]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
Fix sock_exceed_buf_limit not being triggered in __sk_mem_raise_allocated
authorTengteng Yang <yangtengteng@bytedance.com>
Tue, 27 May 2025 03:04:19 +0000 (11:04 +0800)
committerJakub Kicinski <kuba@kernel.org>
Thu, 29 May 2025 02:07:53 +0000 (19:07 -0700)
commit8542d6fac25c03b4bf36b2d762cfe60fda8491bb
treef99bc95c8a938a37424a204eb36b90a524e7d098
parent90b83efa6701656e02c86e7df2cb1765ea602d07
Fix sock_exceed_buf_limit not being triggered in __sk_mem_raise_allocated

When a process under memory pressure is not part of any cgroup and
the charged flag is false, trace_sock_exceed_buf_limit was not called
as expected.

This regression was introduced by commit 2def8ff3fdb6 ("sock:
Code cleanup on __sk_mem_raise_allocated()"). The fix changes the
default value of charged to true while preserving existing logic.

Fixes: 2def8ff3fdb6 ("sock: Code cleanup on __sk_mem_raise_allocated()")
Signed-off-by: Abel Wu <wuyun.abel@bytedance.com>
Signed-off-by: Tengteng Yang <yangtengteng@bytedance.com>
Link: https://patch.msgid.link/20250527030419.67693-1-yangtengteng@bytedance.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
net/core/sock.c