Re: Stack overflow issue
| От | Tom Lane |
|---|---|
| Тема | Re: Stack overflow issue |
| Дата | |
| Msg-id | 1013883.1661349510@sss.pgh.pa.us обсуждение исходный текст |
| Ответ на | Stack overflow issue (Егор Чиндяскин <kyzevan23@mail.ru>) |
| Ответы |
Re: Stack overflow issue
|
| Список | pgsql-hackers |
=?UTF-8?B?0JXQs9C+0YAg0KfQuNC90LTRj9GB0LrQuNC9?= <kyzevan23@mail.ru> writes:
> Therefore, Alexander Lakhin and I decided to deal with this issue and Alexander developed a methodology. We processed
src/backend/*/*.cwith "clang -emit-llvm ... | opt -analyze -print-calgraph" to find all the functions that call
themselvesdirectly. I checked each of them for features that protect against stack overflows.
> We analyzed 4 catalogs: regex, tsearch, snowball and adt.
> Firstly, we decided to test the regex catalog functions and found 6 of them that lack the check_stach_depth() call.
Nice work! I wonder if you can make the regex crashes reachable by
reducing the value of max_stack_depth enough that it's hit before
reaching the "regular expression is too complex" limit.
regards, tom lane
В списке pgsql-hackers по дате отправления: