Re: [PATCH v4 13/16] x86/dumpstack: Try harder to get a call trace on stack overflow

2016-06-26 Thread Andy Lutomirski
On Fri, Jun 24, 2016 at 8:35 AM, Josh Poimboeuf wrote: > On Thu, Jun 23, 2016 at 09:23:08PM -0700, Andy Lutomirski wrote: >> If we overflow the stack, print_context_stack will abort. Detect >> this case and rewind back into the valid part of the stack so that >> we can trace it. >> >> Signed-off-

Re: [PATCH v4 13/16] x86/dumpstack: Try harder to get a call trace on stack overflow

2016-06-24 Thread Josh Poimboeuf
On Thu, Jun 23, 2016 at 09:23:08PM -0700, Andy Lutomirski wrote: > If we overflow the stack, print_context_stack will abort. Detect > this case and rewind back into the valid part of the stack so that > we can trace it. > > Signed-off-by: Andy Lutomirski Reviewed-by: Josh Poimboeuf -- Josh

[PATCH v4 13/16] x86/dumpstack: Try harder to get a call trace on stack overflow

2016-06-23 Thread Andy Lutomirski
If we overflow the stack, print_context_stack will abort. Detect this case and rewind back into the valid part of the stack so that we can trace it. Signed-off-by: Andy Lutomirski --- arch/x86/kernel/dumpstack.c | 9 - 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/arch/x8