| #include <net/tcp.h> |
| #include <net/tcp_memcontrol.h> |
| #include <net/sock.h> |
| #include <net/ip.h> |
| #include <linux/nsproxy.h> |
| #include <linux/memcontrol.h> |
| #include <linux/module.h> |
| |
| static void memcg_tcp_enter_memory_pressure(struct sock *sk) |
| { |
| if (sk->sk_cgrp->memory_pressure) |
| sk->sk_cgrp->memory_pressure = 1; |
| } |
| EXPORT_SYMBOL(memcg_tcp_enter_memory_pressure); |
| |
| int tcp_init_cgroup(struct mem_cgroup *memcg, struct cgroup_subsys *ss) |
| { |
| /* |
| * The root cgroup does not use res_counters, but rather, |
| * rely on the data already collected by the network |
| * subsystem |
| */ |
| struct res_counter *res_parent = NULL; |
| struct cg_proto *cg_proto, *parent_cg; |
| struct mem_cgroup *parent = parent_mem_cgroup(memcg); |
| |
| cg_proto = tcp_prot.proto_cgroup(memcg); |
| if (!cg_proto) |
| return 0; |
| |
| cg_proto->sysctl_mem[0] = sysctl_tcp_mem[0]; |
| cg_proto->sysctl_mem[1] = sysctl_tcp_mem[1]; |
| cg_proto->sysctl_mem[2] = sysctl_tcp_mem[2]; |
| cg_proto->memory_pressure = 0; |
| cg_proto->memcg = memcg; |
| |
| parent_cg = tcp_prot.proto_cgroup(parent); |
| if (parent_cg) |
| res_parent = &parent_cg->memory_allocated; |
| |
| res_counter_init(&cg_proto->memory_allocated, res_parent); |
| percpu_counter_init(&cg_proto->sockets_allocated, 0); |
| |
| return 0; |
| } |
| EXPORT_SYMBOL(tcp_init_cgroup); |
| |
| void tcp_destroy_cgroup(struct mem_cgroup *memcg) |
| { |
| struct cg_proto *cg_proto; |
| |
| cg_proto = tcp_prot.proto_cgroup(memcg); |
| if (!cg_proto) |
| return; |
| |
| percpu_counter_destroy(&cg_proto->sockets_allocated); |
| } |
| EXPORT_SYMBOL(tcp_destroy_cgroup); |
| |
| static int tcp_update_limit(struct mem_cgroup *memcg, u64 val) |
| { |
| struct cg_proto *cg_proto; |
| u64 old_lim; |
| int i; |
| int ret; |
| |
| cg_proto = tcp_prot.proto_cgroup(memcg); |
| if (!cg_proto) |
| return -EINVAL; |
| |
| if (val > RES_COUNTER_MAX) |
| val = RES_COUNTER_MAX; |
| |
| old_lim = res_counter_read_u64(&cg_proto->memory_allocated, RES_LIMIT); |
| ret = res_counter_set_limit(&cg_proto->memory_allocated, val); |
| if (ret) |
| return ret; |
| |
| for (i = 0; i < 3; i++) |
| cg_proto->sysctl_mem[i] = min_t(long, val >> PAGE_SHIFT, |
| sysctl_tcp_mem[i]); |
| |
| if (val == RES_COUNTER_MAX) |
| clear_bit(MEMCG_SOCK_ACTIVE, &cg_proto->flags); |
| else if (val != RES_COUNTER_MAX) { |
| /* |
| * The active bit needs to be written after the static_key |
| * update. This is what guarantees that the socket activation |
| * function is the last one to run. See sock_update_memcg() for |
| * details, and note that we don't mark any socket as belonging |
| * to this memcg until that flag is up. |
| * |
| * We need to do this, because static_keys will span multiple |
| * sites, but we can't control their order. If we mark a socket |
| * as accounted, but the accounting functions are not patched in |
| * yet, we'll lose accounting. |
| * |
| * We never race with the readers in sock_update_memcg(), |
| * because when this value change, the code to process it is not |
| * patched in yet. |
| * |
| * The activated bit is used to guarantee that no two writers |
| * will do the update in the same memcg. Without that, we can't |
| * properly shutdown the static key. |
| */ |
| if (!test_and_set_bit(MEMCG_SOCK_ACTIVATED, &cg_proto->flags)) |
| static_key_slow_inc(&memcg_socket_limit_enabled); |
| set_bit(MEMCG_SOCK_ACTIVE, &cg_proto->flags); |
| } |
| |
| return 0; |
| } |
| |
| static int tcp_cgroup_write(struct cgroup_subsys_state *css, struct cftype *cft, |
| const char *buffer) |
| { |
| struct mem_cgroup *memcg = mem_cgroup_from_css(css); |
| unsigned long long val; |
| int ret = 0; |
| |
| switch (cft->private) { |
| case RES_LIMIT: |
| /* see memcontrol.c */ |
| ret = res_counter_memparse_write_strategy(buffer, &val); |
| if (ret) |
| break; |
| ret = tcp_update_limit(memcg, val); |
| break; |
| default: |
| ret = -EINVAL; |
| break; |
| } |
| return ret; |
| } |
| |
| static u64 tcp_read_stat(struct mem_cgroup *memcg, int type, u64 default_val) |
| { |
| struct cg_proto *cg_proto; |
| |
| cg_proto = tcp_prot.proto_cgroup(memcg); |
| if (!cg_proto) |
| return default_val; |
| |
| return res_counter_read_u64(&cg_proto->memory_allocated, type); |
| } |
| |
| static u64 tcp_read_usage(struct mem_cgroup *memcg) |
| { |
| struct cg_proto *cg_proto; |
| |
| cg_proto = tcp_prot.proto_cgroup(memcg); |
| if (!cg_proto) |
| return atomic_long_read(&tcp_memory_allocated) << PAGE_SHIFT; |
| |
| return res_counter_read_u64(&cg_proto->memory_allocated, RES_USAGE); |
| } |
| |
| static u64 tcp_cgroup_read(struct cgroup_subsys_state *css, struct cftype *cft) |
| { |
| struct mem_cgroup *memcg = mem_cgroup_from_css(css); |
| u64 val; |
| |
| switch (cft->private) { |
| case RES_LIMIT: |
| val = tcp_read_stat(memcg, RES_LIMIT, RES_COUNTER_MAX); |
| break; |
| case RES_USAGE: |
| val = tcp_read_usage(memcg); |
| break; |
| case RES_FAILCNT: |
| case RES_MAX_USAGE: |
| val = tcp_read_stat(memcg, cft->private, 0); |
| break; |
| default: |
| BUG(); |
| } |
| return val; |
| } |
| |
| static int tcp_cgroup_reset(struct cgroup_subsys_state *css, unsigned int event) |
| { |
| struct mem_cgroup *memcg; |
| struct cg_proto *cg_proto; |
| |
| memcg = mem_cgroup_from_css(css); |
| cg_proto = tcp_prot.proto_cgroup(memcg); |
| if (!cg_proto) |
| return 0; |
| |
| switch (event) { |
| case RES_MAX_USAGE: |
| res_counter_reset_max(&cg_proto->memory_allocated); |
| break; |
| case RES_FAILCNT: |
| res_counter_reset_failcnt(&cg_proto->memory_allocated); |
| break; |
| } |
| |
| return 0; |
| } |
| |
| static struct cftype tcp_files[] = { |
| { |
| .name = "kmem.tcp.limit_in_bytes", |
| .write_string = tcp_cgroup_write, |
| .read_u64 = tcp_cgroup_read, |
| .private = RES_LIMIT, |
| }, |
| { |
| .name = "kmem.tcp.usage_in_bytes", |
| .read_u64 = tcp_cgroup_read, |
| .private = RES_USAGE, |
| }, |
| { |
| .name = "kmem.tcp.failcnt", |
| .private = RES_FAILCNT, |
| .trigger = tcp_cgroup_reset, |
| .read_u64 = tcp_cgroup_read, |
| }, |
| { |
| .name = "kmem.tcp.max_usage_in_bytes", |
| .private = RES_MAX_USAGE, |
| .trigger = tcp_cgroup_reset, |
| .read_u64 = tcp_cgroup_read, |
| }, |
| { } /* terminate */ |
| }; |
| |
| static int __init tcp_memcontrol_init(void) |
| { |
| WARN_ON(cgroup_add_cftypes(&mem_cgroup_subsys, tcp_files)); |
| return 0; |
| } |
| __initcall(tcp_memcontrol_init); |