lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.LNX.2.00.1002041044080.15395@pobox.suse.cz>
Date:	Thu, 4 Feb 2010 10:50:50 +0100 (CET)
From:	Jiri Kosina <jkosina@...e.cz>
To:	David Rientjes <rientjes@...gle.com>
Cc:	Lubos Lunak <l.lunak@...e.cz>,
	Balbir Singh <balbir@...ux.vnet.ibm.com>,
	Rik van Riel <riel@...hat.com>, linux-mm@...ck.org,
	linux-kernel@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>,
	KOSAKI Motohiro <kosaki.motohiro@...fujitsu.com>,
	Nick Piggin <npiggin@...e.de>
Subject: Re: Improving OOM killer

On Wed, 3 Feb 2010, David Rientjes wrote:

> > > 		/* Forkbombs get penalized 10% of available RAM */
> > > 		if (forkcount > 500)
> > > 			points += 100;
> > 
> >  As far as I'm concerned, this is a huge improvement over the current code 
> > (and, incidentally :), quite close to what I originally wanted). I'd be 
> > willing to test it in few real-world desktop cases if you provide a patch.
[ ... ]
> Do you have any comments about the forkbomb detector or its threshold that 
> I've put in my heuristic?  I think detecting these scenarios is still an 
> important issue that we need to address instead of simply removing it from 
> consideration entirely.

Why does OOM killer care about forkbombs *at all*?

If we really want kernel to detect forkbombs (*), we'd have to establish 
completely separate infrastructure for that (with its own knobs for tuning 
and possibilities of disabling it completely).

The task of OOM killer is to find the process that caused the system 
to run out of memory, and wipe it, it's as simple as that.

The connection to forkbombs seems to be so loose that I don't see it.

(*) How is forkbomb even defined? Where does the magic constant in 
'forkcount > 500' come from? If your aim is to penalize server processes 
on very loaded web/database servers, then this is probably correct 
aproach. Otherwise, I don't seem to see the point.

Thanks,

-- 
Jiri Kosina
SUSE Labs, Novell Inc.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ