From: Andi Kleen <andi@firstfloor.org>
To: Scott Porter <scott@opengridcomputing.com>
Cc: linux-kernel <linux-kernel@vger.kernel.org>,
Akinobu Mita <Akinobu.Mita@gmail.com>,
Andi Kleen <andi@firstfloor.org>
Subject: Re: Fault Injection issues: stacktrace x86_64 and failslab NUMA
Date: Sun, 22 Apr 2007 00:10:33 +0200 [thread overview]
Message-ID: <20070421221033.GA30496@one.firstfloor.org> (raw)
In-Reply-To: <1177192363.25165.101.camel@scott-desktop.site>
> There is no FRAME_POINTER support in the x86_64 code. Apparently it was
> removed when the unwind code was added but now that has been removed as
> well!
That's because no assembly code in x86-64 knows anything about frame pointers.
You will always get truncated traces if anything assembler is in trace.
That's just dangerous.
> Digging around in the archives it looks like Andi Kleen knew this was an
> issue with the x86_64 fallback stacktrace code. Now that there is no
No I didn't.
> unwind code to even attempt to avoid the problem what should be done?
> How about:
>
> (1) Make it clear the Fault Injection with STACKTRACE on x86_64 is at
> best "Russian Roulette" -- maybe a !X86_64 in Kconfig.debug?
>
> (2) Introduce FRAME_POINTER support back into the x86_64 code. This is
> what Fault Injection really wants.
>
> (3) Keep the saved stack address entries array out of sight of the
> fallback save_stack_trace() code. Lockdep does this by storing it in
> static space but this requires locking which would be ugly for Fault
> Injection. Another option is to mask the saved addresses so they fail
> the __kernel_text_address() test but fail_stacktrace() uses the same
> mask to make it's comparisons. There's still the problem of avoiding
> kernel text addresses stored on the stack by other code (that is, other
> than the expected stack chain uses).
Some hack in (3) would be probably best, otherwise (1).
At some point I hope we can get the dwarf2 unwinder back, then
the problem should be also solved. But then you would need to force
the dwarf2 unwinder with fault injection on, but that shouldn't
be a problem.
-Andi
next prev parent reply other threads:[~2007-04-21 22:10 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-04-20 18:55 Fault Injection issues: stacktrace x86_64 and failslab NUMA Scott Porter
2007-04-21 21:52 ` Scott Porter
2007-04-21 22:10 ` Andi Kleen [this message]
2007-04-22 7:06 ` Akinobu Mita
2007-04-22 9:09 ` [PATCH] fault injection: disable stacktrace filter for x86-64 Akinobu Mita
2007-04-22 9:11 ` [PATCH] fault injection: fix failslab with CONFIG_NUMA Akinobu Mita
2007-04-22 9:12 ` [PATCH] fault injection: add entry to MAINTAINERS Akinobu Mita
2007-04-23 5:05 ` [PATCH] fault injection: fix failslab with CONFIG_NUMA Pekka J Enberg
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20070421221033.GA30496@one.firstfloor.org \
--to=andi@firstfloor.org \
--cc=Akinobu.Mita@gmail.com \
--cc=linux-kernel@vger.kernel.org \
--cc=scott@opengridcomputing.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox