Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp153503iob; Mon, 2 May 2022 15:42:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzNBw1AraUBZfjOdlRpMBFy/MXR3/yzFzQNTnFhecPFvSF+p46EK78L5gt+1vJZ3JNmeM6L X-Received: by 2002:a05:6512:20c6:b0:471:fdba:1480 with SMTP id u6-20020a05651220c600b00471fdba1480mr10062580lfr.425.1651531359166; Mon, 02 May 2022 15:42:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651531359; cv=none; d=google.com; s=arc-20160816; b=YMo0vpKi9XL0Slbzga2Y8k6pIwGM3V+H99UJOFmA/byH31wx83D/6fNfTTurPwW/FE 2IhJLFwxZU/4YzWo5pdDQvkoSt6vzqc2qS/QyOK1fQS2h3M3iV4pONySpupRqHaXVMAj bhGjG+eg1B6Mf3ibsBz9/ijUIfjb487W7sengMqqnoE/db/2ugrFrfW5TAEC+/i0WQg8 iimHPeDQkTL+lNQ9XxZjY2Y5h6KlDMhWz25k7ItttNM/56mRO9h1kZKilroEpTDiXtzi SeQOQS8qKb23OODkuJ5SRUCWzcQjddFEAYW4N5YqW6buJ6xizr410Xt9f/qF0/9QVXGM eOEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :content-language:references:cc:to:subject:from:user-agent :mime-version:date:message-id:dkim-signature; bh=hd0y1OR/b4IeCBpDcty8eQdPQFVx3QSyhq2QmkPNM2U=; b=IoTDsh1PmgLXdNRbMXlj6ayPl86qO5mR4zsoLsmxJHl7SXcQo+2iKMUx5XaMgbAvXM A80oBBFC7lBma1t+alTA38zV+8LwNMnaIyP+EVX5Jyrf90T3H1vtYzaLr29zoLkyyEVS NJRDPzvPS4SMFBq8LppupK+e/1wGYKPYEEPLIe5eqTvjnvmpAgMTOg2a8mrx26cQ051/ DZK/Ml+5e3ECqxT45UJSxnL6AbHJv9JoC6UStmNQBbBdy0lL76LS/Az8RXhj6yYAMiCl N7oFX/20GGRweegOjvksG6pu9U621Or3PyKnlxyblX8MDyGg2D5K5e8rIH7tjTPLFOh+ QkIQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@openvz-org.20210112.gappssmtp.com header.s=20210112 header.b=69H2sZp3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=openvz.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a24-20020a19ca18000000b004722bb4a2c3si13884948lfg.245.2022.05.02.15.42.12; Mon, 02 May 2022 15:42:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@openvz-org.20210112.gappssmtp.com header.s=20210112 header.b=69H2sZp3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=openvz.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1378578AbiEBAOM (ORCPT + 99 others); Sun, 1 May 2022 20:14:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41916 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1378386AbiEBAOI (ORCPT ); Sun, 1 May 2022 20:14:08 -0400 Received: from mail-lj1-x22f.google.com (mail-lj1-x22f.google.com [IPv6:2a00:1450:4864:20::22f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6995FE0BD for ; Sun, 1 May 2022 17:10:36 -0700 (PDT) Received: by mail-lj1-x22f.google.com with SMTP id 4so16646317ljw.11 for ; Sun, 01 May 2022 17:10:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=openvz-org.20210112.gappssmtp.com; s=20210112; h=message-id:date:mime-version:user-agent:from:subject:to:cc :references:content-language:in-reply-to:content-transfer-encoding; bh=hd0y1OR/b4IeCBpDcty8eQdPQFVx3QSyhq2QmkPNM2U=; b=69H2sZp3OJ0LOKrRShXopodHHx0OU2Q0oQ9nk2IPizjQ/AESBps1VdJ5Oq3dfBorHr 0Jpr+Ii0XIGAC9b027CE9SenODK76DnAoIWWvlqEW49Gu+29PZg2IyeJlFBM/wh5nMS5 yXq0RGQ8lNdwBpZIn0z/YqxF4Irp+B7lqzBA+PLV0/1eB6yiziFT4L+VbngWvp7+pT9j i5zbmCEXZ3SaVNtPgvOS97VSGcHt1obphxpMqauFcLOizuZT94JuFThr6wCUy4EfD65Z 2sgiTD7dDr5lf7+AyxpsELyBBnmxFl4tKJ8AlhaZ0bV6G0MyHZoodMaXa13o7wi3NjNn rbtg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:from :subject:to:cc:references:content-language:in-reply-to :content-transfer-encoding; bh=hd0y1OR/b4IeCBpDcty8eQdPQFVx3QSyhq2QmkPNM2U=; b=Z62iwqBJCYqq0C4gIHIKD6eztRQ6bf8DzkBL7d0Lny+Dtf6pZUJ6lXgles6FQ9yPSI oJQfXdVsZWYU5WGuWasw8/8OTWzzqhezdOKd7+dWx6PZdxvx1ILBpaZPVKEZOMEh8Ub2 LguVDrh1FcRLLGc9mM1qy7p1WwJ9/CoQ905rAiP+pQpzH6YAAvhtnLfg8MAtQV66XzOI 4U7eYohi9VFLBixJ9jpAHYNX2j8nvMitBWf5hRZQj/v4DBA6UsLx6oEFsBOvWGhMKHMk l3TxspMftiXWaphFjus9jAPZrbyGNnVSWH4nU8tCkfu5mtqLUS8mmQ0oO5b5PiNVI0ks +9XQ== X-Gm-Message-State: AOAM533N34X0QIUrBPc0CtCMthZc/h+C6PyQijTUTe2Rptse6oudlzdB pF2ibEFOOXM6kcKfEMt7IhiHCA== X-Received: by 2002:a05:651c:505:b0:24f:5248:3018 with SMTP id o5-20020a05651c050500b0024f52483018mr3429236ljp.45.1651450234628; Sun, 01 May 2022 17:10:34 -0700 (PDT) Received: from [192.168.1.65] ([46.188.121.177]) by smtp.gmail.com with ESMTPSA id c5-20020ac25305000000b0047255d211d1sm561008lfh.256.2022.05.01.17.10.33 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 01 May 2022 17:10:34 -0700 (PDT) Message-ID: <0ccfe7a4-c178-0b66-d481-2326c85a8ffb@openvz.org> Date: Mon, 2 May 2022 03:10:32 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0 From: Vasily Averin Subject: [PATCH memcg v5] net: set proper memcg for net_init hooks allocations To: Roman Gushchin , Shakeel Butt Cc: kernel@openvz.org, Florian Westphal , linux-kernel@vger.kernel.org, Vlastimil Babka , Michal Hocko , cgroups@vger.kernel.org, netdev@vger.kernel.org, "David S. Miller" , Jakub Kicinski , Paolo Abeni References: Content-Language: en-US In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org __register_pernet_operations() executes init hook of registered pernet_operation structure in all existing net namespaces. Typically, these hooks are called by a process associated with the specified net namespace, and all __GFP_ACCOUNT marked allocation are accounted for corresponding container/memcg. However __register_pernet_operations() calls the hooks in the same context, and as a result all marked allocations are accounted to one memcg for all processed net namespaces. This patch adjusts active memcg for each net namespace and helps to account memory allocated inside ops_init() into the proper memcg. Signed-off-by: Vasily Averin Acked-by: Roman Gushchin Acked-by: Shakeel Butt --- v5: documented get_mem_cgroup_from_obj() and for mem_cgroup_or_root() functions, asked by Shakeel. v4: get_mem_cgroup_from_kmem() renamed to get_mem_cgroup_from_obj(), get_net_memcg() renamed to mem_cgroup_or_root(), suggested by Roman. v3: put_net_memcg() replaced by an alreay existing mem_cgroup_put() It checks memcg before accessing it, this is required for __register_pernet_operations() called before memcg initialization. Additionally fixed leading whitespaces in non-memcg_kmem version of mem_cgroup_from_obj(). v2: introduced get/put_net_memcg(), new functions are moved under CONFIG_MEMCG_KMEM to fix compilation issues reported by Intel's kernel test robot v1: introduced get_mem_cgroup_from_kmem(), which takes the refcount for the found memcg, suggested by Shakeel --- include/linux/memcontrol.h | 47 +++++++++++++++++++++++++++++++++++++- net/core/net_namespace.c | 7 ++++++ 2 files changed, 53 insertions(+), 1 deletion(-) diff --git a/include/linux/memcontrol.h b/include/linux/memcontrol.h index 0abbd685703b..6405f9b8f5a8 100644 --- a/include/linux/memcontrol.h +++ b/include/linux/memcontrol.h @@ -1714,6 +1714,42 @@ static inline int memcg_cache_id(struct mem_cgroup *memcg) struct mem_cgroup *mem_cgroup_from_obj(void *p); +/** + * get_mem_cgroup_from_obj - get a memcg associated with passed kernel object. + * @p: pointer to object from which memcg should be extracted. It can be NULL. + * + * Retrieves the memory group into which the memory of the pointed kernel + * object is accounted. If memcg is found, its reference is taken. + * If a passed kernel object is uncharged, or if proper memcg cannot be found, + * as well as if mem_cgroup is disabled, NULL is returned. + * + * Return: valid memcg pointer with taken reference or NULL. + */ +static inline struct mem_cgroup *get_mem_cgroup_from_obj(void *p) +{ + struct mem_cgroup *memcg; + + rcu_read_lock(); + do { + memcg = mem_cgroup_from_obj(p); + } while (memcg && !css_tryget(&memcg->css)); + rcu_read_unlock(); + return memcg; +} + +/** + * mem_cgroup_or_root - always returns a pointer to a valid memory cgroup. + * @memcg: pointer to a valid memory cgroup or NULL. + * + * If passed argument is not NULL, returns it without any additional checks + * and changes. Otherwise, root_mem_cgroup is returned. + * + * NOTE: root_mem_cgroup can be NULL during early boot. + */ +static inline struct mem_cgroup *mem_cgroup_or_root(struct mem_cgroup *memcg) +{ + return memcg ? memcg : root_mem_cgroup; +} #else static inline bool mem_cgroup_kmem_disabled(void) { @@ -1763,9 +1799,18 @@ static inline void memcg_put_cache_ids(void) static inline struct mem_cgroup *mem_cgroup_from_obj(void *p) { - return NULL; + return NULL; } +static inline struct mem_cgroup *get_mem_cgroup_from_obj(void *p) +{ + return NULL; +} + +static inline struct mem_cgroup *mem_cgroup_or_root(struct mem_cgroup *memcg) +{ + return NULL; +} #endif /* CONFIG_MEMCG_KMEM */ #endif /* _LINUX_MEMCONTROL_H */ diff --git a/net/core/net_namespace.c b/net/core/net_namespace.c index a5b5bb99c644..240f3db77dec 100644 --- a/net/core/net_namespace.c +++ b/net/core/net_namespace.c @@ -26,6 +26,7 @@ #include #include +#include /* * Our network namespace constructor/destructor lists */ @@ -1147,7 +1148,13 @@ static int __register_pernet_operations(struct list_head *list, * setup_net() and cleanup_net() are not possible. */ for_each_net(net) { + struct mem_cgroup *old, *memcg; + + memcg = mem_cgroup_or_root(get_mem_cgroup_from_obj(net)); + old = set_active_memcg(memcg); error = ops_init(ops, net); + set_active_memcg(old); + mem_cgroup_put(memcg); if (error) goto out_undo; list_add_tail(&net->exit_list, &net_exit_list); -- 2.31.1