arm: wire up dump_backtrace_{entry,stm}
authorDmitry Safonov <dima@arista.com>
Tue, 9 Jun 2020 04:30:16 +0000 (21:30 -0700)
committerLinus Torvalds <torvalds@linux-foundation.org>
Tue, 9 Jun 2020 16:39:10 +0000 (09:39 -0700)
Currently, the log-level of show_stack() depends on a platform
realization.  It creates situations where the headers are printed with
lower log level or higher than the stacktrace (depending on a platform or
user).

Furthermore, it forces the logic decision from user to an architecture
side.  In result, some users as sysrq/kdb/etc are doing tricks with
temporary rising console_loglevel while printing their messages.  And in
result it not only may print unwanted messages from other CPUs, but also
omit printing at all in the unlucky case where the printk() was deferred.

Introducing log-level parameter and KERN_UNSUPPRESSED [1] seems an easier
approach than introducing more printk buffers.  Also, it will consolidate
printings with headers.

Now that c_backtrace() always emits correct loglvl, use it for printing.

[1]: https://lore.kernel.org/lkml/20190528002412.1625-1-dima@arista.com/T/#u

Signed-off-by: Dmitry Safonov <dima@arista.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Cc: Russell King <linux@armlinux.org.uk>
Cc: Will Deacon <will@kernel.org>
Link: http://lkml.kernel.org/r/20200418201944.482088-8-dima@arista.com
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
arch/arm/kernel/traps.c

index 014fb5ad3a8b57d91ae235552f2d16394cc459d8..0aa55dc025a1361c9dd423eb5c0e9acc6bb79da4 100644 (file)
@@ -68,13 +68,15 @@ void dump_backtrace_entry(unsigned long where, unsigned long from,
        unsigned long end = frame + 4 + sizeof(struct pt_regs);
 
 #ifdef CONFIG_KALLSYMS
-       printk("[<%08lx>] (%ps) from [<%08lx>] (%pS)\n", where, (void *)where, from, (void *)from);
+       printk("%s[<%08lx>] (%ps) from [<%08lx>] (%pS)\n",
+               loglvl, where, (void *)where, from, (void *)from);
 #else
-       printk("Function entered at [<%08lx>] from [<%08lx>]\n", where, from);
+       printk("%sFunction entered at [<%08lx>] from [<%08lx>]\n",
+               loglvl, where, from);
 #endif
 
        if (in_entry_text(from) && end <= ALIGN(frame, THREAD_SIZE))
-               dump_mem("", "Exception stack", frame + 4, end);
+               dump_mem(loglvl, "Exception stack", frame + 4, end);
 }
 
 void dump_backtrace_stm(u32 *stack, u32 instruction, const char *loglvl)
@@ -89,12 +91,12 @@ void dump_backtrace_stm(u32 *stack, u32 instruction, const char *loglvl)
                        if (++x == 6) {
                                x = 0;
                                p = str;
-                               printk("%s\n", str);
+                               printk("%s%s\n", loglvl, str);
                        }
                }
        }
        if (p != str)
-               printk("%s\n", str);
+               printk("%s%s\n", loglvl, str);
 }
 
 #ifndef CONFIG_ARM_UNWIND