[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <aa7be5e4-591f-b7df-12e3-1eff77e53741@collabora.com>
Date: Fri, 17 Dec 2021 08:38:34 +0100
From: Tomeu Vizoso <tomeu.vizoso@...labora.com>
To: Alyssa Rosenzweig <alyssa@...labora.com>,
Steven Price <steven.price@....com>
Cc: Daniel Vetter <daniel@...ll.ch>, David Airlie <airlied@...ux.ie>,
Rob Herring <robh@...nel.org>,
Alyssa Rosenzweig <alyssa.rosenzweig@...labora.com>,
Boris Brezillon <boris.brezillon@...labora.com>,
dri-devel@...ts.freedesktop.org, linux-kernel@...r.kernel.org,
Dan Carpenter <dan.carpenter@...cle.com>
Subject: Re: [PATCH] drm/panfrost: Avoid user size passed to kvmalloc()
On 12/16/21 6:49 PM, Alyssa Rosenzweig wrote:
>> This provides an easy method for user
>> space to trigger the OOM killer (by temporarily allocating large amounts
>> of kernel memory)
>
> panfrost user space has a lot of easy ways to trigger to the OOM killer
> unfortunately .... if this is something we want to fix there are a lot
> more patches coming :(
What are you thinking of, Alyssa?
My understanding is that the problem are kernel allocations that aren't
accounted per userspace process. I would expect shmem-backed BOs to be
taken into account by the OOM killer, so the offending process would be
terminated without affecting the other processes in the system.
Cheers,
Tomeu
Powered by blists - more mailing lists