|
|
Subscribe / Log in / New account

Out-of-memory victim selection with BPF

Out-of-memory victim selection with BPF

Posted Aug 18, 2023 23:40 UTC (Fri) by roc (subscriber, #30627)
In reply to: Out-of-memory victim selection with BPF by flussence
Parent article: Out-of-memory victim selection with BPF

I don't know what you're running on your desktop but I don't believe "most" programs are resilient to OOM on most people's desktops. Certainly anything using Python, Javascript, Java or almost any other language than C or maybe C++ cannot be resilient to OOM. Any application that seriously tries to be resilient to OOM must have a rigorous testing regime using fault injection to test the OOM paths, and I haven't seen *any* Linux desktop application or toolkit with such a testing regime. Heck, do X or Wayland have such a regime? Because if they don't, there's no hope at all.


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds