Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3786175pxv; Mon, 26 Jul 2021 12:02:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyqOvV3yp9S1lfT9dhhGfl5nzElIWbjzg082Wwrmil+vx8bDot07P+fA+L2TCMo6yySWjpJ X-Received: by 2002:a05:6e02:ecd:: with SMTP id i13mr14891650ilk.182.1627326123239; Mon, 26 Jul 2021 12:02:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627326123; cv=none; d=google.com; s=arc-20160816; b=dWCCIGI1GPyXLPENeXj2Nm/8thhDgd7V5oA2RJvyYZ8ICx/aDI1y/ZIEGJ7OJgHvTo giraEfxVYuUxAjemr8PqAIhiuOPufc06Syap7OZC8nGoTB/oMDZ4ri3Kp2WB/7lacqyU ltcOcBLkbJBye21xVYJ4MWgtXjtx0kb2OdeRP1Nt0NEfnNGKYaoreR9qUrdDZCrldMNF ssdB1bg+6ab67yEE6onQqWmX6TXuFGwyU/gxI3ArggcdekSoMKB/8azucn1RufuCCwYr fyNo9S6WPIe9RxGUjYR8mYKfZyWXcCgqQgh4Yb7zTxq4cvAh6AWtJpF6oXxzGJ5Frqqo VTxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:references:cc :to:subject:from:dkim-signature; bh=AZePevufwLfIw+HZXFzYrAu9HJFcrBqN7a5eGmS+F6o=; b=kxPBfT+d5XaJPGDX1tqfXp6GUXdzHtLZYBjMATTs1WxD6pGzIUZWzzT1CsfaWzvQvw TNWRlIz8O9n4QxHdTO2PQY0SuGe17hATKq8ppeOFtmgSHOd9bYtULkzEGfVzRIVaj2dq LvpkINJheoNvqj/Q8kx6YKsN0VdF3s+gApOKmSoyZazLej5lQFYspFhZyj+aa4ub/Gfb ew65XM3icktAhXxdNKX3KrM1EXFmFXc6yimf1fiM9VnMjSQPLKcXpM0FEwf2b3W0Ox5f VBqcdXB2gCRn82DSHdT248hr1NMMFJ4WSo0/ffM9MW/D/nbgaxMjA27HCS1iQi5ROUT+ N0fg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=relay header.b=OCYnI1D+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a4si662983ild.162.2021.07.26.12.01.51; Mon, 26 Jul 2021 12:02:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=relay header.b=OCYnI1D+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232742AbhGZSUT (ORCPT + 99 others); Mon, 26 Jul 2021 14:20:19 -0400 Received: from relay.sw.ru ([185.231.240.75]:55148 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232897AbhGZSUG (ORCPT ); Mon, 26 Jul 2021 14:20:06 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=Content-Type:MIME-Version:Date:Message-ID:Subject :From; bh=AZePevufwLfIw+HZXFzYrAu9HJFcrBqN7a5eGmS+F6o=; b=OCYnI1D+kIDAM3W3PkD UygoUhUyuAeVsJ+M3NO3XVRFyjGx+ilOH9LQeObbypVFBER+S7/iCrRqQXjbn1ITehS0p5L+cZhhn qp58uUnx8BMfOzhw6DfHe2XmQbjVbv09PzygHK/S93ZiJMv1TjcB0dus+NukMXTAr8X8iUjea48=; Received: from [10.93.0.56] by relay.sw.ru with esmtp (Exim 4.94.2) (envelope-from ) id 1m85q5-005JTO-2U; Mon, 26 Jul 2021 22:00:33 +0300 From: Vasily Averin Subject: [PATCH v6 05/16] memcg: ipv6/sit: account and don't WARN on ip_tunnel_prl structs allocation To: Andrew Morton Cc: cgroups@vger.kernel.org, Michal Hocko , Shakeel Butt , Johannes Weiner , Vladimir Davydov , Roman Gushchin , "David S. Miller" , Jakub Kicinski , Hideaki YOSHIFUJI , David Ahern , netdev@vger.kernel.org, linux-kernel@vger.kernel.org References: <9bf9d9bd-03b1-2adb-17b4-5d59a86a9394@virtuozzo.com> Message-ID: <52f7bed9-a0a1-24ff-2305-ef3224fa4c67@virtuozzo.com> Date: Mon, 26 Jul 2021 22:00:31 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Author: Andrey Ryabinin The size of the ip_tunnel_prl structs allocation is controllable from user-space, thus it's better to avoid spam in dmesg if allocation failed. Also add __GFP_ACCOUNT as this is a good candidate for per-memcg accounting. Allocation is temporary and limited by 4GB. Signed-off-by: Andrey Ryabinin Signed-off-by: Vasily Averin --- net/ipv6/sit.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/net/ipv6/sit.c b/net/ipv6/sit.c index df5bea8..33adc12 100644 --- a/net/ipv6/sit.c +++ b/net/ipv6/sit.c @@ -321,7 +321,7 @@ static int ipip6_tunnel_get_prl(struct net_device *dev, struct ifreq *ifr) * we try harder to allocate. */ kp = (cmax <= 1 || capable(CAP_NET_ADMIN)) ? - kcalloc(cmax, sizeof(*kp), GFP_KERNEL | __GFP_NOWARN) : + kcalloc(cmax, sizeof(*kp), GFP_KERNEL_ACCOUNT | __GFP_NOWARN) : NULL; rcu_read_lock(); @@ -334,7 +334,8 @@ static int ipip6_tunnel_get_prl(struct net_device *dev, struct ifreq *ifr) * For root users, retry allocating enough memory for * the answer. */ - kp = kcalloc(ca, sizeof(*kp), GFP_ATOMIC); + kp = kcalloc(ca, sizeof(*kp), GFP_ATOMIC | __GFP_ACCOUNT | + __GFP_NOWARN); if (!kp) { ret = -ENOMEM; goto out; -- 1.8.3.1