diff options
| author | Peter Zijlstra <[email protected]> | 2021-09-15 15:12:59 +0000 |
|---|---|---|
| committer | Peter Zijlstra <[email protected]> | 2021-09-21 11:57:43 +0000 |
| commit | 44b979fa302cab91bdd2cc982823e5c13202cd4e (patch) | |
| tree | 95cda92efb3adb9b44d233dbd979e3ecfd9fa66e /scripts/gcc-plugins/sancov_plugin.c | |
| parent | x86/iopl: Fake iopl(3) CLI/STI usage (diff) | |
| download | kernel-44b979fa302cab91bdd2cc982823e5c13202cd4e.tar.gz kernel-44b979fa302cab91bdd2cc982823e5c13202cd4e.zip | |
x86/mm/64: Improve stack overflow warnings
Current code has an explicit check for hitting the task stack guard;
but overflowing any of the other stacks will get you a non-descript
general #DF warning.
Improve matters by using get_stack_info_noinstr() to detetrmine if and
which stack guard page got hit, enabling a better stack warning.
In specific, Michael Wang reported what turned out to be an NMI
exception stack overflow, which is now clearly reported as such:
[] BUG: NMI stack guard page was hit at 0000000085fd977b (stack is 000000003a55b09e..00000000d8cce1a5)
Reported-by: Michael Wang <[email protected]>
Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
Tested-by: Michael Wang <[email protected]>
Link: https://lkml.kernel.org/r/YUTE/[email protected]
Diffstat (limited to 'scripts/gcc-plugins/sancov_plugin.c')
0 files changed, 0 insertions, 0 deletions
