* Kernel stack overflow in process xxxx
@ 2008-03-17 7:12 jay_chen
2008-03-17 7:17 ` jay_chen
0 siblings, 1 reply; 4+ messages in thread
From: jay_chen @ 2008-03-17 7:12 UTC (permalink / raw)
To: linuxppc-embedded
Hello all:
I am using mpc8548 and, kernel 2.6.14.5.
Recently, my system encounter "Kernel stack overflow in process xxxx"
problem.
How to increase the kernel stack size?
I try to modify THREAD_SIZE in thread_info.h, but my system seems couldn't
boot up anymore!
//#define THREAD_SIZE 8192 /* 2 pages */
#define THREAD_SIZE 16384 /* 4 pages */
Thanks in advance for any kind of advice.
Jay Chen...
^ permalink raw reply [flat|nested] 4+ messages in thread
* RE: Kernel stack overflow in process xxxx
2008-03-17 7:12 Kernel stack overflow in process xxxx jay_chen
@ 2008-03-17 7:17 ` jay_chen
2008-03-18 18:12 ` Nicholas Mc Guire
0 siblings, 1 reply; 4+ messages in thread
From: jay_chen @ 2008-03-17 7:17 UTC (permalink / raw)
To: linuxppc-embedded
By the way, is there any skill/tool to avoid/detect/check this kind of
problem?
Jay Chen...
-----Original Message-----
From: linuxppc-embedded-bounces+jay_chen=alphanetworks.com@ozlabs.org
[mailto:linuxppc-embedded-bounces+jay_chen=alphanetworks.com@ozlabs.org]
Sent: Monday, March 17, 2008 3:12 PM
To: linuxppc-embedded@ozlabs.org
Subject: [Spam Mail] Kernel stack overflow in process xxxx (This message
should be blocked: ctfkl59804)
Hello all:
I am using mpc8548 and, kernel 2.6.14.5.
Recently, my system encounter "Kernel stack overflow in process xxxx"
problem.
How to increase the kernel stack size?
I try to modify THREAD_SIZE in thread_info.h, but my system seems couldn't
boot up anymore!
//#define THREAD_SIZE 8192 /* 2 pages */
#define THREAD_SIZE 16384 /* 4 pages */
Thanks in advance for any kind of advice.
Jay Chen...
_______________________________________________
Linuxppc-embedded mailing list
Linuxppc-embedded@ozlabs.org
https://ozlabs.org/mailman/listinfo/linuxppc-embedded
^ permalink raw reply [flat|nested] 4+ messages in thread
* RE: Kernel stack overflow in process xxxx
2008-03-17 7:17 ` jay_chen
@ 2008-03-18 18:12 ` Nicholas Mc Guire
2008-03-19 12:59 ` jay_chen
0 siblings, 1 reply; 4+ messages in thread
From: Nicholas Mc Guire @ 2008-03-18 18:12 UTC (permalink / raw)
To: jay_chen; +Cc: linuxppc-embedded
> By the way, is there any skill/tool to avoid/detect/check this kind of
> problem?
>
did you try:
Kernel hacking --->
...
[*] Kernel debugging
...
[*] Check for stack overflows
[*] Stack utilization instrumentation
the last one depends on SysRq though.
In any case it would be interesting to know if these tools can help find
problems of this kind - so if it does not help - pleas let me/us know.
hofrat
^ permalink raw reply [flat|nested] 4+ messages in thread
* RE: Kernel stack overflow in process xxxx
2008-03-18 18:12 ` Nicholas Mc Guire
@ 2008-03-19 12:59 ` jay_chen
0 siblings, 0 replies; 4+ messages in thread
From: jay_chen @ 2008-03-19 12:59 UTC (permalink / raw)
To: 'Nicholas Mc Guire'; +Cc: linuxppc-embedded
Hi,
My kernel version is 2.6.14.5
I don't see these options.
Jay...
-----Original Message-----
From: Nicholas Mc Guire [mailto:hofrat@hofr.at]
Sent: Wednesday, March 19, 2008 2:13 AM
To: jay_chen
Cc: linuxppc-embedded@ozlabs.org
Subject: RE: Kernel stack overflow in process xxxx
> By the way, is there any skill/tool to avoid/detect/check this kind of
> problem?
>
did you try:
Kernel hacking --->
...
[*] Kernel debugging
...
[*] Check for stack overflows
[*] Stack utilization instrumentation
the last one depends on SysRq though.
In any case it would be interesting to know if these tools can help find
problems of this kind - so if it does not help - pleas let me/us know.
hofrat
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2008-03-19 13:00 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-03-17 7:12 Kernel stack overflow in process xxxx jay_chen
2008-03-17 7:17 ` jay_chen
2008-03-18 18:12 ` Nicholas Mc Guire
2008-03-19 12:59 ` jay_chen
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).