Out-of-memory victim selection with BPF
Out-of-memory victim selection with BPF
Posted Aug 18, 2023 23:40 UTC (Fri) by roc (subscriber, #30627)In reply to: Out-of-memory victim selection with BPF by flussence
Parent article: Out-of-memory victim selection with BPF
I don't know what you're running on your desktop but I don't believe "most" programs are resilient to OOM on most people's desktops. Certainly anything using Python, Javascript, Java or almost any other language than C or maybe C++ cannot be resilient to OOM. Any application that seriously tries to be resilient to OOM must have a rigorous testing regime using fault injection to test the OOM paths, and I haven't seen *any* Linux desktop application or toolkit with such a testing regime. Heck, do X or Wayland have such a regime? Because if they don't, there's no hope at all.