2 #include <net/tcp_memcontrol.h>
5 #include <linux/nsproxy.h>
6 #include <linux/memcontrol.h>
7 #include <linux/module.h>
9 static inline struct tcp_memcontrol *tcp_from_cgproto(struct cg_proto *cg_proto)
11 return container_of(cg_proto, struct tcp_memcontrol, cg_proto);
14 static void memcg_tcp_enter_memory_pressure(struct sock *sk)
16 if (sk->sk_cgrp->memory_pressure)
17 *sk->sk_cgrp->memory_pressure = 1;
19 EXPORT_SYMBOL(memcg_tcp_enter_memory_pressure);
21 int tcp_init_cgroup(struct mem_cgroup *memcg, struct cgroup_subsys *ss)
24 * The root cgroup does not use res_counters, but rather,
25 * rely on the data already collected by the network
28 struct res_counter *res_parent = NULL;
29 struct cg_proto *cg_proto, *parent_cg;
30 struct tcp_memcontrol *tcp;
31 struct mem_cgroup *parent = parent_mem_cgroup(memcg);
32 struct net *net = current->nsproxy->net_ns;
34 cg_proto = tcp_prot.proto_cgroup(memcg);
38 tcp = tcp_from_cgproto(cg_proto);
40 tcp->tcp_prot_mem[0] = net->ipv4.sysctl_tcp_mem[0];
41 tcp->tcp_prot_mem[1] = net->ipv4.sysctl_tcp_mem[1];
42 tcp->tcp_prot_mem[2] = net->ipv4.sysctl_tcp_mem[2];
43 tcp->tcp_memory_pressure = 0;
45 parent_cg = tcp_prot.proto_cgroup(parent);
47 res_parent = parent_cg->memory_allocated;
49 res_counter_init(&tcp->tcp_memory_allocated, res_parent);
50 percpu_counter_init(&tcp->tcp_sockets_allocated, 0);
52 cg_proto->enter_memory_pressure = memcg_tcp_enter_memory_pressure;
53 cg_proto->memory_pressure = &tcp->tcp_memory_pressure;
54 cg_proto->sysctl_mem = tcp->tcp_prot_mem;
55 cg_proto->memory_allocated = &tcp->tcp_memory_allocated;
56 cg_proto->sockets_allocated = &tcp->tcp_sockets_allocated;
57 cg_proto->memcg = memcg;
61 EXPORT_SYMBOL(tcp_init_cgroup);
63 void tcp_destroy_cgroup(struct mem_cgroup *memcg)
65 struct cg_proto *cg_proto;
66 struct tcp_memcontrol *tcp;
68 cg_proto = tcp_prot.proto_cgroup(memcg);
72 tcp = tcp_from_cgproto(cg_proto);
73 percpu_counter_destroy(&tcp->tcp_sockets_allocated);
75 EXPORT_SYMBOL(tcp_destroy_cgroup);
77 static int tcp_update_limit(struct mem_cgroup *memcg, u64 val)
79 struct net *net = current->nsproxy->net_ns;
80 struct tcp_memcontrol *tcp;
81 struct cg_proto *cg_proto;
86 cg_proto = tcp_prot.proto_cgroup(memcg);
90 if (val > RES_COUNTER_MAX)
91 val = RES_COUNTER_MAX;
93 tcp = tcp_from_cgproto(cg_proto);
95 old_lim = res_counter_read_u64(&tcp->tcp_memory_allocated, RES_LIMIT);
96 ret = res_counter_set_limit(&tcp->tcp_memory_allocated, val);
100 for (i = 0; i < 3; i++)
101 tcp->tcp_prot_mem[i] = min_t(long, val >> PAGE_SHIFT,
102 net->ipv4.sysctl_tcp_mem[i]);
104 if (val == RES_COUNTER_MAX)
105 clear_bit(MEMCG_SOCK_ACTIVE, &cg_proto->flags);
106 else if (val != RES_COUNTER_MAX) {
108 * The active bit needs to be written after the static_key
109 * update. This is what guarantees that the socket activation
110 * function is the last one to run. See sock_update_memcg() for
111 * details, and note that we don't mark any socket as belonging
112 * to this memcg until that flag is up.
114 * We need to do this, because static_keys will span multiple
115 * sites, but we can't control their order. If we mark a socket
116 * as accounted, but the accounting functions are not patched in
117 * yet, we'll lose accounting.
119 * We never race with the readers in sock_update_memcg(),
120 * because when this value change, the code to process it is not
123 * The activated bit is used to guarantee that no two writers
124 * will do the update in the same memcg. Without that, we can't
125 * properly shutdown the static key.
127 if (!test_and_set_bit(MEMCG_SOCK_ACTIVATED, &cg_proto->flags))
128 static_key_slow_inc(&memcg_socket_limit_enabled);
129 set_bit(MEMCG_SOCK_ACTIVE, &cg_proto->flags);
135 static int tcp_cgroup_write(struct cgroup_subsys_state *css, struct cftype *cft,
138 struct mem_cgroup *memcg = mem_cgroup_from_css(css);
139 unsigned long long val;
142 switch (cft->private) {
144 /* see memcontrol.c */
145 ret = res_counter_memparse_write_strategy(buffer, &val);
148 ret = tcp_update_limit(memcg, val);
157 static u64 tcp_read_stat(struct mem_cgroup *memcg, int type, u64 default_val)
159 struct tcp_memcontrol *tcp;
160 struct cg_proto *cg_proto;
162 cg_proto = tcp_prot.proto_cgroup(memcg);
166 tcp = tcp_from_cgproto(cg_proto);
167 return res_counter_read_u64(&tcp->tcp_memory_allocated, type);
170 static u64 tcp_read_usage(struct mem_cgroup *memcg)
172 struct tcp_memcontrol *tcp;
173 struct cg_proto *cg_proto;
175 cg_proto = tcp_prot.proto_cgroup(memcg);
177 return atomic_long_read(&tcp_memory_allocated) << PAGE_SHIFT;
179 tcp = tcp_from_cgproto(cg_proto);
180 return res_counter_read_u64(&tcp->tcp_memory_allocated, RES_USAGE);
183 static u64 tcp_cgroup_read(struct cgroup_subsys_state *css, struct cftype *cft)
185 struct mem_cgroup *memcg = mem_cgroup_from_css(css);
188 switch (cft->private) {
190 val = tcp_read_stat(memcg, RES_LIMIT, RES_COUNTER_MAX);
193 val = tcp_read_usage(memcg);
197 val = tcp_read_stat(memcg, cft->private, 0);
205 static int tcp_cgroup_reset(struct cgroup_subsys_state *css, unsigned int event)
207 struct mem_cgroup *memcg;
208 struct tcp_memcontrol *tcp;
209 struct cg_proto *cg_proto;
211 memcg = mem_cgroup_from_css(css);
212 cg_proto = tcp_prot.proto_cgroup(memcg);
215 tcp = tcp_from_cgproto(cg_proto);
219 res_counter_reset_max(&tcp->tcp_memory_allocated);
222 res_counter_reset_failcnt(&tcp->tcp_memory_allocated);
229 unsigned long long tcp_max_memory(const struct mem_cgroup *memcg)
231 struct tcp_memcontrol *tcp;
232 struct cg_proto *cg_proto;
234 cg_proto = tcp_prot.proto_cgroup((struct mem_cgroup *)memcg);
238 tcp = tcp_from_cgproto(cg_proto);
239 return res_counter_read_u64(&tcp->tcp_memory_allocated, RES_LIMIT);
242 void tcp_prot_mem(struct mem_cgroup *memcg, long val, int idx)
244 struct tcp_memcontrol *tcp;
245 struct cg_proto *cg_proto;
247 cg_proto = tcp_prot.proto_cgroup(memcg);
251 tcp = tcp_from_cgproto(cg_proto);
253 tcp->tcp_prot_mem[idx] = val;
256 static struct cftype tcp_files[] = {
258 .name = "kmem.tcp.limit_in_bytes",
259 .write_string = tcp_cgroup_write,
260 .read_u64 = tcp_cgroup_read,
261 .private = RES_LIMIT,
264 .name = "kmem.tcp.usage_in_bytes",
265 .read_u64 = tcp_cgroup_read,
266 .private = RES_USAGE,
269 .name = "kmem.tcp.failcnt",
270 .private = RES_FAILCNT,
271 .trigger = tcp_cgroup_reset,
272 .read_u64 = tcp_cgroup_read,
275 .name = "kmem.tcp.max_usage_in_bytes",
276 .private = RES_MAX_USAGE,
277 .trigger = tcp_cgroup_reset,
278 .read_u64 = tcp_cgroup_read,
283 static int __init tcp_memcontrol_init(void)
285 WARN_ON(cgroup_add_cftypes(&mem_cgroup_subsys, tcp_files));
288 __initcall(tcp_memcontrol_init);