Received: by 2002:a05:6a10:5594:0:0:0:0 with SMTP id ee20csp223185pxb; Mon, 25 Apr 2022 08:51:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxhtvW7tpClZEvyqDsp+bK/aWNHu8YpkAl7BgRwa+4NItBUl3eG1BgIaAxdGmIhpcp30Yrp X-Received: by 2002:a17:906:3593:b0:6f3:a0b2:38c5 with SMTP id o19-20020a170906359300b006f3a0b238c5mr2670276ejb.633.1650901908023; Mon, 25 Apr 2022 08:51:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650901908; cv=none; d=google.com; s=arc-20160816; b=xUDNC6P1rSkRMRdFMz47R5AXwF2gei9Gtq/ZyQBZDPFshmUmMlYBb0/vNyMA+JPE25 Dmi/psTUar/QOiDQ8XUhyJjaGCLgTruRcEro6M/HKJLQ1Hg8go77vkwMDu4A/yiMm06i UdkO6NLV38Dtk6xUrnFSVF/z8BdfzslX78sc8EdAkRBE+gIRpniafNXq5OfWftBIIQ6W Q41KbTWuxj33hFzLgjMSkylike3fgLg8qRQHsCBHHIb6DLmW0jd8+8q6LLz2s/Zj0PjB NFrKABQxi11JVoZeJmRX/2kxy27HBtt4QhEyPL5qTFXifJDito3TJcP/GfJDvo8QQLWq RGXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :content-language:references:cc:to:subject:from:user-agent :mime-version:date:message-id:dkim-signature; bh=T8bwaMzGPgoQcIyr+n6koMGrG7fm/Z4/AiIVbk5FTRE=; b=I6U7beN1jKXV62cMFIcUemawvkxAofRgVetPnVZg21/w74bZL+HXoFqA6SFQ5/I9wa AOg9ylUSHFu1mN3Ewridrmm9O+FNcMk5W7kPK1TRWtYkeLfi32cBx3Jzh5qCT4Wgle7L PIy2UyqGNhpRSbBTm+SFwpSikbF8+bUUmf873J/lPyBITI8GP9X4MKwG/oVRP5peUdub sccAHto7ZzsKr+d0+Cw1vexWsnE3RovB9gtuyI+/7KU8jcH8/UxVrGk5XAdjSv+LA1Oo KdHq3z9xe53+0gr7zqrApYhDt+QtunlUYmw50+WsjGWOYxtksw+9WdMo1eVvDWlwrweQ PjVg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@openvz-org.20210112.gappssmtp.com header.s=20210112 header.b=PHxpIopH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=openvz.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y26-20020aa7c25a000000b00425f73a71f6si260555edo.611.2022.04.25.08.51.21; Mon, 25 Apr 2022 08:51:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@openvz-org.20210112.gappssmtp.com header.s=20210112 header.b=PHxpIopH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=openvz.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232143AbiDYK7Y (ORCPT + 99 others); Mon, 25 Apr 2022 06:59:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56344 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237013AbiDYK7L (ORCPT ); Mon, 25 Apr 2022 06:59:11 -0400 Received: from mail-lf1-x131.google.com (mail-lf1-x131.google.com [IPv6:2a00:1450:4864:20::131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1894383034 for ; Mon, 25 Apr 2022 03:56:06 -0700 (PDT) Received: by mail-lf1-x131.google.com with SMTP id k12so1034821lfr.9 for ; Mon, 25 Apr 2022 03:56:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=openvz-org.20210112.gappssmtp.com; s=20210112; h=message-id:date:mime-version:user-agent:from:subject:to:cc :references:content-language:in-reply-to:content-transfer-encoding; bh=T8bwaMzGPgoQcIyr+n6koMGrG7fm/Z4/AiIVbk5FTRE=; b=PHxpIopHnjSfjS/SVHNS9Ad2fDgAC87mv4w+6ga4qbdW0Q2DTzaYmHRN3FR9hnZOCy 6xHdBZqPo+eR6dnxjdmLPyDBqPd9zII1ImpopMWmMb93yF0N8tm+cUmIT5jrtOL4N/4v XixhnibyCcGYMbLesUH9fox8gdn0Zo0vLs70tveEs+TVVtOicDv7XzpKK+lCL7Svz8Lj GZMLt9aTLZIYCm/IcFYiEyN9C17/I/NuJ8YIv2YRMMdH1cS5JDNQB8rXKBscDJ3JiUNc UpHURClLwRUW/qmDhx/2kWlIj9Ntv/iBjic6ui24tNOoA8UmKZVBg0Y/Y35+pkBgxAMI 0zRQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:from :subject:to:cc:references:content-language:in-reply-to :content-transfer-encoding; bh=T8bwaMzGPgoQcIyr+n6koMGrG7fm/Z4/AiIVbk5FTRE=; b=bHEuHtok0C99KVwMHoHU8s2fLOrmPRdOB6FigWXKqqT38aXnwe1Er6Slv3FJDB/t6K RJerxcg6ryr0VSxik5vu0xszW8ZmBLRT5lglAlS413tcE9/X7BlLpyfvDo3zDIvflb43 MBXkcSB5thf7I5eBqG3JYrJQmeFwHnqPETkENOatp+a4+TWh+kDWM6q8Knxfo8c7XV8O WEjAkyEFHjljGvwP0MZVE3DoFgdJSPc9hUYGMgoEvjR6Y63MLWfo3ntUwoPNhkZY3KuS uG2QRPj2r3jStvqYK9K4MTnrazXMrc8Y3jOsjECuzoDwyqaREy2GjaIkrVREol+g5R/Q inig== X-Gm-Message-State: AOAM531emblM9RWIQ7wTd68URVFPyn/m0MSjWOGTQ9SB+DQjcdaGCA/s MdDlwEVFUsr71Un6+j4tqYRarA== X-Received: by 2002:ac2:410b:0:b0:448:58a8:3e8a with SMTP id b11-20020ac2410b000000b0044858a83e8amr12549809lfi.258.1650884164338; Mon, 25 Apr 2022 03:56:04 -0700 (PDT) Received: from [192.168.1.65] ([46.188.121.177]) by smtp.gmail.com with ESMTPSA id u29-20020ac25bdd000000b004720c866dd0sm213357lfn.87.2022.04.25.03.56.03 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 25 Apr 2022 03:56:03 -0700 (PDT) Message-ID: Date: Mon, 25 Apr 2022 13:56:02 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0 From: Vasily Averin Subject: [PATCH memcg v3] net: set proper memcg for net_init hooks allocations To: Vlastimil Babka , Shakeel Butt Cc: kernel@openvz.org, Florian Westphal , linux-kernel@vger.kernel.org, Roman Gushchin , Michal Hocko , cgroups@vger.kernel.org, netdev@vger.kernel.org, "David S. Miller" , Jakub Kicinski , Paolo Abeni References: <20220424144627.GB13403@xsang-OptiPlex-9020> Content-Language: en-US In-Reply-To: <20220424144627.GB13403@xsang-OptiPlex-9020> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org __register_pernet_operations() executes init hook of registered pernet_operation structure in all existing net namespaces. Typically, these hooks are called by a process associated with the specified net namespace, and all __GFP_ACCOUNTING marked allocation are accounted for corresponding container/memcg. However __register_pernet_operations() calls the hooks in the same context, and as a result all marked allocations are accounted to one memcg for all processed net namespaces. This patch adjusts active memcg for each net namespace and helps to account memory allocated inside ops_init() into the proper memcg. Signed-off-by: Vasily Averin --- v3: put_net_memcg() replaced by an alreay existing mem_cgroup_put() It checks memcg before accessing it, this is required for __register_pernet_operations() called before memcg initialization. Additionally fixed leading whitespaces in non-memcg_kmem version of mem_cgroup_from_obj(). v2: introduced get/put_net_memcg(), new functions are moved under CONFIG_MEMCG_KMEM to fix compilation issues reported by Intel's kernel test robot v1: introduced get_mem_cgroup_from_kmem(), which takes the refcount for the found memcg, suggested by Shakeel --- include/linux/memcontrol.h | 29 ++++++++++++++++++++++++++++- net/core/net_namespace.c | 7 +++++++ 2 files changed, 35 insertions(+), 1 deletion(-) diff --git a/include/linux/memcontrol.h b/include/linux/memcontrol.h index 0abbd685703b..cfb68a3f7015 100644 --- a/include/linux/memcontrol.h +++ b/include/linux/memcontrol.h @@ -1714,6 +1714,29 @@ static inline int memcg_cache_id(struct mem_cgroup *memcg) struct mem_cgroup *mem_cgroup_from_obj(void *p); +static inline struct mem_cgroup *get_mem_cgroup_from_kmem(void *p) +{ + struct mem_cgroup *memcg; + + rcu_read_lock(); + do { + memcg = mem_cgroup_from_obj(p); + } while (memcg && !css_tryget(&memcg->css)); + rcu_read_unlock(); + return memcg; +} + +static inline struct mem_cgroup *get_net_memcg(void *p) +{ + struct mem_cgroup *memcg; + + memcg = get_mem_cgroup_from_kmem(p); + + if (!memcg) + memcg = root_mem_cgroup; + + return memcg; +} #else static inline bool mem_cgroup_kmem_disabled(void) { @@ -1763,9 +1786,13 @@ static inline void memcg_put_cache_ids(void) static inline struct mem_cgroup *mem_cgroup_from_obj(void *p) { - return NULL; + return NULL; } +static inline struct mem_cgroup *get_net_memcg(void *p) +{ + return NULL; +} #endif /* CONFIG_MEMCG_KMEM */ #endif /* _LINUX_MEMCONTROL_H */ diff --git a/net/core/net_namespace.c b/net/core/net_namespace.c index a5b5bb99c644..3093b4d5b2b9 100644 --- a/net/core/net_namespace.c +++ b/net/core/net_namespace.c @@ -26,6 +26,7 @@ #include #include +#include /* * Our network namespace constructor/destructor lists */ @@ -1147,7 +1148,13 @@ static int __register_pernet_operations(struct list_head *list, * setup_net() and cleanup_net() are not possible. */ for_each_net(net) { + struct mem_cgroup *old, *memcg; + + memcg = get_net_memcg(net); + old = set_active_memcg(memcg); error = ops_init(ops, net); + set_active_memcg(old); + mem_cgroup_put(memcg); if (error) goto out_undo; list_add_tail(&net->exit_list, &net_exit_list); -- 2.31.1