Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1148669imm; Wed, 23 May 2018 11:02:39 -0700 (PDT) X-Google-Smtp-Source: AB8JxZp/mSvFzqkNjZfu40DCmMmtpBOXitYtfuwJw7cci1i8QTKNV9Bf6DLL/2BgGFKuJRB0jVM4 X-Received: by 2002:a17:902:7d8a:: with SMTP id a10-v6mr3991366plm.317.1527098559588; Wed, 23 May 2018 11:02:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527098559; cv=none; d=google.com; s=arc-20160816; b=bi42+2V2oiBzV82HU+rG8Qejr3o3xhPixXRvgNbd1xgoHGfF0hBPuhjUvL8/n/0/lJ YjJvaJjH58OoIdQ0ApryExirUnMhmDG8yMgfiPcuCB/Kfnur5RZO8yibD8899iyAum20 QnFva3X4fUX3H780PQ55P6qouxVUD7d9zhZDqpZIVtYXD8fsL2H6wsLZPK0y6dxA82qc WHPf0Fu3Ipc+AxuZPlBj8adrAtvx/9Ys7GFEv5IhXCkucGr4syJQBRLu+dCcuiPJl7V3 2vLEj+hTaNW4G+iOYAThLcVREHuxV4Fw/VoWAdHKa/n0ULaZygD3Vy8QNWtpjnyyEzNH xQmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:to:from :arc-authentication-results; bh=WeoNHVl4hRmzZpZFB/ZKNg4jvoMFy2ZDkKj2qmkpxvM=; b=mB0sxen41iWUOSwWUrUZ+bWysDWu7csTB0j4wKcEMhDh0NIb+QRTcgPAEhMrGL4uUd 4HEDYbYdUyjP98wAOWMwzrgLOBigH/6Ct+kvpVYLp38iP/qbn43rvpLcaFwgPb1Y3iFF KVZQ2wGONkqr4fAepuKcOJmunERfrgKBmU/MqGCGef1veoFEpqCWsXUfQy1EmZ91bT+F j4t8ZBLefcJCA6HygS+mmbKF+IuDIoteB/Fg5zaPKlpombtwVaIec4ybYwYBmfHVPTwY lIF9UX9ImErDv8ZDijQo/43+b7k0TovDYJfzjixIRYEk6UN/Y5D1yT+0xXgDefDvHXdH j11A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c14-v6si1578379plo.359.2018.05.23.11.02.24; Wed, 23 May 2018 11:02:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933952AbeEWSBH (ORCPT + 99 others); Wed, 23 May 2018 14:01:07 -0400 Received: from mx2.suse.de ([195.135.220.15]:50942 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933460AbeEWSA6 (ORCPT ); Wed, 23 May 2018 14:00:58 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id DD5E9AF3E; Wed, 23 May 2018 18:00:56 +0000 (UTC) From: Michal Suchanek To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Balbir Singh , Nicholas Piggin , Breno Leitao , Vaibhav Jain , "Guilherme G. Piccoli" , Michal Suchanek , linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org Subject: [PATCH v2] powerpc/xmon: Also setup debugger hooks when single-stepping Date: Wed, 23 May 2018 20:00:54 +0200 Message-Id: <20180523180054.9937-1-msuchanek@suse.de> X-Mailer: git-send-email 2.13.6 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When single-stepping kernel code from xmon without a debug hook enabled the kernel crashes. This can happen when kernel starts with xmon on crash disabled but xmon is entered using sysrq. Call force_enable_xmon when single-stepping in xmon to install the xmon debug hooks. Fixes: e1368d0c9edb ("powerpc/xmon: Setup debugger hooks when first break-point is set") Signed-off-by: Michal Suchanek --- arch/powerpc/xmon/xmon.c | 21 +++++++++++---------- 1 file changed, 11 insertions(+), 10 deletions(-) v2: calling force_enable_xmon in do_step is sufficient diff --git a/arch/powerpc/xmon/xmon.c b/arch/powerpc/xmon/xmon.c index a0842f1ff72c..252df9741d20 100644 --- a/arch/powerpc/xmon/xmon.c +++ b/arch/powerpc/xmon/xmon.c @@ -778,6 +778,16 @@ static int xmon_fault_handler(struct pt_regs *regs) return 0; } +/* Force enable xmon if not already enabled */ +static inline void force_enable_xmon(void) +{ + /* Enable xmon hooks if needed */ + if (!xmon_on) { + printf("xmon: Enabling debugger hooks\n"); + xmon_on = 1; + } +} + static struct bpt *at_breakpoint(unsigned long pc) { int i; @@ -1094,6 +1104,7 @@ static int do_step(struct pt_regs *regs) unsigned int instr; int stepped; + force_enable_xmon(); /* check we are in 64-bit kernel mode, translation enabled */ if ((regs->msr & (MSR_64BIT|MSR_PR|MSR_IR)) == (MSR_64BIT|MSR_IR)) { if (mread(regs->nip, &instr, 4) == 4) { @@ -1268,16 +1279,6 @@ static long check_bp_loc(unsigned long addr) return 1; } -/* Force enable xmon if not already enabled */ -static inline void force_enable_xmon(void) -{ - /* Enable xmon hooks if needed */ - if (!xmon_on) { - printf("xmon: Enabling debugger hooks\n"); - xmon_on = 1; - } -} - static char *breakpoint_help_string = "Breakpoint command usage:\n" "b show breakpoints\n" -- 2.13.6