Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp3980328rwl; Tue, 28 Mar 2023 00:27:28 -0700 (PDT) X-Google-Smtp-Source: AKy350aVsh0epGtQ0lvRfoDsFz2+oySR1z1rNLwIBLTbrjhzx3iiTcFrrPfTuaxKFjg04TTr0pgm X-Received: by 2002:a17:907:7f0c:b0:93f:870f:a9e2 with SMTP id qf12-20020a1709077f0c00b0093f870fa9e2mr11124037ejc.16.1679988448181; Tue, 28 Mar 2023 00:27:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679988448; cv=none; d=google.com; s=arc-20160816; b=k+8vYl8C4aGsvh+CC024mWX5leUT4u0w8q9wpSZy3ghTdxwn9DDlo4TcF9FxYQFtDI de7OQeS6WwiU1Y9W/uEbVItfbtZkGKa/fIwBIhJoDoQw9J/ckapxiXpNrNvelDXINXPa Ci/GQgxL8Cqw3Y37+s4VOSamClAJNLmHB5SMamS6H5SyOpAq1+PwJ3BbPrBm339flKWP y/PL6iGKPQUmDoB2J3n0BFpzkRzJdlUfX4t0DT/RYK/vl74ZMzdA4W2A0BFw3cDN9ZDn qIh2pXLhXo32jL1O7XseVdcqHv6IrLorlH/YZy9+dHNUP3ioHx2VDOicg/5YdHGNdvD8 yADQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=jueBP26mVZhkF7J/q80JpCDy4GjoqpgoASI9u5gm5jg=; b=Qv0gS5UFnc43IRWuDp0lwRj7T31On3VkLnCnKvnrYQ6ZGyyM+Od9Po7mP2SW31/Yxw Mn0q1JIqykqX0IKIY/hPL6X/mhjf1LpXDK2fuZAP2U+vjQItVADomjpT0NpGUmn19yKB l9TFT7gnoCqtsIRp0atNrN6URcb3FhGa4TJdooN403/xqtxhxeL9Fan4X8e8XlJf/eaG HsN6SVgw5I9ordzBv9VKnNbQDrp5Vze0ZOu0LFD0UbGzVNaEXapVJX4wEa81i5WNBhjf TJBXiD28ICXOgn3Amwl2XI8p1i6CUJhVrHc0u2ncmuEW6gHULcfBP3woPuuXsAv3g/JO Teig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=antgroup.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k20-20020a1709063fd400b00930cad91803si9152707ejj.473.2023.03.28.00.27.03; Tue, 28 Mar 2023 00:27:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=antgroup.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230014AbjC1H0L (ORCPT + 99 others); Tue, 28 Mar 2023 03:26:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34852 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230119AbjC1H0J (ORCPT ); Tue, 28 Mar 2023 03:26:09 -0400 Received: from out0-194.mail.aliyun.com (out0-194.mail.aliyun.com [140.205.0.194]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 233012D64; Tue, 28 Mar 2023 00:26:07 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R581e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018047208;MF=yanyan.yan@antgroup.com;NM=1;PH=DS;RN=11;SR=0;TI=SMTPD_---.S0hatNe_1679988361; Received: from localhost(mailfrom:yanyan.yan@antgroup.com fp:SMTPD_---.S0hatNe_1679988361) by smtp.aliyun-inc.com; Tue, 28 Mar 2023 15:26:01 +0800 From: "=?UTF-8?B?5pmP6ImzKOmHh+iLkyk=?=" To: linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Cc: , , , , , , , "=?UTF-8?B?6LCI6Ym06ZSL?=" , "=?UTF-8?B?5pmP6ImzKOmHh+iLkyk=?=" Subject: [PATCH] Documentation: update kernel stack for x86_64 Date: Tue, 28 Mar 2023 15:25:37 +0800 Message-Id: <20230328072537.20188-1-yanyan.yan@antgroup.com> X-Mailer: git-send-email 2.32.0.3.g01195cf9f MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=0.0 required=5.0 tests=SPF_HELO_NONE,SPF_PASS, UNPARSEABLE_RELAY autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit 6538b8ea886e ("x86_64: expand kernel stack to 16K") expanded kernel stack for x86_64 but left the wrong documentation, update it. Signed-off-by: Yan Yan --- Documentation/x86/kernel-stacks.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Documentation/x86/kernel-stacks.rst b/Documentation/x86/kernel-stacks.rst index 6b0bcf027ff1..738671a4070b 100644 --- a/Documentation/x86/kernel-stacks.rst +++ b/Documentation/x86/kernel-stacks.rst @@ -12,7 +12,7 @@ Most of the text from Keith Owens, hacked by AK x86_64 page size (PAGE_SIZE) is 4K. Like all other architectures, x86_64 has a kernel stack for every -active thread. These thread stacks are THREAD_SIZE (2*PAGE_SIZE) big. +active thread. These thread stacks are THREAD_SIZE (4*PAGE_SIZE) big. These stacks contain useful data as long as a thread is alive or a zombie. While the thread is in user space the kernel stack is empty except for the thread_info structure at the bottom. -- 2.32.0.3.g01195cf9f