This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug runtime/10848] New: enforcement of memory limits
- From: "fche at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 26 Oct 2009 16:17:05 -0000
- Subject: [Bug runtime/10848] New: enforcement of memory limits
- Reply-to: sourceware-bugzilla at sourceware dot org
It would be useful for a sysadmin to assert that a stap module
(especially in unprivileged mode) not be allowed to consume more
than some give MB of memory.
This sort of thing could involve:
- checking the .ko file at -p4 or -p5 time for ELF stats about .text/.data/.bss
sizes, and comparing them to limits
- perhaps teaching staprun to "create" free kernel memory (such as by creating
a short-lived process that touches/consumes enough memory, then killing it
just before the module_insert)
- extending the _stp_*alloc functions to prematurely reject requests if limits
are about to be exceeded
- checking that every other use of kernel allocations go through _stp_alloc*
- checking that all kernel-side memory allocations use __GFP_NORETRY or such
to preclude triggering OOM handling elsewhere
--
Summary: enforcement of memory limits
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: runtime
AssignedTo: systemtap at sources dot redhat dot com
ReportedBy: fche at redhat dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=10848
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.