Re: Stack overflow issue
От | Tom Lane |
---|---|
Тема | Re: Stack overflow issue |
Дата | |
Msg-id | 1013883.1661349510@sss.pgh.pa.us обсуждение исходный текст |
Ответ на | Stack overflow issue (Егор Чиндяскин <kyzevan23@mail.ru>) |
Ответы |
Re: Stack overflow issue
|
Список | pgsql-hackers |
=?UTF-8?B?0JXQs9C+0YAg0KfQuNC90LTRj9GB0LrQuNC9?= <kyzevan23@mail.ru> writes: > Therefore, Alexander Lakhin and I decided to deal with this issue and Alexander developed a methodology. We processed src/backend/*/*.cwith "clang -emit-llvm ... | opt -analyze -print-calgraph" to find all the functions that call themselvesdirectly. I checked each of them for features that protect against stack overflows. > We analyzed 4 catalogs: regex, tsearch, snowball and adt. > Firstly, we decided to test the regex catalog functions and found 6 of them that lack the check_stach_depth() call. Nice work! I wonder if you can make the regex crashes reachable by reducing the value of max_stack_depth enough that it's hit before reaching the "regular expression is too complex" limit. regards, tom lane
В списке pgsql-hackers по дате отправления: