Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3574846pxv; Mon, 19 Jul 2021 03:46:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxkZ/fFy6jBVtmrFEqtBFcYhE0XW8A5XCgcYs/H6g/kKydEHiZKq22Zi3xxXf7efmurLost X-Received: by 2002:aa7:c841:: with SMTP id g1mr33913707edt.343.1626691601981; Mon, 19 Jul 2021 03:46:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626691601; cv=none; d=google.com; s=arc-20160816; b=e10vnli51yKLEBKbJVrWamv68/sLzYAmszQxxu9fieT3UiNmmyqO1+AbF/eUqprWsf zGjYgQgsLsUlBj/f/3c1y8HUUYSrKM7ziN/g+KteWzciD2/6W9tiK4nHxgkjzaC5GCcM uo5ni++8oqowG8Jpea1tgHH17scYIhdPyxeHTPgSMPhifpbygEKRvWgVroSRS7CMm8GF 12J61RZm4A74hoEdT6puhBDkRiV06rO/ZMm7rjUtqKLPgwqkETjx4WkRmzymxiK6MSIc 0D4s7GjvWuJ+AGnxZEaSYKGzh9thl1PtujLjdV5K5airM9GEQf5prYB3Qrl0sBdAucWa Vcpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:references:cc :to:subject:from:dkim-signature; bh=AZePevufwLfIw+HZXFzYrAu9HJFcrBqN7a5eGmS+F6o=; b=vfHKrDo3mEgxqpEmLEK8eIPfm0WfFnXiYWP1Qqc0+YWSi38/LJ9vGHzvhKyPBz583o uYNOGypoU/2sCafpMqjzHrb9rBEK7oZmRqkTPeqgLHXY00408hAySZpeqJZjS47r4zEP S/G4y3XMnr84vkj4OX5s4cbyVIyGQC2QnMrcxC+mHXTRpG/7NtKg6frjlNat2Eyt3iJM 9pEJBYP+JjXrqRuSGk8ih3qFyX/Mk+mYf3JjPOMY9j2eXNDyXX0B/quIweuzQrbrucoB j0nqS3bKVZV6ieE+A5EhPAnj7/6nQqXphvCDrSZWaMeap+pVu+pxOT1qG9FjFyEFgYoI lSpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=relay header.b="n4/Mj7/l"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qc25si12793868ejb.324.2021.07.19.03.46.19; Mon, 19 Jul 2021 03:46:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=relay header.b="n4/Mj7/l"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236567AbhGSKEU (ORCPT + 99 others); Mon, 19 Jul 2021 06:04:20 -0400 Received: from relay.sw.ru ([185.231.240.75]:44600 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236467AbhGSKEN (ORCPT ); Mon, 19 Jul 2021 06:04:13 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=Content-Type:MIME-Version:Date:Message-ID:Subject :From; bh=AZePevufwLfIw+HZXFzYrAu9HJFcrBqN7a5eGmS+F6o=; b=n4/Mj7/lC/4qow33Krv 2z1TPxXmwmJ88Vii7JkfW9gl5gpUXQ45ZNdLvmRAzzU+Jo0ICHF4F7wW2Suf0RkZpO2LobZNg1sEq T2BObePKwIse3bit2Ii1D8G5NidYaELhOtdnCdRii5kqUfNAzMcnxN/MbAcoNyZkdN3LTOGflMM=; Received: from [10.93.0.56] by relay.sw.ru with esmtp (Exim 4.94.2) (envelope-from ) id 1m5QlX-004Rdv-Ga; Mon, 19 Jul 2021 13:44:51 +0300 From: Vasily Averin Subject: [PATCH v5 05/16] memcg: ipv6/sit: account and don't WARN on ip_tunnel_prl structs allocation To: Andrew Morton Cc: cgroups@vger.kernel.org, Michal Hocko , Shakeel Butt , Johannes Weiner , Vladimir Davydov , Roman Gushchin , "David S. Miller" , Jakub Kicinski , Hideaki YOSHIFUJI , David Ahern , netdev@vger.kernel.org, linux-kernel@vger.kernel.org References: Message-ID: <91fd6931-a12d-e2cc-a8db-9861f5545a51@virtuozzo.com> Date: Mon, 19 Jul 2021 13:44:50 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Author: Andrey Ryabinin The size of the ip_tunnel_prl structs allocation is controllable from user-space, thus it's better to avoid spam in dmesg if allocation failed. Also add __GFP_ACCOUNT as this is a good candidate for per-memcg accounting. Allocation is temporary and limited by 4GB. Signed-off-by: Andrey Ryabinin Signed-off-by: Vasily Averin --- net/ipv6/sit.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/net/ipv6/sit.c b/net/ipv6/sit.c index df5bea8..33adc12 100644 --- a/net/ipv6/sit.c +++ b/net/ipv6/sit.c @@ -321,7 +321,7 @@ static int ipip6_tunnel_get_prl(struct net_device *dev, struct ifreq *ifr) * we try harder to allocate. */ kp = (cmax <= 1 || capable(CAP_NET_ADMIN)) ? - kcalloc(cmax, sizeof(*kp), GFP_KERNEL | __GFP_NOWARN) : + kcalloc(cmax, sizeof(*kp), GFP_KERNEL_ACCOUNT | __GFP_NOWARN) : NULL; rcu_read_lock(); @@ -334,7 +334,8 @@ static int ipip6_tunnel_get_prl(struct net_device *dev, struct ifreq *ifr) * For root users, retry allocating enough memory for * the answer. */ - kp = kcalloc(ca, sizeof(*kp), GFP_ATOMIC); + kp = kcalloc(ca, sizeof(*kp), GFP_ATOMIC | __GFP_ACCOUNT | + __GFP_NOWARN); if (!kp) { ret = -ENOMEM; goto out; -- 1.8.3.1