Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 27 Jan 2016 15:12:00 +0300 (MSK)
From:      Maxim Konovalov <maxim.konovalov@gmail.com>
To:        Pavel Timofeev <timp87@gmail.com>
Cc:        Baptiste Daroussin <bapt@freebsd.org>, freebsd-hackers@freebsd.org, Allan Jude <allanjude@freebsd.org>
Subject:   Re: syslogd(8) with OOM Killer protection
Message-ID:  <alpine.BSF.2.20.1601271510190.17961@mp2.macomnet.net>
In-Reply-To: <CAAoTqfuVr_iXR=_AaGXTTGs20sfWeH76m3yDC-hvAL4kB9iKNA@mail.gmail.com>
References:  <CAOfEmZgzL2Ldu53CeSsKcUe00H1VAukhEopSUmpUK0=XAhsD1A@mail.gmail.com> <56A86D91.3040709@freebsd.org> <20160127072850.GG35911@ivaldir.etoilebsd.net> <CAAoTqfuVr_iXR=_AaGXTTGs20sfWeH76m3yDC-hvAL4kB9iKNA@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
[...]
> I'm one that people. I find this generilized way very usefull.
> I have least a couple of daemons that it'd never wanted to be OOMed on
> my machines. Besides syslogd, I'd protect sshd and even crond in some
> cases.

While I agree with the generalization idea via protect(1) or similar
tool just a sidenote, sshd already has this feature:

>From sshd.c:

/* Avoid killing the process in high-pressure swapping
environments. */
if (!inetd_flag && madvise(NULL, 0, MADV_PROTECT) != 0)
	debug("madvise(): %.200s", strerror(errno));


-- 
Maxim Konovalov



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.20.1601271510190.17961>