mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2024-12-29 09:13:38 +00:00
tmpfs,xattr: GFP_KERNEL_ACCOUNT for simple xattrs
It is particularly important for the userns mount case (when a sensible nr_inodes maximum may not be enforced) that tmpfs user xattrs be subject to memory cgroup limiting. Leave temporary buffer allocations as is, but change the persistent simple xattr allocations from GFP_KERNEL to GFP_KERNEL_ACCOUNT. This limits kernfs's cgroupfs too, but that's good. (I had intended to send this change earlier, but had been confused by shmem_alloc_inode() using GFP_KERNEL, and thought a discussion would be needed to change that too: no, I was forgetting the SLAB_ACCOUNT on that kmem_cache, which implicitly adds __GFP_ACCOUNT to all its allocations.) Signed-off-by: Hugh Dickins <hughd@google.com> Reviewed-by: Jan Kara <jack@suse.cz> Message-Id: <f6953e5a-4183-8314-38f2-40be60998615@google.com> Signed-off-by: Christian Brauner <brauner@kernel.org>
This commit is contained in:
parent
aa5b9178c0
commit
572a3d1e5d
@ -1093,7 +1093,7 @@ struct simple_xattr *simple_xattr_alloc(const void *value, size_t size)
|
||||
if (len < sizeof(*new_xattr))
|
||||
return NULL;
|
||||
|
||||
new_xattr = kvmalloc(len, GFP_KERNEL);
|
||||
new_xattr = kvmalloc(len, GFP_KERNEL_ACCOUNT);
|
||||
if (!new_xattr)
|
||||
return NULL;
|
||||
|
||||
@ -1217,7 +1217,7 @@ struct simple_xattr *simple_xattr_set(struct simple_xattrs *xattrs,
|
||||
if (!new_xattr)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
|
||||
new_xattr->name = kstrdup(name, GFP_KERNEL);
|
||||
new_xattr->name = kstrdup(name, GFP_KERNEL_ACCOUNT);
|
||||
if (!new_xattr->name) {
|
||||
simple_xattr_free(new_xattr);
|
||||
return ERR_PTR(-ENOMEM);
|
||||
|
@ -3616,7 +3616,7 @@ static int shmem_initxattrs(struct inode *inode,
|
||||
|
||||
len = strlen(xattr->name) + 1;
|
||||
new_xattr->name = kmalloc(XATTR_SECURITY_PREFIX_LEN + len,
|
||||
GFP_KERNEL);
|
||||
GFP_KERNEL_ACCOUNT);
|
||||
if (!new_xattr->name) {
|
||||
kvfree(new_xattr);
|
||||
break;
|
||||
|
Loading…
Reference in New Issue
Block a user