Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp665024ybx; Wed, 30 Oct 2019 03:07:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqzm19ZraJ5B/F40siaauLhfLGiErJWrHSnuEPk3r5qd78EtnY6f4/LtAjLAFL9MT3Zmd6OL X-Received: by 2002:a17:907:11c7:: with SMTP id va7mr8223502ejb.182.1572430022571; Wed, 30 Oct 2019 03:07:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572430022; cv=none; d=google.com; s=arc-20160816; b=U2ms2b0hzY0TJSvRQZVUZ2R3el3+WjciV+jJTb7wyGV6sMf03yHdpjPAHXcbMz20LF md1XY+0qWq9X7jNHPLTUVeDM2vNkdnhLDzgboUCxurxE6XBGQ9btMbicEx7OBwNMagmD spJwv/I8vsvB+FFezK6JurGeaktz12e9vQmORlOQRb+BjnYTgg2sek71nSnq2XgvKBLF fgNl50KF/SexShgchMf015tdIL5SIukzd66Sg7zyUhfPigcw1ERObIO3WW7rZNibx4ZZ tt1cqGB4KnzhIQmk4sbDgJD+jTQsnz1ZPaCmNtMvJpLDPP2u/Px+MDJbC+7OukeiO8gy tLxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=FgGV39SEdD7nS2X2u+N7LFxnr2PnEV8T0FioBCin3NU=; b=NA3TJaedU4eLXcueyEMcwwz3uSYdiP+Inmv0ggygjS2+L3tGn/Xxg617SWY9DKV/IP iYeHKIY7DvRdBv/enAJ4y5fXa5xoyGbJCeVT8WneW+SHocJ39mwR977LLH5T1s/Pb1xW cwtjUw54B7BFRrl2xycipmPvrGZ+btvhgkF/hZKUaK2gRVaxcvqX5uWZ1+SNEUrWwz0/ R03/xFXkvHDUcqQgorZw3NnqNKJ72KctEYX13EWLdwndBcZtcpwtadUPWstVLQdB/+41 MiqZG3pS55PXaFmyETqPrOrf3elJvUXOCTFtMkhpFZRbyTL3qij3dN0MHu1JWIW4RjmO o8aw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z65si1242682ede.388.2019.10.30.03.06.39; Wed, 30 Oct 2019 03:07:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726687AbfJ3KFs (ORCPT + 99 others); Wed, 30 Oct 2019 06:05:48 -0400 Received: from mx2.suse.de ([195.135.220.15]:44100 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726032AbfJ3KFr (ORCPT ); Wed, 30 Oct 2019 06:05:47 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id E742AADDA; Wed, 30 Oct 2019 10:05:45 +0000 (UTC) Date: Wed, 30 Oct 2019 11:05:45 +0100 (CET) From: Miroslav Benes To: Heiko Carstens cc: gor@linux.ibm.com, borntraeger@de.ibm.com, jpoimboe@redhat.com, joe.lawrence@redhat.com, linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, jikos@kernel.org, pmladek@suse.com, nstange@suse.de, live-patching@vger.kernel.org Subject: Re: [PATCH v2 3/3] s390/livepatch: Implement reliable stack tracing for the consistency model In-Reply-To: <20191029161751.GH5646@osiris> Message-ID: References: <20191029143904.24051-1-mbenes@suse.cz> <20191029143904.24051-4-mbenes@suse.cz> <20191029161751.GH5646@osiris> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 29 Oct 2019, Heiko Carstens wrote: > Hi Miroslav, > > > +bool unwind_next_frame_reliable(struct unwind_state *state) > > +{ > ... > > +} > > + > > void __unwind_start(struct unwind_state *state, struct task_struct *task, > > struct pt_regs *regs, unsigned long sp, > > bool unwind_reliable) > > Did you send the wrong version of your patch series? This patch does > not integrate your new function into the existing one. Also the new > parameter you added with the second patch isn't used at all. No, the version should be correct. Only __unwind_start_reliable() was integrated. The new parameter is used in arch_stack_walk_reliable() (unwind_reliable is set to true) and it is propagated to get_stack_info() where it is used to simplify things for the case. Miroslav