Date: Wed, 27 Jan 2016 15:12:00 +0300 (MSK) From: Maxim Konovalov <maxim.konovalov@gmail.com> To: Pavel Timofeev <timp87@gmail.com> Cc: Baptiste Daroussin <bapt@freebsd.org>, freebsd-hackers@freebsd.org, Allan Jude <allanjude@freebsd.org> Subject: Re: syslogd(8) with OOM Killer protection Message-ID: <alpine.BSF.2.20.1601271510190.17961@mp2.macomnet.net> In-Reply-To: <CAAoTqfuVr_iXR=_AaGXTTGs20sfWeH76m3yDC-hvAL4kB9iKNA@mail.gmail.com> References: <CAOfEmZgzL2Ldu53CeSsKcUe00H1VAukhEopSUmpUK0=XAhsD1A@mail.gmail.com> <56A86D91.3040709@freebsd.org> <20160127072850.GG35911@ivaldir.etoilebsd.net> <CAAoTqfuVr_iXR=_AaGXTTGs20sfWeH76m3yDC-hvAL4kB9iKNA@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
[...] > I'm one that people. I find this generilized way very usefull. > I have least a couple of daemons that it'd never wanted to be OOMed on > my machines. Besides syslogd, I'd protect sshd and even crond in some > cases. While I agree with the generalization idea via protect(1) or similar tool just a sidenote, sshd already has this feature: >From sshd.c: /* Avoid killing the process in high-pressure swapping environments. */ if (!inetd_flag && madvise(NULL, 0, MADV_PROTECT) != 0) debug("madvise(): %.200s", strerror(errno)); -- Maxim Konovalov
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.20.1601271510190.17961>