From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-ed1-f70.google.com (mail-ed1-f70.google.com [209.85.208.70]) by kanga.kvack.org (Postfix) with ESMTP id D11246B026E for ; Tue, 7 Aug 2018 07:38:29 -0400 (EDT) Received: by mail-ed1-f70.google.com with SMTP id i26-v6so5304276edr.4 for ; Tue, 07 Aug 2018 04:38:29 -0700 (PDT) Received: from mx1.suse.de (mx2.suse.de. [195.135.220.15]) by mx.google.com with ESMTPS id u10-v6si1422481edj.219.2018.08.07.04.38.28 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 07 Aug 2018 04:38:28 -0700 (PDT) Date: Tue, 7 Aug 2018 13:38:28 +0200 From: Michal Hocko Subject: Re: [Bug 200651] New: cgroups iptables-restor: vmalloc: allocation failure Message-ID: <20180807113828.GD10003@dhcp22.suse.cz> References: <20180801083349.GF16767@dhcp22.suse.cz> <20180802085043.GC10808@dhcp22.suse.cz> <85c86f17-6f96-6f01-2a3c-e2bad0ccb317@icdsoft.com> <5b5e872e-5785-2cfd-7d53-e19e017e5636@icdsoft.com> <20180807110951.GZ10003@dhcp22.suse.cz> <20180807111926.ibdkzgghn3nfugn2@breakpoint.cc> <20180807112641.GB10003@dhcp22.suse.cz> <20180807113013.su4vjj46vh5fkiqx@breakpoint.cc> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180807113013.su4vjj46vh5fkiqx@breakpoint.cc> Sender: owner-linux-mm@kvack.org List-ID: To: Florian Westphal Cc: Georgi Nikolov , Vlastimil Babka , Andrew Morton , bugzilla-daemon@bugzilla.kernel.org, linux-mm@kvack.org, netfilter-devel@vger.kernel.org On Tue 07-08-18 13:30:13, Florian Westphal wrote: > Michal Hocko wrote: > > On Tue 07-08-18 13:19:26, Florian Westphal wrote: > > > Michal Hocko wrote: > > > > > I can't reproduce it anymore. > > > > > If i understand correctly this way memory allocated will be > > > > > accounted to kmem of this cgroup (if inside cgroup). > > > > > > > > s@this@caller's@ > > > > > > > > Florian, is this patch acceptable > > > > > > I am no mm expert. Should all longlived GFP_KERNEL allocations set ACCOUNT? > > > > No. We should focus only on those that are under direct userspace > > control and it can be triggered by an untrusted user. > > In that case patch is fine and we will need similar patches for > nf_tables_api.c . Can I assume your Acked-by or should I repost the standalong patch in its new thread? -- Michal Hocko SUSE Labs