Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp4296114imm; Mon, 15 Oct 2018 12:16:44 -0700 (PDT) X-Google-Smtp-Source: ACcGV617cTHN5dPV2GknIGLlmJEKV81ZdwImDT/qd73jPalSYAt+WLNnS47Dc83D6u9PtNcb9loa X-Received: by 2002:a63:1b61:: with SMTP id b33-v6mr17260944pgm.245.1539631004148; Mon, 15 Oct 2018 12:16:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539631004; cv=none; d=google.com; s=arc-20160816; b=R51MvVCkCstOUdRhKpKnhwb7qgjZc6nZvjllqpU2vtPEpM64yNSWXkV+Wh9GDS2+MH qeRWmIDwJE+7uekQ79xnpq0ejs9a5KJ78rI4FU+SZuPTgpY71td5sdmTm3PrBRgcRMOI N6WksXbZ3SvXFapK2BQkXZdAK6vDdTzKA2zhd6tDDf+hHw8lyiFr/8OEEYgXqPapOgYU K6255+JD5zpveAdn+81VlocgoEbVNOENlZE+YPVEiacrHyV3BlZB61UNIDStz+ABeRo5 RcwwcdxMYFjNlKlShX/SdZQDIuh5JXWJcEfX42XFd3yZHbS6Ql7oWtfyyiQYdeP1d8Rd OTAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=12iANdTDXkgI1QHXoPOYXTOHCxaClVeEJmSDMI3yPcE=; b=0mnZIahVGWrwI9n2A7Bj5/Go+O8qpieKFSJyeKY9rKet5CyzY961khY0vo2If286wv 7kP2ypZjO70FSuDjJG6XlYpvt5P+9n2TzMEwZZTF3Q9Z5x0c96v4XzmR5/+Mf0AzNcAd CfroZhj+0K0OfOBEXkRyBOywu5XmdGUFII6L2viOQBVCijLj23hfrZ5oMKuWH5/nxovV WPnaUuhKXqLdhMUk2xNANOueuOPbDEdm3eWCoxahMi256sqbWUj1UihmbveV15bAaxSY rXilZiBv7lc9+4I2erUWpUf70D/ssxacj4lVmJJsPwDpbJxS6mnyIlrEH358rgA0jIOu g1ug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gentoo.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g12-v6si11020533plt.4.2018.10.15.12.16.28; Mon, 15 Oct 2018 12:16:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gentoo.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726869AbeJPDBU (ORCPT + 99 others); Mon, 15 Oct 2018 23:01:20 -0400 Received: from smtp.gentoo.org ([140.211.166.183]:45128 "EHLO smtp.gentoo.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726681AbeJPDBU (ORCPT ); Mon, 15 Oct 2018 23:01:20 -0400 Received: from sf (trofi-1-pt.tunnel.tserv1.lon2.ipv6.he.net [IPv6:2001:470:1f1c:a0f::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: slyfox) by smtp.gentoo.org (Postfix) with ESMTPSA id A09F4335C58; Mon, 15 Oct 2018 19:14:44 +0000 (UTC) Date: Mon, 15 Oct 2018 20:14:41 +0100 From: Sergei Trofimovich To: Tony Luck Cc: Fenghua Yu , linux-ia64@vger.kernel.org, Andrew Morton , linux-kernel@vger.kernel.org Subject: Re: [PATCH] ia64: disable SCHED_STACK_END_CHECK Message-ID: <20181015201441.64f6816a@sf> In-Reply-To: <20180914070617.29203-1-slyfox@gentoo.org> References: <20180914070617.29203-1-slyfox@gentoo.org> X-Mailer: Claws Mail 3.17.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 14 Sep 2018 08:06:17 +0100 Sergei Trofimovich wrote: > SCHED_STACK_END_CHECK assumes stack grows in one direction. > ia64 is a rare case where it is not. > > As a result kernel fails at startup as: > Kernel panic - not syncing: corrupted stack end detected inside scheduler > > The error does not find a real problem: it's register backing store > is written on top of canary value. > > Disable SCHED_STACK_END_CHECK on ia64 as there is no good > place for canary without moving initial stack address. > > CC: Tony Luck > CC: Fenghua Yu > CC: linux-ia64@vger.kernel.org > CC: Andrew Morton > CC: linux-kernel@vger.kernel.org > Signed-off-by: Sergei Trofimovich > --- > lib/Kconfig.debug | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug > index 4966c4fbe7f7..a097dfe38d2b 100644 > --- a/lib/Kconfig.debug > +++ b/lib/Kconfig.debug > @@ -1004,7 +1004,7 @@ config SCHEDSTATS > > config SCHED_STACK_END_CHECK > bool "Detect stack corruption on calls to schedule()" > - depends on DEBUG_KERNEL > + depends on DEBUG_KERNEL && !IA64 > default n > help > This option checks for a stack overrun on calls to schedule(). > -- > 2.19.0 > Ping. -- Sergei