lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1222855567.3052.31.camel@castor.localdomain>
Date:	Wed, 01 Oct 2008 11:06:07 +0100
From:	Richard Kennedy <richard@....demon.co.uk>
To:	Jörn Engel <joern@...fs.org>
Cc:	Christoph Lameter <cl@...ux-foundation.org>,
	penberg <penberg@...helsinki.fi>, mpm <mpm@...enic.com>,
	linux-mm <linux-mm@...ck.org>,
	lkml <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] slub: reduce total stack usage of slab_err & object_err

On Tue, 2008-09-30 at 21:33 +0200, Jörn Engel wrote:
> On Tue, 30 September 2008 16:15:36 +0100, Richard Kennedy wrote:
> > 
> > I've been trying to build a tool to estimate the maximum stack usage in
> > the kernel, & noticed that most of the biggest stack users are the error
> > handling routines.
> 
> Cool!  I once did the same, although the code has severely bitrotted by
> now.  Is the code available somewhere?
> 
> Jörn

No I haven't made it available as it's really only a proof of concept,
and I still don't have any sensible ideas how to deal with pointers to
functions. Plus I'm still testing it to see if the results are anything
like reasonable.
Also it's finding lots of potentially recursive code paths and my
heuristic to deal with them is very basic. I'm just adding a feature so
that I can ignore some code paths, so maybe that will help.

Richard

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ