From patchwork Mon Jul 19 10:44:14 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vasily Averin X-Patchwork-Id: 482095 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-12.2 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id CC75DC12002 for ; Mon, 19 Jul 2021 10:44:39 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id BE7A060FF4 for ; Mon, 19 Jul 2021 10:44:39 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236451AbhGSKD5 (ORCPT ); Mon, 19 Jul 2021 06:03:57 -0400 Received: from relay.sw.ru ([185.231.240.75]:44462 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235975AbhGSKDt (ORCPT ); Mon, 19 Jul 2021 06:03:49 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=Content-Type:MIME-Version:Date:Message-ID:Subject :From; bh=iZ1ynByuioCDoTi2cQJPPrkVfNJCOxOFIYdlfBM1PN0=; b=k76dwmG/+ikvsiuwlWE U2ephl4PQhMvGh2Y09udetgUKUe64bpUurFHaVD1zRCRHPgKPiDw0euvVnw3gmGqgiA1KbgUd1+S3 RPj1WAz6bwfvkHo4bNwF0P7uyBEFWrsjJuWH73tHy+fQnwndffiMpXH33Q+9UcEpuAAq6JBQAHw=; Received: from [10.93.0.56] by relay.sw.ru with esmtp (Exim 4.94.2) (envelope-from ) id 1m5Qkx-004Rc7-T6; Mon, 19 Jul 2021 13:44:15 +0300 From: Vasily Averin Subject: [PATCH v5 00/16] memcg accounting from OpenVZ To: Andrew Morton Cc: Tejun Heo , Cgroups , Michal Hocko , Johannes Weiner , Vladimir Davydov , Roman Gushchin , Shakeel Butt , Yutian Yang , Alexander Viro , Alexey Dobriyan , Andrei Vagin , Andrew Morton , Borislav Petkov , Christian Brauner , David Ahern , "David S. Miller" , Dmitry Safonov <0x7f454c46@gmail.com>, Eric Dumazet , "Eric W. Biederman" , Greg Kroah-Hartman , Hideaki YOSHIFUJI , "H. Peter Anvin" , Ingo Molnar , Jakub Kicinski , "J. Bruce Fields" , Jeff Layton , Jens Axboe , Jiri Slaby , Kirill Tkhai , Oleg Nesterov , Serge Hallyn , Thomas Gleixner , Zefan Li , netdev , linux-fsdevel@vger.kernel.org, LKML References: Message-ID: <9bf9d9bd-03b1-2adb-17b4-5d59a86a9394@virtuozzo.com> Date: Mon, 19 Jul 2021 13:44:14 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org OpenVZ uses memory accounting 20+ years since v2.2.x linux kernels. Initially we used our own accounting subsystem, then partially committed it to upstream, and a few years ago switched to cgroups v1. Now we're rebasing again, revising our old patches and trying to push them upstream. We try to protect the host system from any misuse of kernel memory allocation triggered by untrusted users inside the containers. Patch-set is addressed mostly to cgroups maintainers and cgroups@ mailing list, though I would be very grateful for any comments from maintainersi of affected subsystems or other people added in cc: Compared to the upstream, we additionally account the following kernel objects: - network devices and its Tx/Rx queues - ipv4/v6 addresses and routing-related objects - inet_bind_bucket cache objects - VLAN group arrays - ipv6/sit: ip_tunnel_prl - scm_fp_list objects used by SCM_RIGHTS messages of Unix sockets - nsproxy and namespace objects itself - IPC objects: semaphores, message queues and share memory segments - mounts - pollfd and select bits arrays - signals and posix timers - file lock - fasync_struct used by the file lease code and driver's fasync queues - tty objects - per-mm LDT We have an incorrect/incomplete/obsoleted accounting for few other kernel objects: sk_filter, af_packets, netlink and xt_counters for iptables. They require rework and probably will be dropped at all. Also we're going to add an accounting for nft, however it is not ready yet. We have not tested performance on upstream, however, our performance team compares our current RHEL7-based production kernel and reports that they are at least not worse as the according original RHEL7 kernel. v5: - rebased to v5.14-rc1 - updated ack tags v4: - improved description for tty patch - minor cleanup in LDT patch - rebased to v5.12 - resent to lkml@ v3: - added new patches for other kind of accounted objects - combined patches for ip address/routing-related objects - improved description - re-ordered and rebased for linux 5.12-rc8 v2: - squashed old patch 1 "accounting for allocations called with disabled BH" with old patch 2 "accounting for fib6_nodes cache" used such kind of memory allocation - improved patch description - subsystem maintainers added to cc: Vasily Averin (16): memcg: enable accounting for net_device and Tx/Rx queues memcg: enable accounting for IP address and routing-related objects memcg: enable accounting for inet_bin_bucket cache memcg: enable accounting for VLAN group array memcg: ipv6/sit: account and don't WARN on ip_tunnel_prl structs allocation memcg: enable accounting for scm_fp_list objects memcg: enable accounting for mnt_cache entries memcg: enable accounting for pollfd and select bits arrays memcg: enable accounting for file lock caches memcg: enable accounting for fasync_cache memcg: enable accounting for new namesapces and struct nsproxy memcg: enable accounting of ipc resources memcg: enable accounting for signals memcg: enable accounting for posix_timers_cache slab memcg: enable accounting for tty-related objects memcg: enable accounting for ldt_struct objects arch/x86/kernel/ldt.c | 6 +++--- drivers/tty/tty_io.c | 4 ++-- fs/fcntl.c | 3 ++- fs/locks.c | 6 ++++-- fs/namespace.c | 7 ++++--- fs/select.c | 4 ++-- ipc/msg.c | 2 +- ipc/namespace.c | 2 +- ipc/sem.c | 9 +++++---- ipc/shm.c | 2 +- kernel/cgroup/namespace.c | 2 +- kernel/nsproxy.c | 2 +- kernel/pid_namespace.c | 2 +- kernel/signal.c | 2 +- kernel/time/namespace.c | 4 ++-- kernel/time/posix-timers.c | 4 ++-- kernel/user_namespace.c | 2 +- mm/memcontrol.c | 2 +- net/8021q/vlan.c | 2 +- net/core/dev.c | 6 +++--- net/core/fib_rules.c | 4 ++-- net/core/scm.c | 4 ++-- net/dccp/proto.c | 2 +- net/ipv4/devinet.c | 2 +- net/ipv4/fib_trie.c | 4 ++-- net/ipv4/tcp.c | 4 +++- net/ipv6/addrconf.c | 2 +- net/ipv6/ip6_fib.c | 4 ++-- net/ipv6/route.c | 2 +- net/ipv6/sit.c | 5 +++-- 30 files changed, 57 insertions(+), 49 deletions(-)