lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 04 May 2022 10:01:47 -0700
From:   Tim Chen <tim.c.chen@...ux.intel.com>
To:     Marcelo Tosatti <mtosatti@...hat.com>, linux-kernel@...r.kernel.org
Cc:     Nitesh Lal <nilal@...hat.com>,
        Nicolas Saenz Julienne <nsaenzju@...hat.com>,
        Frederic Weisbecker <frederic@...nel.org>,
        Christoph Lameter <cl@...ux.com>,
        Juri Lelli <juri.lelli@...hat.com>,
        Peter Zijlstra <peterz@...radead.org>,
        Alex Belits <abelits@...its.com>, Peter Xu <peterx@...hat.com>,
        Thomas Gleixner <tglx@...utronix.de>,
        Daniel Bristot de Oliveira <bristot@...hat.com>,
        Oscar Shiang <oscar0225@...email.tw>
Subject: Re: [patch v12 00/13] extensible prctl task isolation interface and
 vmstat sync

On Tue, 2022-03-15 at 12:31 -0300, Marcelo Tosatti wrote:
> The logic to disable vmstat worker thread, when entering
> nohz full, does not cover all scenarios. For example, it is possible
> for the following to happen:
> 
> 1) enter nohz_full, which calls refresh_cpu_vm_stats, syncing the stats.
> 2) app runs mlock, which increases counters for mlock'ed pages.
> 3) start -RT loop
> 
> Since refresh_cpu_vm_stats from nohz_full logic can happen _before_
> the mlock, vmstat shepherd can restart vmstat worker thread on
> the CPU in question.
> 
> To fix this, add task isolation prctl interface to quiesce
> deferred actions when returning to userspace.
> 
> The patchset is based on ideas and code from the
> task isolation patchset from Alex Belits:
> https://lwn.net/Articles/816298/
> 
> Please refer to Documentation/userspace-api/task_isolation.rst
> (patch 1) for details. Its attached at the end of this message

Patch 1 doesn't seem to be the documentation patch but rather is
in patch 4.

> 
> Task isolation prctl interface
> ******************************
> 
> Certain types of applications benefit from running uninterrupted by
> background OS activities. Realtime systems and high-bandwidth
> networking applications with user-space drivers can fall into the
> category.
> 
> To create an OS noise free environment for the application, this
> interface allows userspace to inform the kernel the start and end of
> the latency sensitive application section (with configurable system
> behaviour for that section).
> 
> Note: the prctl interface is independent of nohz_full=.
> 
> The prctl options are:
> 
>    * PR_ISOL_FEAT_GET: Retrieve supported features.
> 
>    * PR_ISOL_CFG_GET: Retrieve task isolation configuration.
> 
>    * PR_ISOL_CFG_SET: Set task isolation configuration.
> 
>    * PR_ISOL_ACTIVATE_GET: Retrieve task isolation activation state.
> 
>    * PR_ISOL_ACTIVATE_SET: Set task isolation activation state.
> 
> Summary of terms:
> 
> * feature:
> 
>      A distinct attribute or aspect of task isolation. Examples of
>      features could be logging, new operating modes (eg: syscalls
>      disallowed), userspace notifications, etc. The only feature
>      currently available is quiescing.
> 
> * configuration:
> 
>      A specific choice from a given set of possible choices that
>      dictate how the particular feature in question should behave.
> 
> * activation state:
> 
>      The activation state (whether active/inactive) of the task
>      isolation features (features must be configured before being
>      activated).
> 
> Inheritance of the isolation parameters and state, across fork(2) and
> clone(2), can be changed via PR_ISOL_CFG_GET/PR_ISOL_CFG_SET.
> 
> At a high-level, task isolation is divided in two steps:
> 
> 1. Configuration.
> 
> 2. Activation.
> 
> Section "Userspace support" describes how to use task isolation.
> 
> In terms of the interface, the sequence of steps to activate task
> isolation are:
> 
> 1. Retrieve supported task isolation features (PR_ISOL_FEAT_GET).
> 
> 2. Configure task isolation features
>    (PR_ISOL_CFG_GET/PR_ISOL_CFG_SET).
> 
> 3. Activate or deactivate task isolation features
>    (PR_ISOL_ACTIVATE_GET/PR_ISOL_ACTIVATE_SET).
> 
> This interface is based on ideas and code from the task isolation
> patchset from Alex Belits: https://lwn.net/Articles/816298/
> 
> Note: if the need arises to configure an individual quiesce feature
> with its own extensible structure, please add ISOL_F_QUIESCE_ONE to
> PR_ISOL_CFG_GET/PR_ISOL_CFG_SET (ISOL_F_QUIESCE operates on multiple
> features per syscall currently).
> 
> 
> Feature description
> ===================
> 
>    * "ISOL_F_QUIESCE"
> 
>    This feature allows quiescing selected kernel activities on return
>    from system calls.
> 
> 
> Interface description
> =====================
> 
> **PR_ISOL_FEAT**:
> 
>    Returns the supported features and feature capabilities, as a
>    bitmask:
> 
>       prctl(PR_ISOL_FEAT, feat, arg3, arg4, arg5);
> 
>    The 'feat' argument specifies whether to return supported features
>    (if zero), or feature capabilities (if not zero). Possible values
>    for 'feat' are:
> 
>    * "0":
> 
>         Return the bitmask of supported features, in the location
>         pointed  to  by  "(int *)arg3". The buffer should allow space
>         for 8 bytes.
> 
>    * "ISOL_F_QUIESCE":
> 
>         Return a structure containing which kernel activities are
>         supported for quiescing, in the location pointed to by "(int
>         *)arg3":
> 
>            struct task_isol_quiesce_extensions {
>                    __u64 flags;
>                    __u64 supported_quiesce_bits;
>                    __u64 pad[6];
>            };
> 
>         Where:
> 
>         *flags*: Additional flags (should be zero).
> 
>         *supported_quiesce_bits*: Bitmask indicating
>            which features are supported for quiescing.
> 
>         *pad*: Additional space for future enhancements.
> 
>    Features and its capabilities are defined at
>    include/uapi/linux/task_isolation.h.
> 
> **PR_ISOL_CFG_GET**:
> 
>    Retrieve task isolation configuration. The general format is:
> 
>       prctl(PR_ISOL_CFG_GET, what, arg3, arg4, arg5);
> 
>    The 'what' argument specifies what to configure. Possible values
>    are:
> 
>    * "I_CFG_FEAT":
> 
>         Return configuration of task isolation features. The 'arg3'
>         argument specifies whether to return configured features (if
>         zero), or individual feature configuration (if not zero), as
>         follows.
> 
>         * "0":
> 
>              Return the bitmask of configured features, in the
>              location pointed  to  by  "(int *)arg4". The buffer
>              should allow space for 8 bytes.
> 
>         * "ISOL_F_QUIESCE":
> 
>              If arg4 is QUIESCE_CONTROL, return the control structure
>              for quiescing of background kernel activities, in the
>              location pointed to by "(int *)arg5":
> 
>                 struct task_isol_quiesce_control {
>                        __u64 flags;
>                        __u64 quiesce_mask;
>                        __u64 quiesce_oneshot_mask;
>                        __u64 pad[5];
>                 };
> 
>              See PR_ISOL_CFG_SET description for meaning of fields.
> 
>    * "I_CFG_INHERIT":
> 
>         Retrieve inheritance configuration across fork/clone.
> 
>         Return the structure which configures inheritance across
>         fork/clone, in the location pointed to by "(int *)arg4":
> 
>            struct task_isol_inherit_control {
>                    __u8    inherit_mask;
>                    __u8    pad[7];
>            };
> 
>         See PR_ISOL_CFG_SET description for meaning of fields.
> 
> **PR_ISOL_CFG_SET**:
> 
>    Set task isolation configuration. The general format is:
> 
>       prctl(PR_ISOL_CFG_SET, what, arg3, arg4, arg5);
> 
>    The 'what' argument specifies what to configure. Possible values
>    are:
> 
>    * "I_CFG_FEAT":
> 
>         Set configuration of task isolation features. 'arg3' specifies
>         the feature. Possible values are:
> 
>         * "ISOL_F_QUIESCE":

Is it really necessary for such fine grain control for which kernel
activity to quiesce?  

For most user, all they care about is their
task is not disturbed by kernel activities and not be bothered about
setting which particular activities to quiesce.  And in your patches there
is only ISOL_F_QUIESCE_VMSTATS and nothing else.  I think you could
probably skip the QUIESCE control for now and add it when there's really
a true need for fine grain control.  This will make the interface simpler
for user applications.

Tim





Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ