Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp636031ybh; Tue, 21 Jul 2020 04:20:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwDe+1Scf1BUBSm+BRYjzdx3uMriBpeTxRQhWS35YEla+n+mOoBhWgtQhAH82ab2yGPQYvo X-Received: by 2002:a05:6402:1b1c:: with SMTP id by28mr25463501edb.270.1595330416936; Tue, 21 Jul 2020 04:20:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595330416; cv=none; d=google.com; s=arc-20160816; b=CCiGfueIXqL2MvNh0A9f64jhcEuGajrALCHCXRpYOBNbXwMHN9NqEqvUB9nMSOvWBU Zy9ctYNfSWRK9tjfkV/iBCT2Gn8f4/XoqI5AaojW0CsmmHqxEW5q1XZW4fBgk019MtDH 0HqRxUZUBdIZkj2GHHZCAUrMKQHzvENOope6h+5KoHiVoONFIySitKvDXosFjynnZ1hT JZsG/JthOrvnV1URz/Sd/jKBPtSsYflQ6wj/L9z8seRmHwyvWh9NeN6Jbwz4kDqpGzon 3aGQ3FYJ1su+mPOreHl/DWfG9lKB7nmn9QRlheh0HoYPTvsuqgBI7Tno/UAR5Td6LBqo c/+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=lbys7OC3jNjfiHjht035lNtAdJMskNFUOx+5i+ze+og=; b=xpf4/PW2t0j+MGaeA+c37LzJP0O3PKKZEy0HC2poYr59v58trsTMay/6W21qM3anEw zWHz6axj2SeAmKi5AcudneN0uROB3BPlwci+smG48FITrk1/17CDCnOOXc/XGIWkzwIJ 1w0Qfpt3EL8ns2rWZDpqEPdScbJbWUj9kdPTRBFozZIEhcejPkterOuaou8hXXesE7Og XtPZI5dxzEK6Pl+/m8KEoN2HkhlT5uXlaJX48RbZiPnB/3/dx04I1ei/JMDT/Xc1irHc ynggxZQ28m6DBGsqZBv6gfk5tViOwSSE8MWNr8+qm9IUc34PNRUX788luMh/VivaFyWd iKrg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r29si12146850edi.165.2020.07.21.04.19.53; Tue, 21 Jul 2020 04:20:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729357AbgGULTp (ORCPT + 99 others); Tue, 21 Jul 2020 07:19:45 -0400 Received: from atcsqr.andestech.com ([60.248.187.195]:33779 "EHLO ATCSQR.andestech.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727043AbgGULTp (ORCPT ); Tue, 21 Jul 2020 07:19:45 -0400 Received: from ATCSQR.andestech.com (localhost [127.0.0.2] (may be forged)) by ATCSQR.andestech.com with ESMTP id 06LAxsIa080540 for ; Tue, 21 Jul 2020 18:59:54 +0800 (GMT-8) (envelope-from nickhu@andestech.com) Received: from mail.andestech.com (atcpcs16.andestech.com [10.0.1.222]) by ATCSQR.andestech.com with ESMTP id 06LAxfUT080504; Tue, 21 Jul 2020 18:59:41 +0800 (GMT-8) (envelope-from nickhu@andestech.com) Received: from atcfdc88 (10.0.15.132) by ATCPCS16.andestech.com (10.0.1.222) with Microsoft SMTP Server id 14.3.123.3; Tue, 21 Jul 2020 19:08:33 +0800 Date: Tue, 21 Jul 2020 19:08:34 +0800 From: Nick Hu To: Christoph Hellwig CC: , , Subject: Re: [PATCH 1/2] nds32: remove dump_instr Message-ID: <20200721110834.GB19721@atcfdc88> References: <20200720114448.205876-1-hch@lst.de> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <20200720114448.205876-1-hch@lst.de> User-Agent: Mutt/1.9.4 (2018-02-28) X-Originating-IP: [10.0.15.132] X-DNSRBL: X-MAIL: ATCSQR.andestech.com 06LAxfUT080504 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 20, 2020 at 01:44:47PM +0200, Christoph Hellwig wrote: > dump_inst has a return before actually doing anything, so just drop the > whole thing. > > Signed-off-by: Christoph Hellwig > --- > arch/nds32/kernel/traps.c | 35 ----------------------------------- > 1 file changed, 35 deletions(-) > > diff --git a/arch/nds32/kernel/traps.c b/arch/nds32/kernel/traps.c > index 6a9772ba739276..b66f889bc6df9b 100644 > --- a/arch/nds32/kernel/traps.c > +++ b/arch/nds32/kernel/traps.c > @@ -62,40 +62,6 @@ void dump_mem(const char *lvl, unsigned long bottom, unsigned long top) > > EXPORT_SYMBOL(dump_mem); > > -static void dump_instr(struct pt_regs *regs) > -{ > - unsigned long addr = instruction_pointer(regs); > - mm_segment_t fs; > - char str[sizeof("00000000 ") * 5 + 2 + 1], *p = str; > - int i; > - > - return; > - /* > - * We need to switch to kernel mode so that we can use __get_user > - * to safely read from kernel space. Note that we now dump the > - * code first, just in case the backtrace kills us. > - */ > - fs = get_fs(); > - set_fs(KERNEL_DS); > - > - pr_emerg("Code: "); > - for (i = -4; i < 1; i++) { > - unsigned int val, bad; > - > - bad = __get_user(val, &((u32 *) addr)[i]); > - > - if (!bad) { > - p += sprintf(p, i == 0 ? "(%08x) " : "%08x ", val); > - } else { > - p += sprintf(p, "bad PC value"); > - break; > - } > - } > - pr_emerg("Code: %s\n", str); > - > - set_fs(fs); > -} > - > #define LOOP_TIMES (100) > static void __dump(struct task_struct *tsk, unsigned long *base_reg, > const char *loglvl) > @@ -179,7 +145,6 @@ void die(const char *str, struct pt_regs *regs, int err) > > if (!user_mode(regs) || in_interrupt()) { > dump_mem("Stack: ", regs->sp, (regs->sp + PAGE_SIZE) & PAGE_MASK); > - dump_instr(regs); > dump_stack(); > } > > -- > 2.27.0 > Acked-by: Nick Hu