The Fork Bomb: What it is, how it works, and where it originated
Date:
Mon, 26 Dec 2022 15:29:57 GMT
Description:
The idea started in 1969... and it's been causing computers to crash ever since.
FULL STORY ======================================================================:(){ :|:& };:
That simple line has been crashing systems in the Linux world for years It
is known as the (infamous) BASH Fork Bomb.
When run in a GNU/BASH shell, this BASH variant of the Fork Bomb will bring your average Linux system to its knees, lickety-split. A mere handful of characters that can cause a computer to cry Uncle.
But what, exactly, is a Fork Bomb? How do they work? And where on this
green Earth of ours were they first created?
Come with me on a journey into the history, design, and usage of one of the most dastardly ideas in all of computing of The Fork Bomb!
This is a free article on The Lunduke Journal one of the most independent Tech Publications on planet Earth, being fully supported by subscribers like you.
Here are some recent premium articles you also probably want to read:
Firefox Money: Investigating the bizarre finances of Mozilla & Report: Over 33 Million Desktop Linux users, worldwide . Subscribe now What is a Fork
Bomb?
The idea of a Fork Bomb is simple: Create a piece of code that does one thing and one thing only: replicate running instances of itself. And do so as quickly as possible.
Here, a visual will help drive the idea home.
In this case each Bunny Rabbit represents one instance of the Fork Bomb.
Each bunny makes two new bunnies. Quickly. Multiplying like, well, rabbits.
Each of those adorable little bunny rabbits may not take up much RAM or much CPU time but imagine 20 of them. Or 1000. Or, like, a bazillion?! That Fork Bomb will continue making running copies of itself just as long as the system allows it to (by continuing to have available memory or not fully crash).
With how quickly each Fork Bomb replicates itself and the number of copies growing exponentially you can see how they can become a problem in a hurry. Often causing a system to lock up quicker than you can say, Maybe I shouldn't have pressed Enter. A real-world example and how it works
Lets take a look at that BASH version of the Fork Bomb again (as that is one of the most popular and famous examples).
(If you dont know how BASH scripting works, no worries. Ill break it down make it nice and easy.) :(){ :|:& };:
Ok. So how does this, ridiculous looking, collection of semi-random seeming characters, actually work?
Lets break that apart into multiple lines to make it all easier to read. :(){
:|:&
};:
This is a BASH script function.
But theres something weird about it. Note the many usages of :? In this
case : is being used as a function name.
Why is using : as a function name weird, you ask?
Because, on most UNIX-y systems, it is not allowed to use a character in a function name other than letters and numbers (and underscores). But the GNU version of BASH which is commonly used on oh-so-many Linux systems allows : and so many other characters to be used.
Why does GNU allow a :? Who knows. GNU be crazy.
Regardless
Lets replace the : in that BASH script with rabbit. That will, in addition
to making it run on more UNIX systems, make this a bit easier to read. rabbit() {
rabbit | rabbit &
}; rabbit
There. So much better. Here we go. Line by line.
Line 1: rabbit() {
That first line does something simple. It defines a function named rabbit. Thats it and thats all.
Line 2: rabbit | rabbit &
Line 2 is the insidious part.
It calls the function named rabbit, and sends the output of that function to the function named rabbit.
But, heres the thing, there really isnt any output of the rabbit function.
So this is really just a fancy way of calling the rabbit function twice at
the same time.
Yeah. The rabbit function calls itself, from within itself , then calls itself again .
Oh, and that & at the end? That's the BASH way of telling rabbit to run in the background.
The net result? Every rabbit, makes two new rabbits.
Line 3: }; rabbit
That last nine simply ends the rabbit function and then calls itself.
Note: I highly recommend not running this code on your system unless you do
so in a virtual machine. Without taking the proper precautions this will bring your system to its knees.
Every variation of a Fork Bomb operates in a roughly similar fashion. A
small piece of code that creates copies of itself repeatedly. Thus eternally replicating itself until the system runs out of resources. The first Fork
Bomb
The very first known usage of a Fork Bomb was way back in 1969 at the University of Washington.
There, a Burroughs B5500 computer had been installed three years earlier. A big computer that provided the first time-sharing system on the University of Washington campus (through a series of dial-up modems running at 110 baud). This was also the first computer at the University of Washington to provide disk storage for user files. Pretty cool. The Burroughs B-5500. Not the one at the U of W, though. Classy looking machine, right?
On that big, beautiful Burroughs B-5500, someone reportedly wrote a small bit of code that would make two copies of itself over and over again until the memory of the machine was full and the entire system would crash.
That intrepid programmer named that tiny little program, appropriately: RABBITS
Fun historical tidbit: RABBITS for the Burroughs B-5500 was not, technically the first computer virus. That distinction appears to go to the 1971 Creeper Virus. While RABBITS predated Creeper by a good two years RABBITS doesnt really act like a virus. It requires a user to explicitly run it in order to cause its own mischeif. The 1974 Wabbit
A similar piece of code was written on an IBM System/360, a few years later, in 1974. Clearly inspired by RABBITS, this new code was called Wabbit and was, as Elmer Fudd might say, quite wascally. The IBM System/360 Model 22 control panel. That thing was awesome looking.
Legend has it that the individual who created Wabbit ran the program on the System/360 at work causing the entire system to crash. The man, again according to legend, lost his job.
Fun bit-o-trivia: As years went on any program that would self-replicate when ran by the user but wasnt actually a virus would become known as a "wabbit.
in honor of this particular event. Some other variations on the Fork Bomb
There have been Fork Bomb type bits of code written in just about every language you can imagine. At the beginning we covered how to write a Fork Bomb in BASH. But, because this sort of mayhem is simply too much fun, below you will find code to create similar bits of functionality in several other programming languages.
Enjoy.
Just you know try not to get yourself fired.
Fork Bomb in C: #include <unistd.h>
int main(void) {
for (;;) {
fork();
}
}
Fork Bomb in Python: #!/usr/bin/env python
import os
while True: os.fork()
Fork Bomb in Ruby: #!/usr/bin/env ruby
loop { fork { bomb } }
Fork Bomb in Java: /** A basic forkbomb */
public class Bomb {
/** Utility class */
private Bomb() {}
/** CLI entry point
@param args CLI flags
*/
public static void main(final String[] args) throws IOException {
while (true) {
Runtime.getRuntime().exec(
String.format("javaw -cp %s us.yellosoft.forkbombs.Bomb", System.getProperty("java.class.path"))
);
}
}
}
This is a free article on The Lunduke Journal one of the most independent Tech Publications on planet Earth, being fully supported by subscribers like you.
The Lunduke Journal never takes any money from any Tech Company which means no company can influence the content you find here. Subscribe now
======================================================================
Link to news story:
https://lunduke.substack.com/p/the-fork-bomb-what-it-is-how-it-works
--- Mystic BBS v1.12 A47 (Linux/64)
* Origin: tqwNet Technology News (1337:1/100)