From mboxrd@z Thu Jan 1 00:00:00 1970 From: Peter Zijlstra Subject: [PATCH 17/40] netvm: filter emergency skbs. Date: Fri, 04 May 2007 12:27:08 +0200 Message-ID: <20070504103159.389910222@chello.nl> References: <20070504102651.923946304@chello.nl> Cc: Peter Zijlstra , Trond Myklebust , Thomas Graf , David Miller , James Bottomley , Mike Christie , Andrew Morton , Daniel Phillips To: linux-kernel@vger.kernel.org, linux-mm@kvack.org, netdev@vger.kernel.org Return-path: Received: from amsfep17-int.chello.nl ([213.46.243.15]:15195 "EHLO amsfep14-int.chello.nl" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S2993215AbXEDKe6 (ORCPT ); Fri, 4 May 2007 06:34:58 -0400 Content-Disposition: inline; filename=netvm-sk_filter.patch Sender: netdev-owner@vger.kernel.org List-Id: netdev.vger.kernel.org Toss all emergency packets not for a SOCK_VMIO socket. This ensures our precious memory reserve doesn't get stuck waiting for user-space. Signed-off-by: Peter Zijlstra --- include/net/sock.h | 3 +++ 1 file changed, 3 insertions(+) Index: linux-2.6-git/include/net/sock.h =================================================================== --- linux-2.6-git.orig/include/net/sock.h 2007-02-14 16:15:49.000000000 +0100 +++ linux-2.6-git/include/net/sock.h 2007-02-14 16:16:27.000000000 +0100 @@ -926,6 +926,9 @@ static inline int sk_filter(struct sock { int err; struct sk_filter *filter; + + if (skb_emergency(skb) && !sk_has_vmio(sk)) + return -EPERM; err = security_sock_rcv_skb(sk, skb); if (err) --