From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.ozlabs.org (lists.ozlabs.org [112.213.38.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 35E04C2BB41 for ; Tue, 16 Aug 2022 07:30:57 +0000 (UTC) Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4M6N9W3Byxz3bhQ for ; Tue, 16 Aug 2022 17:30:55 +1000 (AEST) Authentication-Results: lists.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=EziNRW53; dkim-atps=neutral Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=kernel.org (client-ip=2604:1380:4641:c500::1; helo=dfw.source.kernel.org; envelope-from=bugzilla-daemon@kernel.org; receiver=) Authentication-Results: lists.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=EziNRW53; dkim-atps=neutral Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4M6N8j4cTNz307g for ; Tue, 16 Aug 2022 17:30:13 +1000 (AEST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id BE10360F7A for ; Tue, 16 Aug 2022 07:30:09 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPS id 2D2A7C433D6 for ; Tue, 16 Aug 2022 07:30:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1660635009; bh=mbrjyJmgukljz3x1VTWK6YBmgX++j+CqIYQxX93K/2A=; h=From:To:Subject:Date:In-Reply-To:References:From; b=EziNRW53Ccz7kqUFaewAzgCsaSrMLwSm8f4ULPK4M9+ek7LZKBSURuZo+rZ5UVsCR rVO/9YcU+GO3SrTON/W1fZBZ/4nD+55x8YvzDjNJPAOVwbE3LLKrG22m1zbYSQHv2S gcZDlKS5DIG+hftXLaRTl15CotSe5xuvmMA4VzDMAgp+VZzbmFv64ATcrPdXS7ND1L cCEfpCIehZ2ptsPshFz5+nGmuiLDVBJj07O4RqoEr0gpvYZnZvYXJoairLqM29CLY9 B9fS6IZuRij/bEtEvZpf/bWQlXrcVmRSfFyXkSMTJVHd1gbiUvveXBwQmqAymrnx95 +bf4yJcbDIiNw== Received: by aws-us-west-2-korg-bugzilla-1.web.codeaurora.org (Postfix, from userid 48) id 11863C433E7; Tue, 16 Aug 2022 07:30:09 +0000 (UTC) From: bugzilla-daemon@kernel.org To: linuxppc-dev@lists.ozlabs.org Subject: [Bug 216368] do_IRQ: stack overflow at boot on a PowerMac G5 11,2 Date: Tue, 16 Aug 2022 07:30:08 +0000 X-Bugzilla-Reason: None X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: AssignedTo platform_ppc-64@kernel-bugs.osdl.org X-Bugzilla-Product: Platform Specific/Hardware X-Bugzilla-Component: PPC-64 X-Bugzilla-Version: 2.5 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: christophe.leroy@csgroup.eu X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P1 X-Bugzilla-Assigned-To: platform_ppc-64@kernel-bugs.osdl.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugzilla.kernel.org/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: linuxppc-dev@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: linuxppc-dev-bounces+linuxppc-dev=archiver.kernel.org@lists.ozlabs.org Sender: "Linuxppc-dev" https://bugzilla.kernel.org/show_bug.cgi?id=3D216368 Christophe Leroy (christophe.leroy@csgroup.eu) changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |christophe.leroy@csgroup.eu --- Comment #3 from Christophe Leroy (christophe.leroy@csgroup.eu) --- That might be a consequence of commit 41f20d6db2b6 ("powerpc/irq: Increase stack_overflow detection limit when KASAN is enabled") which increased the limit from 2k to 4k for PPC64. This happens when you get an IRQ while being deep into BTRFS handling it se= ems. It should be investigated with BTRFS team why the callstack is so deep. --=20 You may reply to this email to add a comment. You are receiving this mail because: You are watching the assignee of the bug.=