Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1604558pxv; Fri, 16 Jul 2021 13:10:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx1GJKm0lXmjuRCytgxjjH9A44BIx29oy+mN70W0kvngjtVaQxbEGiZZVYTtvmNL252sTCS X-Received: by 2002:a05:6402:cab:: with SMTP id cn11mr17436798edb.308.1626466219514; Fri, 16 Jul 2021 13:10:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626466219; cv=none; d=google.com; s=arc-20160816; b=HZf2WbrodBIuL9IS5nyLPVr94ur9uSCXGBEEbMY39B1t4lZowgyUCe1uqX2vq5OyTh SrxTlGiS0+WvpT35Y5g4CVpK/+s21m5UxL9Ui7wXeEFaMIuxEGb3cX8GwsW42upeTi0j D6RlzxZ3JupAha3+TML/KM+kgG4wH2zP4hG2P5TaB9Wx8++QueRSvA7BG2YiXOZC/VFj w0qokN9DZU5/aGuqymkX4rVucqLkuFYeyaxIcV60Dd/iHNeaIqUejI7L5nebECZ/1K8m 2g1tx5vJpMQEsBv1G3HJNDNwqmL8qAuKTSWrw/m9vaTx+QHapyEwcFS7Y8prPMZyj5Pw OEoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:references:cc :to:subject:from:dkim-signature; bh=Da3jrWfUyIbwMDM6l84hMp2rVe+fWjtYvte2/A1hNbI=; b=YcJmHCd+c6QMvm0FcZdziscCP/RfOUN9/s6qhzc3U7GplyrRcxM6ZFdHGg6o7ExIgn F5Lz85CoAkLFJVzO/XRkKamIvFRCFR6NsQybICGRBEOZv5Rxd5FVXstXK5HzBC8ckyuJ hvKGpktru7s7uLH37N8zpNqjJ4B6QplqFDR3F7oDzeXSSENaN0NcKSM8dH5tUx8C1taj Ne7z5E7IDOA5HMfBssqKHsqP8Gj9NamvYAnDRqYEGVnTr6ohAYCr9ZA1RISbwsNQoMUL 1L+Ies7H2yjAHMNT5u6dYbZWx+1M+29FE6tYXDjHYn/dX7+DU9JoJr3lOP1nR9oOINxI IhDQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=bS2NzdLU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o2si11600996edt.262.2021.07.16.13.09.54; Fri, 16 Jul 2021 13:10:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=bS2NzdLU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229896AbhGPULR (ORCPT + 99 others); Fri, 16 Jul 2021 16:11:17 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:44055 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230172AbhGPULP (ORCPT ); Fri, 16 Jul 2021 16:11:15 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1626466099; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Da3jrWfUyIbwMDM6l84hMp2rVe+fWjtYvte2/A1hNbI=; b=bS2NzdLUhkSK8oiL167ZoMmCXNJIk84wccwJ4Q9f5OWcu3h9BymiH8Y2LQLjq1vk4rEYts JTrM/H3LI0yXszSklG4OMHcuwU7YjWpWGm3FuLQFzrsVg17u2WhVeGk8jBKsdLBRU9NN4W UdkYMHXAUjZpQ6PWtv07KRjfy97cMcQ= Received: from mail-qt1-f197.google.com (mail-qt1-f197.google.com [209.85.160.197]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-16-n86jPxbZNGmUJ4YERWKmlQ-1; Fri, 16 Jul 2021 16:08:18 -0400 X-MC-Unique: n86jPxbZNGmUJ4YERWKmlQ-1 Received: by mail-qt1-f197.google.com with SMTP id 100-20020aed206d0000b029024ea3acef5bso7034610qta.12 for ; Fri, 16 Jul 2021 13:08:17 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:subject:to:cc:references:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=Da3jrWfUyIbwMDM6l84hMp2rVe+fWjtYvte2/A1hNbI=; b=maNbrOuGRGJJ0MgOl4zww8PPP6L1aTp9r0JT/mFOxeZlp1gnozo5x2cDl1QHAW1dYO xDVqVBI+ICgKZ9sQteZu2dThnaAAPySkhVTMj4GCFJlP+BcfNKWPLiRvJIwo/H9yE+e9 v9NJcaWSZ9F7zn+ryYRgluIYVy2wC7gzu2Wo+Jm0+5q8t3gfvWYycvksuPATf806/Rww L3439ra/PabHnLFzzMjkMgIYiL5pdn/4+cI2r+vNmczVmPSLOoztEhY5NOoo0cYWSYs0 BqzwuF8W3Qc0t4ITgJBfUH3eVI2lqUjTNe58BKA3QefWSBw6t00rCDMGYBpV++xjEZiw Kkpw== X-Gm-Message-State: AOAM533TDKw/o488cddgE6dHZnD7v7xWMjYQsf2z84I5wwK0EFeu9MLm J4M79QLu44yxEc9xtdyt2fmiT/kHTVbi0fT8RGF5zbC893U5jUYsukfWwb6dQ3Wi3w1s4pn9tu4 6PYupN0DfjvvweGlzCmbeEw09 X-Received: by 2002:ac8:754a:: with SMTP id b10mr10913335qtr.355.1626466097619; Fri, 16 Jul 2021 13:08:17 -0700 (PDT) X-Received: by 2002:ac8:754a:: with SMTP id b10mr10913314qtr.355.1626466097426; Fri, 16 Jul 2021 13:08:17 -0700 (PDT) Received: from llong.remote.csb ([2601:191:8500:76c0::cdbc]) by smtp.gmail.com with ESMTPSA id h7sm3533020qtq.79.2021.07.16.13.08.15 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 16 Jul 2021 13:08:16 -0700 (PDT) From: Waiman Long X-Google-Original-From: Waiman Long Subject: Re: [PATCH v2 2/6] cgroup/cpuset: Clarify the use of invalid partition root To: Waiman Long , Tejun Heo Cc: Zefan Li , Johannes Weiner , Jonathan Corbet , Shuah Khan , cgroups@vger.kernel.org, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org, Andrew Morton , Roman Gushchin , Phil Auld , Peter Zijlstra , Juri Lelli References: <20210621184924.27493-1-longman@redhat.com> <20210621184924.27493-3-longman@redhat.com> <6ea1ac38-73e1-3f78-a5d2-a4c23bcd8dd1@redhat.com> <1bb119a1-d94a-6707-beac-e3ae5c03fae5@redhat.com> Message-ID: <8c44b659-3fe4-b14f-fac1-cbd5b23010c3@redhat.com> Date: Fri, 16 Jul 2021 16:08:15 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <1bb119a1-d94a-6707-beac-e3ae5c03fae5@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/16/21 2:59 PM, Waiman Long wrote: > On 7/16/21 2:44 PM, Waiman Long wrote: >> On 7/5/21 1:51 PM, Tejun Heo wrote: >>> Hello, Waiman. >>> >>> On Mon, Jun 28, 2021 at 09:06:50AM -0400, Waiman Long wrote: >>>> The main reason for doing this is because normal cpuset control >>>> file actions >>>> are under the direct control of the cpuset code. So it is up to us >>>> to decide >>>> whether to grant it or deny it. Hotplug, on the other hand, is not >>>> under the >>>> control of cpuset code. It can't deny a hotplug operation. This is >>>> the main >>>> reason why the partition root error state was added in the first >>>> place. >>> I have a difficult time convincing myself that this difference >>> justifies the >>> behavior difference and it keeps bothering me that there is a state >>> which >>> can be reached through one path but rejected by the other. I'll >>> continue >>> below. >>> >>>> Normally, users can set cpuset.cpus to whatever value they want >>>> even though >>>> they are not actually granted. However, turning on partition root >>>> is under >>>> more strict control. You can't turn on partition root if the CPUs >>>> requested >>>> cannot actually be granted. The problem with setting the state to just >>>> partition error is that users may not be aware that the partition >>>> creation >>>> operation fails.  We can't assume all users will do the proper error >>>> checking. I would rather let them know the operation fails rather than >>>> relying on them doing the proper check afterward. >>>> >>>> Yes, I agree that it is a different philosophy than the original >>>> cpuset >>>> code, but I thought one reason of doing cgroup v2 is to simplify the >>>> interface and make it a bit more erorr-proof. Since partition root >>>> creation >>>> is a relatively rare operation, we can afford to make it more >>>> strict than >>>> the other operations. >>> So, IMO, one of the reasons why cgroup1 interface was such a mess was >>> because each piece of interaction was designed ad-hoc without regard >>> to the >>> overall consistency. One person feels a particular way of >>> interacting with >>> the interface is "correct" and does it that way and another person does >>> another part in a different way. In the end, we ended up with a messy >>> patchwork. >>> >>> One problematic aspect of cpuset in cgroup1 was the handling of failure >>> modes, which was caused by the same exact approach - we wanted the >>> interface >>> to reject invalid configurations outright even though we didn't have >>> the >>> ability to prevent those configurations from occurring through other >>> paths, >>> which makes the failure mode more subtle by further obscuring them. >>> >>> I think a better approach would be having a clear signal and >>> mechanism to >>> watch the state and explicitly requiring users to verify and monitor >>> the >>> state transitions. >> >> Sorry for the late reply as I was busy with other works. >> >> I agree with you on principle. However, the reason why there are more >> restrictions on enabling partition is because I want to avoid forcing >> the users to always read back cpuset.partition.type to see if the >> operation succeeds instead of just getting an error from the >> operation. The former approach is more error prone. If you don't want >> changes in existing behavior, I can relax the checking and allow them >> to become an invalid partition if an illegal operation happens. >> >> Also there is now another cpuset patch to extend cpu isolation to >> cgroup v1 [1]. I think it is better suit to the cgroup v2 partition >> scheme, but cgroup v1 is still quite heavily out there. >> >> Please let me know what you want me to do and I will send out a v3 >> version. > > Note that the current cpuset partition implementation have implemented > some restrictions on when a partition can be enabled. However, I > missed some corner cases in the original implementation that allow > certain cpuset operations to make a partition invalid. I tried to plug > those holes in this patchset. However, if maintaining backward > compatibility is more important, I can leave those holes and update > the documentation to make sure that people check cpuset.partition.type > to confirm if their operation succeeds. I just realize that partition root set the CPU_EXCLUSIVE bit. So changes to cpuset.cpus that break exclusivity rule is not allowed anyway. This patchset is just adding additional checks so that cpuset.cpus changes that break the partition root rules will not be allowed. I can remove those additional checks for this patchset and allow cpuset.cpus changes that break the partition root rules to make it invalid instead. However, I still want invalid changes to cpuset.partition.type to be disallowed. Cheers, Longman