Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2574745ybl; Sun, 2 Feb 2020 01:38:11 -0800 (PST) X-Google-Smtp-Source: APXvYqxR8bDrsmx62yXNyyUruyO6fnb5iaCvAzmitOM8orUGz9ROMLgG68ZvCoSFlXMzSGWbdwvk X-Received: by 2002:aca:b483:: with SMTP id d125mr11889363oif.167.1580636291641; Sun, 02 Feb 2020 01:38:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580636291; cv=none; d=google.com; s=arc-20160816; b=UplxOF9Qq/vLP2hkmwRugztu/HLIxxLAJeXMAHQTPzTBoHQgG0JKJ6qDaMN1j+3bhn yPtj8NIwL+CNTToYm0j6QErW+tsooOroFLKFC4gKvhGYdlBv2MnfmM5ZHniUulzxZthE 1MEZ/h9WtCdyVWKCxOVZcySIQIRSTm8Z4Of89v98y4JVzaCgl8I3dk3fQznsQxhfsHkF BjPq/q3fGdljWYKXNxSafwrjEX1p0QmQoDfTCv9ouWD/Xv579DzTJ3RpgLOnqOtw3Nre Tz2aiaA3v9R0FNSKBX34hN1GAnUW/iH54SjmIGMMDoRSnuza7yYZ+25wOnh6I8fe9GtZ JZwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=99Z/UTaimtLK3OxhfNl488uEMo83MVgEG0N6EOsIqdw=; b=gT5zLRUpetbvneZWvpadHwg9kWFLpL9/iubA4kGkSl1hapIu1Hdcq7pGvr0ylvsmPu m6Da2q0NSNuPO1XLBUsLuA0Q4Jx8oQUMe59iOv/ILb5JTJp5LMYcHM418aQSc7goes5h Wsh/OyUop/bSCF1vwfEcCoXXGZV6XghkqXCFXQ32s5C9NqNukMrV5EMkqnP/SQYlg8k1 IGog8/4Q50Nw9OAsaD330Oc6E2z9KNe3MF19bEA1gBkInWt0lNqCs/doR2CgevYtg1Sb BgVRJXsJ2i9hLE+v2ddOmqLLyawexozheUxV1koctFfJ1rihlU43v+QnQ+fIQvtUROxa 82Ug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a3si7303649oib.168.2020.02.02.01.37.59; Sun, 02 Feb 2020 01:38:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726679AbgBBJhI (ORCPT + 99 others); Sun, 2 Feb 2020 04:37:08 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:44150 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725962AbgBBJhI (ORCPT ); Sun, 2 Feb 2020 04:37:08 -0500 Received: from [151.216.132.156] (helo=wittgenstein) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1iyBgc-0006i9-9J; Sun, 02 Feb 2020 09:37:02 +0000 Date: Sun, 2 Feb 2020 10:37:02 +0100 From: Christian Brauner To: Michal =?utf-8?Q?Koutn=C3=BD?= Cc: linux-api@vger.kernel.org, linux-kernel@vger.kernel.org, Tejun Heo , Oleg Nesterov , Ingo Molnar , Johannes Weiner , Li Zefan , Peter Zijlstra , cgroups@vger.kernel.org Subject: Re: [PATCH v5 5/6] clone3: allow spawning processes into cgroups Message-ID: <20200202093702.cdlyytywty7hk3rn@wittgenstein> References: <20200121154844.411-1-christian.brauner@ubuntu.com> <20200121154844.411-6-christian.brauner@ubuntu.com> <20200129132719.GD11384@blackbody.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20200129132719.GD11384@blackbody.suse.cz> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 29, 2020 at 02:27:19PM +0100, Michal Koutný wrote: > Hello. > > On Tue, Jan 21, 2020 at 04:48:43PM +0100, Christian Brauner wrote: > > +static int cgroup_css_set_fork(struct kernel_clone_args *kargs) > > + __acquires(&cgroup_mutex) __acquires(&cgroup_threadgroup_rwsem) > > +{ > > + int ret; > > + struct cgroup *dst_cgrp = NULL; > > + struct css_set *cset; > > + struct super_block *sb; > > + struct file *f; > > + > > + if (kargs->flags & CLONE_INTO_CGROUP) > > + mutex_lock(&cgroup_mutex); > > + > > + cgroup_threadgroup_change_begin(current); > > + > > + spin_lock_irq(&css_set_lock); > > + cset = task_css_set(current); > > + get_css_set(cset); > > + spin_unlock_irq(&css_set_lock); > > + > > + if (!(kargs->flags & CLONE_INTO_CGROUP)) { > > + kargs->cset = cset; > Where is this css_set put when CLONE_INTO_CGROUP isn't used? > (Aha, it's passed to child's tsk->cgroups but see my other note below.) > > > + dst_cgrp = cgroup_get_from_file(f); > > + if (IS_ERR(dst_cgrp)) { > > + ret = PTR_ERR(dst_cgrp); > > + dst_cgrp = NULL; > > + goto err; > > + } > > + > > + /* > > + * Verify that we the target cgroup is writable for us. This is > > + * usually done by the vfs layer but since we're not going through > > + * the vfs layer here we need to do it "manually". > > + */ > > + ret = cgroup_may_write(dst_cgrp, sb); > > + if (ret) > > + goto err; > > + > > + ret = cgroup_attach_permissions(cset->dfl_cgrp, dst_cgrp, sb, > > + !!(kargs->flags & CLONE_THREAD)); > > + if (ret) > > + goto err; > > + > > + kargs->cset = find_css_set(cset, dst_cgrp); > > + if (!kargs->cset) { > > + ret = -ENOMEM; > > + goto err; > > + } > > + > > + if (cgroup_is_dead(dst_cgrp)) { > > + ret = -ENODEV; > > + goto err; > > + } > I'd move this check right after cgroup_get_from_file. The fork-migration > path is synchrinized via cgroup_mutex with cgroup_destroy_locked and > there's no need checking permissions on cgroup that's going away anyway. > > > > +static void cgroup_css_set_put_fork(struct kernel_clone_args *kargs) > > + __releases(&cgroup_threadgroup_rwsem) __releases(&cgroup_mutex) > > +{ > > + cgroup_threadgroup_change_end(current); > > + > > + if (kargs->flags & CLONE_INTO_CGROUP) { > > + struct cgroup *cgrp = kargs->cgrp; > > + struct css_set *cset = kargs->cset; > > + > > + mutex_unlock(&cgroup_mutex); > > + > > + if (cset) { > > + put_css_set(cset); > > + kargs->cset = NULL; > > + } > > + > > + if (cgrp) { > > + cgroup_put(cgrp); > > + kargs->cgrp = NULL; > > + } > > + } > I don't see any function problem with this ordering, however, I'd > prefer symmetry with the "allocation" path (in cgroup_css_set_fork), > i.e. cgroup_put, put_css_set and lastly mutex_unlock. I prefer to yield the mutex as early as possible. > > > +void cgroup_post_fork(struct task_struct *child, > > + struct kernel_clone_args *kargs) > > + __releases(&cgroup_threadgroup_rwsem) __releases(&cgroup_mutex) > > { > > struct cgroup_subsys *ss; > > - struct css_set *cset; > > + struct css_set *cset = kargs->cset; > > int i; > > > > spin_lock_irq(&css_set_lock); > > > > WARN_ON_ONCE(!list_empty(&child->cg_list)); > > - cset = task_css_set(current); /* current is @child's parent */ > > - get_css_set(cset); > > cset->nr_tasks++; > > css_set_move_task(child, NULL, cset, false); > So, the reference is passed over from kargs->cset to task->cgroups. I > think it's necessary to zero kargs->cset in order to prevent droping the > reference in cgroup_css_set_put_fork. cgroup_post_fork() is called past the point of no return for fork and cgroup_css_set_put_fork() is explicitly documented as only being callable before forks point of no return: * Drop references to the prepared css_set and target cgroup if * CLONE_INTO_CGROUP was requested. This function can only be * called before fork()'s point of no return. > Perhaps, a general comment about css_set whereabouts during fork and > kargs passing would be useful. > > > @@ -6016,6 +6146,17 @@ void cgroup_post_fork(struct task_struct *child) > > } while_each_subsys_mask(); > > > > cgroup_threadgroup_change_end(current); > > + > > + if (kargs->flags & CLONE_INTO_CGROUP) { > > + mutex_unlock(&cgroup_mutex); > > + > > + cgroup_put(kargs->cgrp); > > + kargs->cgrp = NULL; > > + } > > + > > + /* Make the new cset the root_cset of the new cgroup namespace. */ > > + if (kargs->flags & CLONE_NEWCGROUP) > > + child->nsproxy->cgroup_ns->root_cset = cset; > root_cset reference (from copy_cgroup_ns) seems leaked here and where is > the additional reference to new cset obtained? This should be: if (kargs->flags & CLONE_NEWCGROUP) { struct css_set *rcset = child->nsproxy->cgroup_ns->root_cset; get_css_set(cset); child->nsproxy->cgroup_ns->root_cset = cset; put_css_set(rcset); } Thanks! Christian