Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp555994pxu; Fri, 23 Oct 2020 07:49:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwu5N4feVvwFgsMoDc01XWbISCS7HPtf/vvcwAMI8aXUU1ivvmCjMl7Ze9ZoGcklV+DFSRB X-Received: by 2002:a17:906:85c1:: with SMTP id i1mr2414862ejy.157.1603464551120; Fri, 23 Oct 2020 07:49:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603464551; cv=none; d=google.com; s=arc-20160816; b=p0Xe7B6gDiLbyIHdgFFBBoS1mtnFQD+9NNBAqH/7Vp6ylJdMWucImpAPmeKT0UwWgS yD8NPjPWOAyh9r/LvFW75pVu9HIpaHLhvxabcUquZpD3hX95PlegMI/ktF3RydRGAL03 DIybwy34RcBb8rWXRtP4hWRNGjUB+dUjY2h7AweYkpMpUNsMcGKNwsEh86UAtaldR8Dl TOM8cDDJFNVj5QpXrD9dEKyj0ZwwpHXOVQW5hD9BBQrgJNhWaYhuOAxa1AoYkchh/BGA zzT2JRsS2HiLNXrAWyXWasMVdTdZ986/b7WgXu5RBISAR4WCRXq60mG95h9COwda7x/2 jQ4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=e6HMu+jU3+dJnzaFQH7uVNW0oyiAZjwUFmWbOToMAl4=; b=WWjWGqeVaAHplujIyTU0esv24/2NZ87zx6f+yCFsQDN4MmZQKXCPljMHTPKOBsNvPw pXa4AZHlbSQ22F/E8F3bJBh2POUE6GUeSb7/0rin0+gmc7VB0sHTq1F9BJp8WpMKvV3K 8PtLSmRPi6/aHO1R7fNanAcFihH/Zv+P4aWMOnJTDKNeKzDNVryRjNNvuQ+LhYq+9icG xbd0QDB0N7AQfOy1p7io6hR8YsyV+KlfB14fTyexeAAqlbbaOs5hHwtdEL+G+gu6Lmh3 q1lfGx/CibFHBTau8+sKLjTXa25/T+dgcUyFLjqZDGtRuKJQ1hrltaWKshUIrRXFhTTt mjAQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bz26si1122127ejc.635.2020.10.23.07.48.49; Fri, 23 Oct 2020 07:49:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S375839AbgJWHrY (ORCPT + 99 others); Fri, 23 Oct 2020 03:47:24 -0400 Received: from mx2.suse.de ([195.135.220.15]:59596 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S374613AbgJWHrO (ORCPT ); Fri, 23 Oct 2020 03:47:14 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 6E158AC83; Fri, 23 Oct 2020 07:47:13 +0000 (UTC) From: Takashi Iwai To: dri-devel@lists.freedesktop.org Cc: amd-gfx@lists.freedesktop.org, linux-kernel@vger.kernel.org Subject: [PATCH 2/3] drm/amd/display: Don't invoke kgdb_breakpoint() unconditionally Date: Fri, 23 Oct 2020 09:46:55 +0200 Message-Id: <20201023074656.11855-3-tiwai@suse.de> X-Mailer: git-send-email 2.16.4 In-Reply-To: <20201023074656.11855-1-tiwai@suse.de> References: <20201023074656.11855-1-tiwai@suse.de> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ASSERT_CRITICAL() invokes kgdb_breakpoint() whenever either CONFIG_KGDB or CONFIG_HAVE_KGDB is set. This, however, may lead to a kernel panic when no kdb stuff is attached, since the kgdb_breakpoint() call issues INT3. It's nothing but a surprise for normal end-users. For avoiding the pitfall, make the kgdb_breakpoint() call only when CONFIG_DEBUG_KERNEL_DC is set. https://bugzilla.opensuse.org/show_bug.cgi?id=1177973 Cc: Signed-off-by: Takashi Iwai --- drivers/gpu/drm/amd/display/dc/os_types.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/gpu/drm/amd/display/dc/os_types.h b/drivers/gpu/drm/amd/display/dc/os_types.h index 330acaaed79a..32758b245754 100644 --- a/drivers/gpu/drm/amd/display/dc/os_types.h +++ b/drivers/gpu/drm/amd/display/dc/os_types.h @@ -94,7 +94,7 @@ * general debug capabilities * */ -#if defined(CONFIG_HAVE_KGDB) || defined(CONFIG_KGDB) +#if defined(CONFIG_DEBUG_KERNEL_DC) && (defined(CONFIG_HAVE_KGDB) || defined(CONFIG_KGDB)) #define ASSERT_CRITICAL(expr) do { \ if (WARN_ON(!(expr))) { \ kgdb_breakpoint(); \ -- 2.16.4