Jonathan Adams writes:
> On Thu, Feb 26, 2009 at 03:11:04PM -0500, James Carlson wrote:
> > >   The tool Ed mentioned is a new dcmd command: ::stackinfo (available 
> > > since
> > > Nevada build 102), which shows kernel thread stack usage.
> > 
> > I'm talking about kmdb's stack itself.  When that explodes, all is
> > lost.
> 
> There *is* a stack checking mode in the compiler, which we could probably turn
> on.  The only catches is we'd have to implement the backend support, and
> an unknown performance degradation.

It also seems to be SPARC only.

>  Since it's based on guard pages,
> I *think* it would only effect routines which allocate more than a page
> (or just adds a blind read of the new stack pointer).  Might be something
> to investigate.

Possibly.  I was mostly hoping for a static check, as that'd be the
simplest and most reliable for the specific cases I'm concerned about.

I think your previous suggestion of grepping out the %rsp manipulation
is probably the best answer here.

-- 
James Carlson, Solaris Networking              <james.d.carlson at sun.com>
Sun Microsystems / 35 Network Drive        71.232W   Vox +1 781 442 2084
MS UBUR02-212 / Burlington MA 01803-2757   42.496N   Fax +1 781 442 1677

Reply via email to