On April 20, 2016 4:50:53 AM PDT, "Austin S. Hemmelgarn" <ahferro...@gmail.com> 
wrote:
>On 2016-04-19 23:27, Eric W. Biederman wrote:
>> "H. Peter Anvin" <h...@zytor.com> writes:
>>
>>> On April 19, 2016 12:25:03 PM PDT, "H. Peter Anvin" <h...@zytor.com>
>wrote:
>>>>
>>>> Perhaps a (privileged) option to exempt from the global limit,
>then.
>>>> Something we can implement if asked for.
>>>>
>>>> However, I wouldn't be 100% that the reserved pool isn't used. 
>Someone
>>>> added it presumably for a reason.  An administrator could say it
>and
>>>> we'd have no idea.
>>>
>>> ... and if I personally was running a container-hosting system, I
>>> would *absolutely* set it to make sure the administrator could not
>get
>>> locked out.
>>
>> That is likely easier done by setting:
>> echo RIDICULOUSLY_LARGE_NUMBER > /proc/sys/kernel/pty/max
>This may protect against administrative lockout on a sane system with 
>responsible users, but it doesn't protect you from lockout due to a DoS
>
>attack, while the reserved pool does (or at least, it makes sure you
>can 
>still allocate a few PTY's even when under attack).

... or even accidental due to some runaway script.  (I may or may not have some 
first hand knowledge of a similar situation once in college...)
-- 
Sent from my Android device with K-9 Mail. Please excuse brevity and formatting.

Reply via email to