Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp623666yba; Fri, 12 Apr 2019 10:13:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqzQX7n7/JykzNpq0ynBznL59zZFBYF0HrB5cAQgRMd2BxwolTRnNRsM7MZJqpJ5r8+FvNSz X-Received: by 2002:aa7:884b:: with SMTP id k11mr57983597pfo.49.1555089189387; Fri, 12 Apr 2019 10:13:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555089189; cv=none; d=google.com; s=arc-20160816; b=kTmeHk90u2qh8xBwJBU/hfiC0h7RSItLqb+v8by5eFiYQhJmPJUB6DvvHAVwRdPbqb QY9Jlf90gJulJbjgHw1ux2i/5Sj5HbFviydtbTk5j0BdTq0JlTQgP71hvBj90HiIa7+u IJjKou9aCUlKlRLFDBIUOFTezdoiUjvuuq+iziOmmJdrXdA7FW0DLAXR9zKT//ILNiZt pRBssiH2y8FV7972YigUPnZvxgxkGZ0MqcQ4uWpo2JJvd4BImasDBdCtt4/laNaYgyk0 vucwJzCa8aJu3XABAfPw5pK9x7y7RvRdti0RuNIRvaxdo4785GsaGymhf7Ltk2Wc+UKy q7hg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=p7+aWOLyWvqIjYy0yDQjDaq3bea1Wl24vhmSK2XE3OI=; b=VFo3pX23AQCrmRSmJOLCqQcwRbhofnevZYAyZe3vvVHS2ggS+FlpuEknt4oIxVWeQz hKBgqYfUA23zyI6dPZz85GeeTQclfyhzj0eScvINnq5ste9yV+IKe4aukon+jkEyxqTs wifpAqSfIg7/Ih6cF11hFQeJKzKPc4TKFP3YKnD3cq6PKga/vYKKjPCbzAhc2/ve//ed fzL+s+Ad32COCauiwT3sHyCjJAovZLONsB1Lg6328iBjixYOTNMXs4j28gxF2ynFVSKX 18XfClZgk/sMCDaKfWa/GnDWlagQXqtTJEzqKjJxFdgLDI4cM9jQYy89oB15fDud3gjB FEJw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w20si22139227pfi.96.2019.04.12.10.12.51; Fri, 12 Apr 2019 10:13:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727022AbfDLRKp (ORCPT + 99 others); Fri, 12 Apr 2019 13:10:45 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:46924 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726954AbfDLRKo (ORCPT ); Fri, 12 Apr 2019 13:10:44 -0400 Received: from localhost (unknown [IPv6:2601:601:9f80:35cd::d71]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id BDA6E133EB06B; Fri, 12 Apr 2019 10:10:43 -0700 (PDT) Date: Fri, 12 Apr 2019 10:10:41 -0700 (PDT) Message-Id: <20190412.101041.259784853562829642.davem@davemloft.net> To: dongli.zhang@oracle.com Cc: xen-devel@lists.xenproject.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, wei.liu2@citrix.com, paul.durrant@citrix.com, joe.jin@oracle.com, junxiao.bi@oracle.com, jie.l.li@oracle.com Subject: Re: [PATCH 1/1] xen-netback: add reference from xenvif to backend_info to facilitate coredump analysis From: David Miller In-Reply-To: <1555052004-31855-1-git-send-email-dongli.zhang@oracle.com> References: <1555052004-31855-1-git-send-email-dongli.zhang@oracle.com> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Fri, 12 Apr 2019 10:10:44 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dongli Zhang Date: Fri, 12 Apr 2019 14:53:24 +0800 > During coredump analysis, it is not easy to obtain the address of > backend_info in xen-netback. > > So far there are two ways to obtain backend_info: > > 1. Do what xenbus_device_find() does for vmcore to find the xenbus_device > and then derive it from dev_get_drvdata(). > > 2. Extract backend_info from callstack of xenwatch (e.g., netback_remove() > or frontend_changed()). > > This patch adds a reference from xenvif to backend_info so that it would be > much more easier to obtain backend_info during coredump analysis. > > Signed-off-by: Dongli Zhang Applied to net-next.