lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <1253618962.7695.43.camel@twins>
Date:	Tue, 22 Sep 2009 13:29:22 +0200
From:	Peter Zijlstra <peterz@...radead.org>
To:	John Kacur <jkacur@...hat.com>
Cc:	mingo@...e.hu, tglx@...uxtronix.de, linux-kernel@...r.kernel.org,
	Clark Williams <williams@...hat.com>
Subject: Re: [PATCH] Increase MAX_STACK_TRACE_ENTRIES

On Mon, 2009-09-21 at 19:13 +0200, John Kacur wrote:
> Ingo: please consider this patch if there are no negative consequences to 
> increasing this value. It fixes a problem that we have seen in the past on
> (at least) the real-time kernel. (BUG: MAX_STACK_TRACE_ENTRIES).
> 
> This patch applies to the current tip/master

Hrmm,.. this is growing to be very large indeed.

It would be nice to know where all these extra entries are coming from.
How large are:

# cat /proc/lockdep | grep -v -e "\->" -e "^$" | wc -l
437

# cat /proc/lockdep | grep -v -e "\->" -e "^$" | awk '{print $6}' | 
                      tr -d ".:" | grep -v "^$" | wc -c
1031

On your machine?

> -#define MAX_STACK_TRACE_ENTRIES	262144UL
> +#define MAX_STACK_TRACE_ENTRIES	393216UL

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ