tcp_memcontrol: Remove setting cgroup settings via sysctl
The code is broken and does not constrain sysctl_tcp_mem as tcp_update_limit does. With the result that it allows the cgroup tcp memory limits to be bypassed. The semantics are broken as the settings are not per netns and are in a per netns table, and instead looks at current. Since the code is broken in both design and implementation and does not implement the functionality for which it was written remove it. Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:

committed by
David S. Miller

parent
cd91cce620
commit
f594d63199
@@ -226,20 +226,6 @@ static int tcp_cgroup_reset(struct cgroup_subsys_state *css, unsigned int event)
|
||||
return 0;
|
||||
}
|
||||
|
||||
void tcp_prot_mem(struct mem_cgroup *memcg, long val, int idx)
|
||||
{
|
||||
struct tcp_memcontrol *tcp;
|
||||
struct cg_proto *cg_proto;
|
||||
|
||||
cg_proto = tcp_prot.proto_cgroup(memcg);
|
||||
if (!cg_proto)
|
||||
return;
|
||||
|
||||
tcp = tcp_from_cgproto(cg_proto);
|
||||
|
||||
tcp->tcp_prot_mem[idx] = val;
|
||||
}
|
||||
|
||||
static struct cftype tcp_files[] = {
|
||||
{
|
||||
.name = "kmem.tcp.limit_in_bytes",
|
||||
|
Reference in New Issue
Block a user