From mboxrd@z Thu Jan 1 00:00:00 1970 To: 9fans@cse.psu.edu Date: Thu, 14 Feb 2008 16:45:02 +0000 From: "Douglas A. Gwyn" Message-ID: <47B46ECD.D08BED0F@null.net> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit References: , <32d376bd5d99375e5941cff163ebbfb1@csplan9.rit.edu> Subject: Re: [9fans] Google search of the day Topicbox-Message-UUID: 53be353c-ead3-11e9-9d60-3106f5b1d025 john@csplan9.rit.edu wrote: > for (;;) > fork(); In genuine UNIX(tm) systems, there is a per-user process limit, so eventually the fork requests start failing. However, this program keeps trying to fork, so if you kill off some of the child processes it will spawn replacements. I don't think it counts as a proper "denial of service" attack, since it affects only the invoking user (well, it does bog down the system with swapping etc. but again, per-user resource bounds can address that).