Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758813AbZAMNT7 (ORCPT ); Tue, 13 Jan 2009 08:19:59 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753313AbZAMNTu (ORCPT ); Tue, 13 Jan 2009 08:19:50 -0500 Received: from THUNK.ORG ([69.25.196.29]:54538 "EHLO thunker.thunk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752381AbZAMNTt (ORCPT ); Tue, 13 Jan 2009 08:19:49 -0500 Date: Tue, 13 Jan 2009 08:19:37 -0500 From: Theodore Tso To: Evgeniy Polyakov Cc: Alan Cox , David Rientjes , Bill Davidsen , linux-kernel@vger.kernel.org, Andrew Morton , Linus Torvalds Subject: Re: Linux killed Kenny, bastard! Message-ID: <20090113131937.GB17664@mit.edu> Mail-Followup-To: Theodore Tso , Evgeniy Polyakov , Alan Cox , David Rientjes , Bill Davidsen , linux-kernel@vger.kernel.org, Andrew Morton , Linus Torvalds References: <20090112161931.6203f96e@lxorguk.ukuu.org.uk> <20090112162938.GA22647@ioremap.net> <496BCB7A.2010804@tmr.com> <20090112231728.GA23803@ioremap.net> <20090113085244.GA13796@ioremap.net> <20090113115408.GA22289@ioremap.net> <20090113121510.68a55fe9@lxorguk.ukuu.org.uk> <20090113122904.GC25011@ioremap.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20090113122904.GC25011@ioremap.net> User-Agent: Mutt/1.5.17+20080114 (2008-01-14) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: tytso@mit.edu X-SA-Exim-Scanned: No (on thunker.thunk.org); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1047 Lines: 23 Instead of trying to specify which process should be protected from the OOM killer by name, how about something which is inherited from the parent process? After all, if having the child not get killed due to OOM is important, the child won't even have a chance to run if the parent gets killed off. And in fact, we have something that fits that bill fairly well; getrlimit()/setrlimit(). Why not define a new resource limit which specifies a relative immunity to the oom_killer? Most of the infrastructure to support that will already be in place (i.e., shell support, PAM support in /etc/securitylimits.conf); all that would need to be done is to teach a few userspace programs/libraries about the new resource limit. This would be a much cleaner approach, I would think. Regards, - Ted -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/