[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Re: [patch 13/26] Xen-paravirt_ops: Consistently wrap paravirt ops callsites to make them patchable
On Tue, Mar 20, 2007 at 09:52:42AM -0700, Linus Torvalds wrote: > The ones I reported were all about trusting the stack contents implicitly, The latest version added the full double check you wanted - every new RSP is validated against the current stack or the exception stacks. > and assuming that the unwind info was there and valid. Using things like The code never did that. In fact many of the problems we had initially especially came out of that -- the fallback code that would handle this case wasn't fully correct. > "__get_user()" didn't fix it, because if a WARN_ON() happened while we > held the mm semaphore and the unwind info was bogus, it would take a > page-fault and deadlock. That was fixed too even before you dropped it by using probe_kernel_address() > And I told you guys this. Over *months*. And you ignored me. You told me > everything was fine. Each time, somebody else ended up reporting a hang > where the unwinder was at fault. That was because most of the bugs were reported many times duplicated -- and reports from older releases kept streaming in even after the fix went in. Also frankly often your analysis about what went wrong was just incorrect. > And you clearly *still* haven't accepted the fact that the code was buggy. There were some bugs, but they were all fixed. Or at least I hope -- we will find out during testing. > Does anybody wonder why I wouldn't merge it back? So do you have an alternative to the unwinder? Don't tell me "real men decode 30+ entry long stack traces with lots of callbacks by hand". Or do you prefer to use frame pointers everywhere? -Andi _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |