From patchwork Mon Jan 23 19:17:22 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "T.J. Mercier" X-Patchwork-Id: 13112830 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9766CC54EAA for ; Mon, 23 Jan 2023 19:17:54 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A7A6C6B0074; Mon, 23 Jan 2023 14:17:53 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id A2A886B0075; Mon, 23 Jan 2023 14:17:53 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8F2B46B0078; Mon, 23 Jan 2023 14:17:53 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 802756B0074 for ; Mon, 23 Jan 2023 14:17:53 -0500 (EST) Received: from smtpin06.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id 01DCE84505 for ; Mon, 23 Jan 2023 19:17:52 +0000 (UTC) X-FDA: 80387023626.06.85FFE30 Received: from mail-yb1-f202.google.com (mail-yb1-f202.google.com [209.85.219.202]) by imf29.hostedemail.com (Postfix) with ESMTP id 168ED120002 for ; Mon, 23 Jan 2023 19:17:50 +0000 (UTC) Authentication-Results: imf29.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=btfBgj1o; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf29.hostedemail.com: domain of 3Xt3OYwkKCHkqgjboZfbodlldib.Zljifkru-jjhsXZh.lod@flex--tjmercier.bounces.google.com designates 209.85.219.202 as permitted sender) smtp.mailfrom=3Xt3OYwkKCHkqgjboZfbodlldib.Zljifkru-jjhsXZh.lod@flex--tjmercier.bounces.google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1674501471; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=N+YvoWM7hVZLP7f3mNekEgTLNrfGSz/VUTj8ZELQtN0=; b=ltlMYs3LGVGvWmWNMC85A5BfJadGi7ksUp8bRT3y26f9Wm9cylmBKD2+Bl0a2CyZJ/8oU8 FlNsYqLxCKQWfLImRYyRSU7TR0F5ORFVMDpKC5/ymmM+AWN4pcAhwbq5FZmoLgQNi9cw5v vU0Rs024LIBs6Fd2eNWVV32lDZx523U= ARC-Authentication-Results: i=1; imf29.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=btfBgj1o; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf29.hostedemail.com: domain of 3Xt3OYwkKCHkqgjboZfbodlldib.Zljifkru-jjhsXZh.lod@flex--tjmercier.bounces.google.com designates 209.85.219.202 as permitted sender) smtp.mailfrom=3Xt3OYwkKCHkqgjboZfbodlldib.Zljifkru-jjhsXZh.lod@flex--tjmercier.bounces.google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1674501471; a=rsa-sha256; cv=none; b=McKAfbbMuhH5hBaosZcRF6gNl3Bj+fElpW0HAu3f0TRn8yCI4EPzD2KcTYp81vji7cS/BO 7vyazSzR23zfXn0z3hwDCz4vqQm3vVveuWTeRDa/iF9poU4MWGDfPJnes3A3hEDwA4aKGT DKmpdT5hLAvtmVBAUO/k3BtiO92AV8k= Received: by mail-yb1-f202.google.com with SMTP id k204-20020a256fd5000000b007b8b040bc50so13933489ybc.1 for ; Mon, 23 Jan 2023 11:17:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=N+YvoWM7hVZLP7f3mNekEgTLNrfGSz/VUTj8ZELQtN0=; b=btfBgj1oagL/EjdEgeCa/LpL00/84F14njHYxfZbVx8eK5EnmK1Ttj9sO31U4EmSM8 1MznIrLgPijCnSyvvb8XtI6YXLZ78NHWa/H/mNm31bw5LcdVJksSSGGO2dzPHlgU3buz /p9eEQbQt8x8MWRR7X+Ry+0Y58RX018tAsy1ZXD0QRf9P7CPtLAoftSzjvCACGDXGEgM o15+ngRvubcFDwfKC4626oWwr6aoB3/30CZULYiYPJpCKGXHpUDBYU1vHVotztxTUlup U435Wlbrn0vhCQELYo1hK06QeiCc3qfIoJ83+mV0bqqYDPZ4ySJ6H5OvU4sUwT2bCQY8 tDxg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=N+YvoWM7hVZLP7f3mNekEgTLNrfGSz/VUTj8ZELQtN0=; b=HMGzRZPmzBqx1ICoUUjqPPkE4IxnWC3yNgF25/2qGvgsw+0A6LLT7+cSI+Q+uTrFOt Pn7hgrTUOpDME0NmXdUdy1PqG2jqzgZ8MK+VmHZQ2TUyMaf+QtI1nwFh5iDDv2h8IX6W oWBKuzlk7szEvk4T+mbdxMz+ehH4kZ0LX2kAi8qKFJzEh5myoi7H7LYe+V4IeXyDhH19 i22Em0BB99Pfn+d/rUhFjG+YAeXrt+oJTSyfrnTCpXyEE6e3O3c+ikRcq1AN71G6kh0b TkIuTwDMkJozuqcq/4f3+XeWA3+0jwCqxQBVCgFZ9Qla9N5YQg0NDH6QZg5tES7z/Rfc Xi4Q== X-Gm-Message-State: AFqh2krYTyL/RrpnNPP0Iv4vvXOZrR5pe0NZ/GMjXNHLTDtJv7lTvOeJ sLlBKjGwFuQCT5v/5EoOb0RbBPyv1hAR/Jg= X-Google-Smtp-Source: AMrXdXtnP/Gl6EBzYGNvoAMXHOPKf8g2vx7ry4RLQdGRDJzjzoV9sc3vvEsAv/i0LJexRseYywCPKePifcMKipA= X-Received: from tj.c.googlers.com ([fda3:e722:ac3:cc00:20:ed76:c0a8:53a]) (user=tjmercier job=sendgmr) by 2002:a25:bdca:0:b0:7ca:14e:be6d with SMTP id g10-20020a25bdca000000b007ca014ebe6dmr3007629ybk.415.1674501470074; Mon, 23 Jan 2023 11:17:50 -0800 (PST) Date: Mon, 23 Jan 2023 19:17:22 +0000 Mime-Version: 1.0 X-Mailer: git-send-email 2.39.0.246.g2a6d74b583-goog Message-ID: <20230123191728.2928839-1-tjmercier@google.com> Subject: [PATCH v2 0/4] Track exported dma-buffers with memcg From: "T.J. Mercier" To: tjmercier@google.com, Tejun Heo , Zefan Li , Johannes Weiner , Jonathan Corbet , Greg Kroah-Hartman , " =?utf-8?q?Arve_Hj?= =?utf-8?q?=C3=B8nnev=C3=A5g?= " , Todd Kjos , Martijn Coenen , Joel Fernandes , Christian Brauner , Carlos Llamas , Suren Baghdasaryan , Sumit Semwal , " =?utf-8?q?Christian_K=C3=B6nig?= " , Michal Hocko , Roman Gushchin , Shakeel Butt , Muchun Song , Andrew Morton , Paul Moore , James Morris , "Serge E. Hallyn" , Stephen Smalley , Eric Paris Cc: daniel.vetter@ffwll.ch, android-mm@google.com, jstultz@google.com, jeffv@google.com, linux-security-module@vger.kernel.org, selinux@vger.kernel.org, cgroups@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-media@vger.kernel.org, dri-devel@lists.freedesktop.org, linaro-mm-sig@lists.linaro.org, linux-mm@kvack.org X-Rspam-User: X-Rspamd-Server: rspam02 X-Rspamd-Queue-Id: 168ED120002 X-Stat-Signature: fxuostaonf4jzfoji97zut3xf36ttkm1 X-HE-Tag: 1674501470-654924 X-HE-Meta: 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 pU+Xb50j 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Based on discussions at LPC, this series adds a memory.stat counter for exported dmabufs. This counter allows us to continue tracking system-wide total exported buffer sizes which there is no longer any way to get without DMABUF_SYSFS_STATS, and adds a new capability to track per-cgroup exported buffer sizes. The total (root counter) is helpful for accounting in-kernel dmabuf use (by comparing with the sum of child nodes or with the sum of sizes of mapped buffers or FD references in procfs) in addition to helping identify driver memory leaks when in-kernel use continually increases over time. With per-application cgroups, the per-cgroup counter allows us to quickly see how much dma-buf memory an application has caused to be allocated. This avoids the need to read through all of procfs which can be a lengthy process, and causes the charge to "stick" to the allocating process/cgroup as long as the buffer is alive, regardless of how the buffer is shared (unless the charge is transferred). The first patch adds the counter to memcg. The next two patches allow the charge for a buffer to be transferred across cgroups which is necessary because of the way most dmabufs are allocated from a central process on Android. The fourth patch adds the binder object flags to the existing selinux_binder_transfer_file LSM hook and a SELinux permission for charge transfers. [1] https://lore.kernel.org/all/20220617085702.4298-1-christian.koenig@amd.com/ v2: Actually charge memcg vs just mutate the stat counter per Shakeel Butt and Michal Hocko. Shakeel pointed me at the skmem functions which turned out to be very similar to how I was thinking the dmabuf tracking should work. So I've added a pair of dmabuf functions that do essentially the same thing, except conditionally implemented behind CONFIG_MEMCG alongside the other charge/uncharge functions. Drop security_binder_transfer_charge per Casey Schaufler and Paul Moore Drop BINDER_FDA_FLAG_XFER_CHARGE (and fix commit message) per Carlos Llamas Don't expose is_dma_buf_file for use by binder per Hillf Danton Call dma_buf_stats_teardown in dma_buf_export error handling Rebase onto v6.2-rc5 Hridya Valsaraju (1): binder: Add flags to relinquish ownership of fds T.J. Mercier (3): memcg: Track exported dma-buffers dmabuf: Add cgroup charge transfer function security: binder: Add binder object flags to selinux_binder_transfer_file Documentation/admin-guide/cgroup-v2.rst | 5 ++ drivers/android/binder.c | 27 ++++++++-- drivers/dma-buf/dma-buf.c | 69 +++++++++++++++++++++++++ include/linux/dma-buf.h | 4 ++ include/linux/lsm_hook_defs.h | 2 +- include/linux/lsm_hooks.h | 5 +- include/linux/memcontrol.h | 43 +++++++++++++++ include/linux/security.h | 6 ++- include/uapi/linux/android/binder.h | 19 +++++-- mm/memcontrol.c | 19 +++++++ security/security.c | 4 +- security/selinux/hooks.c | 13 ++++- security/selinux/include/classmap.h | 2 +- 13 files changed, 201 insertions(+), 17 deletions(-) base-commit: 2241ab53cbb5cdb08a6b2d4688feb13971058f65