Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp2401893ybi; Mon, 17 Jun 2019 04:18:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqy2RFWGhfhJ1sz1jH0Wgd8vVZcavKstOe9hknXIpb1o4wwGJmbdLi4HFZQa1fuQtPCC/Axg X-Received: by 2002:aa7:91c5:: with SMTP id z5mr21429722pfa.34.1560770288460; Mon, 17 Jun 2019 04:18:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560770288; cv=none; d=google.com; s=arc-20160816; b=IG8kpXVhvgHjUrTM5gJTYNQn/CDPmrvf074KGkZ6mZqLSD3cGuJwMYlXc6LJ1PaKIG ddLtqvdJJSZHn3iOJOzA4Ut6XnvT/pCrCM6TfUGDWntmlOtXoGEdb9MJH2eUjAh2KkZ1 8KBXEFWTPX+1mMNpTlHB/OisQQP4XwK3R+hl3XyLfCuIML9HG67wCFWSdmzaZwsFmekI pajwEvQbK+bvJUT0rOzXdz9cF3tv4N6lpsr3mEJXX3AnJmKmoou2Khzt8XDeyNxaeWXv oFZSazp6w56IRwx8Xw4/dfvX+8l5EMUX6HG5s+JUTvsW1tkZnt45J95R7JL1iJ/4gl85 vdxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=s+FYdW549vaSdyiJpeB2OJ3kkWx8IQj/pGPny9OUMoA=; b=c9sOtRWn2+h5VGC5/MqC0vGlkN+K350QvRP9tzSYnz4k8f64jHgnFrIcMBjQC7j22o 3NPK3vNJuHHK6HuKePrs8Iu6yRwxjYi7f5vP1hY+UvC3PqYwXGQkqPO5sBxZ57ApfVSZ z84MuISV7HSl05TFulK8wWxpJ0VY/F9kJArF2DdEYe4oymg68DDKldC/oU3RbbNcI9JC 2y58x4otIidzfUevNSaV/EWM5l6tSYEYWbtNJfIKsxwXfWRTAnc0xtUMYWp/mqg5kE9R tTEnbftGul7GYTZ8EYgEpRQzEfk7fGACwHusSjg8m3GbL90yj3x2gM9ABoDfIAst3kR/ qtBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x204si10539200pgx.354.2019.06.17.04.17.52; Mon, 17 Jun 2019 04:18:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728078AbfFQLQ3 (ORCPT + 99 others); Mon, 17 Jun 2019 07:16:29 -0400 Received: from mx2.suse.de ([195.135.220.15]:37232 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727715AbfFQLQ2 (ORCPT ); Mon, 17 Jun 2019 07:16:28 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 5D9A6AEC5; Mon, 17 Jun 2019 11:16:27 +0000 (UTC) Date: Mon, 17 Jun 2019 13:16:26 +0200 From: Petr Mladek To: Thomas Gleixner Cc: Miroslav Benes , jpoimboe@redhat.com, jikos@kernel.org, joe.lawrence@redhat.com, kamalesh@linux.vnet.ibm.com, live-patching@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v4 1/3] stacktrace: Remove weak version of save_stack_trace_tsk_reliable() Message-ID: <20190617111626.vkqayqf3tvleff37@pathway.suse.cz> References: <20190611141320.25359-1-mbenes@suse.cz> <20190611141320.25359-2-mbenes@suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170912 (1.9.0) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Thomas, On Sun 2019-06-16 10:44:59, Thomas Gleixner wrote: > On Tue, 11 Jun 2019, Miroslav Benes wrote: > > > Recent rework of stack trace infrastructure introduced a new set of > > helpers for common stack trace operations (commit e9b98e162aa5 > > ("stacktrace: Provide helpers for common stack trace operations") and > > related). As a result, save_stack_trace_tsk_reliable() is not directly > > called anywhere. Livepatch, currently the only user of the reliable > > stack trace feature, now calls stack_trace_save_tsk_reliable(). > > > > When CONFIG_HAVE_RELIABLE_STACKTRACE is set and depending on > > CONFIG_ARCH_STACKWALK, stack_trace_save_tsk_reliable() calls either > > arch_stack_walk_reliable() or mentioned save_stack_trace_tsk_reliable(). > > x86_64 defines the former, ppc64le the latter. All other architectures > > do not have HAVE_RELIABLE_STACKTRACE and include/linux/stacktrace.h > > defines -ENOSYS returning version for them. > > > > In short, stack_trace_save_tsk_reliable() returning -ENOSYS defined in > > include/linux/stacktrace.h serves the same purpose as the old weak > > version of save_stack_trace_tsk_reliable() which is therefore no longer > > needed. > > > > Cc: Thomas Gleixner > > Signed-off-by: Miroslav Benes > > Reviewed-by: Thomas Gleixner Would you like to push this patch via your tree? Or is it OK to push it via the livepatch tree for 5.3? Best Regards, Petr