On Wed, Oct 26, 2016 at 3:55 PM, Laura Abbott <labb...@redhat.com> wrote: > > I was playing around with overflowing stacks and I managed to generate a > test > case that hung the kernel with vmapped stacks. The test case is just > > static void noinline foo1(void) > { > pr_info("%p\n", (void *)current_stack_pointer()); > foo2(); > } > > where foo$n is the same function with the name changed. I'm super > creative. I have a couple thousand of these for testing with the final > one doing a WARN. The kernel eventually hangs in printk on logbuf_lock
So just to get this right - your test-case is intentionally doing that mutually recursive thing with foo1/foo2 calling each other until they run out of stack? And yes, occasionally the stack will run out while in the middle of "printk()", and then when we take a fault, we'll be screwed. Note that we do *not* guarantee that "printk()" works in all contexts, so it might not really be considered a bug. It's very much a "best effort", but the scheduler and timekeeping, for example, uses "printk_deferred()" exactly because one of the contexts where printk() does *not* work is when you hold the rq lock. And the reason for *that* is that printk() ends up relying on a few different locks: - logbuf_lock, obviously. - console_sem for actual output - cond_resched() requires rq->lock And we do have some hacks on place - the recursive printk test (logbuf_cpu, as you note) and oops_in_progress and that "zap_locks()". But zap_locks only zaps logbuf_lock and console_sem, for example. If you run out of stack somewhere in the middle of the scheduler when the "cond_resched()" case of printk triggers, and we hold "rq->lock" when the double fault occurs, the machine *will* be dead. It will still try to print things out (thanks to that zap_locks thing), but rq->lock will be wrong, and nothing will ever recover. And it _sounds_ like that's the case you hit. Basically, zap_locks and the other printk "try to at least print things out" can only handle so much. Linus