[ cc list trimmed yet again ]
On Tue, 21 Mar 2000, Richard B. Johnson wrote:
>The rogue program would have to _touch_ all the pages in the system during
>a single time-slice. Once it started using pages in the backing-store,
>this would be impossible because disk I/O sleeps.
Ok, so as long as there is free swap, and the daemon is mlock()'ed, it
should have a chance of killing a rogue program. Fair enough.
But I still think that the OOM killer patch (with optional daemon to set
policy in user-space) is a good idea. The last time I checked (earlier
2.3.x) I could kill my system by running out of memory.
Most people probably don't want to run a daemon, and it makes sense to fix
the kernel, especially since the fix already exists for 2.2.x kernels...
Is that unreasonable?
David Whysong firstname.lastname@example.org
Astrophysics graduate student University of California, Santa Barbara
My public PGP keys are on my web page - http://www.physics.ucsb.edu/~dwhysong
DSS PGP Key 0x903F5BD6 : FE78 91FE 4508 106F 7C88 1706 B792 6995 903F 5BD6
D-H PGP key 0x5DAB0F91 : BC33 0F36 FCCD E72C 441F 663A 72ED 7FB7 5DAB 0F91
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to email@example.com
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Thu Mar 23 2000 - 21:00:34 EST