public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Akinobu Mita <akinobu.mita@gmail.com>
To: Andi Kleen <andi@firstfloor.org>
Cc: Scott Porter <scott@opengridcomputing.com>,
	linux-kernel <linux-kernel@vger.kernel.org>
Subject: Re: Fault Injection issues: stacktrace x86_64 and failslab NUMA
Date: Sun, 22 Apr 2007 16:06:03 +0900	[thread overview]
Message-ID: <20070422070603.GA30662@APFDCB5C> (raw)
In-Reply-To: <20070421221033.GA30496@one.firstfloor.org>

On Sun, Apr 22, 2007 at 12:10:33AM +0200, Andi Kleen wrote:
> > unwind code to even attempt to avoid the problem what should be done?
> > How about:
> > 
> > (1) Make it clear the Fault Injection with STACKTRACE on x86_64 is at
> > best "Russian Roulette" -- maybe a !X86_64 in Kconfig.debug?
> > 
> > (2) Introduce FRAME_POINTER support back into the x86_64 code.  This is
> > what Fault Injection really wants.
> > 
> > (3) Keep the saved stack address entries array out of sight of the
> > fallback save_stack_trace() code.  Lockdep does this by storing it in
> > static space but this requires locking which would be ugly for Fault
> > Injection.  Another option is to mask the saved addresses so they fail
> > the __kernel_text_address() test but fail_stacktrace() uses the same
> > mask to make it's comparisons.  There's still the problem of avoiding
> > kernel text addresses stored on the stack by other code (that is, other
> > than the expected stack chain uses).
> 
> Some hack in (3) would be probably best, otherwise (1).
> At some point I hope we can get the dwarf2 unwinder back, then
> the problem should be also solved. But then you would need to force
> the dwarf2 unwinder with fault injection on, but that shouldn't
> be a problem.

I'm goint to send the patch that disables stacktrace filter
(CONFIG_FAULT_INJECTION_STACKTRACE_FILTER) on x86_64.

But dwarf2 unwinder is still available on -mm. So I'll
send -mm only patch that enables it at the same time.

BTW, are there any pending issues in dwarf2 unwinder?


  reply	other threads:[~2007-04-22  7:11 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-04-20 18:55 Fault Injection issues: stacktrace x86_64 and failslab NUMA Scott Porter
2007-04-21 21:52 ` Scott Porter
2007-04-21 22:10   ` Andi Kleen
2007-04-22  7:06     ` Akinobu Mita [this message]
2007-04-22  9:09       ` [PATCH] fault injection: disable stacktrace filter for x86-64 Akinobu Mita
2007-04-22  9:11         ` [PATCH] fault injection: fix failslab with CONFIG_NUMA Akinobu Mita
2007-04-22  9:12           ` [PATCH] fault injection: add entry to MAINTAINERS Akinobu Mita
2007-04-23  5:05           ` [PATCH] fault injection: fix failslab with CONFIG_NUMA Pekka J Enberg

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20070422070603.GA30662@APFDCB5C \
    --to=akinobu.mita@gmail.com \
    --cc=andi@firstfloor.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=scott@opengridcomputing.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox