This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/10848] New: enforcement of memory limits


It would be useful for a sysadmin to assert that a stap module
(especially in unprivileged mode) not be allowed to consume more
than some give MB of memory.

This sort of thing could involve:

- checking the .ko file at -p4 or -p5 time for ELF stats about .text/.data/.bss
  sizes, and comparing them to limits
- perhaps teaching staprun to "create" free kernel memory (such as by creating
  a short-lived process that touches/consumes enough memory, then killing it
  just before the module_insert)
- extending the _stp_*alloc functions to prematurely reject requests if limits
  are about to be exceeded
- checking that every other use of kernel allocations go through _stp_alloc*
- checking that all kernel-side memory allocations use __GFP_NORETRY or such
  to preclude triggering OOM handling elsewhere

-- 
           Summary: enforcement of memory limits
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: runtime
        AssignedTo: systemtap at sources dot redhat dot com
        ReportedBy: fche at redhat dot com


http://sourceware.org/bugzilla/show_bug.cgi?id=10848

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]