mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #593] Limit the memory size used by the jailed process #416
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#416
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @vporton on GitHub (Jun 24, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/593
We need to limit the memory size used by the jailed process, so that a hacked would not run out of memory and swap.
@reinerh commented on GitHub (Jun 24, 2016):
ulimit?@vporton commented on GitHub (Jun 24, 2016):
On Fri, 2016-06-24 at 10:02 -0700, Reiner Herrmann wrote:
I am aware about ulimit, but this will be probably a little more
efficient with single
firejailexecutable than runningulimit firejailcomposed from two commands.@reinerh commented on GitHub (Jun 24, 2016):
It's probably a bit more convenient, I agree, but duplicating functionality already provided by other means also increases the complexity of firejail.
@chiraag-nataraj commented on GitHub (Jun 24, 2016):
Another way is to assign the process to a cgroup and set limits on the cgroup (which you might be able to do in a config file somewhere).
@netblue30 commented on GitHub (Jun 26, 2016):
Yes, cgroup is the way to go. Set up a control group and pass it to the sandbox using --cgroup.