This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/7016] New: Systemtap will causes OOM when specifying large relay buffer size.


When I specified larger value than main memory, to -s option of systemtap, the
system ran OOM killer and stopped on ia64 and x86-64. I couldn't reproduce it on
ia32 because it's vmalloc-space is smaller than real memory.

For example, if the machine has 4GB memory, run
# stap -e 'probe begin{hello}' -s 4095
this causes OOM kill.

if the machine has 8GB memory and 4 CPUs, run
# stap -e 'probe begin{hello}' -s 2048 -b

This is always reproducible on 64-bit arch.

I think stap should fail to run if the system doesn't have enough free memory.

-- 
           Summary: Systemtap will causes OOM when specifying large relay
                    buffer size.
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: runtime
        AssignedTo: systemtap at sources dot redhat dot com
        ReportedBy: mhiramat at redhat dot com


http://sourceware.org/bugzilla/show_bug.cgi?id=7016

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]