lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 20 Mar 2007 22:08:00 -0800 From: Andrew Morton <akpm@...ux-foundation.org> To: Andi Kleen <ak@...e.de> Cc: Linus Torvalds <torvalds@...ux-foundation.org>, "Eric W. Biederman" <ebiederm@...ssion.com>, David Miller <davem@...emloft.net>, virtualization@...ts.linux-foundation.org, jbeulich@...ell.com, jeremy@...p.org, xen-devel@...ts.xensource.com, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, chrisw@...s-sol.org, virtualization@...ts.osdl.org, anthony@...emonkey.ws, mingo@...e.hu Subject: Re: [patch 13/26] Xen-paravirt_ops: Consistently wrap paravirt ops callsites to make them patchable On Tue, 20 Mar 2007 21:23:52 +0100 Andi Kleen <ak@...e.de> wrote: > Well it causes additional problems. We had some cases where it was really > hard to distingush garbage and the true call chain. yes, for some reason the naive backtraces seem to have got messier and messier over the years and some of them are really quite hard to piece together nowadays. An accurate backtrace would have some value, if we can get it bullet-proof. The fault-injection driver wants it too. And lockdep, I guess. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists