Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4472615ybi; Tue, 11 Jun 2019 07:13:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqyZXdRoanL7SpI/TrcPdSWl/nZav9et8rmtRkRwnXkic/naAIzW7VsZJRNm64DTh8zkDalQ X-Received: by 2002:a63:514:: with SMTP id 20mr20278848pgf.272.1560262426814; Tue, 11 Jun 2019 07:13:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560262426; cv=none; d=google.com; s=arc-20160816; b=PKqJZxwHl03/5QcCzs/FRbl83ymf6zezBSf92Vqv8Y7DBg/W2wLehk7KLXJMwTM8J2 nXaAvTGeErYU2fZtNdxfZsWS1OJZMw1aD0FdSVzUVoQ1zBJ+zEzKa4b4OmgeZhzyMSv3 NlgDZHsJdxt+pw5wIut+NW5/+Zv0BnCEe1dFilmxkT4ZE0DhAjHZkae4xnq5XFXfSYeY 3I9aPG5xN5ObHQJtZk2B2GtCEiALwaZoayW61jAeM11bGPOu6A3xb3xbUTjdY0UjB6sS BYAozen6Rwgi5mT2mmI5xFbXGxt7kXt156aD4wVGshivZUYg9OTtH11rm6S7TjOhgdve Yatw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=cgYMoOa2UxNt7NzjdxeMJdwYvb6+ImvrTFMEms3RKDA=; b=DzTiRqSfg7Ljqf0ImUHBVD3d5dc9iiNnE8CvEimQ3aRNSCvF9dHQQWKv/FoAt9XG8w 5V892gYp4ibGtnU9Bp5bJ5ZdC+iGarkMg3yHOEiS/ONVoPWODs6Pofz4kHCRS7puczPg V8oik2jHsEwfV69b4M6sxEaa4m+pLHuJGJMjWKa9p2ObnlZy34pGFJAz/itWp8KOCmSl j/Bk2G84d48O3B49hiPGNE4czldofa8Wlutk5a4ejR8CwmCZRvjM1kFaM05ILlpqYwkG VulaZTqQUK5r2t2MRkU31eIUU4ovTBT3Gl4HIc3RaqAhcqDhvVdLZwEVOxzbnJ87TUSE nqIg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u24si195698plq.430.2019.06.11.07.13.31; Tue, 11 Jun 2019 07:13:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389992AbfFKON3 (ORCPT + 99 others); Tue, 11 Jun 2019 10:13:29 -0400 Received: from mx2.suse.de ([195.135.220.15]:44176 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2388728AbfFKON1 (ORCPT ); Tue, 11 Jun 2019 10:13:27 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 32FF0AF8C; Tue, 11 Jun 2019 14:13:26 +0000 (UTC) From: Miroslav Benes To: jpoimboe@redhat.com, jikos@kernel.org, pmladek@suse.com Cc: joe.lawrence@redhat.com, kamalesh@linux.vnet.ibm.com, live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Miroslav Benes Subject: [PATCH v4 3/3] livepatch: Remove duplicate warning about missing reliable stacktrace support Date: Tue, 11 Jun 2019 16:13:20 +0200 Message-Id: <20190611141320.25359-4-mbenes@suse.cz> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190611141320.25359-1-mbenes@suse.cz> References: <20190611141320.25359-1-mbenes@suse.cz> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Petr Mladek WARN_ON_ONCE() could not be called safely under rq lock because of console deadlock issues. Moreover WARN_ON_ONCE() is superfluous in klp_check_stack(), because stack_trace_save_tsk_reliable() cannot return -ENOSYS thanks to klp_have_reliable_stack() check in klp_try_switch_task(). Signed-off-by: Petr Mladek [ mbenes: changelog edited ] Signed-off-by: Miroslav Benes --- kernel/livepatch/transition.c | 1 - 1 file changed, 1 deletion(-) diff --git a/kernel/livepatch/transition.c b/kernel/livepatch/transition.c index 7e7ef04689d1..cdf318d86dd6 100644 --- a/kernel/livepatch/transition.c +++ b/kernel/livepatch/transition.c @@ -247,7 +247,6 @@ static int klp_check_stack(struct task_struct *task, char *err_buf) int ret, nr_entries; ret = stack_trace_save_tsk_reliable(task, entries, ARRAY_SIZE(entries)); - WARN_ON_ONCE(ret == -ENOSYS); if (ret < 0) { snprintf(err_buf, STACK_ERR_BUF_SIZE, "%s: %s:%d has an unreliable stack\n", -- 2.21.0