Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp4203674pxv; Tue, 27 Jul 2021 01:07:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxvPsnTKxmVpP2EiE3b15FIS4lm0rw/cwxx9ZDG0dv2tDZWlkiVUR/ygeqHCLTBYaih4/if X-Received: by 2002:a92:d141:: with SMTP id t1mr15550885ilg.171.1627373231327; Tue, 27 Jul 2021 01:07:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627373231; cv=none; d=google.com; s=arc-20160816; b=ZP5Xavhdt/XMoY+pXCeuAP0/e2jlKazU45Y8B/DbmNFEM/8m3zVm/QSXNfbIBT/R7I Q0rlzf1RDtZSX/Q1QJPCpeYcEVq9ocNEXc0V/n5CEZozviFZ7RwedQBU/v/DanF01gM9 jr7N3FC6CrQNjydKET64FwNWHukfpKIfd+N4PICbBrmy2fj3jz94eRJtDpeW745vhGfh bW1uxhDmTwKLtg3g0TyubUhfksohcFcmbMVsr30OKxDFW6fSGeaVEj5rBMAegFt7CkLG mOBgzkyHpkulwrSRfBqyzXJJwBAFSu6CVYaXsqoGTJjqSXnq6P5w3CxNfRvyHq/N9EJP opww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=W5ZkylOW4aorWqYoZgdy9OUAHDEpy8dU4QmNRvPVlOs=; b=S/wTOMJnmbKAtdMMZKxlRompbKxUspeCYXkqJNhARa2UYNMH/wBuRYXHDU68B3BOle Y6gRgj3DiZd7bh/8KrbJakuybEFC4arsz7wHoFd8twB0YBMTPWJOOiSgeldrjDXlTf83 MAejq28csmDZmYUbXxuUXiQ3V9QydzuRVR1KnOKziVxAoelT8+v3zYvPpzudCc/AsJQQ S0QpUs2Lh4xes6Z/pg3bx/Lw8fSnqld6daIS4ZWcaVM4rHNRg7WHYNIMsSy2qr1WCy6Z rtSk9cxp0LJiNebFHvEObnL66QZjMBxwPzoyEl3AE/RsCx0x0vOShEuw0+nqzvfUpDTy 9Xfg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=relay header.b=Yj12nar4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f8si2520347ioz.70.2021.07.27.01.06.59; Tue, 27 Jul 2021 01:07:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=relay header.b=Yj12nar4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235897AbhG0IFh (ORCPT + 99 others); Tue, 27 Jul 2021 04:05:37 -0400 Received: from relay.sw.ru ([185.231.240.75]:55596 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235679AbhG0ICu (ORCPT ); Tue, 27 Jul 2021 04:02:50 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=Content-Type:MIME-Version:Date:Message-ID:From: Subject; bh=W5ZkylOW4aorWqYoZgdy9OUAHDEpy8dU4QmNRvPVlOs=; b=Yj12nar4kB+x0tcn9 97g0z8UReUWtZBd8M7TK4t+EblgWkMtLRxzEGpJndlo5lJBaTOwX6Ie72E40Rk0K8jA0cK/uuB36K LvHZgC3Qjsg3GnIS9NTYCQTgU7QuHIYd0xtpICYl/ho2irAdnFnf2UYH2M9kP6NIg+CLeRnurfSpY =; Received: from [10.93.0.56] by relay.sw.ru with esmtp (Exim 4.94.2) (envelope-from ) id 1m8I2q-005M9I-NF; Tue, 27 Jul 2021 11:02:32 +0300 Subject: Re: [PATCH v7 09/10] memcg: enable accounting for tty-related objects To: Jiri Slaby Cc: cgroups@vger.kernel.org, Greg Kroah-Hartman , linux-kernel@vger.kernel.org References: <6f21a0e0-bd36-b6be-1ffa-0dc86c06c470@virtuozzo.com> <1eef95fe-6172-796e-edd1-095545da6e74@kernel.org> From: Vasily Averin Message-ID: Date: Tue, 27 Jul 2021 11:02:31 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <1eef95fe-6172-796e-edd1-095545da6e74@kernel.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/27/21 9:54 AM, Jiri Slaby wrote: > On 27. 07. 21, 7:34, Vasily Averin wrote: >> At each login the user forces the kernel to create a new terminal and >> allocate up to ~1Kb memory for the tty-related structures. >> >> By default it's allowed to create up to 4096 ptys with 1024 reserve for >> initial mount namespace only and the settings are controlled by host admin. >> >> Though this default is not enough for hosters with thousands >> of containers per node. Host admin can be forced to increase it >> up to NR_UNIX98_PTY_MAX = 1<<20. >> >> By default container is restricted by pty mount_opt.max = 1024, >> but admin inside container can change it via remount. As a result, >> one container can consume almost all allowed ptys >> and allocate up to 1Gb of unaccounted memory. >> >> It is not enough per-se to trigger OOM on host, however anyway, it allows >> to significantly exceed the assigned memcg limit and leads to troubles >> on the over-committed node. >> >> It makes sense to account for them to restrict the host's memory >> consumption from inside the memcg-limited container. >> >> Signed-off-by: Vasily Averin >> Acked-by: Greg Kroah-Hartman >> --- >>   drivers/tty/tty_io.c | 4 ++-- >>   1 file changed, 2 insertions(+), 2 deletions(-) >> >> diff --git a/drivers/tty/tty_io.c b/drivers/tty/tty_io.c >> index 26debec..e787f6f 100644 >> --- a/drivers/tty/tty_io.c >> +++ b/drivers/tty/tty_io.c >> @@ -1493,7 +1493,7 @@ void tty_save_termios(struct tty_struct *tty) >>       /* Stash the termios data */ >>       tp = tty->driver->termios[idx]; >>       if (tp == NULL) { >> -        tp = kmalloc(sizeof(*tp), GFP_KERNEL); >> +        tp = kmalloc(sizeof(*tp), GFP_KERNEL_ACCOUNT); > > termios are not saved for PTYs (TTY_DRIVER_RESET_TERMIOS). Am I missing something? No, you are right, I've missed this. Typical terminals inside containers use TTY_DRIVER_RESET_TERMIOS flag and therefore do not save termios. So its accounting have near-to-zero impact in real life. I'll prepare fixup to drop GFP_KERNEL_ACCOUNT here. Thank you very much, Vasily Averin >>           if (tp == NULL) >>               return; >>           tty->driver->termios[idx] = tp; >> @@ -3119,7 +3119,7 @@ struct tty_struct *alloc_tty_struct(struct tty_driver *driver, int idx) >>   { >>       struct tty_struct *tty; >>   -    tty = kzalloc(sizeof(*tty), GFP_KERNEL); >> +    tty = kzalloc(sizeof(*tty), GFP_KERNEL_ACCOUNT); >>       if (!tty) >>           return NULL; >>   > > thanks,