From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from cuda.sgi.com (cuda1.sgi.com [192.48.157.11]) by oss.sgi.com (8.14.3/8.14.3/SuSE Linux 0.8) with ESMTP id n5UI9cM3220548 for ; Tue, 30 Jun 2009 13:09:38 -0500 Received: from mail.sandeen.net (localhost [127.0.0.1]) by cuda.sgi.com (Spam Firewall) with ESMTP id 88E981306658 for ; Tue, 30 Jun 2009 11:16:25 -0700 (PDT) Received: from mail.sandeen.net (sandeen.net [209.173.210.139]) by cuda.sgi.com with ESMTP id LXVP0Qsou1S4eu8I for ; Tue, 30 Jun 2009 11:16:25 -0700 (PDT) Message-ID: <4A4A5500.6070508@sandeen.net> Date: Tue, 30 Jun 2009 13:10:08 -0500 From: Eric Sandeen MIME-Version: 1.0 Subject: Re: do_IRQ stack overflow on 32-bit CentOS 4 References: <4A4A50EC.4090201@sandeen.net> In-Reply-To: <4A4A50EC.4090201@sandeen.net> List-Id: XFS Filesystem from SGI List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: xfs-bounces@oss.sgi.com Errors-To: xfs-bounces@oss.sgi.com To: Orion Poplawski Cc: linux-xfs@oss.sgi.com Eric Sandeen wrote: > Orion Poplawski wrote: >> Just hit a: >> >> do_IRQ: stack overflow: 452 >> >> on 32-bit CentOS 4 machine with xfs-kmod-0.4-2.el4. Is there anything that can >> be done to minimize this risk? Running xfs over md raid5 array, exporting via >> nfs. More kernel dump messages are posted at: >> >> http://bugs.centos.org/view.php?id=3136 > > get an x86_64 machine ;) > > The stack overflow message is misleading; it means you have 452 -left- > > unfortunately on some kernels, simply printing that message actually > consumes what's left, and more. See http://lkml.org/lkml/2007/8/29/245 > > This was fixed in 2.6.18-108.el5 and beyond. Oh, for RHEL^wCENTOS4 it was fixed in 2.6.9-78.8.EL and beyond. -Eric _______________________________________________ xfs mailing list xfs@oss.sgi.com http://oss.sgi.com/mailman/listinfo/xfs