stack hogs in kernel
Robert Watson
rwatson at FreeBSD.org
Sat Apr 12 18:14:22 UTC 2008
On Fri, 11 Apr 2008, Julian Elischer wrote:
> 0xc05667e3 kldstat [kernel]: 2100
> 0xc07214f8 sendsig [kernel]: 1416
> 0xc04fb426 ugenread [kernel]: 1200
> 0xc070616b ipmi_smbios_identify [kernel]: 1136
> 0xc050bd26 usbd_new_device [kernel]: 1128
> 0xc0525a83 pfs_readlink [kernel]: 1092
> 0xc04fb407 ugenwrite [kernel]: 1056
> 0xc055ea33 prison_enforce_statfs [kernel]: 1044
This one, at least, is due to an issue Roman pointed out on hackers@ in the
last 24 hours -- a MAXPATHLEN sized buffer on the stack. Looks like
pfs_readlink() has the same issue.
Robert N M Watson
Computer Laboratory
University of Cambridge
> 0xc0686e8a nfsrv_rename [kernel]: 984
> 0xc05d0886 m_copymdata [kernel]: 956
> 0xc06605a3 nfs4_mount [kernel]: 884
> 0xc0561e25 kse_switchin [kernel]: 848
> 0xc0680ac6 nfsrv_statfs [kernel]: 828
> 0xc0439473 cam_periph_error [kernel]: 820
> 0xc071ff36 sigreturn [kernel]: 812
> 0xc067e876 nfsrv_fsinfo [kernel]: 804
> 0xc05fe7b3 freebsd4_fhstatfs [kernel]: 804
> 0xc0571272 sysctl_out_proc [kernel]: 804
> 0xc067ebf7 nfsrv_fsinfo [kernel]: 804
> 0xc0571006 sysctl_out_proc [kernel]: 804
> 0xc044b743 cddone [kernel]: 800
> 0xc06862cf nfsrv_link [kernel]: 796
> _______________________________________________
> freebsd-current at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-current
> To unsubscribe, send any mail to "freebsd-current-unsubscribe at freebsd.org"
>
More information about the freebsd-current
mailing list