Re: [PATCH 6/6] containers: BeanCounters over generic process containers
On 12/25/06, Kirill Korotaev <[EMAIL PROTECTED]> wrote: > also note that certain limits are much more > complicated than the (very simple) file limits > and the code will be called at higher frequency Agree with this. This patch doesn't prove that BCs can be integrated to the containers infrastructure. What concerns do you have in particular? Are there any changes that you'd like to see? Paul - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: [PATCH 6/6] containers: BeanCounters over generic process containers
Herbert Poetzl wrote: > On Fri, Dec 22, 2006 at 06:14:48AM -0800, Paul Menage wrote: >> This patch implements the BeanCounter resource control abstraction >> over generic process containers. It contains the beancounter core >> code, plus the numfiles resource counter. It doesn't currently contain >> any of the memory tracking code or the code for switching beancounter >> context in interrupts. > > I don't like it, it looks bloated and probably > adds plenty of overhead (similar to the OVZ > implementation where this seems to be taken from) FULL BC patch w/o pages fractions accounting doesn't add any noticeable overhead to mainstream kernel. Pages fractions accounting will be optimized as well. The part you're talking about is only 1/100 of the complete patch. > here are some comments/questions: > >> Currently all the beancounters resource counters are lumped into a >> single hierarchy; ideally it would be possible for each resource >> counter to be a separate container subsystem, allowing them to be >> connected to different hierarchies. >> >> +static inline void bc_uncharge(struct beancounter *bc, int res_id, >> +unsigned long val) >> +{ >> +unsigned long flags; >> + >> +spin_lock_irqsave(&bc->bc_lock, flags); >> +bc_uncharge_locked(bc, res_id, val); >> +spin_unlock_irqrestore(&bc->bc_lock, flags); > > why use a spinlock, when we could use atomic > counters? Because approach if (atomic_read(&bc->barrier) > aromic_read(&bc->held)) atomic_inc(&bc->held); used in vserver accounting is not atomic ;) Look at the comment below about charging two resources at once. > >> +int bc_charge_locked(struct beancounter *bc, int res, unsigned long val, >> +int strict, unsigned long flags) >> +{ >> +struct bc_resource_parm *parm; >> +unsigned long new_held; >> + >> +BUG_ON(val > BC_MAXVALUE); >> + >> +parm = &bc->bc_parms[res]; >> +new_held = parm->held + val; >> + >> +switch (strict) { >> +case BC_LIMIT: >> +if (new_held > parm->limit) >> +break; >> +/* fallthrough */ >> +case BC_BARRIER: >> +if (new_held > parm->barrier) { >> +if (strict == BC_BARRIER) >> +break; >> +if (parm->held < parm->barrier && >> +bc_resources[res]->bcr_barrier_hit) >> +bc_resources[res]->bcr_barrier_hit(bc); >> +} > > why do barrier checks with every accounting? > there are probably a few cases where the > checks could be independant from the accounting Let's look at if (parm->held < parm->barrier && bc_resources[res]->bcr_barrier_hit) bc_resources[res]->bcr_barrier_hit(bc); code one more time. In case of BC_LIMIT charge BC code informs resource controller about BARRIER hit to take some actions before hard resource shortage. >> +/* fallthrough */ >> +case BC_FORCE: >> +parm->held = new_held; >> +bc_adjust_maxheld(parm); > > in what cases do we want to cross the barrier? > >> +return 0; >> +default: >> +BUG(); >> +} >> + >> +if (bc_resources[res]->bcr_limit_hit) >> +return bc_resources[res]->bcr_limit_hit(bc, val, flags); >> + >> +parm->failcnt++; >> +return -ENOMEM; > >> +int bc_file_charge(struct file *file) >> +{ >> +int sev; >> +struct beancounter *bc; >> + >> +task_lock(current); > > why do we lock current? it won't go away that > easily, and for switching the bc, it might be > better to use RCU or a separate lock, no? This came from containers patches. BC code doesn't take locks on fast paths. >> +bc = task_bc(current); >> +css_get_current(&bc->css); >> +task_unlock(current); >> + >> +sev = (capable(CAP_SYS_ADMIN) ? BC_LIMIT : BC_BARRIER); >> + >> +if (bc_charge(bc, BC_NUMFILES, 1, sev)) { >> +css_put(&bc->css); >> +return -EMFILE; >> +} >> + >> +file->f_bc = bc; >> +return 0; >> +} > > also note that certain limits are much more > complicated than the (very simple) file limits > and the code will be called at higher frequency We do know it and we have "pre-charges" optimization for frequent calls. bc->lock we've seen is used to make two or more resources charge in only one atomic operation, that is faster than doing atomic_inc() for each resource as you've proposed above. > how to handle requests like: > try to get as 64 files or as many as available > whatever is smaller I promise, that if Linus will include patch that adds a syscall to open 64 or "as many as available whatever is smaller" files at once we'll add this functionality. > happy xmas, > Herbert > > - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [PATCH 6/6] containers: BeanCounters over generic process containers
Herbert, >>This patch implements the BeanCounter resource control abstraction >>over generic process containers. It contains the beancounter core >>code, plus the numfiles resource counter. It doesn't currently contain >>any of the memory tracking code or the code for switching beancounter >>context in interrupts. > > > I don't like it, it looks bloated and probably > adds plenty of overhead (similar to the OVZ > implementation where this seems to be taken from) > here are some comments/questions: Look like you have commented anything, but OpenVZ :) sure you don't like it, cause it doesn't add racy dcache accounting and works :) speaking about overhead: have you done a single measurement of BC code? >>Currently all the beancounters resource counters are lumped into a >>single hierarchy; ideally it would be possible for each resource >>counter to be a separate container subsystem, allowing them to be >>connected to different hierarchies. >> >>+static inline void bc_uncharge(struct beancounter *bc, int res_id, >>+ unsigned long val) >>+{ >>+ unsigned long flags; >>+ >>+ spin_lock_irqsave(&bc->bc_lock, flags); >>+ bc_uncharge_locked(bc, res_id, val); >>+ spin_unlock_irqrestore(&bc->bc_lock, flags); > > > why use a spinlock, when we could use atomic > counters? 1. some resources can contribute to multiple BC params, thus need to be accounted atomically into 2 counters. 2. spin_lock()/spin_unlock() has the same 1 lock operation on SMP on most archs 3. using atomic counters you can't get a snapshot of current usages. 4. all the performance critical resources should be handled with pre-charges, as it is done in TCP/IP accounting in mainstream and as it is done for files/kmemsize in OpenVZ. >>+int bc_charge_locked(struct beancounter *bc, int res, unsigned long val, >>+ int strict, unsigned long flags) >>+{ >>+ struct bc_resource_parm *parm; >>+ unsigned long new_held; >>+ >>+ BUG_ON(val > BC_MAXVALUE); >>+ >>+ parm = &bc->bc_parms[res]; >>+ new_held = parm->held + val; >>+ >>+ switch (strict) { >>+ case BC_LIMIT: >>+ if (new_held > parm->limit) >>+ break; >>+ /* fallthrough */ >>+ case BC_BARRIER: >>+ if (new_held > parm->barrier) { >>+ if (strict == BC_BARRIER) >>+ break; >>+ if (parm->held < parm->barrier && >>+ bc_resources[res]->bcr_barrier_hit) >>+ bc_resources[res]->bcr_barrier_hit(bc); >>+ } > > > why do barrier checks with every accounting? > there are probably a few cases where the > checks could be independant from the accounting cause it simply doesn't worth optimizing. its overhead is minor compared to accounting itself (atomic operations). >>+ /* fallthrough */ >>+ case BC_FORCE: >>+ parm->held = new_held; >>+ bc_adjust_maxheld(parm); > > > in what cases do we want to cross the barrier? in this patchset it is not used AFAICS. however, it was taken from the full BC patch where it is used to handle resource denials as most gracefully as possible. >>+ return 0; >>+ default: >>+ BUG(); >>+ } >>+ >>+ if (bc_resources[res]->bcr_limit_hit) >>+ return bc_resources[res]->bcr_limit_hit(bc, val, flags); >>+ >>+ parm->failcnt++; >>+ return -ENOMEM; > > >>+int bc_file_charge(struct file *file) >>+{ >>+ int sev; >>+ struct beancounter *bc; >>+ >>+ task_lock(current); > > > why do we lock current? it won't go away that > easily, and for switching the bc, it might be > better to use RCU or a separate lock, no? I guess it's countainers patch issue... >>+ bc = task_bc(current); >>+ css_get_current(&bc->css); >>+ task_unlock(current); >>+ >>+ sev = (capable(CAP_SYS_ADMIN) ? BC_LIMIT : BC_BARRIER); >>+ >>+ if (bc_charge(bc, BC_NUMFILES, 1, sev)) { >>+ css_put(&bc->css); >>+ return -EMFILE; >>+ } >>+ >>+ file->f_bc = bc; >>+ return 0; >>+} > > > also note that certain limits are much more > complicated than the (very simple) file limits > and the code will be called at higher frequency Agree with this. This patch doesn't prove that BCs can be integrated to the containers infrastructure. > how to handle requests like: > try to get as 64 files or as many as available > whatever is smaller Do you see any problems with these except for not-needed-anywhere-now? P) Kirill - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: [PATCH 6/6] containers: BeanCounters over generic process containers
On 12/23/06, Herbert Poetzl <[EMAIL PROTECTED]> wrote: On Fri, Dec 22, 2006 at 06:14:48AM -0800, Paul Menage wrote: > This patch implements the BeanCounter resource control abstraction > over generic process containers. It contains the beancounter core > code, plus the numfiles resource counter. It doesn't currently contain > any of the memory tracking code or the code for switching beancounter > context in interrupts. I don't like it, it looks bloated and probably adds plenty of overhead (similar to the OVZ implementation where this seems to be taken from) Yes - perhaps I should have been clearer in the patch description. It's basically code taken from the OpenVZ bean counters patches that have been posted recently, but with the filesystem and process tracking code ripped out (since it's implemented over the generic containers). The main point of this patch is to demonstrate that UBC can be implemented effectively over generic containers, rather than to be a proposal in favour of UBC versus any of the other potential resource control mechanisms. Most of your comments are about code taken pretty much directly from the UBC patches, so I won't address them. > +int bc_file_charge(struct file *file) > +{ > + int sev; > + struct beancounter *bc; > + > + task_lock(current); why do we lock current? it won't go away that easily, and for switching the bc, it might be better to use RCU or a separate lock, no? The locking model (taken originally from the Cpusets code) in generic containers is that while you can use RCU to guarantee that a pointer read from current->container remains valid until you exit the RCU critical section, if you want to make consistent changes to data referenced from a task P's container, you need to hold either P->alloc_lock or one of the two container mutexes (manage_mutex and/or callback_mutex). In this particular case (sorry, not on the VPN right now to be able to figure out the potential code changes) the fact that the call to css_get_current() uses atomic operations (currently a spinlock, but I suspect I could optimize it to be a cmpxchg) could mean that we can skip the task_lock(), at the cost of occasionally accounting a file to the container that the task had just left. Paul - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: [PATCH 6/6] containers: BeanCounters over generic process containers
On Fri, Dec 22, 2006 at 06:14:48AM -0800, Paul Menage wrote: > This patch implements the BeanCounter resource control abstraction > over generic process containers. It contains the beancounter core > code, plus the numfiles resource counter. It doesn't currently contain > any of the memory tracking code or the code for switching beancounter > context in interrupts. I don't like it, it looks bloated and probably adds plenty of overhead (similar to the OVZ implementation where this seems to be taken from) here are some comments/questions: > Currently all the beancounters resource counters are lumped into a > single hierarchy; ideally it would be possible for each resource > counter to be a separate container subsystem, allowing them to be > connected to different hierarchies. > > +static inline void bc_uncharge(struct beancounter *bc, int res_id, > + unsigned long val) > +{ > + unsigned long flags; > + > + spin_lock_irqsave(&bc->bc_lock, flags); > + bc_uncharge_locked(bc, res_id, val); > + spin_unlock_irqrestore(&bc->bc_lock, flags); why use a spinlock, when we could use atomic counters? > +int bc_charge_locked(struct beancounter *bc, int res, unsigned long val, > + int strict, unsigned long flags) > +{ > + struct bc_resource_parm *parm; > + unsigned long new_held; > + > + BUG_ON(val > BC_MAXVALUE); > + > + parm = &bc->bc_parms[res]; > + new_held = parm->held + val; > + > + switch (strict) { > + case BC_LIMIT: > + if (new_held > parm->limit) > + break; > + /* fallthrough */ > + case BC_BARRIER: > + if (new_held > parm->barrier) { > + if (strict == BC_BARRIER) > + break; > + if (parm->held < parm->barrier && > + bc_resources[res]->bcr_barrier_hit) > + bc_resources[res]->bcr_barrier_hit(bc); > + } why do barrier checks with every accounting? there are probably a few cases where the checks could be independant from the accounting > + /* fallthrough */ > + case BC_FORCE: > + parm->held = new_held; > + bc_adjust_maxheld(parm); in what cases do we want to cross the barrier? > + return 0; > + default: > + BUG(); > + } > + > + if (bc_resources[res]->bcr_limit_hit) > + return bc_resources[res]->bcr_limit_hit(bc, val, flags); > + > + parm->failcnt++; > + return -ENOMEM; > +int bc_file_charge(struct file *file) > +{ > + int sev; > + struct beancounter *bc; > + > + task_lock(current); why do we lock current? it won't go away that easily, and for switching the bc, it might be better to use RCU or a separate lock, no? > + bc = task_bc(current); > + css_get_current(&bc->css); > + task_unlock(current); > + > + sev = (capable(CAP_SYS_ADMIN) ? BC_LIMIT : BC_BARRIER); > + > + if (bc_charge(bc, BC_NUMFILES, 1, sev)) { > + css_put(&bc->css); > + return -EMFILE; > + } > + > + file->f_bc = bc; > + return 0; > +} also note that certain limits are much more complicated than the (very simple) file limits and the code will be called at higher frequency how to handle requests like: try to get as 64 files or as many as available whatever is smaller happy xmas, Herbert - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
[PATCH 6/6] containers: BeanCounters over generic process containers
This patch implements the BeanCounter resource control abstraction over generic process containers. It contains the beancounter core code, plus the numfiles resource counter. It doesn't currently contain any of the memory tracking code or the code for switching beancounter context in interrupts. Currently all the beancounters resource counters are lumped into a single hierarchy; ideally it would be possible for each resource counter to be a separate container subsystem, allowing them to be connected to different hierarchies. --- fs/file_table.c | 11 + include/bc/beancounter.h | 192 include/bc/misc.h| 27 +++ include/linux/fs.h |3 init/Kconfig |4 init/main.c |3 kernel/Makefile |1 kernel/bc/Kconfig| 17 ++ kernel/bc/Makefile |7 kernel/bc/beancounter.c | 371 +++ kernel/bc/misc.c | 56 +++ 11 files changed, 691 insertions(+), 1 deletion(-) Index: container-2.6.20-rc1/init/Kconfig === --- container-2.6.20-rc1.orig/init/Kconfig +++ container-2.6.20-rc1/init/Kconfig @@ -619,6 +619,10 @@ config STOP_MACHINE Need stop_machine() primitive. endmenu +menu "Beancounters" +source "kernel/bc/Kconfig" +endmenu + menu "Block layer" source "block/Kconfig" endmenu Index: container-2.6.20-rc1/kernel/Makefile === --- container-2.6.20-rc1.orig/kernel/Makefile +++ container-2.6.20-rc1/kernel/Makefile @@ -12,6 +12,7 @@ obj-y = sched.o fork.o exec_domain.o obj-$(CONFIG_STACKTRACE) += stacktrace.o obj-y += time/ +obj-$(CONFIG_BEANCOUNTERS) += bc/ obj-$(CONFIG_DEBUG_MUTEXES) += mutex-debug.o obj-$(CONFIG_LOCKDEP) += lockdep.o ifeq ($(CONFIG_PROC_FS),y) Index: container-2.6.20-rc1/kernel/bc/Kconfig === --- /dev/null +++ container-2.6.20-rc1/kernel/bc/Kconfig @@ -0,0 +1,17 @@ +config BEANCOUNTERS + bool "Enable resource accounting/control" + default n + select CONTAINERS + help + When Y this option provides accounting and allows configuring + limits for user's consumption of exhaustible system resources. + The most important resource controlled by this patch is unswappable + memory (either mlock'ed or used by internal kernel structures and + buffers). The main goal of this patch is to protect processes + from running short of important resources because of accidental + misbehavior of processes or malicious activity aiming to ``kill'' + the system. It's worth mentioning that resource limits configured + by setrlimit(2) do not give an acceptable level of protection + because they cover only a small fraction of resources and work on a + per-process basis. Per-process accounting doesn't prevent malicious + users from spawning a lot of resource-consuming processes. Index: container-2.6.20-rc1/kernel/bc/Makefile === --- /dev/null +++ container-2.6.20-rc1/kernel/bc/Makefile @@ -0,0 +1,7 @@ +# +# kernel/bc/Makefile +# +# Copyright (C) 2006 OpenVZ SWsoft Inc. +# + +obj-y = beancounter.o misc.o Index: container-2.6.20-rc1/include/bc/beancounter.h === --- /dev/null +++ container-2.6.20-rc1/include/bc/beancounter.h @@ -0,0 +1,192 @@ +/* + * include/bc/beancounter.h + * + * Copyright (C) 2006 OpenVZ SWsoft Inc + * + */ + +#ifndef __BEANCOUNTER_H__ +#define __BEANCOUNTER_H__ + +#include + +enum { + BC_KMEMSIZE, + BC_PRIVVMPAGES, + BC_PHYSPAGES, + BC_NUMTASKS, + BC_NUMFILES, + + BC_RESOURCES +}; + +struct bc_resource_parm { + unsigned long barrier; + unsigned long limit; + unsigned long held; + unsigned long minheld; + unsigned long maxheld; + unsigned long failcnt; + +}; + +#ifdef __KERNEL__ + +#include +#include +#include +#include +#include + +#define BC_MAXVALUE((unsigned long)LONG_MAX) + +enum bc_severity { + BC_BARRIER, + BC_LIMIT, + BC_FORCE, +}; + +struct beancounter; + +#ifdef CONFIG_BEANCOUNTERS + +enum bc_attr_index { + BC_RES_HELD, + BC_RES_MAXHELD, + BC_RES_MINHELD, + BC_RES_BARRIER, + BC_RES_LIMIT, + BC_RES_FAILCNT, + + BC_ATTRS +}; + +struct bc_resource { + char*bcr_name; + int res_id; + + int (*bcr_init)(struct beancounter *bc, int res); + int (*bcr_change)(struct beancounter *bc, + unsigned long new_bar, unsigned long new_lim); + void(*bcr_barrier_hit)(struct beancounter *bc); + int (*bcr_limit_hit)(struct beancounter *bc, unsigned long val, +