lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20090123092056.GA13383@logfs.org>
Date:	Fri, 23 Jan 2009 10:20:56 +0100
From:	Jörn Engel <joern@...fs.org>
To:	Stefani Seibold <stefani@...bold.net>
Cc:	linux-kernel <linux-kernel@...r.kernel.org>
Subject: Re: Detailed Stack Information Patch [0/3]

http://en.wikipedia.org/wiki/Posting_style

On Thu, 22 January 2009 22:39:28 +0100, Stefani Seibold wrote:
> 
> First, i had explained what is the reason for the patch.

You did explain your solution.  The problem you are trying to solve was
not clear to me.  It may be my mistake.  If you have the stack
information, what can you do that you couldn't do without?  Notice
overly large stacks and fix the application?  I would guess so, but you
surely know better than me.

> Second, the number of #ifdef is not more or less than other features
> which extends the task_struct on demand.
> 
> There is no way to do this without #ifdef's, only if i add this feature
> without a CONFIG_.... option.

True.  The comment was not about removing them completely but moving
them where they hurt less.  When I'm reading through some generic code
and I read something like this:

	f->f_pos = 0;
	f->f_op = fops_get(inode->i_fop);
	file_move(f, &inode->i_sb->s_files);

	error = security_dentry_open(f);
	if (error)
		goto cleanup_all;

I only get slightly distracted by the security_dentry_open() that I
personally may not care about one bit.  Much nicer than having this:

	f->f_pos = 0;
	f->f_op = fops_get(inode->i_fop);
	file_move(f, &inode->i_sb->s_files);

#ifdef CONFIG_SECURITY
	error = security_dentry_open(f);
	if (error)
		goto cleanup_all;
#endif

See the difference?

> But this patch did nit solve a problem, it is a feature like
> PROC_PAGE_MONITOR or similar. It will help to figure out, how much stack
> will be consumed by a particular process or thread.
> 
> It also not a patch which cares Joe Kernelhacker, it cares Jane
> Userlandhacker!

Fair enough.  So assuming I wanted to reduce or limit stack consumption,
what would I do with this information.  I know the responsible process,
but not the callchain.  kill -QUIT 12345 would give me a core dump and I
could analyse that.

Is that what you try to achieve?  I was only guessing and may have
missed a more important point.

Jörn

-- 
Everything should be made as simple as possible, but not simpler.
-- Albert Einstein
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ