From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751501AbdKYMH7 (ORCPT ); Sat, 25 Nov 2017 07:07:59 -0500 Received: from mail.skyhub.de ([5.9.137.197]:38948 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751129AbdKYMH6 (ORCPT ); Sat, 25 Nov 2017 07:07:58 -0500 Date: Sat, 25 Nov 2017 13:07:52 +0100 From: Borislav Petkov To: Ingo Molnar Cc: linux-kernel@vger.kernel.org, Dave Hansen , Andy Lutomirski , Thomas Gleixner , "H . Peter Anvin" , Peter Zijlstra , Linus Torvalds Subject: Re: [PATCH 17/43] x86/irq/64: In the stack overflow warning, print the offending IP Message-ID: <20171125120752.vuxn26wpilfv6jx5@pd.tnic> References: <20171124172411.19476-1-mingo@kernel.org> <20171124172411.19476-18-mingo@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20171124172411.19476-18-mingo@kernel.org> User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 24, 2017 at 06:23:45PM +0100, Ingo Molnar wrote: > From: Andy Lutomirski > > In case something goes wrong with unwind (not unlikely in case of > overflow), print the offending IP where we detected the overflow. > > Signed-off-by: Andy Lutomirski > Signed-off-by: Thomas Gleixner > Cc: Borislav Petkov > Cc: Brian Gerst > Cc: Dave Hansen > Cc: Josh Poimboeuf > Cc: Linus Torvalds > Cc: Peter Zijlstra > Link: https://lkml.kernel.org/r/6fcf700cc5ee884fb739b67d1246ab4185c41409.1511497875.git.luto@kernel.org > Signed-off-by: Ingo Molnar > --- > arch/x86/kernel/irq_64.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/arch/x86/kernel/irq_64.c b/arch/x86/kernel/irq_64.c > index 020efbf5786b..d86e344f5b3d 100644 > --- a/arch/x86/kernel/irq_64.c > +++ b/arch/x86/kernel/irq_64.c > @@ -57,10 +57,10 @@ static inline void stack_overflow_check(struct pt_regs *regs) > if (regs->sp >= estack_top && regs->sp <= estack_bottom) > return; > > - WARN_ONCE(1, "do_IRQ(): %s has overflown the kernel stack (cur:%Lx,sp:%lx,irq stk top-bottom:%Lx-%Lx,exception stk top-bottom:%Lx-%Lx)\n", > + WARN_ONCE(1, "do_IRQ(): %s has overflown the kernel stack (cur:%Lx,sp:%lx,irq stk top-bottom:%Lx-%Lx,exception stk top-bottom:%Lx-%Lx,ip:%pF)\n", > current->comm, curbase, regs->sp, > irq_stack_top, irq_stack_bottom, > - estack_top, estack_bottom); > + estack_top, estack_bottom, (void *)regs->ip); > > if (sysctl_panic_on_stackoverflow) > panic("low stack detected by irq handler - check messages\n"); > -- Reviewed-by: Borislav Petkov Also move to the beginning of the patchset. -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.