On 07/31/2018 04:25 PM, Georgi Nikolov wrote: > On 07/31/2018 05:05 PM, Florian Westphal wrote: >> Georgi Nikolov <gniko...@icdsoft.com> wrote: >>>> No, I think that's rather for the netfilter folks to decide. However, it >>>> seems there has been the debate already [1] and it was not found. The >>>> conclusion was that __GFP_NORETRY worked fine before, so it should work >>>> again after it's added back. But now we know that it doesn't... >>>> >>>> [1] https://lore.kernel.org/lkml/20180130140104.ge21...@dhcp22.suse.cz/T/#u >>> Yes i see. I will add Florian Westphal to CC list. netfilter-devel is >>> already in this list so probably have to wait for their opinion. >> It hasn't changed, I think having OOM killer zap random processes >> just because userspace wants to import large iptables ruleset is not a >> good idea. > And what about passing GFP_NORETRY only above some reasonable threshold?
What is the reasonable threshold? > Or situation has to be handled in userspace. How? > > Regards, > > -- > Georgi Nikolov > -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html