2019-06-04 16:10:45 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2015-06-09 19:32:10 +08:00
|
|
|
/*
|
|
|
|
* Process number limiting controller for cgroups.
|
|
|
|
*
|
|
|
|
* Used to allow a cgroup hierarchy to stop any new processes from fork()ing
|
|
|
|
* after a certain limit is reached.
|
|
|
|
*
|
|
|
|
* Since it is trivial to hit the task limit without hitting any kmemcg limits
|
|
|
|
* in place, PIDs are a fundamental resource. As such, PID exhaustion must be
|
|
|
|
* preventable in the scope of a cgroup hierarchy by allowing resource limiting
|
|
|
|
* of the number of tasks in a cgroup.
|
|
|
|
*
|
|
|
|
* In order to use the `pids` controller, set the maximum number of tasks in
|
|
|
|
* pids.max (this is not available in the root cgroup for obvious reasons). The
|
|
|
|
* number of processes currently in the cgroup is given by pids.current.
|
|
|
|
* Organisational operations are not blocked by cgroup policies, so it is
|
|
|
|
* possible to have pids.current > pids.max. However, it is not possible to
|
|
|
|
* violate a cgroup policy through fork(). fork() will return -EAGAIN if forking
|
|
|
|
* would cause a cgroup policy to be violated.
|
|
|
|
*
|
|
|
|
* To set a cgroup to have no limit, set pids.max to "max". This is the default
|
|
|
|
* for all new cgroups (N.B. that PID limits are hierarchical, so the most
|
|
|
|
* stringent limit in the hierarchy is followed).
|
|
|
|
*
|
|
|
|
* pids.current tracks all child cgroup hierarchies, so parent/pids.current is
|
|
|
|
* a superset of parent/child/pids.current.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2015 Aleksa Sarai <cyphar@cyphar.com>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/threads.h>
|
|
|
|
#include <linux/atomic.h>
|
|
|
|
#include <linux/cgroup.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
|
|
|
|
#define PIDS_MAX (PID_MAX_LIMIT + 1ULL)
|
|
|
|
#define PIDS_MAX_STR "max"
|
|
|
|
|
|
|
|
struct pids_cgroup {
|
|
|
|
struct cgroup_subsys_state css;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Use 64-bit types so that we can safely represent "max" as
|
|
|
|
* %PIDS_MAX = (%PID_MAX_LIMIT + 1).
|
|
|
|
*/
|
|
|
|
atomic64_t counter;
|
2019-10-16 23:50:01 +08:00
|
|
|
atomic64_t limit;
|
2016-06-22 02:04:36 +08:00
|
|
|
|
|
|
|
/* Handle for "pids.events" */
|
|
|
|
struct cgroup_file events_file;
|
|
|
|
|
|
|
|
/* Number of times fork failed because limit was hit. */
|
|
|
|
atomic64_t events_limit;
|
2015-06-09 19:32:10 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static struct pids_cgroup *css_pids(struct cgroup_subsys_state *css)
|
|
|
|
{
|
|
|
|
return container_of(css, struct pids_cgroup, css);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct pids_cgroup *parent_pids(struct pids_cgroup *pids)
|
|
|
|
{
|
|
|
|
return css_pids(pids->css.parent);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct cgroup_subsys_state *
|
|
|
|
pids_css_alloc(struct cgroup_subsys_state *parent)
|
|
|
|
{
|
|
|
|
struct pids_cgroup *pids;
|
|
|
|
|
|
|
|
pids = kzalloc(sizeof(struct pids_cgroup), GFP_KERNEL);
|
|
|
|
if (!pids)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
|
|
|
atomic64_set(&pids->counter, 0);
|
2019-10-16 23:50:01 +08:00
|
|
|
atomic64_set(&pids->limit, PIDS_MAX);
|
2016-06-22 02:04:36 +08:00
|
|
|
atomic64_set(&pids->events_limit, 0);
|
2015-06-09 19:32:10 +08:00
|
|
|
return &pids->css;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void pids_css_free(struct cgroup_subsys_state *css)
|
|
|
|
{
|
|
|
|
kfree(css_pids(css));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* pids_cancel - uncharge the local pid count
|
|
|
|
* @pids: the pid cgroup state
|
|
|
|
* @num: the number of pids to cancel
|
|
|
|
*
|
|
|
|
* This function will WARN if the pid count goes under 0, because such a case is
|
|
|
|
* a bug in the pids controller proper.
|
|
|
|
*/
|
|
|
|
static void pids_cancel(struct pids_cgroup *pids, int num)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* A negative count (or overflow for that matter) is invalid,
|
|
|
|
* and indicates a bug in the `pids` controller proper.
|
|
|
|
*/
|
|
|
|
WARN_ON_ONCE(atomic64_add_negative(-num, &pids->counter));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* pids_uncharge - hierarchically uncharge the pid count
|
|
|
|
* @pids: the pid cgroup state
|
|
|
|
* @num: the number of pids to uncharge
|
|
|
|
*/
|
|
|
|
static void pids_uncharge(struct pids_cgroup *pids, int num)
|
|
|
|
{
|
|
|
|
struct pids_cgroup *p;
|
|
|
|
|
2015-12-03 23:18:21 +08:00
|
|
|
for (p = pids; parent_pids(p); p = parent_pids(p))
|
2015-06-09 19:32:10 +08:00
|
|
|
pids_cancel(p, num);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* pids_charge - hierarchically charge the pid count
|
|
|
|
* @pids: the pid cgroup state
|
|
|
|
* @num: the number of pids to charge
|
|
|
|
*
|
|
|
|
* This function does *not* follow the pid limit set. It cannot fail and the new
|
|
|
|
* pid count may exceed the limit. This is only used for reverting failed
|
|
|
|
* attaches, where there is no other way out than violating the limit.
|
|
|
|
*/
|
|
|
|
static void pids_charge(struct pids_cgroup *pids, int num)
|
|
|
|
{
|
|
|
|
struct pids_cgroup *p;
|
|
|
|
|
2015-12-03 23:18:21 +08:00
|
|
|
for (p = pids; parent_pids(p); p = parent_pids(p))
|
2015-06-09 19:32:10 +08:00
|
|
|
atomic64_add(num, &p->counter);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* pids_try_charge - hierarchically try to charge the pid count
|
|
|
|
* @pids: the pid cgroup state
|
|
|
|
* @num: the number of pids to charge
|
|
|
|
*
|
|
|
|
* This function follows the set limit. It will fail if the charge would cause
|
|
|
|
* the new value to exceed the hierarchical limit. Returns 0 if the charge
|
2015-12-14 04:13:08 +08:00
|
|
|
* succeeded, otherwise -EAGAIN.
|
2015-06-09 19:32:10 +08:00
|
|
|
*/
|
|
|
|
static int pids_try_charge(struct pids_cgroup *pids, int num)
|
|
|
|
{
|
|
|
|
struct pids_cgroup *p, *q;
|
|
|
|
|
2015-12-03 23:18:21 +08:00
|
|
|
for (p = pids; parent_pids(p); p = parent_pids(p)) {
|
2015-06-09 19:32:10 +08:00
|
|
|
int64_t new = atomic64_add_return(num, &p->counter);
|
2019-10-16 23:50:01 +08:00
|
|
|
int64_t limit = atomic64_read(&p->limit);
|
2015-06-09 19:32:10 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Since new is capped to the maximum number of pid_t, if
|
|
|
|
* p->limit is %PIDS_MAX then we know that this test will never
|
|
|
|
* fail.
|
|
|
|
*/
|
2019-10-16 23:50:01 +08:00
|
|
|
if (new > limit)
|
2015-06-09 19:32:10 +08:00
|
|
|
goto revert;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
revert:
|
|
|
|
for (q = pids; q != p; q = parent_pids(q))
|
|
|
|
pids_cancel(q, num);
|
|
|
|
pids_cancel(p, num);
|
|
|
|
|
|
|
|
return -EAGAIN;
|
|
|
|
}
|
|
|
|
|
cgroup: fix handling of multi-destination migration from subtree_control enabling
Consider the following v2 hierarchy.
P0 (+memory) --- P1 (-memory) --- A
\- B
P0 has memory enabled in its subtree_control while P1 doesn't. If
both A and B contain processes, they would belong to the memory css of
P1. Now if memory is enabled on P1's subtree_control, memory csses
should be created on both A and B and A's processes should be moved to
the former and B's processes the latter. IOW, enabling controllers
can cause atomic migrations into different csses.
The core cgroup migration logic has been updated accordingly but the
controller migration methods haven't and still assume that all tasks
migrate to a single target css; furthermore, the methods were fed the
css in which subtree_control was updated which is the parent of the
target csses. pids controller depends on the migration methods to
move charges and this made the controller attribute charges to the
wrong csses often triggering the following warning by driving a
counter negative.
WARNING: CPU: 1 PID: 1 at kernel/cgroup_pids.c:97 pids_cancel.constprop.6+0x31/0x40()
Modules linked in:
CPU: 1 PID: 1 Comm: systemd Not tainted 4.4.0-rc1+ #29
...
ffffffff81f65382 ffff88007c043b90 ffffffff81551ffc 0000000000000000
ffff88007c043bc8 ffffffff810de202 ffff88007a752000 ffff88007a29ab00
ffff88007c043c80 ffff88007a1d8400 0000000000000001 ffff88007c043bd8
Call Trace:
[<ffffffff81551ffc>] dump_stack+0x4e/0x82
[<ffffffff810de202>] warn_slowpath_common+0x82/0xc0
[<ffffffff810de2fa>] warn_slowpath_null+0x1a/0x20
[<ffffffff8118e031>] pids_cancel.constprop.6+0x31/0x40
[<ffffffff8118e0fd>] pids_can_attach+0x6d/0xf0
[<ffffffff81188a4c>] cgroup_taskset_migrate+0x6c/0x330
[<ffffffff81188e05>] cgroup_migrate+0xf5/0x190
[<ffffffff81189016>] cgroup_attach_task+0x176/0x200
[<ffffffff8118949d>] __cgroup_procs_write+0x2ad/0x460
[<ffffffff81189684>] cgroup_procs_write+0x14/0x20
[<ffffffff811854e5>] cgroup_file_write+0x35/0x1c0
[<ffffffff812e26f1>] kernfs_fop_write+0x141/0x190
[<ffffffff81265f88>] __vfs_write+0x28/0xe0
[<ffffffff812666fc>] vfs_write+0xac/0x1a0
[<ffffffff81267019>] SyS_write+0x49/0xb0
[<ffffffff81bcef32>] entry_SYSCALL_64_fastpath+0x12/0x76
This patch fixes the bug by removing @css parameter from the three
migration methods, ->can_attach, ->cancel_attach() and ->attach() and
updating cgroup_taskset iteration helpers also return the destination
css in addition to the task being migrated. All controllers are
updated accordingly.
* Controllers which don't care whether there are one or multiple
target csses can be converted trivially. cpu, io, freezer, perf,
netclassid and netprio fall in this category.
* cpuset's current implementation assumes that there's single source
and destination and thus doesn't support v2 hierarchy already. The
only change made by this patchset is how that single destination css
is obtained.
* memory migration path already doesn't do anything on v2. How the
single destination css is obtained is updated and the prep stage of
mem_cgroup_can_attach() is reordered to accomodate the change.
* pids is the only controller which was affected by this bug. It now
correctly handles multi-destination migrations and no longer causes
counter underflow from incorrect accounting.
Signed-off-by: Tejun Heo <tj@kernel.org>
Reported-and-tested-by: Daniel Wagner <daniel.wagner@bmw-carit.de>
Cc: Aleksa Sarai <cyphar@cyphar.com>
2015-12-03 23:18:21 +08:00
|
|
|
static int pids_can_attach(struct cgroup_taskset *tset)
|
2015-06-09 19:32:10 +08:00
|
|
|
{
|
|
|
|
struct task_struct *task;
|
cgroup: fix handling of multi-destination migration from subtree_control enabling
Consider the following v2 hierarchy.
P0 (+memory) --- P1 (-memory) --- A
\- B
P0 has memory enabled in its subtree_control while P1 doesn't. If
both A and B contain processes, they would belong to the memory css of
P1. Now if memory is enabled on P1's subtree_control, memory csses
should be created on both A and B and A's processes should be moved to
the former and B's processes the latter. IOW, enabling controllers
can cause atomic migrations into different csses.
The core cgroup migration logic has been updated accordingly but the
controller migration methods haven't and still assume that all tasks
migrate to a single target css; furthermore, the methods were fed the
css in which subtree_control was updated which is the parent of the
target csses. pids controller depends on the migration methods to
move charges and this made the controller attribute charges to the
wrong csses often triggering the following warning by driving a
counter negative.
WARNING: CPU: 1 PID: 1 at kernel/cgroup_pids.c:97 pids_cancel.constprop.6+0x31/0x40()
Modules linked in:
CPU: 1 PID: 1 Comm: systemd Not tainted 4.4.0-rc1+ #29
...
ffffffff81f65382 ffff88007c043b90 ffffffff81551ffc 0000000000000000
ffff88007c043bc8 ffffffff810de202 ffff88007a752000 ffff88007a29ab00
ffff88007c043c80 ffff88007a1d8400 0000000000000001 ffff88007c043bd8
Call Trace:
[<ffffffff81551ffc>] dump_stack+0x4e/0x82
[<ffffffff810de202>] warn_slowpath_common+0x82/0xc0
[<ffffffff810de2fa>] warn_slowpath_null+0x1a/0x20
[<ffffffff8118e031>] pids_cancel.constprop.6+0x31/0x40
[<ffffffff8118e0fd>] pids_can_attach+0x6d/0xf0
[<ffffffff81188a4c>] cgroup_taskset_migrate+0x6c/0x330
[<ffffffff81188e05>] cgroup_migrate+0xf5/0x190
[<ffffffff81189016>] cgroup_attach_task+0x176/0x200
[<ffffffff8118949d>] __cgroup_procs_write+0x2ad/0x460
[<ffffffff81189684>] cgroup_procs_write+0x14/0x20
[<ffffffff811854e5>] cgroup_file_write+0x35/0x1c0
[<ffffffff812e26f1>] kernfs_fop_write+0x141/0x190
[<ffffffff81265f88>] __vfs_write+0x28/0xe0
[<ffffffff812666fc>] vfs_write+0xac/0x1a0
[<ffffffff81267019>] SyS_write+0x49/0xb0
[<ffffffff81bcef32>] entry_SYSCALL_64_fastpath+0x12/0x76
This patch fixes the bug by removing @css parameter from the three
migration methods, ->can_attach, ->cancel_attach() and ->attach() and
updating cgroup_taskset iteration helpers also return the destination
css in addition to the task being migrated. All controllers are
updated accordingly.
* Controllers which don't care whether there are one or multiple
target csses can be converted trivially. cpu, io, freezer, perf,
netclassid and netprio fall in this category.
* cpuset's current implementation assumes that there's single source
and destination and thus doesn't support v2 hierarchy already. The
only change made by this patchset is how that single destination css
is obtained.
* memory migration path already doesn't do anything on v2. How the
single destination css is obtained is updated and the prep stage of
mem_cgroup_can_attach() is reordered to accomodate the change.
* pids is the only controller which was affected by this bug. It now
correctly handles multi-destination migrations and no longer causes
counter underflow from incorrect accounting.
Signed-off-by: Tejun Heo <tj@kernel.org>
Reported-and-tested-by: Daniel Wagner <daniel.wagner@bmw-carit.de>
Cc: Aleksa Sarai <cyphar@cyphar.com>
2015-12-03 23:18:21 +08:00
|
|
|
struct cgroup_subsys_state *dst_css;
|
2015-06-09 19:32:10 +08:00
|
|
|
|
cgroup: fix handling of multi-destination migration from subtree_control enabling
Consider the following v2 hierarchy.
P0 (+memory) --- P1 (-memory) --- A
\- B
P0 has memory enabled in its subtree_control while P1 doesn't. If
both A and B contain processes, they would belong to the memory css of
P1. Now if memory is enabled on P1's subtree_control, memory csses
should be created on both A and B and A's processes should be moved to
the former and B's processes the latter. IOW, enabling controllers
can cause atomic migrations into different csses.
The core cgroup migration logic has been updated accordingly but the
controller migration methods haven't and still assume that all tasks
migrate to a single target css; furthermore, the methods were fed the
css in which subtree_control was updated which is the parent of the
target csses. pids controller depends on the migration methods to
move charges and this made the controller attribute charges to the
wrong csses often triggering the following warning by driving a
counter negative.
WARNING: CPU: 1 PID: 1 at kernel/cgroup_pids.c:97 pids_cancel.constprop.6+0x31/0x40()
Modules linked in:
CPU: 1 PID: 1 Comm: systemd Not tainted 4.4.0-rc1+ #29
...
ffffffff81f65382 ffff88007c043b90 ffffffff81551ffc 0000000000000000
ffff88007c043bc8 ffffffff810de202 ffff88007a752000 ffff88007a29ab00
ffff88007c043c80 ffff88007a1d8400 0000000000000001 ffff88007c043bd8
Call Trace:
[<ffffffff81551ffc>] dump_stack+0x4e/0x82
[<ffffffff810de202>] warn_slowpath_common+0x82/0xc0
[<ffffffff810de2fa>] warn_slowpath_null+0x1a/0x20
[<ffffffff8118e031>] pids_cancel.constprop.6+0x31/0x40
[<ffffffff8118e0fd>] pids_can_attach+0x6d/0xf0
[<ffffffff81188a4c>] cgroup_taskset_migrate+0x6c/0x330
[<ffffffff81188e05>] cgroup_migrate+0xf5/0x190
[<ffffffff81189016>] cgroup_attach_task+0x176/0x200
[<ffffffff8118949d>] __cgroup_procs_write+0x2ad/0x460
[<ffffffff81189684>] cgroup_procs_write+0x14/0x20
[<ffffffff811854e5>] cgroup_file_write+0x35/0x1c0
[<ffffffff812e26f1>] kernfs_fop_write+0x141/0x190
[<ffffffff81265f88>] __vfs_write+0x28/0xe0
[<ffffffff812666fc>] vfs_write+0xac/0x1a0
[<ffffffff81267019>] SyS_write+0x49/0xb0
[<ffffffff81bcef32>] entry_SYSCALL_64_fastpath+0x12/0x76
This patch fixes the bug by removing @css parameter from the three
migration methods, ->can_attach, ->cancel_attach() and ->attach() and
updating cgroup_taskset iteration helpers also return the destination
css in addition to the task being migrated. All controllers are
updated accordingly.
* Controllers which don't care whether there are one or multiple
target csses can be converted trivially. cpu, io, freezer, perf,
netclassid and netprio fall in this category.
* cpuset's current implementation assumes that there's single source
and destination and thus doesn't support v2 hierarchy already. The
only change made by this patchset is how that single destination css
is obtained.
* memory migration path already doesn't do anything on v2. How the
single destination css is obtained is updated and the prep stage of
mem_cgroup_can_attach() is reordered to accomodate the change.
* pids is the only controller which was affected by this bug. It now
correctly handles multi-destination migrations and no longer causes
counter underflow from incorrect accounting.
Signed-off-by: Tejun Heo <tj@kernel.org>
Reported-and-tested-by: Daniel Wagner <daniel.wagner@bmw-carit.de>
Cc: Aleksa Sarai <cyphar@cyphar.com>
2015-12-03 23:18:21 +08:00
|
|
|
cgroup_taskset_for_each(task, dst_css, tset) {
|
|
|
|
struct pids_cgroup *pids = css_pids(dst_css);
|
2015-06-09 19:32:10 +08:00
|
|
|
struct cgroup_subsys_state *old_css;
|
|
|
|
struct pids_cgroup *old_pids;
|
|
|
|
|
|
|
|
/*
|
2015-08-25 10:50:44 +08:00
|
|
|
* No need to pin @old_css between here and cancel_attach()
|
|
|
|
* because cgroup core protects it from being freed before
|
|
|
|
* the migration completes or fails.
|
2015-06-09 19:32:10 +08:00
|
|
|
*/
|
2015-08-25 10:50:44 +08:00
|
|
|
old_css = task_css(task, pids_cgrp_id);
|
2015-06-09 19:32:10 +08:00
|
|
|
old_pids = css_pids(old_css);
|
|
|
|
|
|
|
|
pids_charge(pids, 1);
|
|
|
|
pids_uncharge(old_pids, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
cgroup: fix handling of multi-destination migration from subtree_control enabling
Consider the following v2 hierarchy.
P0 (+memory) --- P1 (-memory) --- A
\- B
P0 has memory enabled in its subtree_control while P1 doesn't. If
both A and B contain processes, they would belong to the memory css of
P1. Now if memory is enabled on P1's subtree_control, memory csses
should be created on both A and B and A's processes should be moved to
the former and B's processes the latter. IOW, enabling controllers
can cause atomic migrations into different csses.
The core cgroup migration logic has been updated accordingly but the
controller migration methods haven't and still assume that all tasks
migrate to a single target css; furthermore, the methods were fed the
css in which subtree_control was updated which is the parent of the
target csses. pids controller depends on the migration methods to
move charges and this made the controller attribute charges to the
wrong csses often triggering the following warning by driving a
counter negative.
WARNING: CPU: 1 PID: 1 at kernel/cgroup_pids.c:97 pids_cancel.constprop.6+0x31/0x40()
Modules linked in:
CPU: 1 PID: 1 Comm: systemd Not tainted 4.4.0-rc1+ #29
...
ffffffff81f65382 ffff88007c043b90 ffffffff81551ffc 0000000000000000
ffff88007c043bc8 ffffffff810de202 ffff88007a752000 ffff88007a29ab00
ffff88007c043c80 ffff88007a1d8400 0000000000000001 ffff88007c043bd8
Call Trace:
[<ffffffff81551ffc>] dump_stack+0x4e/0x82
[<ffffffff810de202>] warn_slowpath_common+0x82/0xc0
[<ffffffff810de2fa>] warn_slowpath_null+0x1a/0x20
[<ffffffff8118e031>] pids_cancel.constprop.6+0x31/0x40
[<ffffffff8118e0fd>] pids_can_attach+0x6d/0xf0
[<ffffffff81188a4c>] cgroup_taskset_migrate+0x6c/0x330
[<ffffffff81188e05>] cgroup_migrate+0xf5/0x190
[<ffffffff81189016>] cgroup_attach_task+0x176/0x200
[<ffffffff8118949d>] __cgroup_procs_write+0x2ad/0x460
[<ffffffff81189684>] cgroup_procs_write+0x14/0x20
[<ffffffff811854e5>] cgroup_file_write+0x35/0x1c0
[<ffffffff812e26f1>] kernfs_fop_write+0x141/0x190
[<ffffffff81265f88>] __vfs_write+0x28/0xe0
[<ffffffff812666fc>] vfs_write+0xac/0x1a0
[<ffffffff81267019>] SyS_write+0x49/0xb0
[<ffffffff81bcef32>] entry_SYSCALL_64_fastpath+0x12/0x76
This patch fixes the bug by removing @css parameter from the three
migration methods, ->can_attach, ->cancel_attach() and ->attach() and
updating cgroup_taskset iteration helpers also return the destination
css in addition to the task being migrated. All controllers are
updated accordingly.
* Controllers which don't care whether there are one or multiple
target csses can be converted trivially. cpu, io, freezer, perf,
netclassid and netprio fall in this category.
* cpuset's current implementation assumes that there's single source
and destination and thus doesn't support v2 hierarchy already. The
only change made by this patchset is how that single destination css
is obtained.
* memory migration path already doesn't do anything on v2. How the
single destination css is obtained is updated and the prep stage of
mem_cgroup_can_attach() is reordered to accomodate the change.
* pids is the only controller which was affected by this bug. It now
correctly handles multi-destination migrations and no longer causes
counter underflow from incorrect accounting.
Signed-off-by: Tejun Heo <tj@kernel.org>
Reported-and-tested-by: Daniel Wagner <daniel.wagner@bmw-carit.de>
Cc: Aleksa Sarai <cyphar@cyphar.com>
2015-12-03 23:18:21 +08:00
|
|
|
static void pids_cancel_attach(struct cgroup_taskset *tset)
|
2015-06-09 19:32:10 +08:00
|
|
|
{
|
|
|
|
struct task_struct *task;
|
cgroup: fix handling of multi-destination migration from subtree_control enabling
Consider the following v2 hierarchy.
P0 (+memory) --- P1 (-memory) --- A
\- B
P0 has memory enabled in its subtree_control while P1 doesn't. If
both A and B contain processes, they would belong to the memory css of
P1. Now if memory is enabled on P1's subtree_control, memory csses
should be created on both A and B and A's processes should be moved to
the former and B's processes the latter. IOW, enabling controllers
can cause atomic migrations into different csses.
The core cgroup migration logic has been updated accordingly but the
controller migration methods haven't and still assume that all tasks
migrate to a single target css; furthermore, the methods were fed the
css in which subtree_control was updated which is the parent of the
target csses. pids controller depends on the migration methods to
move charges and this made the controller attribute charges to the
wrong csses often triggering the following warning by driving a
counter negative.
WARNING: CPU: 1 PID: 1 at kernel/cgroup_pids.c:97 pids_cancel.constprop.6+0x31/0x40()
Modules linked in:
CPU: 1 PID: 1 Comm: systemd Not tainted 4.4.0-rc1+ #29
...
ffffffff81f65382 ffff88007c043b90 ffffffff81551ffc 0000000000000000
ffff88007c043bc8 ffffffff810de202 ffff88007a752000 ffff88007a29ab00
ffff88007c043c80 ffff88007a1d8400 0000000000000001 ffff88007c043bd8
Call Trace:
[<ffffffff81551ffc>] dump_stack+0x4e/0x82
[<ffffffff810de202>] warn_slowpath_common+0x82/0xc0
[<ffffffff810de2fa>] warn_slowpath_null+0x1a/0x20
[<ffffffff8118e031>] pids_cancel.constprop.6+0x31/0x40
[<ffffffff8118e0fd>] pids_can_attach+0x6d/0xf0
[<ffffffff81188a4c>] cgroup_taskset_migrate+0x6c/0x330
[<ffffffff81188e05>] cgroup_migrate+0xf5/0x190
[<ffffffff81189016>] cgroup_attach_task+0x176/0x200
[<ffffffff8118949d>] __cgroup_procs_write+0x2ad/0x460
[<ffffffff81189684>] cgroup_procs_write+0x14/0x20
[<ffffffff811854e5>] cgroup_file_write+0x35/0x1c0
[<ffffffff812e26f1>] kernfs_fop_write+0x141/0x190
[<ffffffff81265f88>] __vfs_write+0x28/0xe0
[<ffffffff812666fc>] vfs_write+0xac/0x1a0
[<ffffffff81267019>] SyS_write+0x49/0xb0
[<ffffffff81bcef32>] entry_SYSCALL_64_fastpath+0x12/0x76
This patch fixes the bug by removing @css parameter from the three
migration methods, ->can_attach, ->cancel_attach() and ->attach() and
updating cgroup_taskset iteration helpers also return the destination
css in addition to the task being migrated. All controllers are
updated accordingly.
* Controllers which don't care whether there are one or multiple
target csses can be converted trivially. cpu, io, freezer, perf,
netclassid and netprio fall in this category.
* cpuset's current implementation assumes that there's single source
and destination and thus doesn't support v2 hierarchy already. The
only change made by this patchset is how that single destination css
is obtained.
* memory migration path already doesn't do anything on v2. How the
single destination css is obtained is updated and the prep stage of
mem_cgroup_can_attach() is reordered to accomodate the change.
* pids is the only controller which was affected by this bug. It now
correctly handles multi-destination migrations and no longer causes
counter underflow from incorrect accounting.
Signed-off-by: Tejun Heo <tj@kernel.org>
Reported-and-tested-by: Daniel Wagner <daniel.wagner@bmw-carit.de>
Cc: Aleksa Sarai <cyphar@cyphar.com>
2015-12-03 23:18:21 +08:00
|
|
|
struct cgroup_subsys_state *dst_css;
|
2015-06-09 19:32:10 +08:00
|
|
|
|
cgroup: fix handling of multi-destination migration from subtree_control enabling
Consider the following v2 hierarchy.
P0 (+memory) --- P1 (-memory) --- A
\- B
P0 has memory enabled in its subtree_control while P1 doesn't. If
both A and B contain processes, they would belong to the memory css of
P1. Now if memory is enabled on P1's subtree_control, memory csses
should be created on both A and B and A's processes should be moved to
the former and B's processes the latter. IOW, enabling controllers
can cause atomic migrations into different csses.
The core cgroup migration logic has been updated accordingly but the
controller migration methods haven't and still assume that all tasks
migrate to a single target css; furthermore, the methods were fed the
css in which subtree_control was updated which is the parent of the
target csses. pids controller depends on the migration methods to
move charges and this made the controller attribute charges to the
wrong csses often triggering the following warning by driving a
counter negative.
WARNING: CPU: 1 PID: 1 at kernel/cgroup_pids.c:97 pids_cancel.constprop.6+0x31/0x40()
Modules linked in:
CPU: 1 PID: 1 Comm: systemd Not tainted 4.4.0-rc1+ #29
...
ffffffff81f65382 ffff88007c043b90 ffffffff81551ffc 0000000000000000
ffff88007c043bc8 ffffffff810de202 ffff88007a752000 ffff88007a29ab00
ffff88007c043c80 ffff88007a1d8400 0000000000000001 ffff88007c043bd8
Call Trace:
[<ffffffff81551ffc>] dump_stack+0x4e/0x82
[<ffffffff810de202>] warn_slowpath_common+0x82/0xc0
[<ffffffff810de2fa>] warn_slowpath_null+0x1a/0x20
[<ffffffff8118e031>] pids_cancel.constprop.6+0x31/0x40
[<ffffffff8118e0fd>] pids_can_attach+0x6d/0xf0
[<ffffffff81188a4c>] cgroup_taskset_migrate+0x6c/0x330
[<ffffffff81188e05>] cgroup_migrate+0xf5/0x190
[<ffffffff81189016>] cgroup_attach_task+0x176/0x200
[<ffffffff8118949d>] __cgroup_procs_write+0x2ad/0x460
[<ffffffff81189684>] cgroup_procs_write+0x14/0x20
[<ffffffff811854e5>] cgroup_file_write+0x35/0x1c0
[<ffffffff812e26f1>] kernfs_fop_write+0x141/0x190
[<ffffffff81265f88>] __vfs_write+0x28/0xe0
[<ffffffff812666fc>] vfs_write+0xac/0x1a0
[<ffffffff81267019>] SyS_write+0x49/0xb0
[<ffffffff81bcef32>] entry_SYSCALL_64_fastpath+0x12/0x76
This patch fixes the bug by removing @css parameter from the three
migration methods, ->can_attach, ->cancel_attach() and ->attach() and
updating cgroup_taskset iteration helpers also return the destination
css in addition to the task being migrated. All controllers are
updated accordingly.
* Controllers which don't care whether there are one or multiple
target csses can be converted trivially. cpu, io, freezer, perf,
netclassid and netprio fall in this category.
* cpuset's current implementation assumes that there's single source
and destination and thus doesn't support v2 hierarchy already. The
only change made by this patchset is how that single destination css
is obtained.
* memory migration path already doesn't do anything on v2. How the
single destination css is obtained is updated and the prep stage of
mem_cgroup_can_attach() is reordered to accomodate the change.
* pids is the only controller which was affected by this bug. It now
correctly handles multi-destination migrations and no longer causes
counter underflow from incorrect accounting.
Signed-off-by: Tejun Heo <tj@kernel.org>
Reported-and-tested-by: Daniel Wagner <daniel.wagner@bmw-carit.de>
Cc: Aleksa Sarai <cyphar@cyphar.com>
2015-12-03 23:18:21 +08:00
|
|
|
cgroup_taskset_for_each(task, dst_css, tset) {
|
|
|
|
struct pids_cgroup *pids = css_pids(dst_css);
|
2015-06-09 19:32:10 +08:00
|
|
|
struct cgroup_subsys_state *old_css;
|
|
|
|
struct pids_cgroup *old_pids;
|
|
|
|
|
|
|
|
old_css = task_css(task, pids_cgrp_id);
|
|
|
|
old_pids = css_pids(old_css);
|
|
|
|
|
|
|
|
pids_charge(old_pids, 1);
|
|
|
|
pids_uncharge(pids, 1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-11-28 02:57:22 +08:00
|
|
|
/*
|
|
|
|
* task_css_check(true) in pids_can_fork() and pids_cancel_fork() relies
|
2017-02-02 18:50:56 +08:00
|
|
|
* on cgroup_threadgroup_change_begin() held by the copy_process().
|
2015-11-28 02:57:22 +08:00
|
|
|
*/
|
2015-12-03 23:24:08 +08:00
|
|
|
static int pids_can_fork(struct task_struct *task)
|
2015-06-09 19:32:10 +08:00
|
|
|
{
|
|
|
|
struct cgroup_subsys_state *css;
|
|
|
|
struct pids_cgroup *pids;
|
2016-06-22 02:04:36 +08:00
|
|
|
int err;
|
2015-06-09 19:32:10 +08:00
|
|
|
|
2015-11-28 02:57:22 +08:00
|
|
|
css = task_css_check(current, pids_cgrp_id, true);
|
2015-06-09 19:32:10 +08:00
|
|
|
pids = css_pids(css);
|
2016-06-22 02:04:36 +08:00
|
|
|
err = pids_try_charge(pids, 1);
|
|
|
|
if (err) {
|
|
|
|
/* Only log the first time events_limit is incremented. */
|
|
|
|
if (atomic64_inc_return(&pids->events_limit) == 1) {
|
|
|
|
pr_info("cgroup: fork rejected by pids controller in ");
|
2017-03-02 04:39:07 +08:00
|
|
|
pr_cont_cgroup_path(css->cgroup);
|
2016-06-22 02:04:36 +08:00
|
|
|
pr_cont("\n");
|
|
|
|
}
|
|
|
|
cgroup_file_notify(&pids->events_file);
|
|
|
|
}
|
|
|
|
return err;
|
2015-06-09 19:32:10 +08:00
|
|
|
}
|
|
|
|
|
2015-12-03 23:24:08 +08:00
|
|
|
static void pids_cancel_fork(struct task_struct *task)
|
2015-06-09 19:32:10 +08:00
|
|
|
{
|
2015-11-28 02:57:22 +08:00
|
|
|
struct cgroup_subsys_state *css;
|
|
|
|
struct pids_cgroup *pids;
|
2015-06-09 19:32:10 +08:00
|
|
|
|
2015-11-28 02:57:22 +08:00
|
|
|
css = task_css_check(current, pids_cgrp_id, true);
|
|
|
|
pids = css_pids(css);
|
2015-06-09 19:32:10 +08:00
|
|
|
pids_uncharge(pids, 1);
|
|
|
|
}
|
|
|
|
|
2019-01-29 00:00:13 +08:00
|
|
|
static void pids_release(struct task_struct *task)
|
2015-06-09 19:32:10 +08:00
|
|
|
{
|
2015-10-16 04:41:53 +08:00
|
|
|
struct pids_cgroup *pids = css_pids(task_css(task, pids_cgrp_id));
|
2015-06-09 19:32:10 +08:00
|
|
|
|
|
|
|
pids_uncharge(pids, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t pids_max_write(struct kernfs_open_file *of, char *buf,
|
|
|
|
size_t nbytes, loff_t off)
|
|
|
|
{
|
|
|
|
struct cgroup_subsys_state *css = of_css(of);
|
|
|
|
struct pids_cgroup *pids = css_pids(css);
|
|
|
|
int64_t limit;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
buf = strstrip(buf);
|
|
|
|
if (!strcmp(buf, PIDS_MAX_STR)) {
|
|
|
|
limit = PIDS_MAX;
|
|
|
|
goto set_limit;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = kstrtoll(buf, 0, &limit);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
if (limit < 0 || limit >= PIDS_MAX)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
set_limit:
|
|
|
|
/*
|
|
|
|
* Limit updates don't need to be mutex'd, since it isn't
|
|
|
|
* critical that any racing fork()s follow the new limit.
|
|
|
|
*/
|
2019-10-16 23:50:01 +08:00
|
|
|
atomic64_set(&pids->limit, limit);
|
2015-06-09 19:32:10 +08:00
|
|
|
return nbytes;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int pids_max_show(struct seq_file *sf, void *v)
|
|
|
|
{
|
|
|
|
struct cgroup_subsys_state *css = seq_css(sf);
|
|
|
|
struct pids_cgroup *pids = css_pids(css);
|
2019-10-16 23:50:01 +08:00
|
|
|
int64_t limit = atomic64_read(&pids->limit);
|
2015-06-09 19:32:10 +08:00
|
|
|
|
|
|
|
if (limit >= PIDS_MAX)
|
|
|
|
seq_printf(sf, "%s\n", PIDS_MAX_STR);
|
|
|
|
else
|
|
|
|
seq_printf(sf, "%lld\n", limit);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static s64 pids_current_read(struct cgroup_subsys_state *css,
|
|
|
|
struct cftype *cft)
|
|
|
|
{
|
|
|
|
struct pids_cgroup *pids = css_pids(css);
|
|
|
|
|
|
|
|
return atomic64_read(&pids->counter);
|
|
|
|
}
|
|
|
|
|
2016-06-22 02:04:36 +08:00
|
|
|
static int pids_events_show(struct seq_file *sf, void *v)
|
|
|
|
{
|
|
|
|
struct pids_cgroup *pids = css_pids(seq_css(sf));
|
|
|
|
|
2016-06-22 02:55:35 +08:00
|
|
|
seq_printf(sf, "max %lld\n", (s64)atomic64_read(&pids->events_limit));
|
2016-06-22 02:04:36 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-06-09 19:32:10 +08:00
|
|
|
static struct cftype pids_files[] = {
|
|
|
|
{
|
|
|
|
.name = "max",
|
|
|
|
.write = pids_max_write,
|
|
|
|
.seq_show = pids_max_show,
|
|
|
|
.flags = CFTYPE_NOT_ON_ROOT,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.name = "current",
|
|
|
|
.read_s64 = pids_current_read,
|
2015-12-03 23:18:21 +08:00
|
|
|
.flags = CFTYPE_NOT_ON_ROOT,
|
2015-06-09 19:32:10 +08:00
|
|
|
},
|
2016-06-22 02:04:36 +08:00
|
|
|
{
|
|
|
|
.name = "events",
|
|
|
|
.seq_show = pids_events_show,
|
|
|
|
.file_offset = offsetof(struct pids_cgroup, events_file),
|
|
|
|
.flags = CFTYPE_NOT_ON_ROOT,
|
|
|
|
},
|
2015-06-09 19:32:10 +08:00
|
|
|
{ } /* terminate */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct cgroup_subsys pids_cgrp_subsys = {
|
|
|
|
.css_alloc = pids_css_alloc,
|
|
|
|
.css_free = pids_css_free,
|
|
|
|
.can_attach = pids_can_attach,
|
|
|
|
.cancel_attach = pids_cancel_attach,
|
|
|
|
.can_fork = pids_can_fork,
|
|
|
|
.cancel_fork = pids_cancel_fork,
|
2019-01-29 00:00:13 +08:00
|
|
|
.release = pids_release,
|
2015-06-09 19:32:10 +08:00
|
|
|
.legacy_cftypes = pids_files,
|
|
|
|
.dfl_cftypes = pids_files,
|
cgroup: implement cgroup v2 thread support
This patch implements cgroup v2 thread support. The goal of the
thread mode is supporting hierarchical accounting and control at
thread granularity while staying inside the resource domain model
which allows coordination across different resource controllers and
handling of anonymous resource consumptions.
A cgroup is always created as a domain and can be made threaded by
writing to the "cgroup.type" file. When a cgroup becomes threaded, it
becomes a member of a threaded subtree which is anchored at the
closest ancestor which isn't threaded.
The threads of the processes which are in a threaded subtree can be
placed anywhere without being restricted by process granularity or
no-internal-process constraint. Note that the threads aren't allowed
to escape to a different threaded subtree. To be used inside a
threaded subtree, a controller should explicitly support threaded mode
and be able to handle internal competition in the way which is
appropriate for the resource.
The root of a threaded subtree, the nearest ancestor which isn't
threaded, is called the threaded domain and serves as the resource
domain for the whole subtree. This is the last cgroup where domain
controllers are operational and where all the domain-level resource
consumptions in the subtree are accounted. This allows threaded
controllers to operate at thread granularity when requested while
staying inside the scope of system-level resource distribution.
As the root cgroup is exempt from the no-internal-process constraint,
it can serve as both a threaded domain and a parent to normal cgroups,
so, unlike non-root cgroups, the root cgroup can have both domain and
threaded children.
Internally, in a threaded subtree, each css_set has its ->dom_cset
pointing to a matching css_set which belongs to the threaded domain.
This ensures that thread root level cgroup_subsys_state for all
threaded controllers are readily accessible for domain-level
operations.
This patch enables threaded mode for the pids and perf_events
controllers. Neither has to worry about domain-level resource
consumptions and it's enough to simply set the flag.
For more details on the interface and behavior of the thread mode,
please refer to the section 2-2-2 in Documentation/cgroup-v2.txt added
by this patch.
v5: - Dropped silly no-op ->dom_cgrp init from cgroup_create().
Spotted by Waiman.
- Documentation updated as suggested by Waiman.
- cgroup.type content slightly reformatted.
- Mark the debug controller threaded.
v4: - Updated to the general idea of marking specific cgroups
domain/threaded as suggested by PeterZ.
v3: - Dropped "join" and always make mixed children join the parent's
threaded subtree.
v2: - After discussions with Waiman, support for mixed thread mode is
added. This should address the issue that Peter pointed out
where any nesting should be avoided for thread subtrees while
coexisting with other domain cgroups.
- Enabling / disabling thread mode now piggy backs on the existing
control mask update mechanism.
- Bug fixes and cleanup.
Signed-off-by: Tejun Heo <tj@kernel.org>
Cc: Waiman Long <longman@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
2017-07-21 23:14:51 +08:00
|
|
|
.threaded = true,
|
2015-06-09 19:32:10 +08:00
|
|
|
};
|