Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1292750imu; Thu, 20 Dec 2018 13:39:01 -0800 (PST) X-Google-Smtp-Source: AFSGD/VxPm4HSWyYihWTblmLqLEdQLGHN0KB/KwuFOIXty4R4EVTO3hYzmv4ItjCOwF/nXlxX5iJ X-Received: by 2002:a62:83ce:: with SMTP id h197mr25657595pfe.187.1545341941085; Thu, 20 Dec 2018 13:39:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545341941; cv=none; d=google.com; s=arc-20160816; b=H9xNeDg6Q5O6G8NvQeo+qqD6N/c0fmSq/02YkQptQjxerMLB2jWRPKldD5OPV3Nd+4 NLCjnOI7qoPatTMEm4WRxs/TSm430XWUAr8AQuk5r4Is4HEluAWiYzDDH2rpSqIJJTeu 7cl7JigLK2Y5j5xEILUNmcZCRHb2iq/zQu5dJkpvSp1e+1Jns4kArg5NLJHZgbU109Ip m/fYHDt3/zb7nJJMHI9mez9z5vc5LZbF2hkMedunedoLSGAQm9yyyXi+PBV8uKKcPB05 B6XrWwfmSyYxfyDoyTBtLIGGeZyKkH57iF7WTIGOeqrcj4Q3nGLQtgk8j/OaTc2j3yHc 780Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=T4VmQYXNUpFz+WYmgHWSdv1QkKo9XP2DqzBx6ry0QGI=; b=zMNBGnxi5ZsasCFkpWGyb+0n9JziT+8+uVvVrn7GDN9vOzplxfw4YrI392N2ZX9HnC 6KMubPoKoSIPNcsl30OVCzs0sh2PN+ej/wgnEMf4DnRIygqT7y9nCkjYCHm5inKOOfDm duXEclmJWOh+fD0CmDHIEPMwD57/zZf3Ho60C7KcJxhfptjRc/OrP37FcRXYPwXA/Teo zUFKWXNN1PerygmBmGWQ+L3s2hUHYiWuJTze0/e/NLT2qlqrApG3xTUzvaAbX31nsfsY 8TCG1f2QFwuUKLk1JbpZ1tfGD4p6E+thgrEQrG6jqm9XmDHEVwT5xkPdxXLVXdZe7OOs Q55Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x33si8697301plb.43.2018.12.20.13.38.45; Thu, 20 Dec 2018 13:39:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732439AbeLTQQy (ORCPT + 99 others); Thu, 20 Dec 2018 11:16:54 -0500 Received: from mx1.redhat.com ([209.132.183.28]:50126 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728803AbeLTQQx (ORCPT ); Thu, 20 Dec 2018 11:16:53 -0500 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id D98EA169741; Thu, 20 Dec 2018 16:16:52 +0000 (UTC) Received: from dhcp-27-174.brq.redhat.com (unknown [10.43.17.131]) by smtp.corp.redhat.com (Postfix) with SMTP id 01EDB6B645; Thu, 20 Dec 2018 16:16:50 +0000 (UTC) Received: by dhcp-27-174.brq.redhat.com (nbSMTP-1.00) for uid 1000 oleg@redhat.com; Thu, 20 Dec 2018 17:16:52 +0100 (CET) Date: Thu, 20 Dec 2018 17:16:50 +0100 From: Oleg Nesterov To: Roman Gushchin Cc: Roman Gushchin , Tejun Heo , Dan Carpenter , Mike Rapoport , "cgroups@vger.kernel.org" , "linux-doc@vger.kernel.org" , "linux-kernel@vger.kernel.org" , Kernel Team Subject: Re: [PATCH v5 4/7] cgroup: cgroup v2 freezer Message-ID: <20181220161649.GA31865@redhat.com> References: <20181207201531.1665-1-guro@fb.com> <20181207201531.1665-5-guro@fb.com> <20181211162632.GB8504@redhat.com> <20181211184033.GA8971@tower.DHCP.thefacebook.com> <20181212174902.GA30309@redhat.com> <20181218012800.GA29563@tower.DHCP.thefacebook.com> <20181218171230.GA11319@redhat.com> <20181218202701.GA12730@castle.DHCP.thefacebook.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181218202701.GA12730@castle.DHCP.thefacebook.com> User-Agent: Mutt/1.5.24 (2015-08-30) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.30]); Thu, 20 Dec 2018 16:16:53 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/18, Roman Gushchin wrote: > > > > > > --- a/kernel/freezer.c > > > > > +++ b/kernel/freezer.c > > > > > @@ -134,7 +134,7 @@ bool freeze_task(struct task_struct *p) > > > > > return false; > > > > > > > > > > spin_lock_irqsave(&freezer_lock, flags); > > > > > - if (!freezing(p) || frozen(p)) { > > > > > + if (!freezing(p) || frozen(p) || cgroup_task_frozen()) { > > > > > spin_unlock_irqrestore(&freezer_lock, flags); > > > > > return false; > > > > > } > > > > > > > > > > -- > > > > > > > > > > If the task is already frozen by the cgroup freezer, we don't have to do > > > > > anything additionally. > > > > > > > > I don't think so. A cgroup_task_frozen() task can be killed after > > > > try_to_freeze_tasks() succeeds, and the exiting task can close files, > > > > do IO, etc. Or it can be thawed by cgroup_freeze_task(false). > > > > > > > > In short, if try_to_freeze_tasks() succeeds, the caller has all rights > > > > to assume that nobody can escape from __refrigerator(). > > > > > > But this is what we do with stopped and ptraced tasks, isn't it? > > > > No, > > > > > We do use freezable_schedule() and the system freezer just ignores such tasks. > > > > static inline void freezable_schedule(void) > > { > > freezer_do_not_count(); > > schedule(); > > freezer_count(); > > } > > > > and note that freezer_count() calls try_to_freeze(). > > > > IOW, the task sleeping in freezable_schedule() doesn't really differ from the > > task sleeping in __refrigerator(). It is not that "the system freezer just > > ignores such tasks", it ignores them because it can safely count them as frozen. > > Right, so the task is sleeping peacefully, and we know, that it won't get > anywhere, because we'll catch it in freezer_count(). We allow it to sleep > there, we don't force it to __refrigerator(), and we treat it as frozen. > > How's that different to cgroup v2 freezer? If the task is frozen by cgroup v2 > freezer, let it sleep there, and catch if it tries to escape. Exactly as it > works for SIGSTOP. > > Am I missing something? Roman, perhaps we misunderstood each other... I still think that the cgroup_task_frozen() check in freeze_task() you proposed a) is not right, and b) it is not what we do with the STOPPED/TRACED tasks which call freezable_schedule(). This is what I tried to say. If you meant that freezer v2 can too use freezable_schedule() - I agree. > So, you think that v2 freezer should follow the same approach, and allow tasks > sleeping on SIGSTOP, for instance, to be treated as frozen? > Hm, maybe. I have to think more here. I think this would be nice. Otherwise, say, CGRP_FREEZE can be never reported if I read this code correctly. And this looks "symmetrical" with the fact that a ->frozen task reacts to SIGSTOP and it is still treated as frozen after that. Oleg.