Received: by 2002:ac0:da4c:0:0:0:0:0 with SMTP id a12csp514287imi; Fri, 22 Jul 2022 04:05:24 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uXyuxSBSILjf4B3Xbj5Q5x8Re8PIHCJAMLCwm0/SRGyMVLCYtlbGkdcYSMgFfmYhpXCxoX X-Received: by 2002:a05:6870:b3a0:b0:10d:62cc:564a with SMTP id w32-20020a056870b3a000b0010d62cc564amr7215853oap.66.1658487923927; Fri, 22 Jul 2022 04:05:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658487923; cv=none; d=google.com; s=arc-20160816; b=gr8uD1kX1hZPo8AOdyiW1NrGve+S69Gw/z3nFcmbyiKecbmVl1f9t51a1Pwe3C3dmv 41hIRYLqfSrEvvz9FjKoW5FC6BAUT6ZjgL6ioTPo0jtOs4kybis9Gg/dd6FZarE4+HHM ljHPGs5pu2WlJpH4LL7o9SlBhD3/JeNjTiTXYZHycFKkp6KBh1zFuWHJqLHGB9p1H7gx N9I3CXRUWcydqt2pqZWMNEXZExh/xEbQJYjZUXto7PsSgsqjgmQ834t1b/niwgG1jHPW fGnbbEjRoFHrHcUsI/AZDFyiEptKak8O2N61zEWyJ5SPZ9TeWCphJwkkFSLtg+zW4a/P xyNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:dkim-signature:date; bh=0AyQqMWkq3QK3cl0AVPhmS1VRFhKVJORRDR1qEdQa2E=; b=NBeSxeyTT/Oz1uJY6dxN0Ucu0Ik26eiGBOcyT6BawQppY6w1C9SM/Ae0Ev2TdwkTyW 3XiMRcdsMyISkcUNLi918JE59qobmrFyOyWh50Tgekkt1i7XYZtrHadMPCa8NDI+Kak2 fYCNdUBD/0NUh4/i9kwcXDAFWhf1ywSADVj2HXaFo/JPRCA/Hr4wEHP744nw80X3fscL zAvUEX6CwdNaxc54lTooKEHzxLH7ASAiyRfRZIdid6x8JHy0SA9XVyLeZ9ejKlZ6ixjw vc171Z4s8GcIofAM1fSOzxBBlS6GzcpNy7iV3TEDI8bYD9HQq2KxtcDPvncLs5DG83j/ iKjA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=xicOKB6O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d189-20020aca36c6000000b0033a217e20cfsi3768580oia.254.2022.07.22.04.05.03; Fri, 22 Jul 2022 04:05:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=xicOKB6O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234744AbiGVKsm (ORCPT + 99 others); Fri, 22 Jul 2022 06:48:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55450 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231902AbiGVKsl (ORCPT ); Fri, 22 Jul 2022 06:48:41 -0400 Received: from out1.migadu.com (out1.migadu.com [91.121.223.63]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8A962A6F8F for ; Fri, 22 Jul 2022 03:48:36 -0700 (PDT) Date: Fri, 22 Jul 2022 11:48:31 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1658486914; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=0AyQqMWkq3QK3cl0AVPhmS1VRFhKVJORRDR1qEdQa2E=; b=xicOKB6Owxf662WLaEHk73CJEtDiVVJlzZYlCwcm2/Diwz0HTpzvGaebKIShQmRpj0iZR1 G0JoITMh43Aju/9To6bjbUkmSVnwtTN0+CxPKbszZa19YuGHmQBj+QkAqOzApPVL6H6VZH n38wfKDStIPrL8+wxF39Kgji85DhFrU= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Oliver Upton To: Kalesh Singh Cc: maz@kernel.org, mark.rutland@arm.com, broonie@kernel.org, madvenka@linux.microsoft.com, tabba@google.com, will@kernel.org, qperret@google.com, james.morse@arm.com, alexandru.elisei@arm.com, suzuki.poulose@arm.com, catalin.marinas@arm.com, andreyknvl@gmail.com, vincenzo.frascino@arm.com, mhiramat@kernel.org, ast@kernel.org, drjones@redhat.com, wangkefeng.wang@huawei.com, elver@google.com, keirf@google.com, yuzenghui@huawei.com, ardb@kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-kernel@vger.kernel.org, android-mm@google.com, kernel-team@android.com Subject: Re: [PATCH v5 00/17] KVM nVHE Hypervisor stack unwinder Message-ID: References: <20220721055728.718573-1-kaleshsingh@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220721055728.718573-1-kaleshsingh@google.com> X-Migadu-Flow: FLOW_OUT X-Migadu-Auth-User: linux.dev X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_PASS, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Kalesh, On Wed, Jul 20, 2022 at 10:57:11PM -0700, Kalesh Singh wrote: [...] > Kalesh Singh (17): > arm64: stacktrace: Add shared header for common stack unwinding code > arm64: stacktrace: Factor out on_accessible_stack_common() > arm64: stacktrace: Factor out unwind_next_common() > arm64: stacktrace: Handle frame pointer from different address spaces > arm64: stacktrace: Factor out common unwind() > arm64: stacktrace: Add description of stacktrace/common.h > KVM: arm64: On stack overflow switch to hyp overflow_stack > KVM: arm64: Add PROTECTED_NVHE_STACKTRACE Kconfig > KVM: arm64: Allocate shared pKVM hyp stacktrace buffers > KVM: arm64: Stub implementation of pKVM HYP stack unwinder > KVM: arm64: Stub implementation of non-protected nVHE HYP stack > unwinder > KVM: arm64: Save protected-nVHE (pKVM) hyp stacktrace > KVM: arm64: Prepare non-protected nVHE hypervisor stacktrace > KVM: arm64: Implement protected nVHE hyp stack unwinder > KVM: arm64: Implement non-protected nVHE hyp stack unwinder > KVM: arm64: Introduce pkvm_dump_backtrace() > KVM: arm64: Introduce hyp_dump_backtrace() Adding a general comment on the organization of the series. I think for the next spin it'd be good to organize the entire non-pKVM implementation first, followed by the pKVM implementation. Otherwise, reviewers need to jump around the series a lot in order to page in the appropriate context. I had mentioned this about the last two patches earlier, but after grokking the stack I see the comment applies to the entire KVM portion of the series. -- Thanks, Oliver