From nobody Tue Feb 10 07:21:22 2026 Received: from mail-pl1-f173.google.com (mail-pl1-f173.google.com [209.85.214.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8A077BA50 for ; Wed, 29 Jan 2025 16:27:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.173 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738168057; cv=none; b=FQcycV5DnqxPClKovc+fGqJdukLweCZwwTmBHTa01zzwN9sNQCLXCRSXe+pl6Uz2jjf/kE6fLQoBCkvCoMOmw6awDrprZC1oRbbWMj05BOMXMIXL4gguvyou3YWD4hEfUpczDiMIcfukK43wite2D3RwkkeIWKtICEwQDO3iPI8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738168057; c=relaxed/simple; bh=xC0xL3xkUrJX5BUOGfgoFPaOTr3+cZj7iUN6rx1TtGs=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=A7joYdl9O4cK1iKgigglPp3d+mnGc5iIBg5ejwdPNf/rCUP/7l2bNjAx8LbZHEoUo8yhDZWJk+jflshGG67eTb4if47ZV/srPUCjz9Q68amzU8FZVqqAWCDLcTXslgkRjCQ7DcJsmph86nldNkqLVGE1xiq9wuDDaLrXabQSzFs= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=chromium.org; spf=pass smtp.mailfrom=chromium.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b=dsMSUfXJ; arc=none smtp.client-ip=209.85.214.173 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=chromium.org Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="dsMSUfXJ" Received: by mail-pl1-f173.google.com with SMTP id d9443c01a7336-2166f1e589cso10455065ad.3 for ; Wed, 29 Jan 2025 08:27:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1738168055; x=1738772855; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=SlqbrB8qvt9xCnWbF/o5yExRVumEzsDKl37nom5IOEo=; b=dsMSUfXJNi8LYLrdK12UKImSskE5VUlStvYcvDuBEmGM5MvFGMeNoKni7tLBBM/6IT voZX0Q5YcBojiYLHcM08qJJ6tMrHXmI8b7eGVENzLWV/yFWNtQec0sWNq7iNQ/YhseiG SbMhUAp+v8d61BaEkC2nWE6o2b3g7F+crW5Bs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1738168055; x=1738772855; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=SlqbrB8qvt9xCnWbF/o5yExRVumEzsDKl37nom5IOEo=; b=GxL71PwAICD3h2flionOEJlA+EDmQAjRqoZ6ycmHR7rPywB4rs9CVXtMoWLWbax44c NBeqrK0ojP2XCaiecIXE/RYkq7qkkwp9Bqh6UzgZ7VMC2CutRXqB8VFB5lO3U5jtQJYY CflG2uMzqDaK5RmkfJHFThdN3XvsQqE7cvJkGDdStre7ltg0MS/iT+9vlZ3KhvdaiB79 FYSyGCADHAFtQHeyKCxdWKPmoeOrxgE7TmA28EYoF6g16RrqaCKtNMH3v2jKFg+iOt1o oC3irMNBtEWy8zOzUR//EEU3HjwKZkpO4u8iPEcD+AqQGLueENm5hOAOrZNJ4dWw58jY DFtg== X-Forwarded-Encrypted: i=1; AJvYcCXf/qBHKtKbuzQqFVWiaOYAuUkcvtUi9nJrppNvjtLgaVwuYYNITmnRD23aGZhRup5QURj8d/+OyjrcH4Y=@vger.kernel.org X-Gm-Message-State: AOJu0YwiMNj8DH/r2RlL1AJITaErtVMtURuu9PuuOeJ5CqlbiiXfvOOe SV1EaVV/8wRZ9u5yF4b5M8b2wGbgpOXgQTpOctqTLCqGjMfhT9D8KPFRfaLyYw== X-Gm-Gg: ASbGncu3NnEGfySHQ8NBhniK9cFbuSeor49i0NM9cH/V4k59z4Y+Q/erGTkHDwqs8AM dDRANha+vErlje6oviSA99Abkc+5AB5bJxYYzI2IDcfbNLOVxgQ9WJjJUIql1wbiT50ssPCtJ4Z j86fBbykz3kYqPUCDXXMeCWNE0157Y82ozDiO8gZSwZVyOdbgh0BCMoQMFiOdrZa+ydbE0w9JVS DxfxeFh7cVVKO/eQF4dO2zliUmoW2kBi5dFvFYKkTRNDaaoWheeCMFoX6bQ7J7Kbb84cqGF5SKM RlBk/afQodIJ06tWiSYwNs/nh7+Ed5ZN+L0cXUyeRMSQlA== X-Google-Smtp-Source: AGHT+IGwHJzqht4xgAE8aAHlAbgCQ+Cy1fdEcP9Joan7vjqiFIKdYsXcIDYJ2XLcGb2ysyVeLoX41A== X-Received: by 2002:a05:6a20:12c1:b0:1db:e0d7:675c with SMTP id adf61e73a8af0-1ed7a4c9922mr7132442637.13.1738168054926; Wed, 29 Jan 2025 08:27:34 -0800 (PST) Received: from dianders.sjc.corp.google.com ([2620:15c:9d:2:fa8a:f68a:6cb9:40b2]) by smtp.gmail.com with ESMTPSA id 41be03b00d2f7-ac496cb4810sm10577009a12.66.2025.01.29.08.27.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 29 Jan 2025 08:27:33 -0800 (PST) From: Douglas Anderson To: Greg Kroah-Hartman , Jiri Slaby , Daniel Thompson Cc: "Dr . David Alan Gilbert" , kgdb-bugreport@lists.sourceforge.net, Anton Vorontsov , Sumit Garg , linux-serial@vger.kernel.org, Douglas Anderson , Jason Wessel , Nir Lichtman , Thorsten Blum , Yuran Pereira , Zheng Zengkai , linux-kernel@vger.kernel.org Subject: [PATCH 2/3] Revert "kdb: Implement disable_nmi command" Date: Wed, 29 Jan 2025 08:25:51 -0800 Message-ID: <20250129082535.2.Ib91bfb95bdcf77591257a84063fdeb5b4dce65b1@changeid> X-Mailer: git-send-email 2.48.1.262.g85cc9f2d1e-goog In-Reply-To: <20250129162700.848018-1-dianders@chromium.org> References: <20250129162700.848018-1-dianders@chromium.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" This reverts commit ad394f66fa57ae66014cb74f337e2820bac4c417. No architectures ever implemented `enable_nmi` since the later patches in the series adding it never landed. It's been a long time. Drop it. NOTE: this is not a clean revert due to changes in the file in the meantime. Signed-off-by: Douglas Anderson --- kernel/debug/kdb/kdb_main.c | 37 ------------------------------------- 1 file changed, 37 deletions(-) diff --git a/kernel/debug/kdb/kdb_main.c b/kernel/debug/kdb/kdb_main.c index 5f4be507d79f..3a5408b54570 100644 --- a/kernel/debug/kdb/kdb_main.c +++ b/kernel/debug/kdb/kdb_main.c @@ -25,7 +25,6 @@ #include #include #include -#include #include #include #include @@ -2119,32 +2118,6 @@ static int kdb_dmesg(int argc, const char **argv) return 0; } #endif /* CONFIG_PRINTK */ - -/* Make sure we balance enable/disable calls, must disable first. */ -static atomic_t kdb_nmi_disabled; - -static int kdb_disable_nmi(int argc, const char *argv[]) -{ - if (atomic_read(&kdb_nmi_disabled)) - return 0; - atomic_set(&kdb_nmi_disabled, 1); - arch_kgdb_ops.enable_nmi(0); - return 0; -} - -static int kdb_param_enable_nmi(const char *val, const struct kernel_param= *kp) -{ - if (!atomic_add_unless(&kdb_nmi_disabled, -1, 0)) - return -EINVAL; - arch_kgdb_ops.enable_nmi(1); - return 0; -} - -static const struct kernel_param_ops kdb_param_ops_enable_nmi =3D { - .set =3D kdb_param_enable_nmi, -}; -module_param_cb(enable_nmi, &kdb_param_ops_enable_nmi, NULL, 0600); - /* * kdb_cpu - This function implements the 'cpu' command. * cpu [] @@ -2836,20 +2809,10 @@ static kdbtab_t maintab[] =3D { }, }; =20 -static kdbtab_t nmicmd =3D { - .name =3D "disable_nmi", - .func =3D kdb_disable_nmi, - .usage =3D "", - .help =3D "Disable NMI entry to KDB", - .flags =3D KDB_ENABLE_ALWAYS_SAFE, -}; - /* Initialize the kdb command table. */ static void __init kdb_inittab(void) { kdb_register_table(maintab, ARRAY_SIZE(maintab)); - if (arch_kgdb_ops.enable_nmi) - kdb_register_table(&nmicmd, 1); } =20 /* Execute any commands defined in kdb_cmds. */ --=20 2.48.1.262.g85cc9f2d1e-goog