Re: [CHECKER] large stack variables (>=1K) in 2.4.4 and 2.4.4-ac8

Keith Owens (kaos@ocs.com.au)
Fri, 25 May 2001 18:37:04 +1000


On Fri, 25 May 2001 10:27:53 +0200,
Andi Kleen <ak@suse.de> wrote:
>On Fri, May 25, 2001 at 06:25:57PM +1000, Keith Owens wrote:
>> Nothing in arch/i386/kernel/traps.c uses a task gate, they are all
>> interrupt, trap, system or call gates. I guarantee that kdb on ix86
>> and ia64 uses the same kernel stack as the failing task, the starting
>> point for the kdb backtrace is itself and it does not follow segment
>> switches.
>
>I would consider this a bug in kdb then.

No more of a bug than panic(), show_stack(), printk() and all the other
routines that get called during a kernel problem. They all use the
current kernel stack and they work almost all the time. Kernel stack
overflows are symptoms of bad code, so fix the code, not the recovery
routines.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/