From nobody Fri Oct 3 01:59:09 2025 Received: from out30-111.freemail.mail.aliyun.com (out30-111.freemail.mail.aliyun.com [115.124.30.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DA2F32EB848; Mon, 8 Sep 2025 10:20:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=115.124.30.111 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757326844; cv=none; b=clGrG7qbwfIgK46gS5q+iVIHLaJHD7dyFKTE1SBhlKVXOxjWYgKADmm2FE7S+15XQyLk0xCPD70900PgJB+kGH1DMkDkMgM6RoXK3wW6bkjOJPmSULrrrMvi7Ov9h1kxvmaj9DWXihM6PprxqQWhT1LXUpHeK2uHihoV5VzHy9s= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757326844; c=relaxed/simple; bh=H1W27uKJ6galuuqimkU9B/bGkZSmam8WaXVj6LbGWDA=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=NCUdjUIZ15PSsfYdl3rq8Ekm0KBwbQOH4jzaSwGwboPwJZam77MMpfSHrv91M0o3Ptkuf9K86mPWRTFjCpOrVpbtS5Zr1Tx4gbCtnC9mXYPWWl699IHKnbUp7ZM2NNN+afvPmtSvtA0IT5nE9h7rdCOJRVm7zIHMga1xwa62syE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com; spf=pass smtp.mailfrom=linux.alibaba.com; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b=rkLGdo1M; arc=none smtp.client-ip=115.124.30.111 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.alibaba.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b="rkLGdo1M" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.alibaba.com; s=default; t=1757326831; h=From:To:Subject:Date:Message-Id:MIME-Version; bh=+ThG25u9fOphR8vcFUoFKU674QqJi3K4k2kuM14oqFQ=; b=rkLGdo1M8HT0GZAu42J9eS5mVV/2gRke47guQdubjUJIIl3Wc0bsOFQXdwDTFHIiiwnW+s1wh7b+DHO4wUuiIHIfc4fSCinnS70K6tNS+Aze6AGySGYWSMYLw2A3stIskSF/wuxZmxoxBcevk8plPZK88TehtXeEC34cQAcfZMM= Received: from localhost(mailfrom:escape@linux.alibaba.com fp:SMTPD_---0WnVVXno_1757326830 cluster:ay36) by smtp.aliyun-inc.com; Mon, 08 Sep 2025 18:20:31 +0800 From: Yi Tao To: tj@kernel.org, hannes@cmpxchg.org, mkoutny@suse.com Cc: cgroups@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v3 1/1] cgroup: replace global percpu_rwsem with per threadgroup resem when writing to cgroup.procs Date: Mon, 8 Sep 2025 18:20:27 +0800 Message-Id: X-Mailer: git-send-email 2.32.0.3.g01195cf9f In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" As computer hardware advances, modern systems are typically equipped with many CPU cores and large amounts of memory, enabling the deployment of numerous applications. On such systems, container creation and deletion become frequent operations, making cgroup process migration no longer a cold path. This leads to noticeable contention with common process operations such as fork, exec, and exit. To alleviate the contention between cgroup process migration and operations like process fork, this patch modifies lock to take the write lock on signal_struct->group_rwsem when writing pid to cgroup.procs/threads instead of holding a global write lock. Cgroup process migration has historically relied on signal_struct->group_rwsem to protect thread group integrity. In commit <1ed1328792ff> ("sched, cgroup: replace signal_struct->group_rwsem with a global percpu_rwsem"), this was changed to a global cgroup_threadgroup_rwsem. The advantage of using a global lock was simplified handling of process group migrations. This patch retains the use of the global lock for protecting process group migration, while reducing contention by using per thread group lock during cgroup.procs/threads writes. The locking behavior is as follows: write cgroup.procs/threads | process fork,exec,exit | process group migrat= ion ---------------------------------------------------------------------------= --- cgroup_lock() | down_read(&g_rwsem) | cgroup_lock() down_write(&p_rwsem) | down_read(&p_rwsem) | down_write(&g_rwsem) critical section | critical section | critical section up_write(&p_rwsem) | up_read(&p_rwsem) | up_write(&g_rwsem) cgroup_unlock() | up_read(&g_rwsem) | cgroup_unlock() g_rwsem denotes cgroup_threadgroup_rwsem, p_rwsem denotes signal_struct->group_rwsem. This patch eliminates contention between cgroup migration and fork operations for threads that belong to different thread groups, thereby reducing the long-tail latency of cgroup migrations and lowering system load. With this patch, under heavy fork and exec interference, the long-tail latency of cgroup migration has been reduced from milliseconds to microseconds. Under heavy cgroup migration interference, the multi-CPU score of the spawn test case in UnixBench increased by 9%. The static usage pattern of creating a cgroup, enabling controllers, and then seeding it with CLONE_INTO_CGROUP doesn't require write locking cgroup_threadgroup_rwsem and thus doesn't benefit from this patch. To avoid affecting other users, the per threadgroup rwsem is only used when the `favordynmods` flag is enabled. Signed-off-by: Yi Tao --- include/linux/cgroup-defs.h | 12 +++- include/linux/sched/signal.h | 4 ++ init/init_task.c | 3 + kernel/cgroup/cgroup-internal.h | 4 +- kernel/cgroup/cgroup-v1.c | 8 +-- kernel/cgroup/cgroup.c | 105 ++++++++++++++++++++++---------- kernel/fork.c | 4 ++ 7 files changed, 101 insertions(+), 39 deletions(-) diff --git a/include/linux/cgroup-defs.h b/include/linux/cgroup-defs.h index 6b93a64115fe..5033e3bdac9e 100644 --- a/include/linux/cgroup-defs.h +++ b/include/linux/cgroup-defs.h @@ -88,7 +88,8 @@ enum { /* * Reduce latencies on dynamic cgroup modifications such as task * migrations and controller on/offs by disabling percpu operation on - * cgroup_threadgroup_rwsem. This makes hot path operations such as + * cgroup_threadgroup_rwsem and taking per threadgroup rwsem when + * writing to cgroup.procs. This makes hot path operations such as * forks and exits into the slow path and more expensive. * * The static usage pattern of creating a cgroup, enabling controllers, @@ -828,16 +829,21 @@ struct cgroup_of_peak { struct list_head list; }; =20 +extern int take_per_threadgroup_rwsem; + /** * cgroup_threadgroup_change_begin - threadgroup exclusion for cgroups * @tsk: target task * * Allows cgroup operations to synchronize against threadgroup changes - * using a percpu_rw_semaphore. + * using a global percpu_rw_semaphore and a per threadgroup rw_semaphore w= hen + * favordynmods is on. See the comment above CGRP_ROOT_FAVOR_DYNMODS defin= ition. */ static inline void cgroup_threadgroup_change_begin(struct task_struct *tsk) { percpu_down_read(&cgroup_threadgroup_rwsem); + if (take_per_threadgroup_rwsem) + down_read(&tsk->signal->cgroup_threadgroup_rwsem); } =20 /** @@ -848,6 +854,8 @@ static inline void cgroup_threadgroup_change_begin(stru= ct task_struct *tsk) */ static inline void cgroup_threadgroup_change_end(struct task_struct *tsk) { + if (take_per_threadgroup_rwsem) + up_read(&tsk->signal->cgroup_threadgroup_rwsem); percpu_up_read(&cgroup_threadgroup_rwsem); } =20 diff --git a/include/linux/sched/signal.h b/include/linux/sched/signal.h index 1ef1edbaaf79..7d6449982822 100644 --- a/include/linux/sched/signal.h +++ b/include/linux/sched/signal.h @@ -226,6 +226,10 @@ struct signal_struct { struct tty_audit_buf *tty_audit_buf; #endif =20 +#ifdef CONFIG_CGROUPS + struct rw_semaphore cgroup_threadgroup_rwsem; +#endif + /* * Thread is the potential origin of an oom condition; kill first on * oom diff --git a/init/init_task.c b/init/init_task.c index e557f622bd90..a55e2189206f 100644 --- a/init/init_task.c +++ b/init/init_task.c @@ -27,6 +27,9 @@ static struct signal_struct init_signals =3D { }, .multiprocess =3D HLIST_HEAD_INIT, .rlim =3D INIT_RLIMITS, +#ifdef CONFIG_CGROUPS + .cgroup_threadgroup_rwsem =3D __RWSEM_INITIALIZER(init_signals.cgroup_thr= eadgroup_rwsem), +#endif .cred_guard_mutex =3D __MUTEX_INITIALIZER(init_signals.cred_guard_mutex), .exec_update_lock =3D __RWSEM_INITIALIZER(init_signals.exec_update_lock), #ifdef CONFIG_POSIX_TIMERS diff --git a/kernel/cgroup/cgroup-internal.h b/kernel/cgroup/cgroup-interna= l.h index b14e61c64a34..318cc7f22e2c 100644 --- a/kernel/cgroup/cgroup-internal.h +++ b/kernel/cgroup/cgroup-internal.h @@ -249,8 +249,8 @@ int cgroup_migrate(struct task_struct *leader, bool thr= eadgroup, =20 int cgroup_attach_task(struct cgroup *dst_cgrp, struct task_struct *leader, bool threadgroup); -void cgroup_attach_lock(bool lock_threadgroup); -void cgroup_attach_unlock(bool lock_threadgroup); +void cgroup_attach_lock(bool lock_threadgroup, struct task_struct *tsk); +void cgroup_attach_unlock(bool lock_threadgroup, struct task_struct *tsk); struct task_struct *cgroup_procs_write_start(char *buf, bool threadgroup, bool *locked) __acquires(&cgroup_threadgroup_rwsem); diff --git a/kernel/cgroup/cgroup-v1.c b/kernel/cgroup/cgroup-v1.c index 2a4a387f867a..65e9b454780c 100644 --- a/kernel/cgroup/cgroup-v1.c +++ b/kernel/cgroup/cgroup-v1.c @@ -68,7 +68,7 @@ int cgroup_attach_task_all(struct task_struct *from, stru= ct task_struct *tsk) int retval =3D 0; =20 cgroup_lock(); - cgroup_attach_lock(true); + cgroup_attach_lock(true, NULL); for_each_root(root) { struct cgroup *from_cgrp; =20 @@ -80,7 +80,7 @@ int cgroup_attach_task_all(struct task_struct *from, stru= ct task_struct *tsk) if (retval) break; } - cgroup_attach_unlock(true); + cgroup_attach_unlock(true, NULL); cgroup_unlock(); =20 return retval; @@ -117,7 +117,7 @@ int cgroup_transfer_tasks(struct cgroup *to, struct cgr= oup *from) =20 cgroup_lock(); =20 - cgroup_attach_lock(true); + cgroup_attach_lock(true, NULL); =20 /* all tasks in @from are being moved, all csets are source */ spin_lock_irq(&css_set_lock); @@ -153,7 +153,7 @@ int cgroup_transfer_tasks(struct cgroup *to, struct cgr= oup *from) } while (task && !ret); out_err: cgroup_migrate_finish(&mgctx); - cgroup_attach_unlock(true); + cgroup_attach_unlock(true, NULL); cgroup_unlock(); return ret; } diff --git a/kernel/cgroup/cgroup.c b/kernel/cgroup/cgroup.c index 312c6a8b55bb..8650ec394d0c 100644 --- a/kernel/cgroup/cgroup.c +++ b/kernel/cgroup/cgroup.c @@ -1298,18 +1298,29 @@ struct cgroup_root *cgroup_root_from_kf(struct kern= fs_root *kf_root) return root_cgrp->root; } =20 +int take_per_threadgroup_rwsem; + void cgroup_favor_dynmods(struct cgroup_root *root, bool favor) { bool favoring =3D root->flags & CGRP_ROOT_FAVOR_DYNMODS; =20 - /* see the comment above CGRP_ROOT_FAVOR_DYNMODS definition */ + /* + * see the comment above CGRP_ROOT_FAVOR_DYNMODS definition. + * favordynmods can flip while task is between + * cgroup_threadgroup_change_begin and cgroup_threadgroup_change_end, + * so down_write global cgroup_threadgroup_rwsem to synchronize them. + */ + percpu_down_write(&cgroup_threadgroup_rwsem); if (favor && !favoring) { + take_per_threadgroup_rwsem++; rcu_sync_enter(&cgroup_threadgroup_rwsem.rss); root->flags |=3D CGRP_ROOT_FAVOR_DYNMODS; } else if (!favor && favoring) { + take_per_threadgroup_rwsem--; rcu_sync_exit(&cgroup_threadgroup_rwsem.rss); root->flags &=3D ~CGRP_ROOT_FAVOR_DYNMODS; } + percpu_up_write(&cgroup_threadgroup_rwsem); } =20 static int cgroup_init_root_id(struct cgroup_root *root) @@ -2459,7 +2470,8 @@ EXPORT_SYMBOL_GPL(cgroup_path_ns); =20 /** * cgroup_attach_lock - Lock for ->attach() - * @lock_threadgroup: whether to down_write cgroup_threadgroup_rwsem + * @lock_threadgroup: whether to down_write rwsem + * @tsk: thread group to lock * * cgroup migration sometimes needs to stabilize threadgroups against fork= s and * exits by write-locking cgroup_threadgroup_rwsem. However, some ->attach= () @@ -2479,22 +2491,37 @@ EXPORT_SYMBOL_GPL(cgroup_path_ns); * Resolve the situation by always acquiring cpus_read_lock() before optio= nally * write-locking cgroup_threadgroup_rwsem. This allows ->attach() to assum= e that * CPU hotplug is disabled on entry. + * + * When favordynmods is enabled, take per threadgroup rwsem to reduce late= ncies + * on dynamic cgroup modifications. see the comment above + * CGRP_ROOT_FAVOR_DYNMODS definition. + * + * tsk is not NULL only when writing to cgroup.procs. */ -void cgroup_attach_lock(bool lock_threadgroup) +void cgroup_attach_lock(bool lock_threadgroup, struct task_struct *tsk) { cpus_read_lock(); - if (lock_threadgroup) - percpu_down_write(&cgroup_threadgroup_rwsem); + if (lock_threadgroup) { + if (tsk && take_per_threadgroup_rwsem) + down_write(&tsk->signal->cgroup_threadgroup_rwsem); + else + percpu_down_write(&cgroup_threadgroup_rwsem); + } } =20 /** * cgroup_attach_unlock - Undo cgroup_attach_lock() - * @lock_threadgroup: whether to up_write cgroup_threadgroup_rwsem + * @lock_threadgroup: whether to up_write rwsem + * @tsk: thread group to lock */ -void cgroup_attach_unlock(bool lock_threadgroup) +void cgroup_attach_unlock(bool lock_threadgroup, struct task_struct *tsk) { - if (lock_threadgroup) - percpu_up_write(&cgroup_threadgroup_rwsem); + if (lock_threadgroup) { + if (tsk && take_per_threadgroup_rwsem) + up_write(&tsk->signal->cgroup_threadgroup_rwsem); + else + percpu_up_write(&cgroup_threadgroup_rwsem); + } cpus_read_unlock(); } =20 @@ -2976,24 +3003,13 @@ struct task_struct *cgroup_procs_write_start(char *= buf, bool threadgroup, if (kstrtoint(strstrip(buf), 0, &pid) || pid < 0) return ERR_PTR(-EINVAL); =20 - /* - * If we migrate a single thread, we don't care about threadgroup - * stability. If the thread is `current`, it won't exit(2) under our - * hands or change PID through exec(2). We exclude - * cgroup_update_dfl_csses and other cgroup_{proc,thread}s_write - * callers by cgroup_mutex. - * Therefore, we can skip the global lock. - */ - lockdep_assert_held(&cgroup_mutex); - *threadgroup_locked =3D pid || threadgroup; - cgroup_attach_lock(*threadgroup_locked); - +retry_find_task: rcu_read_lock(); if (pid) { tsk =3D find_task_by_vpid(pid); if (!tsk) { tsk =3D ERR_PTR(-ESRCH); - goto out_unlock_threadgroup; + goto out_unlock_rcu; } } else { tsk =3D current; @@ -3010,15 +3026,42 @@ struct task_struct *cgroup_procs_write_start(char *= buf, bool threadgroup, */ if (tsk->no_cgroup_migration || (tsk->flags & PF_NO_SETAFFINITY)) { tsk =3D ERR_PTR(-EINVAL); - goto out_unlock_threadgroup; + goto out_unlock_rcu; } - get_task_struct(tsk); - goto out_unlock_rcu; =20 -out_unlock_threadgroup: - cgroup_attach_unlock(*threadgroup_locked); - *threadgroup_locked =3D false; + rcu_read_unlock(); + + /* + * If we migrate a single thread, we don't care about threadgroup + * stability. If the thread is `current`, it won't exit(2) under our + * hands or change PID through exec(2). We exclude + * cgroup_update_dfl_csses and other cgroup_{proc,thread}s_write + * callers by cgroup_mutex. + * Therefore, we can skip the global lock. + */ + lockdep_assert_held(&cgroup_mutex); + *threadgroup_locked =3D pid || threadgroup; + + cgroup_attach_lock(*threadgroup_locked, tsk); + + if (threadgroup) { + if (!thread_group_leader(tsk)) { + /* + * a race with de_thread from another thread's exec() + * may strip us of our leadership, if this happens, + * there is no choice but to throw this task away and + * try again; this is + * "double-double-toil-and-trouble-check locking". + */ + cgroup_attach_unlock(*threadgroup_locked, tsk); + put_task_struct(tsk); + goto retry_find_task; + } + } + + return tsk; + out_unlock_rcu: rcu_read_unlock(); return tsk; @@ -3032,7 +3075,7 @@ void cgroup_procs_write_finish(struct task_struct *ta= sk, bool threadgroup_locked /* release reference from cgroup_procs_write_start() */ put_task_struct(task); =20 - cgroup_attach_unlock(threadgroup_locked); + cgroup_attach_unlock(threadgroup_locked, task); =20 for_each_subsys(ss, ssid) if (ss->post_attach) @@ -3119,7 +3162,7 @@ static int cgroup_update_dfl_csses(struct cgroup *cgr= p) * write-locking can be skipped safely. */ has_tasks =3D !list_empty(&mgctx.preloaded_src_csets); - cgroup_attach_lock(has_tasks); + cgroup_attach_lock(has_tasks, NULL); =20 /* NULL dst indicates self on default hierarchy */ ret =3D cgroup_migrate_prepare_dst(&mgctx); @@ -3140,7 +3183,7 @@ static int cgroup_update_dfl_csses(struct cgroup *cgr= p) ret =3D cgroup_migrate_execute(&mgctx); out_finish: cgroup_migrate_finish(&mgctx); - cgroup_attach_unlock(has_tasks); + cgroup_attach_unlock(has_tasks, NULL); return ret; } =20 diff --git a/kernel/fork.c b/kernel/fork.c index af673856499d..ae7826815c2c 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -1688,6 +1688,10 @@ static int copy_signal(unsigned long clone_flags, st= ruct task_struct *tsk) tty_audit_fork(sig); sched_autogroup_fork(sig); =20 +#ifdef CONFIG_CGROUPS + init_rwsem(&sig->cgroup_threadgroup_rwsem); +#endif + sig->oom_score_adj =3D current->signal->oom_score_adj; sig->oom_score_adj_min =3D current->signal->oom_score_adj_min; =20 --=20 2.32.0.3.g01195cf9f