lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1164319725.4695.367.camel@edge>
Date:	Fri, 24 Nov 2006 09:08:45 +1100
From:	Nathan Scott <nscott@...nex.com>
To:	xfs-masters@....sgi.com
Cc:	Al Viro <viro@....linux.org.uk>,
	David Miller <davem@...emloft.net>, dgc@....com,
	jesper.juhl@...il.com, chatz@...bourne.sgi.com,
	linux-kernel@...r.kernel.org, xfs@....sgi.com,
	netdev@...r.kernel.org, linux-scsi@...r.kernel.org
Subject: Re: [xfs-masters] Re: 2.6.19-rc6 : Spontaneous reboots, stack
	overflows - seems to implicate xfs, scsi, networking, SMP

On Thu, 2006-11-23 at 09:12 +0100, Arjan van de Ven wrote:
> On Thu, 2006-11-23 at 04:35 +0000, Al Viro wrote:
> > > I would even say 10 function calls deep to allocate file blocks
> > > is overkill, but 22 it just astronomically bad.
> > 
> > Especially since a large part is due to cxfs...
> > -
> 
> it's a bit sad to see XFS this crippled in linux due to an external,
> proprietary module ;(

Heh, never let reality get in the way of a good conspiracy theory.
The stack depth in XFS is more a factor of the complexity of the
XFS space allocation algorithms, and is unrelated to CXFS.

I'm sure if people would point to specific stack issues they would
(continue to) get addressed.  Its just so much easier to speculate
randomly though...

cheers.

-- 
Nathan

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ