I think it would be worth the effort. One approach would be to
create a `can_sleep()' macro. Add that to functions which may
schedule. It's useful for documentation purposes as well as runtime
checks.
The Stanford checker caught a lot of these, but it seems that
the (high) amount of source-level obfuscation in the ipc code
defeated it.
> One would think these types of things are easily found, but this example
> suggests otherwise. Has anyone run the kernel through an extensive
> (stress) test suite with any of the kernel debug options enabled?
There are at present no tools in the tree to trap this
problem.
-
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/