[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20080827.174605.85608276.davem@davemloft.net>
Date: Wed, 27 Aug 2008 17:46:05 -0700 (PDT)
From: David Miller <davem@...emloft.net>
To: lethal@...ux-sh.org
Cc: bunk@...nel.org, torvalds@...ux-foundation.org,
rusty@...tcorp.com.au, Alan.Brunelle@...com, rjw@...k.pl,
linux-kernel@...r.kernel.org, kernel-testers@...r.kernel.org,
akpm@...ux-foundation.org, arjan@...ux.intel.com, mingo@...e.hu,
linux-embedded@...r.kernel.org
Subject: Re: [Bug #11342] Linux 2.6.27-rc3: kernel BUG at mm/vmalloc.c -
bisected
From: Paul Mundt <lethal@...ux-sh.org>
Date: Thu, 28 Aug 2008 09:32:13 +0900
> On Wed, Aug 27, 2008 at 08:35:44PM +0300, Adrian Bunk wrote:
> > CONFIG_DEBUG_STACKOVERFLOW should give you the same information, and if
> > wanted with an arbitrary limit.
>
> In some cases, yes. In the CONFIG_DEBUG_STACKOVERFLOW case the check is
> only performed from do_IRQ(), which is sporadic at best, especially on
> tickless. While it catches some things, it's not a complete solution in
> and of iteslf.
BTW, on sparc64 we have a stack overflow checker that runs via
the profiling _mcount hook. So every function call we check
if the stack is getting overused.
If so, we jump onto a special static debugging stack and print
the stack overflow message.
And yes it works with IRQ stacks which is all that sparc64 uses
nowadays.
Perhaps this is useful enough to make generic.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists