From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on archive.lwn.net X-Spam-Level: X-Spam-Status: No, score=-6.0 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI autolearn=unavailable autolearn_force=no version=3.4.2 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by archive.lwn.net (Postfix) with ESMTP id 180DF7D2EF for ; Tue, 14 May 2019 10:43:23 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726362AbfENKnQ (ORCPT ); Tue, 14 May 2019 06:43:16 -0400 Received: from mx2.suse.de ([195.135.220.15]:39300 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725893AbfENKnQ (ORCPT ); Tue, 14 May 2019 06:43:16 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id D4BF7AC3F; Tue, 14 May 2019 10:43:13 +0000 (UTC) Date: Tue, 14 May 2019 12:43:11 +0200 From: Cyril Hrubis To: Yuri Norov Cc: Andreas Schwab , Yury Norov , "ltp@lists.linux.it" , "linux-doc@vger.kernel.org" , Szabolcs Nagy , Catalin Marinas , Heiko Carstens , Philipp Tomsich , Joseph Myers , "linux-arch@vger.kernel.org" , Steve Ellcey , Prasun Kapoor , Alexander Graf , Bamvor Zhangjian , Geert Uytterhoeven , Dave Martin , Adam Borowski , Manuel Montezelo , James Hogan , Chris Metcalf , Arnd Bergmann , Andrew Pinski , Lin Yongting , Alexey Klimov , Mark Brown , "linux-arm-kernel@lists.infradead.org" , Maxim Kuvyrkov , Florian Weimer , "linux-api@vger.kernel.org" , Nathan_Lynch , "linux-kernel@vger.kernel.org" , Ramana Radhakrishnan , Martin Schwidefsky , "David S . Miller" , Christoph Muellner Subject: Re: [LTP] [EXT] Re: [PATCH v9 00/24] ILP32 for ARM64 Message-ID: <20190514104311.GA24708@rei> References: <20180516081910.10067-1-ynorov@caviumnetworks.com> <20190508225900.GA14091@yury-thinkpad> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-doc-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-doc@vger.kernel.org Hi! > > There is a problem with the stack size accounting during execve when > > there is no stack limit: > > > > $ ulimit -s > > 8192 > > $ ./hello.ilp32 > > Hello World! > > $ ulimit -s unlimited > > $ ./hello.ilp32 > > Segmentation fault > > $ strace ./hello.ilp32 > > execve("./hello.ilp32", ["./hello.ilp32"], 0xfffff10548f0 /* 77 vars */) = -1 ENOMEM (Cannot allocate memory) > > +++ killed by SIGSEGV +++ > > Segmentation fault (core dumped) > > > > Andreas. > > Thanks Andreas, I will take a look. Do we have such test in LTP? We do have a test that we can run a binary with very small stack size i.e. 512kB but there does not seem to be anything that would catch this specific problem. Can you please open an issue and describe how to reproduce the problem at our github tracker: https://github.com/linux-test-project/ltp/issues Then we can create testcase based on that reproducer later on. -- Cyril Hrubis chrubis@suse.cz