Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix probestack #2548

Merged
merged 15 commits into from
Sep 2, 2021
Merged

Fix probestack #2548

merged 15 commits into from
Sep 2, 2021

Conversation

ptitSeb
Copy link
Contributor

@ptitSeb ptitSeb commented Sep 1, 2021

Description

The skip_stack_gard_page were failing.

The patch first add a trampoline for the PROBEGUARD function on x86_64 build, as this one comes from some runtime and can be too far away from generated code for a regular 32bits relative address (this fix a segfault when a generated function needs a call to probeguard).
The patch also add a special case for StackOverflow error, and doesn't check if the error comes from Wasm code (as the stack overflow will comes from a runtime library, generated by the probeguard function).

Copy link
Member

@syrusakbary syrusakbary left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Other than my comments it looks great

@ptitSeb
Copy link
Contributor Author

ptitSeb commented Sep 1, 2021

bors r+

bors bot added a commit that referenced this pull request Sep 1, 2021
2548: Fix probestack r=ptitSeb a=ptitSeb

# Description
The `skip_stack_gard_page` were failing.

The patch first add a trampoline for the PROBEGUARD function on x86_64 build, as this one comes from some runtime and can be too far away from generated code for a regular 32bits relative address (this fix a segfault when a generated function needs a call to probeguard).
The patch also add a special case for StackOverflow error, and doesn't check if the error comes from Wasm code (as the stack overflow will comes from a runtime library, generated by the probeguard function).

Co-authored-by: Syrus Akbary <me@syrusakbary.com>
Co-authored-by: ptitSeb <sebastien.chev@gmail.com>
@bors
Copy link
Contributor

bors bot commented Sep 1, 2021

Build failed:

@ptitSeb
Copy link
Contributor Author

ptitSeb commented Sep 1, 2021

bors r+

bors bot added a commit that referenced this pull request Sep 1, 2021
2548: Fix probestack r=ptitSeb a=ptitSeb

# Description
The `skip_stack_gard_page` were failing.

The patch first add a trampoline for the PROBEGUARD function on x86_64 build, as this one comes from some runtime and can be too far away from generated code for a regular 32bits relative address (this fix a segfault when a generated function needs a call to probeguard).
The patch also add a special case for StackOverflow error, and doesn't check if the error comes from Wasm code (as the stack overflow will comes from a runtime library, generated by the probeguard function).

Co-authored-by: Syrus Akbary <me@syrusakbary.com>
Co-authored-by: ptitSeb <sebastien.chev@gmail.com>
@bors
Copy link
Contributor

bors bot commented Sep 1, 2021

Canceled.

@ptitSeb
Copy link
Contributor Author

ptitSeb commented Sep 1, 2021

bors r+

bors bot added a commit that referenced this pull request Sep 1, 2021
2548: Fix probestack r=ptitSeb a=ptitSeb

# Description
The `skip_stack_gard_page` were failing.

The patch first add a trampoline for the PROBEGUARD function on x86_64 build, as this one comes from some runtime and can be too far away from generated code for a regular 32bits relative address (this fix a segfault when a generated function needs a call to probeguard).
The patch also add a special case for StackOverflow error, and doesn't check if the error comes from Wasm code (as the stack overflow will comes from a runtime library, generated by the probeguard function).

Co-authored-by: Syrus Akbary <me@syrusakbary.com>
Co-authored-by: ptitSeb <sebastien.chev@gmail.com>
@bors
Copy link
Contributor

bors bot commented Sep 1, 2021

Build failed:

@ptitSeb
Copy link
Contributor Author

ptitSeb commented Sep 2, 2021

bors r+

bors bot added a commit that referenced this pull request Sep 2, 2021
2548: Fix probestack r=ptitSeb a=ptitSeb

# Description
The `skip_stack_gard_page` were failing.

The patch first add a trampoline for the PROBEGUARD function on x86_64 build, as this one comes from some runtime and can be too far away from generated code for a regular 32bits relative address (this fix a segfault when a generated function needs a call to probeguard).
The patch also add a special case for StackOverflow error, and doesn't check if the error comes from Wasm code (as the stack overflow will comes from a runtime library, generated by the probeguard function).

Co-authored-by: Syrus Akbary <me@syrusakbary.com>
Co-authored-by: ptitSeb <sebastien.chev@gmail.com>
@bors
Copy link
Contributor

bors bot commented Sep 2, 2021

Build failed:

@ptitSeb
Copy link
Contributor Author

ptitSeb commented Sep 2, 2021

bors r+

bors bot added a commit that referenced this pull request Sep 2, 2021
2548: Fix probestack r=ptitSeb a=ptitSeb

# Description
The `skip_stack_gard_page` were failing.

The patch first add a trampoline for the PROBEGUARD function on x86_64 build, as this one comes from some runtime and can be too far away from generated code for a regular 32bits relative address (this fix a segfault when a generated function needs a call to probeguard).
The patch also add a special case for StackOverflow error, and doesn't check if the error comes from Wasm code (as the stack overflow will comes from a runtime library, generated by the probeguard function).

Co-authored-by: Syrus Akbary <me@syrusakbary.com>
Co-authored-by: ptitSeb <sebastien.chev@gmail.com>
@bors
Copy link
Contributor

bors bot commented Sep 2, 2021

Build failed:

@syrusakbary
Copy link
Member

Not sure if it's flaky, let's try again.

bors r+

bors bot added a commit that referenced this pull request Sep 2, 2021
2548: Fix probestack r=syrusakbary a=ptitSeb

# Description
The `skip_stack_gard_page` were failing.

The patch first add a trampoline for the PROBEGUARD function on x86_64 build, as this one comes from some runtime and can be too far away from generated code for a regular 32bits relative address (this fix a segfault when a generated function needs a call to probeguard).
The patch also add a special case for StackOverflow error, and doesn't check if the error comes from Wasm code (as the stack overflow will comes from a runtime library, generated by the probeguard function).

Co-authored-by: Syrus Akbary <me@syrusakbary.com>
Co-authored-by: ptitSeb <sebastien.chev@gmail.com>
@bors
Copy link
Contributor

bors bot commented Sep 2, 2021

Build failed:

@ptitSeb
Copy link
Contributor Author

ptitSeb commented Sep 2, 2021

I reproduce on my side now. Working on a fix...

@ptitSeb
Copy link
Contributor Author

ptitSeb commented Sep 2, 2021

bors r+

@bors
Copy link
Contributor

bors bot commented Sep 2, 2021

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants