lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4F75BF5B.7000306@canonical.com>
Date:	Fri, 30 Mar 2012 16:12:43 +0200
From:	David Henningsson <david.henningsson@...onical.com>
To:	Thomas Gleixner <tglx@...utronix.de>
CC:	Arun Raghavan <arun.raghavan@...labora.co.uk>,
	LKML <linux-kernel@...r.kernel.org>,
	Peter Zijlstra <peterz@...radead.org>
Subject: Re: [PATCH] [RESEND] rlimits: Print more information when limits
 are exceeded

On 03/30/2012 03:39 PM, Thomas Gleixner wrote:
> On Fri, 24 Feb 2012, Arun Raghavan wrote:
>
>> This dumps some information in logs when a process exceeds its CPU or RT
>> limits (soft and hard). Makes debugging easier when userspace triggers
>> these limits.
>
> Why do we need to spam the logs with such information?
>
> SIGXCPU is only ever sent by this code. If there is a signal handler
> in the application it's easy to debug. If not it's even easier, the
> thing will simply be killed and you get the reason printed.

I'm not totally sure, but don't we log SIGSEGVs? If so, the same 
reasoning would apply to SIGSEGV.

> For the SIGKILL case there only a limited number of reasons why a
> SIGKILL is sent. So no, I rather commit a patch which removes that
> ugly printk which is already there instead of adding more of them.

The reason I proposed some kind of printk for SIGKILL, was to get some 
diagnostic information out of the SIGKILL. E g, if you have two threads 
both running on rtprio rlimits in the same process, it would be very 
interesting to know which one of them was causing the kernel to send 
SIGKILL.

Also, it could be useful to know whether the SIGKILL was actually sent 
by the kernel, or by some other process feeling evil (e g "kill -9").

-- 
David Henningsson, Canonical Ltd.
http://launchpad.net/~diwic
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ