Received: by 10.223.185.116 with SMTP id b49csp4169160wrg; Tue, 13 Feb 2018 14:03:48 -0800 (PST) X-Google-Smtp-Source: AH8x227agVIKHX6CBbJMDrtHZ8wMVLWorpo+/AgDrlaPEMmOW0Qir1tEDnuokpOcY6xH5RjUI2xb X-Received: by 10.99.65.133 with SMTP id o127mr2086590pga.13.1518559428206; Tue, 13 Feb 2018 14:03:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518559428; cv=none; d=google.com; s=arc-20160816; b=a13CLA1sHkKiEE/dHpZhUehPddfCzWESoYZw3xuh7ElRIrEbvjprIUVxSderl7uZa9 DfEIBIDPozlHTHTPUj70rtNBIlPdu9lTM5J0aZylzV3f9G5YNkYp3y/kkhCMLYeRsi0/ sArk+tBn3yggWfF5pLBxTnxnfRVeXZv76Z31YhdY0ex3SLQNufDJHw5jLk0Xj/mbI7x6 9CXviAuyIBaZ68QFSEuAYi/9kAJCwuOjs1Qt7JWQlWCI0YmTjiAku9wn3tBSxdEgOGGL yNP66chgz7KQlywRuLTEmak8eHYfJg8ZvNHkL+KLV77+kEK17ZSMJHtiOsVdJxN23U8m YxYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=ydD3mc/hTUAfoSLyFIhU6CwwjiwjvdVC0JmKOk8ialg=; b=FGVu+oo0OJt6oPGaurKtxkRIWfSOJagD54CAp1TGhTKdZej17qFCjQ6zgj/2iz6X49 39JDWC2OTYkSjmhPmbcT2rekyBLX+9ZWakEUfR1Y6W5lubI6wW77ad6qQitr9HQthhkk tMgQCykWWV3mYn5c8AZURuGFMq6LOTwD1sP4qGXS/SEbyUgprgUTJ+kvSheWprUsb3Pk l3UmHdTleiPQexA/YQ4eRWcy5/Sov6iZE19fiqS34qNvb4n2PRsSTOSZsy8lq2uMjUtq c99miEzAgp0N1TeksmNYHyBlSYlY8MQqXl1OYpUMk2YgYXySDH/6uQjUIMA8mBMntgb3 3hQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=vUDcBgY/; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l184si5739354pge.224.2018.02.13.14.03.33; Tue, 13 Feb 2018 14:03:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=vUDcBgY/; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965978AbeBMWBF (ORCPT + 99 others); Tue, 13 Feb 2018 17:01:05 -0500 Received: from mail-ua0-f171.google.com ([209.85.217.171]:43538 "EHLO mail-ua0-f171.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965907AbeBMWBE (ORCPT ); Tue, 13 Feb 2018 17:01:04 -0500 Received: by mail-ua0-f171.google.com with SMTP id i5so12483185uai.10 for ; Tue, 13 Feb 2018 14:01:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ydD3mc/hTUAfoSLyFIhU6CwwjiwjvdVC0JmKOk8ialg=; b=vUDcBgY/zqTjN9+vJzn2sdtg6ojFgkWgnAWfLX8XSfV9ywX7NE6yrMxSbbutUYNVe7 k8pieR2NgMmtL+3a9AgyJe1CqGCLZw6T0gKjxUDoNkE/XYNpjK+crXgMXVF5P6BCHeFK IhNpWbJxVZyUMzHGOa4Nb26R5FnvCvz5pZrXXA7ghrpoSMi/9eXrzFfIYgarugCkx1uT LzyDBkwbvQH9LWjdaBTalxP6AEw6Mc2Aqb5gC2Vqth//J2FBotsbxgi4Yg9ibJRiZgdj 2J3ev2HNcxOqJ/QgVxaJAHGIyqq9Ou1OJjBVjYAqnri5A1jGA2gk+YHdqyZ5tFfJdPhM AUWA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ydD3mc/hTUAfoSLyFIhU6CwwjiwjvdVC0JmKOk8ialg=; b=pVlNzWAyV2NYJAxqCYxy21qIMVn67WoDdRniNi0PxQqfF1XLEtNyXhKnkWu6wOV8cj 3NKlHBYzOMKW+QgToPKjHjNBMr46r6rX9a20OqpWv3fMZUMuUdFdvKZG2NB2Dx/5BU2q TlGr4xZlXH7fRFMgpJ0j1GQl+w4F7uKKvzNnaBVrsmVriSrgF7kHVp5HSllvO8Jpdehg cgiEYcTySnyFCEgrgipb2wWzpWQ5QeTEGwy+EQsMjKx2tn7N/3nz0w9pf3355GDVuC3Z FjZMwNh9qJWIAb5ZSY694x87hGMdl+l9OYgvguEoh4q6g4Oy2uXyY1IAF95Cqk3IMmJL ZJyw== X-Gm-Message-State: APf1xPDLYwyyP/NtByqOZY/kl63wSw1ZeEV7C/wm5jpDb1/8oIydveZB xp3vr3hyWdU0HSWoDu0l2sA+J9VrOQBgdII7GdQ= X-Received: by 10.159.41.33 with SMTP id t30mr2673375uat.16.1518559263328; Tue, 13 Feb 2018 14:01:03 -0800 (PST) MIME-Version: 1.0 Received: by 10.176.9.18 with HTTP; Tue, 13 Feb 2018 14:01:02 -0800 (PST) In-Reply-To: <8737264c91.fsf@vajain21.in.ibm.com> References: <20180212085956.12016-1-vaibhav@linux.vnet.ibm.com> <8737264c91.fsf@vajain21.in.ibm.com> From: Balbir Singh Date: Wed, 14 Feb 2018 09:01:02 +1100 Message-ID: Subject: Re: [PATCH] powerpc/xmon: Dont register sysrq key when kernel param xmon=off To: Vaibhav Jain Cc: "open list:LINUX FOR POWERPC (32-BIT AND 64-BIT)" , "linux-kernel@vger.kernel.org" , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Nicholas Piggin , Douglas Miller , Pan Xinhui Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Feb 12, 2018 at 11:35 PM, Vaibhav Jain wrote: > Thanks for reviewing this patch Balbir > > Balbir Singh writes: > >> Any specific issue you've run into without this patch? > Without this patch since xmon is still accessible via sysrq and there is > no indication/warning on the xmon console mentioning that its is not > fully functional. Specifically xmon-console would still allow user to > set instruction/data breakpoint eventhough they wont work and will > result in a kernel-oops. > > Below is command log illustrating this problem on one of my test system > where I tried setting an instruction breakpoint on cmdline_proc_show() > with xmon=off: > > ~# cat /proc/cmdline > root=UUID=248ad10e-a272-4187-8672-5b25f701e8b9 ro xmon=off > > ~# echo 'x' > /proc/sysrq-trigger > [ 458.904802] sysrq: SysRq : Entering xmon > > [ snip ] > > 78:mon> ls cmdline_proc_show > cmdline_proc_show: c0000000004196e0 > 78:mon> bi c0000000004196e0 > 78:mon> x > > ~# cat /proc/cmdline > [ 505.618702] Oops: Exception in kernel mode, sig: 5 [#1] > [ snip ] > [ 505.620082] NIP [c0000000004196e4] cmdline_proc_show+0x4/0x60 > [ 505.620136] LR [c0000000003b1db0] seq_read+0x130/0x5e0 > [ 505.620177] Call Trace: > [ 505.620202] [c000200e5078fc00] [c0000000003b1d74] seq_read+0xf4/0x5e0 (unreliable) > [ 505.620267] [c000200e5078fca0] [c00000000040cae0] proc_reg_read+0xb0/0x110 > [ 505.620322] [c000200e5078fcf0] [c00000000037687c] __vfs_read+0x6c/0x1b0 > [ 505.620376] [c000200e5078fd90] [c000000000376a7c] vfs_read+0xbc/0x1b0 > [ 505.620430] [c000200e5078fde0] [c00000000037724c] SyS_read+0x6c/0x110 > [ 505.620485] [c000200e5078fe30] [c00000000000b320] system_call+0x58/0x6c > [ 505.620536] Instruction dump: > [ 505.620570] 3c82ff2a 7fe3fb78 38a00000 3884dee0 4bf98c05 60000000 38210030 e8010010 > [ 505.620656] ebe1fff8 7c0803a6 4e800020 3c4c00d6 <38422120> 7c0802a6 f8010010 f821ff91 > [ 505.620728] ---[ end trace eaf583921860b3de ]--- > [ 506.629019] > Trace/breakpoint trap > ~# > > >> I presume running xmon=off indicates we don't want xmon to take over in case of >> panic/die/oops, > I believe that when xmon console is available it should be fully > functional rather than partially, otherwise it gets really confusing to > the user as to why Instruction/Data break points arent working. > OK, so kernel breakpoints are broken with xmon=off and lead to oops as opposed to passing them on to a kprobe handler perhaps? Balbir Singh.