All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH 1/2] arm64: Call __show_regs directly
@ 2017-05-08 13:56 Kefeng Wang
  2017-05-08 13:56 ` [PATCH 2/2] arm64: Add dump_backtrace() in show_regs Kefeng Wang
  2017-05-08 14:55 ` [PATCH 1/2] arm64: Call __show_regs directly Mark Rutland
  0 siblings, 2 replies; 9+ messages in thread
From: Kefeng Wang @ 2017-05-08 13:56 UTC (permalink / raw)
  To: linux-arm-kernel

Call __show_regs directly in longjmp_break_handler() and
__do_user_fault(), it is to prepare for dump stack when
softlockup detected.

Signed-off-by: Kefeng Wang <wangkefeng.wang@huawei.com>
---
 arch/arm64/kernel/probes/kprobes.c | 4 ++--
 arch/arm64/mm/fault.c              | 2 +-
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/arch/arm64/kernel/probes/kprobes.c b/arch/arm64/kernel/probes/kprobes.c
index c5c4594..d849d98 100644
--- a/arch/arm64/kernel/probes/kprobes.c
+++ b/arch/arm64/kernel/probes/kprobes.c
@@ -522,9 +522,9 @@ int __kprobes longjmp_break_handler(struct kprobe *p, struct pt_regs *regs)
 		pr_err("current sp %lx does not match saved sp %lx\n",
 		       orig_sp, stack_addr);
 		pr_err("Saved registers for jprobe %p\n", jp);
-		show_regs(saved_regs);
+		__show_regs(saved_regs);
 		pr_err("Current registers\n");
-		show_regs(regs);
+		__show_regs(regs);
 		BUG();
 	}
 	unpause_graph_tracing();
diff --git a/arch/arm64/mm/fault.c b/arch/arm64/mm/fault.c
index 37b95df..c3f2b10 100644
--- a/arch/arm64/mm/fault.c
+++ b/arch/arm64/mm/fault.c
@@ -250,7 +250,7 @@ static void __do_user_fault(struct task_struct *tsk, unsigned long addr,
 			tsk->comm, task_pid_nr(tsk), inf->name, sig,
 			addr, esr);
 		show_pte(tsk->mm, addr);
-		show_regs(regs);
+		__show_regs(regs);
 	}
 
 	tsk->thread.fault_address = addr;
-- 
1.7.12.4

^ permalink raw reply related	[flat|nested] 9+ messages in thread

* [PATCH 2/2] arm64: Add dump_backtrace() in show_regs
  2017-05-08 13:56 [PATCH 1/2] arm64: Call __show_regs directly Kefeng Wang
@ 2017-05-08 13:56 ` Kefeng Wang
  2017-05-08 15:04   ` Mark Rutland
  2017-05-08 14:55 ` [PATCH 1/2] arm64: Call __show_regs directly Mark Rutland
  1 sibling, 1 reply; 9+ messages in thread
From: Kefeng Wang @ 2017-05-08 13:56 UTC (permalink / raw)
  To: linux-arm-kernel

When the system trigger a softlockup(eg, infinite loop when
PREEMPT_NONE), it only shows regs without stack trace, which
makes it difficult to adress the issue.

Signed-off-by: Kefeng Wang <wangkefeng.wang@huawei.com>
---
 arch/arm64/include/asm/stacktrace.h | 1 +
 arch/arm64/kernel/process.c         | 1 +
 arch/arm64/kernel/traps.c           | 2 +-
 3 files changed, 3 insertions(+), 1 deletion(-)

diff --git a/arch/arm64/include/asm/stacktrace.h b/arch/arm64/include/asm/stacktrace.h
index 801a16db..5b6eafc 100644
--- a/arch/arm64/include/asm/stacktrace.h
+++ b/arch/arm64/include/asm/stacktrace.h
@@ -30,5 +30,6 @@ struct stackframe {
 extern int unwind_frame(struct task_struct *tsk, struct stackframe *frame);
 extern void walk_stackframe(struct task_struct *tsk, struct stackframe *frame,
 			    int (*fn)(struct stackframe *, void *), void *data);
+extern void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk);
 
 #endif	/* __ASM_STACKTRACE_H */
diff --git a/arch/arm64/kernel/process.c b/arch/arm64/kernel/process.c
index ae2a835..af1ea25 100644
--- a/arch/arm64/kernel/process.c
+++ b/arch/arm64/kernel/process.c
@@ -210,6 +210,7 @@ void __show_regs(struct pt_regs *regs)
 void show_regs(struct pt_regs * regs)
 {
 	__show_regs(regs);
+	dump_backtrace(regs, NULL);
 }
 
 static void tls_thread_flush(void)
diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c
index d4d6ae0..368c3c8 100644
--- a/arch/arm64/kernel/traps.c
+++ b/arch/arm64/kernel/traps.c
@@ -140,7 +140,7 @@ static void dump_instr(const char *lvl, struct pt_regs *regs)
 	}
 }
 
-static void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk)
+void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk)
 {
 	struct stackframe frame;
 	unsigned long irq_stack_ptr;
-- 
1.7.12.4

^ permalink raw reply related	[flat|nested] 9+ messages in thread

* [PATCH 1/2] arm64: Call __show_regs directly
  2017-05-08 13:56 [PATCH 1/2] arm64: Call __show_regs directly Kefeng Wang
  2017-05-08 13:56 ` [PATCH 2/2] arm64: Add dump_backtrace() in show_regs Kefeng Wang
@ 2017-05-08 14:55 ` Mark Rutland
  2017-05-09  1:53   ` [PATCH v2 " Kefeng Wang
  1 sibling, 1 reply; 9+ messages in thread
From: Mark Rutland @ 2017-05-08 14:55 UTC (permalink / raw)
  To: linux-arm-kernel

Hi,

I see these patches are effectively a v2 of [1].

Please cite prior patch series when posting updates. The context really
helps review.

[1] http://lists.infradead.org/pipermail/linux-arm-kernel/2017-March/494840.html

On Mon, May 08, 2017 at 09:56:54PM +0800, Kefeng Wang wrote:
> Call __show_regs directly in longjmp_break_handler() and
> __do_user_fault(), it is to prepare for dump stack when
> softlockup detected.
> 
> Signed-off-by: Kefeng Wang <wangkefeng.wang@huawei.com>

The above doesn't explain the problem clearly. How about:

  Generic code expects show_regs() to also dump the stack, but arm64's
  show_reg() does not do this. Some arm64 callers of show_regs() *only*
  want the registers dumped, without the stack.

  To enable generic code to work as expected, we need to make
  show_regs() dump the stack. Where we only want the registers dumped,
  we must use __show_regs().

  This patch updates code to use __show_regs() where only registers are
  desired. A subsequent patch will modify show_regs().

... with that:

Acked-by: Mark Rutland <mark.rutland@arm.com>

Thanks,
Mark.

> ---
>  arch/arm64/kernel/probes/kprobes.c | 4 ++--
>  arch/arm64/mm/fault.c              | 2 +-
>  2 files changed, 3 insertions(+), 3 deletions(-)
> 
> diff --git a/arch/arm64/kernel/probes/kprobes.c b/arch/arm64/kernel/probes/kprobes.c
> index c5c4594..d849d98 100644
> --- a/arch/arm64/kernel/probes/kprobes.c
> +++ b/arch/arm64/kernel/probes/kprobes.c
> @@ -522,9 +522,9 @@ int __kprobes longjmp_break_handler(struct kprobe *p, struct pt_regs *regs)
>  		pr_err("current sp %lx does not match saved sp %lx\n",
>  		       orig_sp, stack_addr);
>  		pr_err("Saved registers for jprobe %p\n", jp);
> -		show_regs(saved_regs);
> +		__show_regs(saved_regs);
>  		pr_err("Current registers\n");
> -		show_regs(regs);
> +		__show_regs(regs);
>  		BUG();
>  	}
>  	unpause_graph_tracing();
> diff --git a/arch/arm64/mm/fault.c b/arch/arm64/mm/fault.c
> index 37b95df..c3f2b10 100644
> --- a/arch/arm64/mm/fault.c
> +++ b/arch/arm64/mm/fault.c
> @@ -250,7 +250,7 @@ static void __do_user_fault(struct task_struct *tsk, unsigned long addr,
>  			tsk->comm, task_pid_nr(tsk), inf->name, sig,
>  			addr, esr);
>  		show_pte(tsk->mm, addr);
> -		show_regs(regs);
> +		__show_regs(regs);
>  	}
>  
>  	tsk->thread.fault_address = addr;
> -- 
> 1.7.12.4
> 

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [PATCH 2/2] arm64: Add dump_backtrace() in show_regs
  2017-05-08 13:56 ` [PATCH 2/2] arm64: Add dump_backtrace() in show_regs Kefeng Wang
@ 2017-05-08 15:04   ` Mark Rutland
  2017-05-09  1:23     ` Kefeng Wang
  0 siblings, 1 reply; 9+ messages in thread
From: Mark Rutland @ 2017-05-08 15:04 UTC (permalink / raw)
  To: linux-arm-kernel

On Mon, May 08, 2017 at 09:56:55PM +0800, Kefeng Wang wrote:
> When the system trigger a softlockup(eg, infinite loop when
> PREEMPT_NONE), it only shows regs without stack trace, which
> makes it difficult to adress the issue.

How about:

  Generic code expects show_regs() to dump the stack, but arm64's
  show_regs() does not. This makes it hard to debug softlockups and
  other issues that reesult in show_regs() being called.

  This patch updates arm64's show_regs() to dump the stack, as common
  code expects.

> Signed-off-by: Kefeng Wang <wangkefeng.wang@huawei.com>
> ---
>  arch/arm64/include/asm/stacktrace.h | 1 +
>  arch/arm64/kernel/process.c         | 1 +
>  arch/arm64/kernel/traps.c           | 2 +-
>  3 files changed, 3 insertions(+), 1 deletion(-)
> 
> diff --git a/arch/arm64/include/asm/stacktrace.h b/arch/arm64/include/asm/stacktrace.h
> index 801a16db..5b6eafc 100644
> --- a/arch/arm64/include/asm/stacktrace.h
> +++ b/arch/arm64/include/asm/stacktrace.h
> @@ -30,5 +30,6 @@ struct stackframe {
>  extern int unwind_frame(struct task_struct *tsk, struct stackframe *frame);
>  extern void walk_stackframe(struct task_struct *tsk, struct stackframe *frame,
>  			    int (*fn)(struct stackframe *, void *), void *data);
> +extern void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk);
>  
>  #endif	/* __ASM_STACKTRACE_H */
> diff --git a/arch/arm64/kernel/process.c b/arch/arm64/kernel/process.c
> index ae2a835..af1ea25 100644
> --- a/arch/arm64/kernel/process.c
> +++ b/arch/arm64/kernel/process.c
> @@ -210,6 +210,7 @@ void __show_regs(struct pt_regs *regs)
>  void show_regs(struct pt_regs * regs)
>  {
>  	__show_regs(regs);
> +	dump_backtrace(regs, NULL);
>  }

I believe that as we pass the regs down, this should trigger the frame
skipping that we want, as I mentioned in reply to v1 [1].

So FWIW, with the commit message fixup:

Acked-by: Mark Rutland <mark.rutland@arm.com>

Thanks,
Mark.

[1] http://lists.infradead.org/pipermail/linux-arm-kernel/2017-March/496377.html

>  static void tls_thread_flush(void)
> diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c
> index d4d6ae0..368c3c8 100644
> --- a/arch/arm64/kernel/traps.c
> +++ b/arch/arm64/kernel/traps.c
> @@ -140,7 +140,7 @@ static void dump_instr(const char *lvl, struct pt_regs *regs)
>  	}
>  }
>  
> -static void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk)
> +void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk)
>  {
>  	struct stackframe frame;
>  	unsigned long irq_stack_ptr;
> -- 
> 1.7.12.4
> 

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [PATCH 2/2] arm64: Add dump_backtrace() in show_regs
  2017-05-08 15:04   ` Mark Rutland
@ 2017-05-09  1:23     ` Kefeng Wang
  0 siblings, 0 replies; 9+ messages in thread
From: Kefeng Wang @ 2017-05-09  1:23 UTC (permalink / raw)
  To: linux-arm-kernel



On 2017/5/8 23:04, Mark Rutland wrote:
> On Mon, May 08, 2017 at 09:56:55PM +0800, Kefeng Wang wrote:
>> When the system trigger a softlockup(eg, infinite loop when
>> PREEMPT_NONE), it only shows regs without stack trace, which
>> makes it difficult to adress the issue.
> 
> How about:
> 
>   Generic code expects show_regs() to dump the stack, but arm64's
>   show_regs() does not. This makes it hard to debug softlockups and
>   other issues that reesult in show_regs() being called.
> 
>   This patch updates arm64's show_regs() to dump the stack, as common
>   code expects.
> 

Will update, thanks.

>> Signed-off-by: Kefeng Wang <wangkefeng.wang@huawei.com>
>> ---
>>  arch/arm64/include/asm/stacktrace.h | 1 +
>>  arch/arm64/kernel/process.c         | 1 +
>>  arch/arm64/kernel/traps.c           | 2 +-
>>  3 files changed, 3 insertions(+), 1 deletion(-)
>>
>> diff --git a/arch/arm64/include/asm/stacktrace.h b/arch/arm64/include/asm/stacktrace.h
>> index 801a16db..5b6eafc 100644
>> --- a/arch/arm64/include/asm/stacktrace.h
>> +++ b/arch/arm64/include/asm/stacktrace.h
>> @@ -30,5 +30,6 @@ struct stackframe {
>>  extern int unwind_frame(struct task_struct *tsk, struct stackframe *frame);
>>  extern void walk_stackframe(struct task_struct *tsk, struct stackframe *frame,
>>  			    int (*fn)(struct stackframe *, void *), void *data);
>> +extern void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk);
>>  
>>  #endif	/* __ASM_STACKTRACE_H */
>> diff --git a/arch/arm64/kernel/process.c b/arch/arm64/kernel/process.c
>> index ae2a835..af1ea25 100644
>> --- a/arch/arm64/kernel/process.c
>> +++ b/arch/arm64/kernel/process.c
>> @@ -210,6 +210,7 @@ void __show_regs(struct pt_regs *regs)
>>  void show_regs(struct pt_regs * regs)
>>  {
>>  	__show_regs(regs);
>> +	dump_backtrace(regs, NULL);
>>  }
> 
> I believe that as we pass the regs down, this should trigger the frame
> skipping that we want, as I mentioned in reply to v1 [1].
> 
> So FWIW, with the commit message fixup:
> 
> Acked-by: Mark Rutland <mark.rutland@arm.com>

Thanks for your careful guidance, will update both.

Kefeng

> 
> Thanks,
> Mark.
> 
> [1] http://lists.infradead.org/pipermail/linux-arm-kernel/2017-March/496377.html
> 
>>  static void tls_thread_flush(void)
>> diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c
>> index d4d6ae0..368c3c8 100644
>> --- a/arch/arm64/kernel/traps.c
>> +++ b/arch/arm64/kernel/traps.c
>> @@ -140,7 +140,7 @@ static void dump_instr(const char *lvl, struct pt_regs *regs)
>>  	}
>>  }
>>  
>> -static void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk)
>> +void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk)
>>  {
>>  	struct stackframe frame;
>>  	unsigned long irq_stack_ptr;
>> -- 
>> 1.7.12.4
>>
> 
> .
> 

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [PATCH v2 1/2] arm64: Call __show_regs directly
  2017-05-08 14:55 ` [PATCH 1/2] arm64: Call __show_regs directly Mark Rutland
@ 2017-05-09  1:53   ` Kefeng Wang
  2017-05-09  1:53     ` [PATCH v2 2/2] arm64: Add dump_backtrace() in show_regs Kefeng Wang
  0 siblings, 1 reply; 9+ messages in thread
From: Kefeng Wang @ 2017-05-09  1:53 UTC (permalink / raw)
  To: linux-arm-kernel

Generic code expects show_regs() to also dump the stack, but arm64's
show_reg() does not do this. Some arm64 callers of show_regs() *only*
want the registers dumped, without the stack.

To enable generic code to work as expected, we need to make
show_regs() dump the stack. Where we only want the registers dumped,
we must use __show_regs().

This patch updates code to use __show_regs() where only registers are
desired. A subsequent patch will modify show_regs().

Acked-by: Mark Rutland <mark.rutland@arm.com>
Signed-off-by: Kefeng Wang <wangkefeng.wang@huawei.com>
---

v1->v2:
- Update the changelog according to Mark's kindly review, thanks Mark again.

Please see the background from link [1].

[1] http://lists.infradead.org/pipermail/linux-arm-kernel/2017-March/494840.html

 arch/arm64/kernel/probes/kprobes.c | 4 ++--
 arch/arm64/mm/fault.c              | 2 +-
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/arch/arm64/kernel/probes/kprobes.c b/arch/arm64/kernel/probes/kprobes.c
index c5c4594..d849d98 100644
--- a/arch/arm64/kernel/probes/kprobes.c
+++ b/arch/arm64/kernel/probes/kprobes.c
@@ -522,9 +522,9 @@ int __kprobes longjmp_break_handler(struct kprobe *p, struct pt_regs *regs)
 		pr_err("current sp %lx does not match saved sp %lx\n",
 		       orig_sp, stack_addr);
 		pr_err("Saved registers for jprobe %p\n", jp);
-		show_regs(saved_regs);
+		__show_regs(saved_regs);
 		pr_err("Current registers\n");
-		show_regs(regs);
+		__show_regs(regs);
 		BUG();
 	}
 	unpause_graph_tracing();
diff --git a/arch/arm64/mm/fault.c b/arch/arm64/mm/fault.c
index 37b95df..c3f2b10 100644
--- a/arch/arm64/mm/fault.c
+++ b/arch/arm64/mm/fault.c
@@ -250,7 +250,7 @@ static void __do_user_fault(struct task_struct *tsk, unsigned long addr,
 			tsk->comm, task_pid_nr(tsk), inf->name, sig,
 			addr, esr);
 		show_pte(tsk->mm, addr);
-		show_regs(regs);
+		__show_regs(regs);
 	}
 
 	tsk->thread.fault_address = addr;
-- 
1.7.12.4

^ permalink raw reply related	[flat|nested] 9+ messages in thread

* [PATCH v2 2/2] arm64: Add dump_backtrace() in show_regs
  2017-05-09  1:53   ` [PATCH v2 " Kefeng Wang
@ 2017-05-09  1:53     ` Kefeng Wang
  2017-05-24 10:09       ` Mark Rutland
  0 siblings, 1 reply; 9+ messages in thread
From: Kefeng Wang @ 2017-05-09  1:53 UTC (permalink / raw)
  To: linux-arm-kernel

Generic code expects show_regs() to dump the stack, but arm64's
show_regs() does not. This makes it hard to debug softlockups and
other issues that result in show_regs() being called.

This patch updates arm64's show_regs() to dump the stack, as common
code expects.

Acked-by: Mark Rutland <mark.rutland@arm.com>
Signed-off-by: Kefeng Wang <wangkefeng.wang@huawei.com>
---
 arch/arm64/include/asm/stacktrace.h | 1 +
 arch/arm64/kernel/process.c         | 1 +
 arch/arm64/kernel/traps.c           | 2 +-
 3 files changed, 3 insertions(+), 1 deletion(-)

diff --git a/arch/arm64/include/asm/stacktrace.h b/arch/arm64/include/asm/stacktrace.h
index 801a16db..5b6eafc 100644
--- a/arch/arm64/include/asm/stacktrace.h
+++ b/arch/arm64/include/asm/stacktrace.h
@@ -30,5 +30,6 @@ struct stackframe {
 extern int unwind_frame(struct task_struct *tsk, struct stackframe *frame);
 extern void walk_stackframe(struct task_struct *tsk, struct stackframe *frame,
 			    int (*fn)(struct stackframe *, void *), void *data);
+extern void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk);
 
 #endif	/* __ASM_STACKTRACE_H */
diff --git a/arch/arm64/kernel/process.c b/arch/arm64/kernel/process.c
index ae2a835..af1ea25 100644
--- a/arch/arm64/kernel/process.c
+++ b/arch/arm64/kernel/process.c
@@ -210,6 +210,7 @@ void __show_regs(struct pt_regs *regs)
 void show_regs(struct pt_regs * regs)
 {
 	__show_regs(regs);
+	dump_backtrace(regs, NULL);
 }
 
 static void tls_thread_flush(void)
diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c
index d4d6ae0..368c3c8 100644
--- a/arch/arm64/kernel/traps.c
+++ b/arch/arm64/kernel/traps.c
@@ -140,7 +140,7 @@ static void dump_instr(const char *lvl, struct pt_regs *regs)
 	}
 }
 
-static void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk)
+void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk)
 {
 	struct stackframe frame;
 	unsigned long irq_stack_ptr;
-- 
1.7.12.4

^ permalink raw reply related	[flat|nested] 9+ messages in thread

* [PATCH v2 2/2] arm64: Add dump_backtrace() in show_regs
  2017-05-09  1:53     ` [PATCH v2 2/2] arm64: Add dump_backtrace() in show_regs Kefeng Wang
@ 2017-05-24 10:09       ` Mark Rutland
  2017-05-25 10:58         ` Will Deacon
  0 siblings, 1 reply; 9+ messages in thread
From: Mark Rutland @ 2017-05-24 10:09 UTC (permalink / raw)
  To: linux-arm-kernel

Hi,

On Tue, May 09, 2017 at 09:53:37AM +0800, Kefeng Wang wrote:
> Generic code expects show_regs() to dump the stack, but arm64's
> show_regs() does not. This makes it hard to debug softlockups and
> other issues that result in show_regs() being called.
> 
> This patch updates arm64's show_regs() to dump the stack, as common
> code expects.
> 
> Acked-by: Mark Rutland <mark.rutland@arm.com>
> Signed-off-by: Kefeng Wang <wangkefeng.wang@huawei.com>
> ---
>  arch/arm64/include/asm/stacktrace.h | 1 +
>  arch/arm64/kernel/process.c         | 1 +
>  arch/arm64/kernel/traps.c           | 2 +-
>  3 files changed, 3 insertions(+), 1 deletion(-)
> 
> diff --git a/arch/arm64/include/asm/stacktrace.h b/arch/arm64/include/asm/stacktrace.h
> index 801a16db..5b6eafc 100644
> --- a/arch/arm64/include/asm/stacktrace.h
> +++ b/arch/arm64/include/asm/stacktrace.h
> @@ -30,5 +30,6 @@ struct stackframe {
>  extern int unwind_frame(struct task_struct *tsk, struct stackframe *frame);
>  extern void walk_stackframe(struct task_struct *tsk, struct stackframe *frame,
>  			    int (*fn)(struct stackframe *, void *), void *data);
> +extern void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk);
>  
>  #endif	/* __ASM_STACKTRACE_H */
> diff --git a/arch/arm64/kernel/process.c b/arch/arm64/kernel/process.c
> index ae2a835..af1ea25 100644
> --- a/arch/arm64/kernel/process.c
> +++ b/arch/arm64/kernel/process.c
> @@ -210,6 +210,7 @@ void __show_regs(struct pt_regs *regs)
>  void show_regs(struct pt_regs * regs)
>  {
>  	__show_regs(regs);
> +	dump_backtrace(regs, NULL);
>  }
>  
>  static void tls_thread_flush(void)
> diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c
> index d4d6ae0..368c3c8 100644
> --- a/arch/arm64/kernel/traps.c
> +++ b/arch/arm64/kernel/traps.c
> @@ -140,7 +140,7 @@ static void dump_instr(const char *lvl, struct pt_regs *regs)
>  	}
>  }
>  
> -static void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk)
> +void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk)
>  {
>  	struct stackframe frame;
>  	unsigned long irq_stack_ptr;

I just realised that we'll need one additional fixup:

diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c
index 0805b44..f452fcc 100644
--- a/arch/arm64/kernel/traps.c
+++ b/arch/arm64/kernel/traps.c
@@ -728,8 +728,6 @@ static int bug_handler(struct pt_regs *regs, unsigned int esr)
                break;
 
        case BUG_TRAP_TYPE_WARN:
-               /* Ideally, report_bug() should backtrace for us... but no. */
-               dump_backtrace(regs, NULL);
                break;
 
        default:

... since report_bug() will call show_regs(), and dump the stack itself
now.

With that change, these patches will also fix *_ONCE() traps spewing
backtraces every time they're invoked, which was a side-effect of
commit:

  19d436268dde9538 ("debug: Add _ONCE() logic to report_bug()")

Would you mind folding that into a v3?

Thanks,
Mark.

^ permalink raw reply related	[flat|nested] 9+ messages in thread

* [PATCH v2 2/2] arm64: Add dump_backtrace() in show_regs
  2017-05-24 10:09       ` Mark Rutland
@ 2017-05-25 10:58         ` Will Deacon
  0 siblings, 0 replies; 9+ messages in thread
From: Will Deacon @ 2017-05-25 10:58 UTC (permalink / raw)
  To: linux-arm-kernel

On Wed, May 24, 2017 at 11:09:49AM +0100, Mark Rutland wrote:
> On Tue, May 09, 2017 at 09:53:37AM +0800, Kefeng Wang wrote:
> > Generic code expects show_regs() to dump the stack, but arm64's
> > show_regs() does not. This makes it hard to debug softlockups and
> > other issues that result in show_regs() being called.
> > 
> > This patch updates arm64's show_regs() to dump the stack, as common
> > code expects.
> > 
> > Acked-by: Mark Rutland <mark.rutland@arm.com>
> > Signed-off-by: Kefeng Wang <wangkefeng.wang@huawei.com>

[...]

> diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c
> index 0805b44..f452fcc 100644
> --- a/arch/arm64/kernel/traps.c
> +++ b/arch/arm64/kernel/traps.c
> @@ -728,8 +728,6 @@ static int bug_handler(struct pt_regs *regs, unsigned int esr)
>                 break;
>  
>         case BUG_TRAP_TYPE_WARN:
> -               /* Ideally, report_bug() should backtrace for us... but no. */
> -               dump_backtrace(regs, NULL);
>                 break;
>  
>         default:
> 
> ... since report_bug() will call show_regs(), and dump the stack itself
> now.
> 
> With that change, these patches will also fix *_ONCE() traps spewing
> backtraces every time they're invoked, which was a side-effect of
> commit:
> 
>   19d436268dde9538 ("debug: Add _ONCE() logic to report_bug()")
> 
> Would you mind folding that into a v3?

I've queued this locally, so I can just fold that in too. No need to repost.

I'll push what I have at -rc3.

Cheers,

Will

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2017-05-25 10:58 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-05-08 13:56 [PATCH 1/2] arm64: Call __show_regs directly Kefeng Wang
2017-05-08 13:56 ` [PATCH 2/2] arm64: Add dump_backtrace() in show_regs Kefeng Wang
2017-05-08 15:04   ` Mark Rutland
2017-05-09  1:23     ` Kefeng Wang
2017-05-08 14:55 ` [PATCH 1/2] arm64: Call __show_regs directly Mark Rutland
2017-05-09  1:53   ` [PATCH v2 " Kefeng Wang
2017-05-09  1:53     ` [PATCH v2 2/2] arm64: Add dump_backtrace() in show_regs Kefeng Wang
2017-05-24 10:09       ` Mark Rutland
2017-05-25 10:58         ` Will Deacon

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.