linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: bot+bpf-ci@kernel.org
To: hui.zhu@linux.dev, akpm@linux-foundation.org, hannes@cmpxchg.org,
	mhocko@kernel.org, roman.gushchin@linux.dev,
	shakeel.butt@linux.dev, muchun.song@linux.dev, ast@kernel.org,
	daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev,
	eddyz87@gmail.com, song@kernel.org, yonghong.song@linux.dev,
	john.fastabend@gmail.com, kpsingh@kernel.org, sdf@fomichev.me,
	haoluo@google.com, jolsa@kernel.org, shuah@kernel.org,
	peterz@infradead.org, ojeda@kernel.org, nathan@kernel.org,
	kees@kernel.org, tj@kernel.org, jeffxu@chromium.org,
	mkoutny@suse.com, kernel@jfarr.cc, brauner@kernel.org,
	rdunlap@infradead.org, brgerst@gmail.com, masahiroy@kernel.org,
	davem@davemloft.net, kuba@kernel.org, hawk@kernel.org,
	inwardvessel@gmail.com, willemb@google.com,
	kerneljasonxing@gmail.com, paul.chaignon@gmail.com,
	a.s.protopopov@gmail.com, ameryhung@gmail.com,
	chenridong@huaweicloud.com, lance.yang@linux.dev,
	jiayuan.chen@linux.dev, linux-kernel@vger.kernel.org,
	linux-mm@kvack.org, cgroups@vger.kernel.org, bpf@vger.kernel.org,
	netdev@vger.kernel.org, linu@kvack.org,
	x-kselftest@vger.kernel.org
Cc: zhuhui@kylinos.cn,geliang@kernel.org,ast@kernel.org,andrii@kernel.org,daniel@iogearbox.net,martin.lau@kernel.org,eddyz87@gmail.com,yonghong.song@linux.dev,clm@meta.com,ihor.solodrai@linux.dev
Subject: Re: [RFC PATCH bpf-next v4 08/12] mm: memcontrol: Add BPF struct_ops for memory controller
Date: Mon, 26 Jan 2026 09:30:25 +0000 (UTC)	[thread overview]
Message-ID: <dae9aa2f4d4de48d86d1e65ab1ce73e01bcff2d003361feb26d06d91eb15b6f7@mail.kernel.org> (raw)
In-Reply-To: <e4c02c0f2673ade0b6e0c254605e011385b744df.1769417588.git.zhuhui@kylinos.cn>

[-- Attachment #1: Type: text/plain, Size: 3192 bytes --]

> diff --git a/include/linux/memcontrol.h b/include/linux/memcontrol.h
> index f3b8c71870d8..1083be5d0362 100644
> --- a/include/linux/memcontrol.h
> +++ b/include/linux/memcontrol.h

[ ... ]

> +#else /* CONFIG_BPF_SYSCALL */
> +
> +static inline unsigned long
> +bpf_memcg_get_high_delay(struct mem_cgroup *memcg) { return 0; }
> +static inline bpf_memcg_below_low(struct mem_cgroup *memcg) { return false; }
> +static inline bpf_memcg_below_min(struct mem_cgroup *memcg) { return false; }
                ^^^^^^^^^^^^^^^^^^^^

These two stubs are missing the bool return type. This will cause a
compilation error when CONFIG_BPF_SYSCALL is not set. Should these be:

  static inline bool bpf_memcg_below_low(...)
  static inline bool bpf_memcg_below_min(...)

> +static inline void memcontrol_bpf_online(struct mem_cgroup *memcg) { }
> +static inline void memcontrol_bpf_offline(struct mem_cgroup *memcg) { }
> +
> +#endif /* CONFIG_BPF_SYSCALL */

[ ... ]

> diff --git a/mm/bpf_memcontrol.c b/mm/bpf_memcontrol.c
> index 716df49d7647..20c5c3552ce3 100644
> --- a/mm/bpf_memcontrol.c
> +++ b/mm/bpf_memcontrol.c

[ ... ]

> +static int bpf_memcg_ops_reg(void *kdata, struct bpf_link *link)
> +{
> +	struct bpf_struct_ops_link *ops_link
> +		= container_of(link, struct bpf_struct_ops_link, link);
> +	struct memcg_bpf_ops *ops = kdata;
> +	struct mem_cgroup *memcg, *iter = NULL;
> +	int err = 0;
> +
> +	memcg = mem_cgroup_get_from_ino(ops_link->cgroup_id);
> +	if (IS_ERR_OR_NULL(memcg))
> +		return PTR_ERR(memcg);
> +
> +	cgroup_lock();
> +	while ((iter = mem_cgroup_iter(memcg, iter, NULL))) {
> +		if (READ_ONCE(iter->bpf_ops)) {
> +			mem_cgroup_iter_break(memcg, iter);
> +			err = -EBUSY;
> +			break;
> +		}
> +		WRITE_ONCE(iter->bpf_ops, ops);
> +	}
> +	if (err)
> +		clean_memcg_bpf_ops(memcg, NULL);
                                      ^^^^

When registration fails because a descendant cgroup already has a BPF
program attached, this calls clean_memcg_bpf_ops() with NULL. Looking at
clean_memcg_bpf_ops():

  while ((iter = mem_cgroup_iter(memcg, iter, NULL))) {
      if (ops) {
          if (!WARN_ON(READ_ONCE(iter->bpf_ops) != ops))
              WRITE_ONCE(iter->bpf_ops, NULL);
      } else
          WRITE_ONCE(iter->bpf_ops, NULL);   // unconditional clear
  }

With ops=NULL, this will unconditionally clear bpf_ops for all
descendants in the hierarchy, including the cgroup that already had a
different BPF program attached (which caused the -EBUSY error). This
would incorrectly detach that existing program.

Should this be clean_memcg_bpf_ops(memcg, ops) instead, so it only clears
the ops that were written during this failed registration attempt?

Note: This issue appears to be addressed in the subsequent commit
5f3bb9a8c33f ("mm/bpf: Add BPF_F_ALLOW_OVERRIDE support for
memcg_bpf_ops") which completely rewrites the registration logic.

> +	cgroup_unlock();
> +
> +	mem_cgroup_put(memcg);
> +	return err;
> +}


---
AI reviewed your patch. Please fix the bug or email reply why it's not a bug.
See: https://github.com/kernel-patches/vmtest/blob/master/ci/claude/README.md

CI run summary: https://github.com/kernel-patches/bpf/actions/runs/21352241149

  reply	other threads:[~2026-01-26  9:30 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-01-26  9:02 [RFC PATCH bpf-next v4 00/12] mm: memcontrol: Add BPF hooks " Hui Zhu
2026-01-26  9:02 ` [RFC PATCH bpf-next v4 01/12] bpf: move bpf_struct_ops_link into bpf.h Hui Zhu
2026-01-26  9:02 ` [RFC PATCH bpf-next v4 02/12] bpf: initial support for attaching struct ops to cgroups Hui Zhu
2026-01-26  9:02 ` [RFC PATCH bpf-next v4 03/12] bpf: mark struct oom_control's memcg field as TRUSTED_OR_NULL Hui Zhu
2026-01-26  9:04 ` [RFC PATCH bpf-next v4 04/12] mm: define mem_cgroup_get_from_ino() outside of CONFIG_SHRINKER_DEBUG Hui Zhu
2026-01-26  9:04 ` [RFC PATCH bpf-next v4 05/12] libbpf: introduce bpf_map__attach_struct_ops_opts() Hui Zhu
2026-01-26  9:04 ` [RFC PATCH bpf-next v4 06/12] bpf: Pass flags in bpf_link_create for struct_ops Hui Zhu
2026-01-26  9:04 ` [RFC PATCH bpf-next v4 07/12] libbpf: Support passing user-defined flags " Hui Zhu
2026-01-26  9:06 ` [RFC PATCH bpf-next v4 08/12] mm: memcontrol: Add BPF struct_ops for memory controller Hui Zhu
2026-01-26  9:30   ` bot+bpf-ci [this message]
2026-01-26  9:06 ` [RFC PATCH bpf-next v4 09/12] selftests/bpf: Add tests for memcg_bpf_ops Hui Zhu
2026-01-26  9:06 ` [RFC PATCH bpf-next v4 10/12] mm/bpf: Add BPF_F_ALLOW_OVERRIDE support " Hui Zhu
2026-01-26  9:06 ` [RFC PATCH bpf-next v4 11/12] selftests/bpf: Add test for memcg_bpf_ops hierarchies Hui Zhu
2026-01-26  9:30   ` bot+bpf-ci
2026-01-26  9:06 ` [RFC PATCH bpf-next v4 12/12] samples/bpf: Add memcg priority control example Hui Zhu

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=dae9aa2f4d4de48d86d1e65ab1ce73e01bcff2d003361feb26d06d91eb15b6f7@mail.kernel.org \
    --to=bot+bpf-ci@kernel.org \
    --cc=a.s.protopopov@gmail.com \
    --cc=akpm@linux-foundation.org \
    --cc=ameryhung@gmail.com \
    --cc=andrii@kernel.org \
    --cc=ast@kernel.org \
    --cc=bpf@vger.kernel.org \
    --cc=brauner@kernel.org \
    --cc=brgerst@gmail.com \
    --cc=cgroups@vger.kernel.org \
    --cc=chenridong@huaweicloud.com \
    --cc=clm@meta.com \
    --cc=daniel@iogearbox.net \
    --cc=davem@davemloft.net \
    --cc=eddyz87@gmail.com \
    --cc=geliang@kernel.org \
    --cc=hannes@cmpxchg.org \
    --cc=haoluo@google.com \
    --cc=hawk@kernel.org \
    --cc=hui.zhu@linux.dev \
    --cc=ihor.solodrai@linux.dev \
    --cc=inwardvessel@gmail.com \
    --cc=jeffxu@chromium.org \
    --cc=jiayuan.chen@linux.dev \
    --cc=john.fastabend@gmail.com \
    --cc=jolsa@kernel.org \
    --cc=kees@kernel.org \
    --cc=kernel@jfarr.cc \
    --cc=kerneljasonxing@gmail.com \
    --cc=kpsingh@kernel.org \
    --cc=kuba@kernel.org \
    --cc=lance.yang@linux.dev \
    --cc=linu@kvack.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=martin.lau@kernel.org \
    --cc=martin.lau@linux.dev \
    --cc=masahiroy@kernel.org \
    --cc=mhocko@kernel.org \
    --cc=mkoutny@suse.com \
    --cc=muchun.song@linux.dev \
    --cc=nathan@kernel.org \
    --cc=netdev@vger.kernel.org \
    --cc=ojeda@kernel.org \
    --cc=paul.chaignon@gmail.com \
    --cc=peterz@infradead.org \
    --cc=rdunlap@infradead.org \
    --cc=roman.gushchin@linux.dev \
    --cc=sdf@fomichev.me \
    --cc=shakeel.butt@linux.dev \
    --cc=shuah@kernel.org \
    --cc=song@kernel.org \
    --cc=tj@kernel.org \
    --cc=willemb@google.com \
    --cc=x-kselftest@vger.kernel.org \
    --cc=yonghong.song@linux.dev \
    --cc=zhuhui@kylinos.cn \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox