Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp5839665imu; Wed, 30 Jan 2019 04:33:40 -0800 (PST) X-Google-Smtp-Source: ALg8bN7iLDFjk+pANItP1HUPSHV1lQ19OBktfzNv/YMo6lLC1PLzxpXcdkRrdVXyMLvCxFXgNPR1 X-Received: by 2002:a17:902:b18b:: with SMTP id s11mr30018635plr.56.1548851620793; Wed, 30 Jan 2019 04:33:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548851620; cv=none; d=google.com; s=arc-20160816; b=q+bTynfOHQQ2AIj+yvCNj2lHCxfK436yNv0Lcoxpuv6j3R5zRzSDs+WvxgEqCl1KUh 9hD9Ce2X7C94GrT0T+91tIO1O5Yr8lBX4UCHDLO7lU5L4zk61jBIV/2+j/2QwXenlAm9 cskIsGNpbSaHmM4cJrQzNnuMnSN+sDAO5cWjClYVanSkU+OjICAKc7fy2VliSmSsGloz OgSt5GQ44HvHPgpSEr63zjWxvcFiuKKhdD67Imn07+W2S5xmdqqmtILKjZfSB+IFWli/ KZdW6kmcfyxReHJ1MASlTwQYaoDKPgLfQfNiOfBg5bZ+oDMXTpT6RNjyAyZUCgLIpOWl 7R0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=a3hIy8ztey4D6JKT7qA2TRm2FC4ZAamv3xEMk6T2s2Q=; b=oWpXCU7fsnggM2b25AhAoq4DCRQm+OOfqnWe4QbBKzFFr1jegYDfSn/TiwOMN6EObg eTbmlnkNpSDrMqkP3DTJ3zd38fMIvZNHX6cRf68AcA520c8LhIiDVNKdzA+VjQ2rGv8y nU9fIlZ84qt/P3Ai9pj/LrgXQK9+7RJ3+p2yiTQiWxKsmnNiAqnr9hN2EwDPpHtDWemH wRaqpvLWITJ9TX1UQYifynCzg52ejVF8kXDRDuWIujr2LWFfViPyfzPytE3CJwYYlOm+ a1RGqvycsbehmx+QVxHCNaEWOe13V14XoFDO3oJ6nOm5omRI7Cga5EFJ/WdElfG5uuDD ckpg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i66si1469612pfb.91.2019.01.30.04.33.25; Wed, 30 Jan 2019 04:33:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730737AbfA3MdB (ORCPT + 99 others); Wed, 30 Jan 2019 07:33:01 -0500 Received: from ozlabs.org ([203.11.71.1]:58445 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726210AbfA3MdB (ORCPT ); Wed, 30 Jan 2019 07:33:01 -0500 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPSA id 43qN7H2tRFz9s9h; Wed, 30 Jan 2019 23:32:59 +1100 (AEDT) From: Michael Ellerman To: Christophe Leroy , Benjamin Herrenschmidt , Paul Mackerras Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Subject: Re: [PATCH v2] powerpc/traps: fix the message printed when stack overflows In-Reply-To: <5aa3c84a675405ac99382a5893406ef7e8dfd455.1548779831.git.christophe.leroy@c-s.fr> References: <5aa3c84a675405ac99382a5893406ef7e8dfd455.1548779831.git.christophe.leroy@c-s.fr> Date: Wed, 30 Jan 2019 23:32:58 +1100 Message-ID: <87o97ypbph.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Christophe Leroy writes: > Today's message is useless: > > [ 42.253267] Kernel stack overflow in process (ptrval), r1=c65500b0 > > This patch fixes it: > > [ 66.905235] Kernel stack overflow in process sh[356], r1=c65560b0 > > Fixes: ad67b74d2469 ("printk: hash addresses printed with %p") > Cc: > Signed-off-by: Christophe Leroy > --- > v2: make checkpatch happy :) > > arch/powerpc/kernel/traps.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/arch/powerpc/kernel/traps.c b/arch/powerpc/kernel/traps.c > index 5e917a84f949..a3dc6872d5aa 100644 > --- a/arch/powerpc/kernel/traps.c > +++ b/arch/powerpc/kernel/traps.c > @@ -1535,8 +1535,8 @@ void alignment_exception(struct pt_regs *regs) > > void StackOverflow(struct pt_regs *regs) > { > - printk(KERN_CRIT "Kernel stack overflow in process %p, r1=%lx\n", > - current, regs->gpr[1]); > + pr_crit("Kernel stack overflow in process %s[%d], r1=%lx\n", > + current->comm, current->pid, regs->gpr[1]); I think you're meant to use task_pid_nr(current) these days. I fixed it up when applying. cheers