Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp1851522pxb; Thu, 16 Sep 2021 17:55:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyWDKJCfN6WVIcKUiSspJBa22h5+UdqHYKIxowrHRLwlbCwrQQBOkKvC/ZNmQWBH/um4V33 X-Received: by 2002:a05:6e02:1bc9:: with SMTP id x9mr6042473ilv.168.1631840141976; Thu, 16 Sep 2021 17:55:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631840141; cv=none; d=google.com; s=arc-20160816; b=NB1WDtNM9ZGY1nZniroDC2AANb6X2z0XqaDxnXxsWTo7nYqBUhb/QwcyksdOlGc2/L H65xIV8vh3kw+5X6pmH+kHO3Ug4yhGtTiqJ1UvswIzuebzdTkfW7LNboXGFIK5OA1Oee fCd3wR4RaCI/Z36jg6pyWXU+RMy3Pdxb2tWJlpf/M0TrI/2C5kCXetP1P7LKo9sR0vpK BqnmGpaxwHihAtl5pfSDffz0gposRsxddDb/N74SfES4PtEU6MS9Ptj/ogBplzh3QlFU 7DDthlALYlTbHNjxNolzj4vIdaMRyBWF8KWWf/ER0LTgVXI1yYayfUe54bA2LYICPSdw SBCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Mwj+Q1i0qxf9pnnORvtWcjOjLxkF8FmXvXam7s1WeLY=; b=lRR3BXV8MgMwtznacJqMl8vR+vbp99JVmgwCFnzmJ+u9UQuknchWSO65zZqaLQ4hwo qvGg+l1xCmc/U+dnDiMehZLFUAZJf8Ec84KiQMhlqeAniRTjFSWzn6S0dW16F5fCEtrG W8vmCurcc7Lza8MRtIvJ9rZ83Z0OzrxQ/pWiRTx3TfULXRDHZmqosJs2AmjkrfFR3OPh YQWi3HPSrc98g6arj9QlvSSkGgx+j9RM2wVIVdKstZtAPdJFwCZtWdphUWUYVKAOUuYG /VgfG9USvvUm5YtDkbqoTObK6B74J1XZPZF0QznUWdyL2a23x1lSG8iS+e2x/NqvVe2i XYrg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=jQAVPElt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z7si4479303ils.59.2021.09.16.17.55.26; Thu, 16 Sep 2021 17:55:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=jQAVPElt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243363AbhIPRFI (ORCPT + 99 others); Thu, 16 Sep 2021 13:05:08 -0400 Received: from mail.kernel.org ([198.145.29.99]:34142 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1348105AbhIPRBs (ORCPT ); Thu, 16 Sep 2021 13:01:48 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 621F161AFD; Thu, 16 Sep 2021 16:33:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1631810000; bh=Lx/7dvfq/ZH0FLfRLQXCRbj4o1l2TjiKGWN5OXRUYgk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jQAVPEltyywcwHb1bwzrIGYeK8Ym4CM88uPJYHx7W6g0yobOl86FAK7ZBsXBuvAJ6 x80+WDnhWOxbnEq5MqXwpDW59DBgSceCtOLrdzRpaqp46YA3gxyx+Kr7+cLV0MnvGm YXclcE+KK57wHgfhx1/3TsW4XiqRcyvkuroJo8ig= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vasily Averin , =?UTF-8?q?Michal=20Koutn=C3=BD?= , Shakeel Butt , Christian Brauner , Roman Gushchin , Michal Hocko , Johannes Weiner , Andrew Morton , Linus Torvalds Subject: [PATCH 5.13 362/380] memcg: enable accounting for pids in nested pid namespaces Date: Thu, 16 Sep 2021 18:01:59 +0200 Message-Id: <20210916155816.373188339@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210916155803.966362085@linuxfoundation.org> References: <20210916155803.966362085@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vasily Averin commit fab827dbee8c2e06ca4ba000fa6c48bcf9054aba upstream. Commit 5d097056c9a0 ("kmemcg: account certain kmem allocations to memcg") enabled memcg accounting for pids allocated from init_pid_ns.pid_cachep, but forgot to adjust the setting for nested pid namespaces. As a result, pid memory is not accounted exactly where it is really needed, inside memcg-limited containers with their own pid namespaces. Pid was one the first kernel objects enabled for memcg accounting. init_pid_ns.pid_cachep marked by SLAB_ACCOUNT and we can expect that any new pids in the system are memcg-accounted. Though recently I've noticed that it is wrong. nested pid namespaces creates own slab caches for pid objects, nested pids have increased size because contain id both for all parent and for own pid namespaces. The problem is that these slab caches are _NOT_ marked by SLAB_ACCOUNT, as a result any pids allocated in nested pid namespaces are not memcg-accounted. Pid struct in nested pid namespace consumes up to 500 bytes memory, 100000 such objects gives us up to ~50Mb unaccounted memory, this allow container to exceed assigned memcg limits. Link: https://lkml.kernel.org/r/8b6de616-fd1a-02c6-cbdb-976ecdcfa604@virtuozzo.com Fixes: 5d097056c9a0 ("kmemcg: account certain kmem allocations to memcg") Cc: stable@vger.kernel.org Signed-off-by: Vasily Averin Reviewed-by: Michal Koutný Reviewed-by: Shakeel Butt Acked-by: Christian Brauner Acked-by: Roman Gushchin Cc: Michal Hocko Cc: Johannes Weiner Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- kernel/pid_namespace.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/kernel/pid_namespace.c +++ b/kernel/pid_namespace.c @@ -51,7 +51,8 @@ static struct kmem_cache *create_pid_cac mutex_lock(&pid_caches_mutex); /* Name collision forces to do allocation under mutex. */ if (!*pkc) - *pkc = kmem_cache_create(name, len, 0, SLAB_HWCACHE_ALIGN, 0); + *pkc = kmem_cache_create(name, len, 0, + SLAB_HWCACHE_ALIGN | SLAB_ACCOUNT, 0); mutex_unlock(&pid_caches_mutex); /* current can fail, but someone else can succeed. */ return READ_ONCE(*pkc);