[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160831173251.GY12660@htj.duckdns.org>
Date: Wed, 31 Aug 2016 13:32:51 -0400
From: Tejun Heo <tj@...nel.org>
To: Andy Lutomirski <luto@...capital.net>
Cc: Ingo Molnar <mingo@...hat.com>,
Mike Galbraith <umgwanakikbuti@...il.com>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
kernel-team@...com,
"open list:CONTROL GROUP (CGROUP)" <cgroups@...r.kernel.org>,
Andrew Morton <akpm@...ux-foundation.org>,
Paul Turner <pjt@...gle.com>, Li Zefan <lizefan@...wei.com>,
Linux API <linux-api@...r.kernel.org>,
Peter Zijlstra <peterz@...radead.org>,
Johannes Weiner <hannes@...xchg.org>,
Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: [Documentation] State of CPU controller in cgroup v2
Hello, Andy.
On Tue, Aug 30, 2016 at 08:42:20PM -0700, Andy Lutomirski wrote:
> On Mon, Aug 29, 2016 at 3:20 PM, Tejun Heo <tj@...nel.org> wrote:
> >> This seems to explain why the controllers need to be able to handle
> >> things being charged to the root cgroup (or to an unidentifiable
> >> cgroup, anyway). That isn't quite the same thing as allowing, from an
> >> ABI point of view, the root cgroup to contain processes and cgroups
> >> but not allowing other cgroups to do the same thing. Consider:
> >
> > The points are 1. we need the root to be a special container anyway
>
> But you don't need to let userspace see that.
I'm not saying that what cgroup v2 implements is the only solution.
There of course can be other approaches which don't expose this
particular detail to userland. I was highlighting that there is an
underlying condition to be dealt with and that what cgroup v2
implements is one working solution for it.
It's fine to have, say, aesthetical disgreements on the specifics of
the chosen approach, and, while a bit late, we can still talk about
pros and cons of different possible approaches and make improvements
where it makes sense. However, this isn't in any way a
make-it-or-break-it issue as you implied before.
> >> I really, really think that cgroup v2 should supply the same
> >> *interface* inside and outside of a non-root namespace. If this is
> >
> > It *does*. That's what I tried to explain, that it's exactly
> > isomorhpic once you discount the system-wide consumptions.
>
> I don't think I agree.
>
> Suppose I wrote an init program or a cgroup manager. I can expect
> that init program to be started in the root cgroup. The program can
> be lazy and write +io to /cgroup/cgroup.subtree_control and then
> create some new cgroup /cgroup/a and it will work (I just tried it).
>
> Now I run that program in a namespace. It will not work because it'll
> get -EBUSY when it tries to write to cgroup.subtree_control. (I just
> tried this, too, only using cd instead of a namespace.) So it's *not*
> isomorphic.
Yeah, it is possible to shoot yourself in the foot but both
system-scope and namespace-scope can implement the exactly same
behavior - move yourself out of root before enabling resource controls
and get the same expected outcome, which BTW is how systemd behaves
already.
You can say that allowing the possibility of deviation isn't a good
design choice but it is a design choice with other implications - on
how we deal with configurations without cgroup at all, transitioning
from v1, bootstrapping a system and avoiding surprising
userland-visible behaviors (e.g. like creating magic preset cgroups
and silently migrating process there on certain events).
> It *also* won't work (I think) if subtree control is enabled on the
> root, but I don't think this is a problem in practice because subtree
> control won't be enabled on the namespace root by a sensible cgroup
> manager.
Exactly the same thing. You can shoot yourself in the foot but it's
easy not to.
Thanks.
--
tejun
Powered by blists - more mailing lists