From mboxrd@z Thu Jan 1 00:00:00 1970 From: Glauber Costa Subject: Re: [RFD] Merge task counter into memcg Date: Wed, 18 Apr 2012 09:00:00 -0300 Message-ID: <4F8EACC0.50204@parallels.com> References: <20120411185715.GA4317@somewhere.redhat.com> <20120412010745.GE1787@cmpxchg.org> <20120412145507.GC11455@somewhere.redhat.com> <4F87042A.2000902@parallels.com> <20120412165922.GA12484@somewhere.redhat.com> <20120417151753.GB32402@google.com> <20120418065430.GB25568@somewhere> Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: Sender: cgroups-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org List-ID: Content-Type: text/plain; charset="us-ascii"; format="flowed" To: Frederic Weisbecker Cc: Tejun Heo , Johannes Weiner , Hugh Dickins , Andrew Morton , KAMEZAWA Hiroyuki , Daniel Walsh , "Daniel P. Berrange" , Li Zefan , LKML , Cgroups , Containers On 04/18/2012 05:10 AM, Frederic Weisbecker wrote: > 2012/4/18 Frederic Weisbecker: >> On Tue, Apr 17, 2012 at 08:17:53AM -0700, Tejun Heo wrote: >>> Hello, Frederic. >>> >>> On Thu, Apr 12, 2012 at 06:59:27PM +0200, Frederic Weisbecker wrote: >>>> I want: >>>> >>>> a) to prevent the forkbomb from going far enough to DDOS the machine >>>> b) to be able to kill that forkbomb once detected, in one go without race >>>> against concurrent forks. >>>> >>>> I think a) can work just fine with kernel stack limiting. I also need >>>> to be notified about the fact we reached the limit. And b) should >>>> be feasible with the help of the cgroup freezer. >>> >>> kmem allocation fail after reaching the limit which in turn should >>> fail task creation. Isn't that the same effect as the task_counter as >>> implemented? >> >> That's it. >> >>> >>>>> Is there anything for which you need to know exactly the number of >>>>> processes? >>>> >>>> No that's really about prevent/kill forkbomb as far as I'm concerned. >>> >>> Hmm... so, accounting overhead aside, if the only purpose is >>> preventing the whole machine being brought down by a fork bomb, kmem >>> limiting is enough, right? >> >> I think so yeah. > > But this needs to be a well defined kind of kmem I think. Relying on > kernel memory > alone is too general to just protect against forkbombs. Kernel stack, > OTOH, should be > a good criteria. The problem is not it being too general. The problem is it is slab-based, and it takes a lot of allocations to fill a slab page. It is a small object, but you still have one per task. If you set the limit too high, it won't help you. If you set it too low, it will harm other object users. > But now I'm worrying, do you think this kmem.kernel_stack limitation > is going to be useful > for other kind of usecase? Yes. Ultimately, we want to track as many kinds of kernel memory to avoid having one container harming the others. Page tables and stack were already briefly discussed, so I think we would get to that eventually anyway.