This patch aids the quick diagnosis of stack overflow bugs.
In the debug build when showing a stack trace, show stack limits
and stack frame addresses. This results in the follow
appearance:
(XEN) Stack base:ffff830000234000 limit:ffff830000233000
(XEN) Xen call trace:
(XEN) ffff830000233c28[<ffff830000144fe4>]
put_page_type+0xf8/0x455
(XEN) ffff830000233c48[<ffff830000140d0a>]
put_page_and_type+0x15/0x20
(XEN) ffff830000233c88[<ffff830000142271>]
put_page_from_l1e+0x12a/0x1ad
(XEN) ffff830000233cf8[<ffff83000014b7d9>]
revalidate_l1+0x18f/0x1a7
(XEN) ffff830000233d88[<ffff83000014ba93>] ptwr_flush+0x2a2/0x4fb
(XEN) ffff830000233da8[<ffff83000014cd86>]
cleanup_writable_pagetable+0x68/0x88
(XEN) ffff830000233f08[<ffff8300001469cf>] do_mmuext_op+0xd4/0xaf5
(XEN) 00007cffffdcc0b7[<ffff8300001ca45d>]
syscall_enter+0xad/0x107
Signed-off-by: Robert S. Phillips (rphillips@virtualiron.com)
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel