Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161491AbbKFNjt (ORCPT ); Fri, 6 Nov 2015 08:39:49 -0500 Received: from smtprelay0122.hostedemail.com ([216.40.44.122]:48262 "EHLO smtprelay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1033211AbbKFNjs (ORCPT ); Fri, 6 Nov 2015 08:39:48 -0500 X-Session-Marker: 726F737465647440676F6F646D69732E6F7267 X-Spam-Summary: 2,0,0,,d41d8cd98f00b204,rostedt@goodmis.org,:::::::::::::::,RULES_HIT:41:355:379:541:599:800:960:973:988:989:1260:1277:1311:1313:1314:1345:1359:1437:1515:1516:1518:1534:1540:1593:1594:1711:1730:1747:1777:1792:2198:2199:2393:2553:2559:2562:2693:2731:2895:3138:3139:3140:3141:3142:3352:3622:3743:3865:3866:3867:3870:3871:3872:3873:3874:5007:6261:7875:8660:10004:10400:10848:10967:11026:11232:11658:11914:12050:12438:12517:12519:12740:13069:13148:13180:13229:13230:13311:13357:14096:14097:14659:21060:21080:30012:30054:30070:30090:30091,0,RBL:none,CacheIP:none,Bayesian:0.5,0.5,0.5,Netcheck:none,DomainCache:0,MSF:not bulk,SPF:fn,MSBL:0,DNSBL:none,Custom_rules:0:0:0,LFtime:3,LUA_SUMMARY:none X-HE-Tag: cat69_1b2879de9611d X-Filterd-Recvd-Size: 2011 Date: Fri, 6 Nov 2015 08:39:45 -0500 From: Steven Rostedt To: AKASHI Takahiro Cc: catalin.marinas@arm.com, will.deacon@arm.com, jungseoklee85@gmail.com, broonie@kernel.org, david.griego@linaro.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v5 3/6] ftrace: allow arch-specific stack tracer Message-ID: <20151106083945.6442b59b@gandalf.local.home> In-Reply-To: <1446792285-1154-4-git-send-email-takahiro.akashi@linaro.org> References: <1446792285-1154-1-git-send-email-takahiro.akashi@linaro.org> <1446792285-1154-4-git-send-email-takahiro.akashi@linaro.org> X-Mailer: Claws Mail 3.12.0 (GTK+ 2.24.28; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1181 Lines: 27 On Fri, 6 Nov 2015 15:44:42 +0900 AKASHI Takahiro wrote: > A stack frame may be used in a different way depending on cpu architecture. > Thus it is not always appropriate to slurp the stack contents, as current > check_stack() does, in order to calcurate a stack index (height) at a given > function call. At least not on arm64. > In addition, there is a possibility that we will mistakenly detect a stale > stack frame which has not been overwritten. > > This patch makes check_stack() a weak function so as to later implement > arch-specific version. > > Signed-off-by: AKASHI Takahiro Note, I already accepted this patch. I'll be pushing it to Linus today. I also added a patch on top of it to rename max_stack_lock to stack_trace_max_lock to stay consistent with the other global variables used in this file. You may need to update your code to handle that. -- Steve -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/