Re: [PATCH 1/5] mm: Introduce OOM kill timeout.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon 24-11-14 14:29:00, David Rientjes wrote:
> On Mon, 24 Nov 2014, Michal Hocko wrote:
> 
> > > The problem described above is one of phenomena which is triggered by
> > > a vulnerability which exists since (if I didn't miss something)
> > > Linux 2.0 (18 years ago). However, it is too difficult to backport
> > > patches which fix the vulnerability.
> > 
> > What is the vulnerability?
> > 
> 
> There have historically been issues when oom killed processes fail to 
> exit, so this is probably trying to address one of those issues.

Let me clarify. The patch is sold as a security fix. In that context
vulnerability means a behavior which might be abused by a user. I was
merely interested whether there are some known scenarios which would
turn a potential OOM killer deadlock into an exploitable bug. The
changelog was rather unclear about it and rather strong in claims that
any user might trigger OOM deadlock.
-- 
Michal Hocko
SUSE Labs

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@xxxxxxxxx.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@xxxxxxxxx";> email@xxxxxxxxx </a>




[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]