Date: Sat, 12 Apr 2008 19:14:21 +0100 (BST) From: Robert Watson <rwatson@FreeBSD.org> To: Julian Elischer <julian@elischer.org> Cc: FreeBSD Current <current@freebsd.org> Subject: Re: stack hogs in kernel Message-ID: <20080412191300.E7693@fledge.watson.org> In-Reply-To: <48002444.4030505@elischer.org> References: <48002444.4030505@elischer.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 11 Apr 2008, Julian Elischer wrote: > 0xc05667e3 kldstat [kernel]: 2100 > 0xc07214f8 sendsig [kernel]: 1416 > 0xc04fb426 ugenread [kernel]: 1200 > 0xc070616b ipmi_smbios_identify [kernel]: 1136 > 0xc050bd26 usbd_new_device [kernel]: 1128 > 0xc0525a83 pfs_readlink [kernel]: 1092 > 0xc04fb407 ugenwrite [kernel]: 1056 > 0xc055ea33 prison_enforce_statfs [kernel]: 1044 This one, at least, is due to an issue Roman pointed out on hackers@ in the last 24 hours -- a MAXPATHLEN sized buffer on the stack. Looks like pfs_readlink() has the same issue. Robert N M Watson Computer Laboratory University of Cambridge > 0xc0686e8a nfsrv_rename [kernel]: 984 > 0xc05d0886 m_copymdata [kernel]: 956 > 0xc06605a3 nfs4_mount [kernel]: 884 > 0xc0561e25 kse_switchin [kernel]: 848 > 0xc0680ac6 nfsrv_statfs [kernel]: 828 > 0xc0439473 cam_periph_error [kernel]: 820 > 0xc071ff36 sigreturn [kernel]: 812 > 0xc067e876 nfsrv_fsinfo [kernel]: 804 > 0xc05fe7b3 freebsd4_fhstatfs [kernel]: 804 > 0xc0571272 sysctl_out_proc [kernel]: 804 > 0xc067ebf7 nfsrv_fsinfo [kernel]: 804 > 0xc0571006 sysctl_out_proc [kernel]: 804 > 0xc044b743 cddone [kernel]: 800 > 0xc06862cf nfsrv_link [kernel]: 796 > _______________________________________________ > freebsd-current@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080412191300.E7693>