Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp23983imw; Mon, 4 Jul 2022 04:40:19 -0700 (PDT) X-Google-Smtp-Source: AGRyM1sKED1vZ8421pHgJ+F+KefZ1I8aZI6R5O7BRm9DvWQH0oX3FAVoBOm2VcNh3HjLScAL4suH X-Received: by 2002:a05:6a00:2387:b0:525:7314:7cf with SMTP id f7-20020a056a00238700b00525731407cfmr36281871pfc.84.1656934819343; Mon, 04 Jul 2022 04:40:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656934819; cv=none; d=google.com; s=arc-20160816; b=zETBrSFfzTBfQHx+g6WwCEcwU9pH+iTpttBYUuAT7BKORkiIjfY0IM2jtaqzi2HYhG q/+IrixrDbCbjUsYBxRVTcluFdISd3/xjUv3dJQ9rsUzH0FVm3RzMjrSJ18tLG8Uri8Y Fpoag+ElaT1SYzIZ+71AkHoaWm7M1QuzywVunkSekQwVpoac2ECCb/fzGynMY417rx9C trTWnbkxSmp6wpZLXu0b6cWnbs9N8VVq2toRyCS4+bEU01a/P+1MeegXHE2EUQ+yuCbU SbXQmlIaTyYS2DlVH2TcW/3rtdchFKnKvq3jN5cW6uVf+cUqgsYZ9VPXxiF/KEe0YLGk Gg/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version:date :message-id:subject:references:in-reply-to:cc:to:from; bh=J0tGs8UOQJsYjATnahnSaic1F5tRBEdFpaCg1ezRAkk=; b=Gwbkfs//6e6CwDDt3hiHk1gEg+sTsS2XHjhKmckwg9c/vHPFEmGGo3m84HYU1zn23n 3CBLLXeSpfcPkxSmkQK7BS5ZmAzKbUPQcVsTcnUAxYC2eFO8o8f2bdtQonX4hM65pv6S /cnDgYdhW5LJ2CRFi8BNuVJf+vljSFeO/ke/beBNy4Z35DwiJlg56dHQLazX6JWAC+4C 2oxEWmTGrNdxsx0EYxnTsanL4UM1DDh6dkAH0JKJKA6GurnIjazA92DEkn2UWPQqUnzO QHGNM28DJkxyyiceE6tIQJ+q2qVy7G1ATrTS5MpmrO2gubVgZSejuyFi6LW8b51NtDZP XgEg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mw9-20020a17090b4d0900b001bfb0db0879si10120775pjb.88.2022.07.04.04.40.08; Mon, 04 Jul 2022 04:40:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234399AbiGDLgr (ORCPT + 99 others); Mon, 4 Jul 2022 07:36:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47706 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232972AbiGDLgX (ORCPT ); Mon, 4 Jul 2022 07:36:23 -0400 Received: from gandalf.ozlabs.org (gandalf.ozlabs.org [150.107.74.76]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B1C9511A04 for ; Mon, 4 Jul 2022 04:36:14 -0700 (PDT) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4Lc3fM0X09z4xbT; Mon, 4 Jul 2022 21:36:11 +1000 (AEST) From: Michael Ellerman To: Christophe Leroy , Paul Mackerras , Benjamin Herrenschmidt , Michael Ellerman Cc: Arnd Bergmann , Erhard Furtner , linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org In-Reply-To: References: Subject: Re: [PATCH v2] powerpc/irq: Increase stack_overflow detection limit when KASAN is enabled Message-Id: <165693439802.9954.361439982234083073.b4-ty@ellerman.id.au> Date: Mon, 04 Jul 2022 21:33:18 +1000 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 3 Jun 2022 15:08:14 +0200, Christophe Leroy wrote: > When KASAN is enabled, as shown by the Oops below, the 2k limit is not > enough to allow stack dump after a stack overflow detection when > CONFIG_DEBUG_STACKOVERFLOW is selected: > > do_IRQ: stack overflow: 1984 > CPU: 0 PID: 126 Comm: systemd-udevd Not tainted 5.18.0-gentoo-PMacG4 #1 > Call Trace: > Oops: Kernel stack overflow, sig: 11 [#1] > BE PAGE_SIZE=4K MMU=Hash SMP NR_CPUS=2 PowerMac > Modules linked in: sr_mod cdrom radeon(+) ohci_pci(+) hwmon i2c_algo_bit drm_ttm_helper ttm drm_dp_helper snd_aoa_i2sbus snd_aoa_soundbus snd_pcm ehci_pci snd_timer ohci_hcd snd ssb ehci_hcd 8250_pci soundcore drm_kms_helper pcmcia 8250 pcmcia_core syscopyarea usbcore sysfillrect 8250_base sysimgblt serial_mctrl_gpio fb_sys_fops usb_common pkcs8_key_parser fuse drm drm_panel_orientation_quirks configfs > CPU: 0 PID: 126 Comm: systemd-udevd Not tainted 5.18.0-gentoo-PMacG4 #1 > NIP: c02e5558 LR: c07eb3bc CTR: c07f46a8 > REGS: e7fe9f50 TRAP: 0000 Not tainted (5.18.0-gentoo-PMacG4) > MSR: 00001032 CR: 44a14824 XER: 20000000 > > [...] Applied to powerpc/next. [1/1] powerpc/irq: Increase stack_overflow detection limit when KASAN is enabled https://git.kernel.org/powerpc/c/41f20d6db2b64677225bb0b97df956241c353ef8 cheers