From mboxrd@z Thu Jan 1 00:00:00 1970 Mime-Version: 1.0 (Apple Message framework v753) In-Reply-To: <32d376bd5d99375e5941cff163ebbfb1@csplan9.rit.edu> References: <32d376bd5d99375e5941cff163ebbfb1@csplan9.rit.edu> Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed Message-Id: <7F4F3CB9-7965-42C2-AE3A-A60B7A9B70DD@mac.com> Content-Transfer-Encoding: 7bit From: Pietro Gagliardi Subject: Re: [9fans] Google search of the day Date: Wed, 13 Feb 2008 19:04:23 -0500 To: Fans of the OS Plan 9 from Bell Labs <9fans@cse.psu.edu> Topicbox-Message-UUID: 53a5a6a2-ead3-11e9-9d60-3106f5b1d025 That is exactly how that shell attack works. At one point, however, I think that the number of dynamically allocated task objects should run out, and the program should just wind about in an infinite loop of erroneous calls to fork(). What a shame. I'm happy the OS I'm writing does so. It isn't a UNIX-like one, but the semantics are similar. On Feb 13, 2008, at 6:59 PM, john@csplan9.rit.edu wrote: >> In most /bin/sh variants (I'm not sure about original): >> >> :(){:|:};: >> >> Quick denial of service. >> > > This just in: Repeated forks can bring down a system. > Story at 11. > > #include > #include > > int main() { > for (;;) > fork(); > } > > Look ma! > > John >