Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp302817imm; Mon, 21 May 2018 06:22:53 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpIptd6zbhnLh0RogwUVGVtHMRwAwRSYROke7qP9UCNe5cYCjJ5+5xeKwPeK+K45JWKQi52 X-Received: by 2002:a17:902:7b83:: with SMTP id w3-v6mr20834177pll.12.1526908973572; Mon, 21 May 2018 06:22:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526908973; cv=none; d=google.com; s=arc-20160816; b=fA6oyr4AaIj1TerZZ2TeO8X7qhctUTwFIYZfuK7qDsfaO1kTpJipxzCBcKI/0BDvor 0Ahbhd2x7yOUE1kiaUVi2pksm1skZUaHGfDVK7/yDlAX2SSYLQYrVZKShScPWfTdSKo3 Vlk1LVja+uZeyg7b6a/jjFeK3Ivqf1+hQY1OIFEX8sYXLs5sT4qKVnBtzAhY8srcREi9 agAXrw5ubom0RPU1siQ4HdJ5bGU24wB/JwT85SnRQksZlSGkDk1i6romOx/ZmrVL3NCM Qbuxz75fUes8lJ5rJjm4xSqSx+qyhoGD31apdWIeFZHM3VYO7Ov5UZZKPPYreNeYqy5N mUpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=kxsK/9QzNBN9LMi1cAiqOzQQpeGeVZYYE8Yc3xAi4h4=; b=Gw1+bq53ZuDsAPTRx09GJrsU4OhILGfur053ARmEe2w80vmC43EMlz7cdIqcfA8Zim uqFU0dx5eovc0X09blNQs3AnS8TswVqb8cbPonVPK3v5hj4EJtjN5t58a3VvGAqWz6VN 3Sd6N04pIE99WBaY5iCwldblX1OuqknzBnwyJMtjOZqNoYjVoTFltiW6oxfFRa0JokGb 2Sds2On2JQ30/3nhpTqGwIvi7ddll66hvamuN5eQ0ZgPLzYti/iu99TjJzZ8nwIa7SOW lY6bzl8WFJOlpB1br4hCcFrtxRHC+9I3TR9DmxNhWh7SxXXCH/E4QeVb8CfN6AsSZ4BH tt6A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r39-v6si14459899pld.249.2018.05.21.06.22.38; Mon, 21 May 2018 06:22:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752631AbeEUNVU (ORCPT + 99 others); Mon, 21 May 2018 09:21:20 -0400 Received: from mx2.suse.de ([195.135.220.15]:57970 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750970AbeEUNVT (ORCPT ); Mon, 21 May 2018 09:21:19 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 9DFE6AE81; Mon, 21 May 2018 13:21:17 +0000 (UTC) From: Michal Suchanek To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Balbir Singh , Nicholas Piggin , Breno Leitao , "Naveen N. Rao" , Vaibhav Jain , "Guilherme G. Piccoli" , linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org Cc: Michal Suchanek Subject: [PATCH] powerpc/xmon: really enable xmon when a breakpoint is set Date: Mon, 21 May 2018 15:21:08 +0200 Message-Id: <20180521132108.7938-1-msuchanek@suse.de> X-Mailer: git-send-email 2.13.6 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When single-stepping kernel code from xmon without a debug hook enabled the kernel crashes. This can happen when kernel starts with xmon on crash disabled but xmon is entered using sysrq. Commit e1368d0c9edb ("powerpc/xmon: Setup debugger hooks when first break-point is set") adds force_enable_xmon function that prints "xmon: Enabling debugger hooks" but does not enable them. Add the call to xmon_init to install the debugger hooks in force_enable_xmon and also call force_enable_xmon when single-stepping in xmon. Fixes: e1368d0c9edb ("powerpc/xmon: Setup debugger hooks when first break-point is set") Signed-off-by: Michal Suchanek --- arch/powerpc/xmon/xmon.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/arch/powerpc/xmon/xmon.c b/arch/powerpc/xmon/xmon.c index a0842f1ff72c..504bd1c3d8b0 100644 --- a/arch/powerpc/xmon/xmon.c +++ b/arch/powerpc/xmon/xmon.c @@ -179,6 +179,9 @@ static const char *getvecname(unsigned long vec); static int do_spu_cmd(void); +static void xmon_init(int enable); +static inline void force_enable_xmon(void); + #ifdef CONFIG_44x static void dump_tlb_44x(void); #endif @@ -1094,6 +1097,7 @@ static int do_step(struct pt_regs *regs) unsigned int instr; int stepped; + force_enable_xmon(); /* check we are in 64-bit kernel mode, translation enabled */ if ((regs->msr & (MSR_64BIT|MSR_PR|MSR_IR)) == (MSR_64BIT|MSR_IR)) { if (mread(regs->nip, &instr, 4) == 4) { @@ -1275,6 +1279,7 @@ static inline void force_enable_xmon(void) if (!xmon_on) { printf("xmon: Enabling debugger hooks\n"); xmon_on = 1; + xmon_init(1); } } -- 2.13.6