Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp4168180pxv; Mon, 26 Jul 2021 23:56:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz9G34ud+hLEytn8mI0r2pstwDg6/8Bo7Q9FTMSbODZZ8Mpi4umgZbTn8VOTGEfvvLUvEr0 X-Received: by 2002:a17:907:9849:: with SMTP id jj9mr6877386ejc.205.1627368984558; Mon, 26 Jul 2021 23:56:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627368984; cv=none; d=google.com; s=arc-20160816; b=Rfwi+Jssuu+krXGwvwvOYTX8oNK0CaAncmwvAlFJUDH8MuAsMOSgvKPSlr2etjwnTQ LzbPFCB4rgXHuLGHD/mOL/uSDyyj36s9hT6P5/LPUZDR1g7IS12a1nM3LoFKhg79wdoG JAlKQgOOgMLjmBbLMPgUB5k1QBnjI4UCdeSJYh6NCv6YdmB98+hxr8YFZX2NslsOuf4/ w8QZ99KQj8UAPL2uwm3FYz96epIu5AWLENS3mM/15MT7mqM7HKys8Ro4J60VUOPXmMyB 82lev4LPCK75QC5eu/5q3caTLXpLFKuHJOvD5wSmLn9YoXDeKw7W7fFxMx93rn2yEpE6 vNJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=aaW7cFw+oCFWM/dmmy7Fk93SXTQV0wxby9I/PRxiL4c=; b=dfxk7GsyDX3Mae7GyMT0fLMUKKgx7ccTlEHbSR5BrardTZS3atLML9IugqoKG/dJhm wnEA2sC4WKMXU6Yc6F/nWQERE+H5nDjCR0iPktLjpSxwNS69TgKYhVgSc7m8yn5GCkLP 8lOlHUWwPbOLB2kHv8nPIatu2PbKCQO+7H3KdWt/L7Zs/+URdU/uVZJ3bPvPAix6HbbU wLSdaSXGzWfGFJD1FgJsvKhTSI5TFEiraid7KIw1AFg6c47rNctT73c7vsjyRJ0y4HeX CtBfk8RU8pUUlyvQozhXmlBK9UdIzPO4qJpzU8PF4pJxc6vA2SApDdpJ0AMvDs9sBcho YNuQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j6si1930040eja.714.2021.07.26.23.56.01; Mon, 26 Jul 2021 23:56:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235197AbhG0Gyh (ORCPT + 99 others); Tue, 27 Jul 2021 02:54:37 -0400 Received: from mail-wm1-f53.google.com ([209.85.128.53]:43573 "EHLO mail-wm1-f53.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234349AbhG0Gyd (ORCPT ); Tue, 27 Jul 2021 02:54:33 -0400 Received: by mail-wm1-f53.google.com with SMTP id m20-20020a05600c4f54b029024e75a15716so1568909wmq.2; Mon, 26 Jul 2021 23:54:33 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=aaW7cFw+oCFWM/dmmy7Fk93SXTQV0wxby9I/PRxiL4c=; b=mm+Lxm8cVSQOnilaLWWRArZ4654l0xlZSyBHgyDaMhy0+F43HIuhyue/KPMcnTIvEc E/VNDDCiMtJDEga4sSgz9XJTBf2MUxoC7+CWF6drYIxhVEBw4k2aK+kX7Ft9+VPFGFxG SyvobGT3hAHjaMHAZwyl3DGoIdQARN8JTyu5e+ro0i6Enqs02PUt2oAVafRQs/MU087f RZ+Q25ujjKKAVbWUdkzwEYLFI4rXfkNHRSsEuph9gJpW0ELyb40ZHNVHOEdN/HkCYjbk SaifLrPsUCqWILB7y1nLjFyfue5dBK05HZG9P5clWY2rsiYypuLQaE1TcQ6syT8WjsfM lBFg== X-Gm-Message-State: AOAM532JtP36Q+YCBHWFkxBOBt2ZL/RIN6bPO3MWlRGEw0PP0kxNAXTe tkQ/GSGU8F4418Fnfd1hUOiu6cSfFXW5Yw== X-Received: by 2002:a7b:ce08:: with SMTP id m8mr2518480wmc.21.1627368872670; Mon, 26 Jul 2021 23:54:32 -0700 (PDT) Received: from ?IPv6:2a0b:e7c0:0:107::70f? ([2a0b:e7c0:0:107::70f]) by smtp.gmail.com with ESMTPSA id v15sm1738843wmj.39.2021.07.26.23.54.31 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 26 Jul 2021 23:54:31 -0700 (PDT) Subject: Re: [PATCH v7 09/10] memcg: enable accounting for tty-related objects To: Vasily Averin , Andrew Morton Cc: cgroups@vger.kernel.org, Michal Hocko , Shakeel Butt , Johannes Weiner , Vladimir Davydov , Roman Gushchin , Greg Kroah-Hartman , linux-kernel@vger.kernel.org References: <6f21a0e0-bd36-b6be-1ffa-0dc86c06c470@virtuozzo.com> From: Jiri Slaby Message-ID: <1eef95fe-6172-796e-edd1-095545da6e74@kernel.org> Date: Tue, 27 Jul 2021 08:54:31 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 27. 07. 21, 7:34, Vasily Averin wrote: > At each login the user forces the kernel to create a new terminal and > allocate up to ~1Kb memory for the tty-related structures. > > By default it's allowed to create up to 4096 ptys with 1024 reserve for > initial mount namespace only and the settings are controlled by host admin. > > Though this default is not enough for hosters with thousands > of containers per node. Host admin can be forced to increase it > up to NR_UNIX98_PTY_MAX = 1<<20. > > By default container is restricted by pty mount_opt.max = 1024, > but admin inside container can change it via remount. As a result, > one container can consume almost all allowed ptys > and allocate up to 1Gb of unaccounted memory. > > It is not enough per-se to trigger OOM on host, however anyway, it allows > to significantly exceed the assigned memcg limit and leads to troubles > on the over-committed node. > > It makes sense to account for them to restrict the host's memory > consumption from inside the memcg-limited container. > > Signed-off-by: Vasily Averin > Acked-by: Greg Kroah-Hartman > --- > drivers/tty/tty_io.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/drivers/tty/tty_io.c b/drivers/tty/tty_io.c > index 26debec..e787f6f 100644 > --- a/drivers/tty/tty_io.c > +++ b/drivers/tty/tty_io.c > @@ -1493,7 +1493,7 @@ void tty_save_termios(struct tty_struct *tty) > /* Stash the termios data */ > tp = tty->driver->termios[idx]; > if (tp == NULL) { > - tp = kmalloc(sizeof(*tp), GFP_KERNEL); > + tp = kmalloc(sizeof(*tp), GFP_KERNEL_ACCOUNT); termios are not saved for PTYs (TTY_DRIVER_RESET_TERMIOS). Am I missing something? > if (tp == NULL) > return; > tty->driver->termios[idx] = tp; > @@ -3119,7 +3119,7 @@ struct tty_struct *alloc_tty_struct(struct tty_driver *driver, int idx) > { > struct tty_struct *tty; > > - tty = kzalloc(sizeof(*tty), GFP_KERNEL); > + tty = kzalloc(sizeof(*tty), GFP_KERNEL_ACCOUNT); > if (!tty) > return NULL; > > thanks, -- js suse labs