Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp413580pxb; Sat, 18 Sep 2021 06:30:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxwAg+4JxzknqNKSY5LgR4u7ER5BgveCzvonX+OTPI+UmmoQKHmxcHTCXj+CZp0xhw98HSe X-Received: by 2002:a50:d8c9:: with SMTP id y9mr16943242edj.79.1631971813845; Sat, 18 Sep 2021 06:30:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631971813; cv=none; d=google.com; s=arc-20160816; b=HqtcK35s8v+CGghi8WwatWWAS01D7BRikJnQZseqJzzdSh2vSgBUUVJqvByge2E3Cr ZiBw6QN724cZdwvGYw6sUiIYfxXvAXIFMrrb7V2grQsgLBkhcppqUmOsD+1yhhWPjXV6 x4Kvb5CgR1WZWSub61QIBuB0i5dPCOMo6cTv40MwpP9B52U5mzp019IwOxPVOOeA0nVc 7soXZ8S7gdgR1pSYre6sUZNxQTGXLNjRkUyslkThPyF4Dx+VLIjwocOiZ1x6tyat9MXx fgoK8LsNUplWDwic8gNmDPKXpUux5fAxaj1o1n44VT7qocHQxmq6NOssJg/wq0NOAQRF lbAw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=zytGosLqW2wfFrKu1mAwI9TGDUzHhR58aTgQdttyjj4=; b=Q2FjYr4JdHJdQPhklOeOJPtkKLBYtZKVhyRWMoiR4yGGt2pXA0V6EFAPBXBCB3JI4N NXLk0/Xh4Mtp+wWU2tt+05nN6+w98p8Jx1+VlrPJyHRoBTUPSvXc/qoz64b6IOooweiA oBRtJxxqOEIAnastbF6FItRyEvG6H0uq8aHU6rtzhTrdzLalTjGTcosVKHyLQxGjaMul oquMr044yzYMSTfSgZTV/tpMnR6BYkOs8xzncg94AloBerRULRQYPvPGZPpBNxLHOjEH kT4whdYFyXpAre5Si3ny8FtJBPumoJycaaLua+x1PnygwKBGIX64qeeIjr6jkUfiMoHo H6+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=desiato.20200630 header.b=Kp2BSvBY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i10si3171371edf.522.2021.09.18.06.29.50; Sat, 18 Sep 2021 06:30:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=desiato.20200630 header.b=Kp2BSvBY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240348AbhIRG6i (ORCPT + 99 others); Sat, 18 Sep 2021 02:58:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58638 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239917AbhIRG6f (ORCPT ); Sat, 18 Sep 2021 02:58:35 -0400 Received: from desiato.infradead.org (desiato.infradead.org [IPv6:2001:8b0:10b:1:d65d:64ff:fe57:4e05]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CA31CC061574; Fri, 17 Sep 2021 23:57:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=desiato.20200630; h=In-Reply-To:Content-Transfer-Encoding: Content-Type:MIME-Version:References:Message-ID:Subject:Cc:To:From:Date: Sender:Reply-To:Content-ID:Content-Description; bh=zytGosLqW2wfFrKu1mAwI9TGDUzHhR58aTgQdttyjj4=; b=Kp2BSvBYJhKuJ7h7QA0bvkAiHt IL20N4owGPJjRZRAZWm9jhjGZU8sQ9M6qeYrO76hCse6aWskcRit9kbjWw05aX9y6Th4lPf6i7XVy gc+atN9/uXdLCWJlut//LpLu+VRz8naOutjvScNwNc7n8bqNBZu4KRWyR+85gGaOGSyetpa1p1fjV 0RK/Arw3UddjT7gOPR65WcYv4ZUjkFuAruS/gqCgbvF78vcvnS33wIh8tH+5qevqHZGR5R5I70VBv bz7WPGwldoxoz2n93ojLv86JnowzXFCfLg2qqb16GmmIjSDsyp4v6aPJWxodcTyAqY/oxGmh7VcKz Ze/1gLOg==; Received: from j217100.upc-j.chello.nl ([24.132.217.100] helo=noisy.programming.kicks-ass.net) by desiato.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux)) id 1mRUHL-0042Er-Ru; Sat, 18 Sep 2021 06:56:52 +0000 Received: from hirez.programming.kicks-ass.net (hirez.programming.kicks-ass.net [192.168.1.225]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (Client did not present a certificate) by noisy.programming.kicks-ass.net (Postfix) with ESMTPS id ED5B3300260; Sat, 18 Sep 2021 08:56:50 +0200 (CEST) Received: by hirez.programming.kicks-ass.net (Postfix, from userid 1000) id B00082BDA5D63; Sat, 18 Sep 2021 08:56:50 +0200 (CEST) Date: Sat, 18 Sep 2021 08:56:50 +0200 From: Peter Zijlstra To: =?utf-8?B?546L6LSH?= Cc: Ingo Molnar , Arnaldo Carvalho de Melo , Mark Rutland , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , "open list:PERFORMANCE EVENTS SUBSYSTEM" , "open list:PERFORMANCE EVENTS SUBSYSTEM" , "open list:BPF (Safe dynamic programs and tools)" , "open list:BPF (Safe dynamic programs and tools)" , jroedel@suse.de, x86@kernel.org, Josh Poimboeuf Subject: Re: [PATCH] x86/dumpstack/64: Add guard pages to stack_info Message-ID: References: <3f26f7a2-0a09-056a-3a7a-4795b6723b60@linux.alibaba.com> <76de02b7-4d87-4a3a-e4d4-048829749887@linux.alibaba.com> <89f8281f-b778-5bf5-13e0-2bda613d963c@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <89f8281f-b778-5bf5-13e0-2bda613d963c@linux.alibaba.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Sep 18, 2021 at 10:30:42AM +0800, 王贇 wrote: > > Andy suggested something like this. > > Now it seem like working well :-) Thanks for sticking with it and testing all that over and over! > [ 193.100475][ C0] BUG: NMI stack guard page was hit at 0000000085fd977b (stack is 000000003a55b09e..00000000d8cce1a5) > [ 193.100493][ C0] stack guard page: 0000 [#1] SMP PTI > [ 193.100499][ C0] CPU: 0 PID: 968 Comm: a.out Not tainted 5.14.0-next-20210913+ #548 > [ 193.100506][ C0] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 > [ 193.100510][ C0] RIP: 0010:perf_swevent_get_recursion_context+0x0/0x70 > [ 193.100523][ C0] Code: 48 03 43 28 48 8b 0c 24 bb 01 00 00 00 4c 29 f0 48 39 c8 48 0f 47 c1 49 89 45 08 e9 48 ff ff ff 66 2e 0f 1f 84 00 00 00 00 00 <55> 53 e8 09 20 f2 ff 48 c7 c2 20 4d 03 00 65 48 03 15 5a 3b d2 7e > [ 193.100529][ C0] RSP: 0018:fffffe000000b000 EFLAGS: 00010046 > [ 193.100535][ C0] RAX: 0000000080120006 RBX: fffffe000000b050 RCX: 0000000000000000 > [ 193.100540][ C0] RDX: ffff88810de82180 RSI: ffffffff81269031 RDI: 000000000000001c > [ 193.100544][ C0] RBP: 000000000000001c R08: 0000000000000001 R09: 0000000000000000 > [ 193.100548][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 > [ 193.100551][ C0] R13: fffffe000000b044 R14: 0000000000000001 R15: 0000000000000009 > [ 193.100556][ C0] FS: 00007fa18c42d740(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000 > [ 193.100562][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 193.100566][ C0] CR2: fffffe000000aff8 CR3: 00000001160ac005 CR4: 00000000003606f0 > [ 193.100570][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > [ 193.100574][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > [ 193.100578][ C0] Call Trace: > [ 193.100581][ C0] > [ 193.100584][ C0] perf_trace_buf_alloc+0x26/0xd0 > [ 193.100597][ C0] ? is_prefetch.isra.25+0x260/0x260 > [ 193.100605][ C0] ? __bad_area_nosemaphore+0x1b8/0x280 > [ 193.100611][ C0] perf_ftrace_function_call+0x18f/0x2e0 > > > Tested-by: Michael Wang > > BTW, would you like to apply the other patch which increasing exception > stack size after this one? Yes, I have that queued behind it :-)