Re: [discuss] [PATCH 1/2] (resend) x86_64 stack overflow debugging

From: Andi Kleen
Date: Wed Jun 14 2006 - 02:41:45 EST


On Wednesday 14 June 2006 08:24, Jan Beulich wrote:
> Are you certain you will ever see this trigger? Assembly code switches to the special interrupt handling stack prior to calling do_IRQ(), so I can't see how you would ever find yourself on the process stack in stack_overflow_check(). Jan

The point of the code is to sample the original process stack
and check if the code there is a stack pig, not the interrupt.

I'm not sure it would be worth adding a special check for irqstack/exception
stacks because nesting there should be pretty rare. Probably not.

-Andi
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/