[LTP] [PATCH 1/2] syscalls/msgstress03: fix fork failure on small memory systems

xuyang2018.jy@fujitsu.com xuyang2018.jy@fujitsu.com
Wed Jun 23 11:28:58 CEST 2021


Hi Krzysztof
> Running syscalls/msgstress03 on a system with less than ~4 GB of RAM fails:
>
>      msgstress03    1  TFAIL  :  msgstress03.c:155: 	Fork failed (may be OK if under stress)
>
> In dmesg:
>
>      LTP: starting msgstress03
>      cgroup: fork rejected by pids controller in /user.slice/user-1000.slice/session-1.scope
>
> The reason is cgroups pid limit set by systemd user.slice.  The limit is
> set for login session, also for root user.  For example on 2 GB RAM
> machine it is set as:
>      /sys/fs/cgroup/pids/user.slice/user-0.slice/pids.max:5207
This file only exists on cgroupv1 and cgroupv2 should use
/sys/fs/cgroup/user.slice/user-0.slice/pids.max.

Also if some embedded system doesn't have systemd, do we have a generic 
way or fallback way to calculate the pid max?

For this problem, I have a calculate way in my patch[1] at this time 
last year.

[1]https://patchwork.ozlabs.org/project/ltp/patch/1592298082-21792-2-git-send-email-xuyang2018.jy@cn.fujitsu.com/

Best Regards
Yang Xu
>
> Read the maximum number of pids and adjust the test limit.  For 2 GB RAM
> machine with systemd this will result in:
>
>      msgstress03    0  TINFO  :  Found limit of processes 5056 (from /sys/fs/cgroup/pids/user.slice/user-1000.slice/pids.max)
>      msgstress03    0  TINFO  :  Requested number of processes higher than user session limit (10000>  4556), setting to 4556
>
> Signed-off-by: Krzysztof Kozlowski<krzysztof.kozlowski@canonical.com>
> ---
>   include/ipcmsg.h                              |  2 +
>   libs/libltpipc/libipc.c                       | 58 +++++++++++++++++++
>   .../syscalls/ipc/msgstress/msgstress03.c      | 15 ++++-
>   3 files changed, 74 insertions(+), 1 deletion(-)
>
> diff --git a/include/ipcmsg.h b/include/ipcmsg.h
> index d89894b726cf..b73b72d6d172 100644
> --- a/include/ipcmsg.h
> +++ b/include/ipcmsg.h
> @@ -61,8 +61,10 @@ void rm_queue(int);
>
>   key_t getipckey();
>   int getuserid(char *);
> +int get_session_uid(void);
>
>   int get_max_msgqueues(void);
>   int get_used_msgqueues(void);
> +int get_pids_limit(void);
>
>   #endif /* ipcmsg.h */
> diff --git a/libs/libltpipc/libipc.c b/libs/libltpipc/libipc.c
> index d94880f54b64..cd3480ed9f21 100644
> --- a/libs/libltpipc/libipc.c
> +++ b/libs/libltpipc/libipc.c
> @@ -151,6 +151,31 @@ int getuserid(char *user)
>   	return (ent->pw_uid);
>   }
>
> +/*
> + * Get the effective session UID - either one invoking current test via sudo
> + * or the real UID.
> + */
> +int get_session_uid(void)
> +{
> +	const char *sudo_uid;
> +
> +	sudo_uid = getenv("SUDO_UID");
> +	if (sudo_uid) {
> +		int real_uid;
> +
> +		TEST(sscanf(sudo_uid, "%u",&real_uid));
> +		if (TEST_RETURN != 1) {
> +#ifdef DEBUG
> +			tst_resm(TINFO, "No SUDO_UID from env");
> +#endif
> +		} else {
> +			return real_uid;
> +		}
> +	}
> +
> +	return getuid();
> +}
> +
>   /*
>    * rm_shm() - removes a shared memory segment.
>    */
> @@ -218,3 +243,36 @@ int get_max_msgqueues(void)
>   	fclose(f);
>   	return atoi(buff);
>   }
> +
> +/*
> + * Get the limit of processes for current session configured by systemd user.slice.
> + * This also applies to root user.
> + */
> +int get_pids_limit(void)
> +{
> +	int real_uid, ret;
> +	char path[PATH_MAX];
> +	long unsigned int max_pids;
> +
> +	real_uid = get_session_uid();
> +	if (TEST_RETURN != 1) {
> +		tst_resm(TINFO, "Cannot get UID");
> +		return -1;
> +	}
> +
> +	ret = snprintf(path, sizeof(path),
> +		       "/sys/fs/cgroup/pids/user.slice/user-%d.slice/pids.max",
> +		       real_uid);
> +	if (ret<  0 || (size_t)ret>= sizeof(path))
> +		return -1;
> +
> +	if (access(path, R_OK) != 0) {
> +		tst_resm(TINFO, "Cannot read session user limits from '%s'", path);
> +		return -1;
> +	}
> +
> +	SAFE_FILE_SCANF(cleanup, path, "%lu",&max_pids);
> +	tst_resm(TINFO, "Found limit of processes %lu (from %s)", max_pids, path);
> +
> +	return max_pids;
> +}
> diff --git a/testcases/kernel/syscalls/ipc/msgstress/msgstress03.c b/testcases/kernel/syscalls/ipc/msgstress/msgstress03.c
> index 294b401b1b38..9cf96db7956e 100644
> --- a/testcases/kernel/syscalls/ipc/msgstress/msgstress03.c
> +++ b/testcases/kernel/syscalls/ipc/msgstress/msgstress03.c
> @@ -78,7 +78,7 @@ static void usage(void)
>
>   int main(int argc, char **argv)
>   {
> -	int i, j, ok, pid;
> +	int i, j, ok, pid, max_session_pids;
>   	int count, status;
>   	struct sigaction act;
>
> @@ -109,6 +109,19 @@ int main(int argc, char **argv)
>   		}
>   	}
>
> +	max_session_pids = get_pids_limit();
> +	if (max_session_pids>  0) {
> +		/* Clamp number of processes to session limit with some buffer for OS */
> +		max_session_pids = (max_session_pids>  500 ? max_session_pids - 500 : 0);
> +		if (nprocs>= max_session_pids) {
> +			tst_resm(TINFO,
> +				 "Requested number of processes higher than user session limit (%d>  %d), "
> +				 "setting to %d", nprocs, max_session_pids,
> +				 max_session_pids);
> +			nprocs = max_session_pids;
> +		}
> +	}
> +
>   	srand(getpid());
>   	tid = -1;
>


More information about the ltp mailing list