This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug runtime/7016] New: Systemtap will causes OOM when specifying large relay buffer size.
- From: "mhiramat at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 10 Nov 2008 17:10:21 -0000
- Subject: [Bug runtime/7016] New: Systemtap will causes OOM when specifying large relay buffer size.
- Reply-to: sourceware-bugzilla at sourceware dot org
When I specified larger value than main memory, to -s option of systemtap, the
system ran OOM killer and stopped on ia64 and x86-64. I couldn't reproduce it on
ia32 because it's vmalloc-space is smaller than real memory.
For example, if the machine has 4GB memory, run
# stap -e 'probe begin{hello}' -s 4095
this causes OOM kill.
if the machine has 8GB memory and 4 CPUs, run
# stap -e 'probe begin{hello}' -s 2048 -b
This is always reproducible on 64-bit arch.
I think stap should fail to run if the system doesn't have enough free memory.
--
Summary: Systemtap will causes OOM when specifying large relay
buffer size.
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: runtime
AssignedTo: systemtap at sources dot redhat dot com
ReportedBy: mhiramat at redhat dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=7016
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.