Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 10 Apr 2008 20:28:03 +0000 (UTC)
From:      Robert Watson <rwatson@FreeBSD.org>
To:        src-committers@FreeBSD.org, cvs-src@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: src/share/man/man9 Makefile stack.9 src/sys/kern kern_lock.c subr_stack.c src/sys/sys stack.h src/sys/vm redzone.c
Message-ID:  <200804102028.m3AKS32j020447@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
rwatson     2008-04-10 20:28:03 UTC

  FreeBSD src repository

  Modified files:        (Branch: RELENG_7)
    share/man/man9       Makefile stack.9 
    sys/kern             kern_lock.c subr_stack.c 
    sys/sys              stack.h 
    sys/vm               redzone.c 
  Log:
  Merge Makefile:1.320, stack.9:1.4, kern_lock.c:1.114, subr_stack.c:1.4,
  stack.h:1.3, redzone.c:1.2 from HEAD to RELENG_7:
  
    Modify stack(9) stack_print() and stack_sbuf_print() routines to use new
    linker interfaces for looking up function names and offsets from
    instruction pointers.  Create two variants of each call: one that is
    "DDB-safe" and avoids locking in the linker, and one that is safe for
    use in live kernels, by virtue of observing locking, and in particular
    safe when kernel modules are being loaded and unloaded simultaneous to
    their use.  This will allow them to be used outside of debugging
    contexts.
  
    Modify two of three current stack(9) consumers to use the DDB-safe
    interfaces, as they run in low-level debugging contexts, such as inside
    lockmgr(9) and the kernel memory allocator.
  
    Update man page.
  
  Revision   Changes    Path
  1.310.2.3  +1 -0      src/share/man/man9/Makefile
  1.5.2.2    +15 -2     src/share/man/man9/stack.9
  1.110.2.1  +1 -1      src/sys/kern/kern_lock.c
  1.3.2.1    +79 -24    src/sys/kern/subr_stack.c
  1.2.4.1    +2 -0      src/sys/sys/stack.h
  1.1.2.1    +4 -4      src/sys/vm/redzone.c



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200804102028.m3AKS32j020447>