Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp648274img; Fri, 22 Mar 2019 05:54:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqz29ltWunJVjZb853hqHBDPlyr/c9ZSp4uM+QWj3K07Ho8GXLvQIhBwx5Mu4VUAb5YIjR26 X-Received: by 2002:aa7:8051:: with SMTP id y17mr9044551pfm.92.1553259250656; Fri, 22 Mar 2019 05:54:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553259250; cv=none; d=google.com; s=arc-20160816; b=Z6kA5s92GnoGXGbKV2OJekru8vm8jz2w+4JqAxBTbGCCkFgIFHSS0Xzh2XvWIA4WpI ZouFtgkU4ohfm7qq2CFHm+Idc0UP2r/LgJ4E0/g/ZOK69lvTCPhAkOSjqoE1zeBgr9t1 UR/VqGzi5XLdDLGuk0Ir0siwecTYLaiRRtA46ic0/3BpHQdNagh8GGgiXU2y7sGGG/sZ VrlQa/GdCtrCADAMTpXtTGmd3GYX7Af/06aEV5z6afiE+d0MhkakIdeCcHuLwST+ujJR g7nEnlmUlg/BzFK3eMdCW7kXels3liZxD2SuwDRIvlxkxT6nSk0XTkwuXgAc6qYN0iyQ r8UA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=M0R5AnYt/vilGQ8oza49ek25VRnxt76XHp9+AkQEjh4=; b=HZ5pHG11C3/YzYNYc0It8FVOIkgwhZkErOPQUgCAGknjxwB6lUdSmzTkG78rNkIQG1 /Ws+Aoj1BDIAXS88Hbo5gZOnQyD0b96uDP4dxrpLmyrEf6aao2p5M2EZdPAVU1AUwuZI m99+bdMV9Br604HvZ+5UYMsMX6hBZ6sA+WjZpE/XfNh425xgmBIfwflFJx9annr2ulJ/ 66WkCT/YAgf4cnCruf1ZvT2j3Cv5ChraubVX44cwSRtFfsJAPY0qvWMw01TrDgsBOWWm Hb5UZv8gLDVaZjlKuY9FX4lhzHIIZ7x9AdQTGRz2COqs+dELDRresTwM19FwBpSYUNKe Cr6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fL3Jyexh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n8si6454583pgq.119.2019.03.22.05.53.55; Fri, 22 Mar 2019 05:54:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fL3Jyexh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733075AbfCVLxm (ORCPT + 99 others); Fri, 22 Mar 2019 07:53:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:57872 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732365AbfCVLxj (ORCPT ); Fri, 22 Mar 2019 07:53:39 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E44AF21939; Fri, 22 Mar 2019 11:53:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553255618; bh=ic9yBBX2lWZfq43wNDlo6LfoqqWT+47XvcKAqLNgm64=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fL3JyexhtNl31VR4n0qzpUZkGIQ5mRNlB6nhS6eyzaygH4EZ2Jnai0EzqU+dh4QhB ZjbB44KrCfXkiJrEjzkXWAK8gz3D82YYFtu7C1dicxhMUHwaZ8ZBo1ra6JER3VWnqb pkI3dY3eeRx9J/d5mh0yVEEF6vVi7SePlOd0659o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christophe Leroy , Michael Ellerman Subject: [PATCH 4.14 146/183] powerpc/traps: Fix the message printed when stack overflows Date: Fri, 22 Mar 2019 12:16:14 +0100 Message-Id: <20190322111252.382851750@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111241.819468003@linuxfoundation.org> References: <20190322111241.819468003@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Christophe Leroy commit 9bf3d3c4e4fd82c7174f4856df372ab2a71005b9 upstream. Today's message is useless: [ 42.253267] Kernel stack overflow in process (ptrval), r1=c65500b0 This patch fixes it: [ 66.905235] Kernel stack overflow in process sh[356], r1=c65560b0 Fixes: ad67b74d2469 ("printk: hash addresses printed with %p") Cc: stable@vger.kernel.org # v4.15+ Signed-off-by: Christophe Leroy [mpe: Use task_pid_nr()] Signed-off-by: Michael Ellerman Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/kernel/traps.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/arch/powerpc/kernel/traps.c +++ b/arch/powerpc/kernel/traps.c @@ -1292,8 +1292,8 @@ void slb_miss_bad_addr(struct pt_regs *r void StackOverflow(struct pt_regs *regs) { - printk(KERN_CRIT "Kernel stack overflow in process %p, r1=%lx\n", - current, regs->gpr[1]); + pr_crit("Kernel stack overflow in process %s[%d], r1=%lx\n", + current->comm, task_pid_nr(current), regs->gpr[1]); debugger(regs); show_regs(regs); panic("kernel stack overflow");