From owner-freebsd-current@FreeBSD.ORG Sat Apr 12 18:16:35 2008 Return-Path: Delivered-To: current@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9A2A2106564A; Sat, 12 Apr 2008 18:16:35 +0000 (UTC) (envelope-from rdivacky@vlk.vlakno.cz) Received: from vlakno.cz (vlk.vlakno.cz [62.168.28.247]) by mx1.freebsd.org (Postfix) with ESMTP id 3B5088FC0A; Sat, 12 Apr 2008 18:16:34 +0000 (UTC) (envelope-from rdivacky@vlk.vlakno.cz) Received: from localhost (localhost [127.0.0.1]) by vlakno.cz (Postfix) with ESMTP id 897AC67C50D; Sat, 12 Apr 2008 20:16:14 +0200 (CEST) X-Virus-Scanned: amavisd-new at vlakno.cz Received: from vlakno.cz ([127.0.0.1]) by localhost (vlk.vlakno.cz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M3-3MFrbapXT; Sat, 12 Apr 2008 20:16:03 +0200 (CEST) Received: from vlk.vlakno.cz (localhost [127.0.0.1]) by vlakno.cz (Postfix) with ESMTP id 0FF5967C50B; Sat, 12 Apr 2008 20:16:03 +0200 (CEST) Received: (from rdivacky@localhost) by vlk.vlakno.cz (8.14.2/8.14.2/Submit) id m3CIG2n5014577; Sat, 12 Apr 2008 20:16:02 +0200 (CEST) (envelope-from rdivacky) Date: Sat, 12 Apr 2008 20:16:01 +0200 From: Roman Divacky To: Robert Watson Message-ID: <20080412181601.GA14472@freebsd.org> References: <48002444.4030505@elischer.org> <20080412191300.E7693@fledge.watson.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20080412191300.E7693@fledge.watson.org> User-Agent: Mutt/1.4.2.3i Cc: Julian Elischer , FreeBSD Current Subject: Re: stack hogs in kernel X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 12 Apr 2008 18:16:35 -0000 On Sat, Apr 12, 2008 at 07:14:21PM +0100, Robert Watson wrote: > > On Fri, 11 Apr 2008, Julian Elischer wrote: > > >0xc05667e3 kldstat [kernel]: 2100 > >0xc07214f8 sendsig [kernel]: 1416 > >0xc04fb426 ugenread [kernel]: 1200 > >0xc070616b ipmi_smbios_identify [kernel]: 1136 > >0xc050bd26 usbd_new_device [kernel]: 1128 > >0xc0525a83 pfs_readlink [kernel]: 1092 > >0xc04fb407 ugenwrite [kernel]: 1056 > >0xc055ea33 prison_enforce_statfs [kernel]: 1044 > > This one, at least, is due to an issue Roman pointed out on hackers@ in the > last 24 hours -- a MAXPATHLEN sized buffer on the stack. Looks like > pfs_readlink() has the same issue. I plan to look at some of the MAXPATHLEN usage... I guess we can shave a few tens of KBs from the kernel (static size and runtime size). roman