Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp756716pxb; Fri, 22 Apr 2022 10:29:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz+BnyeL4aezzqDAHJ8+9LprUm9ONYbhCvkaWlJhm2UD4MViBlrthuE7zUMMWtrjUzEuxnw X-Received: by 2002:a17:90a:590b:b0:1d9:2376:661 with SMTP id k11-20020a17090a590b00b001d923760661mr699657pji.69.1650648559476; Fri, 22 Apr 2022 10:29:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650648559; cv=none; d=google.com; s=arc-20160816; b=ngjfVMgJND6sVHnjUvb5CwKQ0DtXk9xrYLUOS/Q2U2t65r7y4/b6C5Wl8TsxFnp5z0 JVCzSyfJkLAqH+zDl5ct84rG3rmv9uMjC9tptH5nrs58Q8P6NgYC2ethBzZUDBJmJKku GqHcK0j3IS9kYg7Xzxerzk1F47BhZ8GGJtbxdWFbj0lqA5Qgm2r2oeA3vGAdXW8RZfr+ k4MLWSkSwcNJ4+nID8s1kC0zP3t8MSra413KFrsABf/uIuGFLZOGgEwQaVIKPHKkLoL/ wjUHlfkSS+B8GtfpZebxDq2lcVvnzhZPDPKvx4vZ8EB+sXFBg6ETaoqYjE3Md8fe2WkC J3/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=SQtAE3ZcQpFqrp+bASWhDiZvk53BS0iYnbojqFdBn7s=; b=i87mPBaiUQk2zEtCHvJFPC3K2pDnDWTHX1jvtoUuwaWAGu6Ryi3eZRQvB2yUUZxdx6 JgMHfpKOGEH1Ii35F4Oa5UD9wq4LuduPrkExdq+ehDsjOJjs2V2Py3ssKMMqeietmmnH qnFGagEjDm6fD9AG1If8/H0gwCzCT75Ftw9Gik1byvPssu3S/K0Tk/jQ1OxBTy5k7YXp qWX3IE/5AcvPzmkGBkWtMYxBNSNnFUOqdGgNTWaKT1TyyZ3Oy3l6ygwkTT5RqIpQAU5Q 0EaREkmo72x2c0y/Gm6U4IhUE1jJNmiYXuhohDqB0NmjNf+lRmPcpYfeINWrC+zZyBiF Ni5Q== ARC-Authentication-Results: i=1; mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id h7-20020a654687000000b003816043f0dasi9366217pgr.719.2022.04.22.10.29.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Apr 2022 10:29:19 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 6CF57C90EE; Fri, 22 Apr 2022 10:22:27 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1388249AbiDVQAx (ORCPT + 99 others); Fri, 22 Apr 2022 12:00:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34772 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1444635AbiDVQAo (ORCPT ); Fri, 22 Apr 2022 12:00:44 -0400 Received: from mail-qk1-f177.google.com (mail-qk1-f177.google.com [209.85.222.177]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5F41C5DA6E; Fri, 22 Apr 2022 08:57:51 -0700 (PDT) Received: by mail-qk1-f177.google.com with SMTP id d19so6104392qko.3; Fri, 22 Apr 2022 08:57:51 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=SQtAE3ZcQpFqrp+bASWhDiZvk53BS0iYnbojqFdBn7s=; b=pUjL1i8FFKphbX3iLrEFzRe2/oR2hgqiTKaefu4wZn8iGy41GnogA69Drqw75RHLA9 oVuJ3MvA7U4NCea6LQzpVHoKL6oQVvv9OAEXDg9+Fx1h/BBrKhp9m3AllcGgPgX9hrLu bp8098AD2I8S2SjUne27p3UizmsYi1wDUkYUPt/jju86dwbpf1FU6KdLCM2MwPpjQpLz IQ46RP9PW5MhP473tLGqLYmCuxfOkE6E4uOO3GzYE68I+/C89v/W3300ssKgtelg92tv Rv3FqlGMVHE9LmftXi8LkVrEXcaZUwaFimvN41VlqM7Y7Zqj0mFpk/Xkc89E8//OO/I4 dVQw== X-Gm-Message-State: AOAM530X5HrPKHw+aCjiSIJZkK/THfeTEuYfbwEuGCHIZcyuzp2cAQSQ DIN5NJEFtYs1KlLyRTHJ+SP6uqnkcrOXNg== X-Received: by 2002:a37:987:0:b0:69e:927e:756f with SMTP id 129-20020a370987000000b0069e927e756fmr3142409qkj.699.1650643070358; Fri, 22 Apr 2022 08:57:50 -0700 (PDT) Received: from localhost (fwdproxy-ash-018.fbsv.net. [2a03:2880:20ff:12::face:b00c]) by smtp.gmail.com with ESMTPSA id e23-20020a05620a12d700b0069ec181a0b2sm1033549qkl.69.2022.04.22.08.57.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Apr 2022 08:57:50 -0700 (PDT) From: David Vernet To: akpm@linux-foundation.org Cc: tj@kernel.org, roman.gushchin@linux.dev, linux-kernel@vger.kernel.org, linux-mm@kvack.org, cgroups@vger.kernel.org, hannes@cmpxchg.org, mhocko@kernel.org, shakeelb@google.com, kernel-team@fb.com, void@manifault.com Subject: [PATCH 4/5] cgroup: Removing racy check in test_memcg_sock() Date: Fri, 22 Apr 2022 08:57:28 -0700 Message-Id: <20220422155728.3055914-5-void@manifault.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220422155728.3055914-1-void@manifault.com> References: <20220422155728.3055914-1-void@manifault.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org test_memcg_sock() in the cgroup memcg tests, verifies expected memory accounting for sockets. The test forks a process which functions as a TCP server, and sends large buffers back and forth between itself (as the TCP client) and the forked TCP server. While doing so, it verifies that memory.current and memory.stat.sock look correct. There is currently a check in tcp_client() which asserts memory.current >= memory.stat.sock. This check is racy, as between memory.current and memory.stat.sock being queried, a packet could come in which causes mem_cgroup_charge_skmem() to be invoked. This could cause memory.stat.sock to exceed memory.current. Reversing the order of querying doesn't address the problem either, as memory may be reclaimed between the two calls. Instead, this patch just removes that assertion altogether, and instead relies on the values_close() check that follows to validate the expected accounting. Signed-off-by: David Vernet --- tools/testing/selftests/cgroup/test_memcontrol.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/tools/testing/selftests/cgroup/test_memcontrol.c b/tools/testing/selftests/cgroup/test_memcontrol.c index d88e0ca3f3d1..c4735fa36a3d 100644 --- a/tools/testing/selftests/cgroup/test_memcontrol.c +++ b/tools/testing/selftests/cgroup/test_memcontrol.c @@ -993,9 +993,6 @@ static int tcp_client(const char *cgroup, unsigned short port) if (current < 0 || sock < 0) goto close_sk; - if (current < sock) - goto close_sk; - if (values_close(current, sock, 10)) { ret = KSFT_PASS; break; -- 2.30.2