lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <fcfe6cae27a59fbc5e40145664b3cf085a560c68.1464079538.git.vdavydov@virtuozzo.com> Date: Tue, 24 May 2016 11:49:30 +0300 From: Vladimir Davydov <vdavydov@...tuozzo.com> To: Andrew Morton <akpm@...ux-foundation.org> CC: "David S. Miller" <davem@...emloft.net>, Johannes Weiner <hannes@...xchg.org>, Michal Hocko <mhocko@...nel.org>, <linux-mm@...ck.org>, <linux-fsdevel@...r.kernel.org>, <netdev@...r.kernel.org>, <x86@...nel.org>, <linux-kernel@...r.kernel.org> Subject: [PATCH RESEND 8/8] af_unix: charge buffers to kmemcg Unix sockets can consume a significant amount of system memory, hence they should be accounted to kmemcg. Since unix socket buffers are always allocated from process context, all we need to do to charge them to kmemcg is set __GFP_ACCOUNT in sock->sk_allocation mask. Signed-off-by: Vladimir Davydov <vdavydov@...tuozzo.com> Cc: "David S. Miller" <davem@...emloft.net> --- net/unix/af_unix.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c index 80aa6a3e6817..022bdd3ab7d9 100644 --- a/net/unix/af_unix.c +++ b/net/unix/af_unix.c @@ -769,6 +769,7 @@ static struct sock *unix_create1(struct net *net, struct socket *sock, int kern) lockdep_set_class(&sk->sk_receive_queue.lock, &af_unix_sk_receive_queue_lock_key); + sk->sk_allocation = GFP_KERNEL_ACCOUNT; sk->sk_write_space = unix_write_space; sk->sk_max_ack_backlog = net->unx.sysctl_max_dgram_qlen; sk->sk_destruct = unix_sock_destructor; -- 2.1.4
Powered by blists - more mailing lists