I noticed that Linux has been updated on later versions to always
consume the skb in calls to dev_queue_xmit, and may even drop the skb
after returning a return code of NETDEV_TX_OK which seems kind of
broken. I have an application which requires guaranteed skb
transmission and the following code
On 10/3/16, Jeffrey Merkey <jeffmer...@gmail.com> wrote:
> On 10/3/16, Joe Perches <j...@perches.com> wrote:
>>
>> On Tue, 2016-10-04 at 13:29 +1100, Stephen Rothwell wrote:
>>> Hi Joe,
>>
>> Hi Stephen.
>>
>>> On Mon,
On 10/3/16, Jeffrey Merkey wrote:
> On 10/3/16, Joe Perches wrote:
>>
>> On Tue, 2016-10-04 at 13:29 +1100, Stephen Rothwell wrote:
>>> Hi Joe,
>>
>> Hi Stephen.
>>
>>> On Mon, 03 Oct 2016 18:47:04 -0700 Joe Perches wrote:
>>> >
On 10/3/16, Joe Perches <j...@perches.com> wrote:
>
> On Tue, 2016-10-04 at 13:29 +1100, Stephen Rothwell wrote:
>> Hi Joe,
>
> Hi Stephen.
>
>> On Mon, 03 Oct 2016 18:47:04 -0700 Joe Perches <j...@perches.com> wrote:
>> >
>> >
On 10/3/16, Joe Perches wrote:
>
> On Tue, 2016-10-04 at 13:29 +1100, Stephen Rothwell wrote:
>> Hi Joe,
>
> Hi Stephen.
>
>> On Mon, 03 Oct 2016 18:47:04 -0700 Joe Perches wrote:
>> >
>> > On Mon, 2016-10-03 at 18:17 -0600, Jeffrey Merkey wro
Debugger to Linux Kernel v4.8 (2016-10-02 20:33:55 -0600)
Jeffrey Merkey (1):
Add MDB Debugger to Linux Kernel v4.8
Documentation/sysrq.txt|2 +-
MAINTAINERS|6 +
arch
Debugger to Linux Kernel v4.8 (2016-10-02 20:33:55 -0600)
Jeffrey Merkey (1):
Add MDB Debugger to Linux Kernel v4.8
Documentation/sysrq.txt|2 +-
MAINTAINERS|6 +
arch
Debugger to Linux Kernel v4.8 (2016-10-02 20:33:55 -0600)
Jeffrey Merkey (1):
Add MDB Debugger to Linux Kernel v4.8
Documentation/sysrq.txt|2 +-
MAINTAINERS|6 +
arch
Debugger to Linux Kernel v4.8 (2016-10-02 20:33:55 -0600)
Jeffrey Merkey (1):
Add MDB Debugger to Linux Kernel v4.8
Documentation/sysrq.txt|2 +-
MAINTAINERS|6 +
arch
lines checked
0001-Add-MDB-Linux-Kernel-Debugger-to-Linux-v4.6.patch has no obvious style
problems and is ready for submission.
----
Jeffrey Merkey (1):
Add MDB Linux Kernel Debugger to Linux v4.6
Documentation/sys
-Linux-Kernel-Debugger-to-Linux-v4.6.patch has no obvious style
problems and is ready for submission.
Jeffrey Merkey (1):
Add MDB Linux Kernel Debugger to Linux v4.6
Documentation/sysrq.txt|2
On 3/25/16, Stephen Rothwell <s...@canb.auug.org.au> wrote:
> Hi Jeff,
>
> On Fri, 25 Mar 2016 17:01:27 -0600 Jeffrey Merkey <jeffmer...@gmail.com>
> wrote:
>>
>> I went back and checked the code and as it turns out, none of the
>> patches you nak'd are
On 3/25/16, Stephen Rothwell wrote:
> Hi Jeff,
>
> On Fri, 25 Mar 2016 17:01:27 -0600 Jeffrey Merkey
> wrote:
>>
>> I went back and checked the code and as it turns out, none of the
>> patches you nak'd are in the current branch, there are different
>> patche
On 3/25/16, Jeffrey Merkey <jeffmer...@gmail.com> wrote:
> On 3/25/16, Jeffrey Merkey <jeffmer...@gmail.com> wrote:
>> On 3/25/16, Jeffrey Merkey <jeffmer...@gmail.com> wrote:
>>> On 3/25/16, Ingo Molnar <mi...@kernel.org> wrote:
>>>>
On 3/25/16, Jeffrey Merkey wrote:
> On 3/25/16, Jeffrey Merkey wrote:
>> On 3/25/16, Jeffrey Merkey wrote:
>>> On 3/25/16, Ingo Molnar wrote:
>>>>
>>>> * Stephen Rothwell wrote:
>>>>
>>>>> Hi Joe,
>>>>>
>&
On 3/25/16, Jeffrey Merkey <jeffmer...@gmail.com> wrote:
> On 3/25/16, Jeffrey Merkey <jeffmer...@gmail.com> wrote:
>> On 3/25/16, Ingo Molnar <mi...@kernel.org> wrote:
>>>
>>> * Stephen Rothwell <s...@canb.auug.org.au> wrote:
>>>
&
On 3/25/16, Jeffrey Merkey wrote:
> On 3/25/16, Jeffrey Merkey wrote:
>> On 3/25/16, Ingo Molnar wrote:
>>>
>>> * Stephen Rothwell wrote:
>>>
>>>> Hi Joe,
>>>>
>>>> On Mon, 14 Mar 2016 16:57:03 -0700 Joe Perches wrot
On 3/25/16, Jeffrey Merkey <jeffmer...@gmail.com> wrote:
> On 3/25/16, Ingo Molnar <mi...@kernel.org> wrote:
>>
>> * Stephen Rothwell <s...@canb.auug.org.au> wrote:
>>
>>> Hi Joe,
>>>
>>> On Mon, 14 Mar 2016 16:57:03 -0700 Joe Perc
On 3/25/16, Jeffrey Merkey wrote:
> On 3/25/16, Ingo Molnar wrote:
>>
>> * Stephen Rothwell wrote:
>>
>>> Hi Joe,
>>>
>>> On Mon, 14 Mar 2016 16:57:03 -0700 Joe Perches wrote:
>>> >
>>> > On Mon, 2016-03-14 at 17:50
On 3/25/16, Ingo Molnar <mi...@kernel.org> wrote:
>
> * Stephen Rothwell <s...@canb.auug.org.au> wrote:
>
>> Hi Joe,
>>
>> On Mon, 14 Mar 2016 16:57:03 -0700 Joe Perches <j...@perches.com> wrote:
>> >
>> > On Mon, 2016-03-14 at 17:50
On 3/25/16, Ingo Molnar wrote:
>
> * Stephen Rothwell wrote:
>
>> Hi Joe,
>>
>> On Mon, 14 Mar 2016 16:57:03 -0700 Joe Perches wrote:
>> >
>> > On Mon, 2016-03-14 at 17:50 -0600, Jeffrey Merkey wrote:
>> > > The following changes sin
On 3/17/16, Joe Perches <j...@perches.com> wrote:
> On Thu, 2016-03-17 at 23:31 -0600, Jeffrey Merkey wrote:
>> On 3/16/16, Jeffrey Merkey <jeffmer...@gmail.com> wrote:
>> > On 3/15/16, Theodore Ts'o <ty...@mit.edu> wrote:
>> > > On Tue, Mar 15,
On 3/17/16, Joe Perches wrote:
> On Thu, 2016-03-17 at 23:31 -0600, Jeffrey Merkey wrote:
>> On 3/16/16, Jeffrey Merkey wrote:
>> > On 3/15/16, Theodore Ts'o wrote:
>> > > On Tue, Mar 15, 2016 at 01:03:39PM +1100, Stephen Rothwell wrote:
>> > > &g
On 3/15/16, Theodore Ts'o wrote:
> On Tue, Mar 15, 2016 at 01:03:39PM +1100, Stephen Rothwell wrote:
>> We don't generally PGP (GPG) sign commits in the kernel tree (so "-S"
>> is not required), just tags. However we always require that anyone who
>> handles a patch adds a
On 3/15/16, Theodore Ts'o wrote:
> On Tue, Mar 15, 2016 at 01:03:39PM +1100, Stephen Rothwell wrote:
>> We don't generally PGP (GPG) sign commits in the kernel tree (so "-S"
>> is not required), just tags. However we always require that anyone who
>> handles a patch adds a Signed-off-by line to
On 3/16/16, Jeffrey Merkey <jeffmer...@gmail.com> wrote:
> On 3/15/16, Theodore Ts'o <ty...@mit.edu> wrote:
>> On Tue, Mar 15, 2016 at 01:03:39PM +1100, Stephen Rothwell wrote:
>>> We don't generally PGP (GPG) sign commits in the kernel tree (so "-S"
>
On 3/16/16, Jeffrey Merkey wrote:
> On 3/15/16, Theodore Ts'o wrote:
>> On Tue, Mar 15, 2016 at 01:03:39PM +1100, Stephen Rothwell wrote:
>>> We don't generally PGP (GPG) sign commits in the kernel tree (so "-S"
>>> is not required), just tags. Howe
On 3/14/16, Stephen Rothwell <s...@canb.auug.org.au> wrote:
> Hi Joe,
>
> On Mon, 14 Mar 2016 16:57:03 -0700 Joe Perches <j...@perches.com> wrote:
>>
>> On Mon, 2016-03-14 at 17:50 -0600, Jeffrey Merkey wrote:
>> > The following changes since commit
>
On 3/14/16, Stephen Rothwell wrote:
> Hi Joe,
>
> On Mon, 14 Mar 2016 16:57:03 -0700 Joe Perches wrote:
>>
>> On Mon, 2016-03-14 at 17:50 -0600, Jeffrey Merkey wrote:
>> > The following changes since commit
>> > b562e44f507e863c6792946e4e1b1449fbbac85d:
>
problems and is ready
for submission.
Jeffrey Merkey (1):
Add MDB Debugger to linux v4.5
Documentation/sysrq.txt|2 +-
MAINTAINERS|6 +
arch/x86/include/asm/bug.h
problems and is ready
for submission.
Jeffrey Merkey (1):
Add MDB Debugger to linux v4.5
Documentation/sysrq.txt|2 +-
MAINTAINERS|6 +
arch/x86/include/asm/bug.h
.
Jeffrey Merkey (3):
Add MDB Kernel Debugger for Linux to Linus' Tree
Add Kconfig.debug options for build
Add kbuild-test-robot fixes for CONFIG_VT
Documentation/sysrq.txt|2 +-
MAINTAINERS
.
Jeffrey Merkey (3):
Add MDB Kernel Debugger for Linux to Linus' Tree
Add Kconfig.debug options for build
Add kbuild-test-robot fixes for CONFIG_VT
Documentation/sysrq.txt|2 +-
MAINTAINERS
.
Jeffrey Merkey (3):
Add MDB Kernel Debugger for Linux to Linus' Tree
Add Kconfig.debug options for build
Add kbuild-test-robot fixes for CONFIG_VT
Documentation/sysrq.txt|2 +-
MAINTAINERS
.
Jeffrey Merkey (3):
Add MDB Kernel Debugger for Linux to Linus' Tree
Add Kconfig.debug options for build
Add kbuild-test-robot fixes for CONFIG_VT
Documentation/sysrq.txt|2 +-
MAINTAINERS
Some quite excellent fixes from Joe Perches that belong
back in the original. Submitting to Joe for inclusion. Joe
was the original author of these fixes that save a lot of time
rewriting code. Thanks Joe.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.com>
---
scripts/checkpatch.p
Some quite excellent fixes from Joe Perches that belong
back in the original. Submitting to Joe for inclusion. Joe
was the original author of these fixes that save a lot of time
rewriting code. Thanks Joe.
Signed-off-by: Jeffrey Merkey
---
scripts/checkpatch.pl | 23
>> So, if you disable 'sysctl_hardlockup_all_cpu_backtrace' and enable
>> 'hardlockup_panic', you should be able to achieve what you want, no?
>>
>> But you mentioned you wanted to recover? Hence avoiding the panic?
>>
>> Cheers,
>> Don
>>
>
> Yes. Avoiding the panic is what I wanted to do.
On 2/3/16, Don Zickus wrote:
> On Wed, Feb 03, 2016 at 10:23:42AM -0700, Jeffrey Merkey wrote:
>> > Hmm, I am confused here. So you are saying because we are in the nmi
>> > handler you can not break into the system? The nmi handler prints some
>> > stuff to th
On 2/3/16, Don Zickus wrote:
> On Tue, Feb 02, 2016 at 03:40:34PM -0700, Jeffrey Merkey wrote:
>> >
>> > Please remember to add version history, so I can tell what changed.
>> >
>>
>> What command do I give to git when it creates the patch from
> Hmm, I am confused here. So you are saying because we are in the nmi
> handler you can not break into the system? The nmi handler prints some
> stuff to the screen, pokes the other cpus to print stuff to the screen and
> then returns to a normal operation. Unless you are saying the act of
>
On 2/3/16, Don Zickus <dzic...@redhat.com> wrote:
> On Wed, Feb 03, 2016 at 10:23:42AM -0700, Jeffrey Merkey wrote:
>> > Hmm, I am confused here. So you are saying because we are in the nmi
>> > handler you can not break into the system? The nmi handler prints so
>> So, if you disable 'sysctl_hardlockup_all_cpu_backtrace' and enable
>> 'hardlockup_panic', you should be able to achieve what you want, no?
>>
>> But you mentioned you wanted to recover? Hence avoiding the panic?
>>
>> Cheers,
>> Don
>>
>
> Yes. Avoiding the panic is what I wanted to do.
> Hmm, I am confused here. So you are saying because we are in the nmi
> handler you can not break into the system? The nmi handler prints some
> stuff to the screen, pokes the other cpus to print stuff to the screen and
> then returns to a normal operation. Unless you are saying the act of
>
On 2/3/16, Don Zickus <dzic...@redhat.com> wrote:
> On Tue, Feb 02, 2016 at 03:40:34PM -0700, Jeffrey Merkey wrote:
>> >
>> > Please remember to add version history, so I can tell what changed.
>> >
>>
>> What command do I give to git when it creates
On 2/2/16, Jeffrey Merkey wrote:
>> Because when you catch a bug in the hard lockup detector the system
>> just sits there hard hung and you are not able to get into a debugger
>> console since the system has crashed and the watchdog code has already
>> killed off the oth
> Because when you catch a bug in the hard lockup detector the system
> just sits there hard hung and you are not able to get into a debugger
> console since the system has crashed and the watchdog code has already
> killed off the other processors and locked up all the NMI interrupt
> handlers,
>
> Please remember to add version history, so I can tell what changed.
>
What command do I give to git when it creates the patch from git
format-patch that outputs what you are looking for or do I have to add
that manually. The diff of files changed?
>
> I am not sure I am a fan of this. You
On 2/2/16, Maciej W. Rozycki wrote:
> On Mon, 1 Feb 2016, Jeffrey Merkey wrote:
>
>> If a debugger is loaded it will not crash, just enter the debugger.
>> But yes, it will int3 if set and no debugger has been loaded to handle
>> the int3 condition. Hmmm. Maybe its bet
On 2/2/16, Maciej W. Rozycki <ma...@linux-mips.org> wrote:
> On Mon, 1 Feb 2016, Jeffrey Merkey wrote:
>
>> If a debugger is loaded it will not crash, just enter the debugger.
>> But yes, it will int3 if set and no debugger has been loaded to handle
>> the int3 condi
>
> Please remember to add version history, so I can tell what changed.
>
What command do I give to git when it creates the patch from git
format-patch that outputs what you are looking for or do I have to add
that manually. The diff of files changed?
>
> I am not sure I am a fan of this. You
> Because when you catch a bug in the hard lockup detector the system
> just sits there hard hung and you are not able to get into a debugger
> console since the system has crashed and the watchdog code has already
> killed off the other processors and locked up all the NMI interrupt
> handlers,
On 2/2/16, Jeffrey Merkey <jeffmer...@gmail.com> wrote:
>> Because when you catch a bug in the hard lockup detector the system
>> just sits there hard hung and you are not able to get into a debugger
>> console since the system has crashed and the watchdog code has already
allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
arch/x86/include/asm/bug.h
allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
lib/Kconfig.debug | 11
allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
kernel/watchdog.c | 10
On 2/1/16, Steven Rostedt wrote:
> On Mon, 1 Feb 2016 16:35:52 -0700
> Jeffrey Merkey wrote:
>> ---
>> include/linux/printk.h | 8
>> 1 file changed, 8 insertions(+)
>>
>> diff --git a/include/linux/printk.h b/include/linux/printk.h
>> inde
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
arch/x86/include
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
include/asm
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
lib
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
include/linux
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
include/linux
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
arch/x86/include
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
include/asm
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
lib
>>
>> +WARN(1, "Watchdog detected hard LOCKUP on cpu %d", this_cpu);
>> +
>
> So we repeat the same exact print message and dump the same stack again as
> we do a few lines above? That doesn't make any sense.
>
> Cheers,
> Don
>
Agreed. I'll go back and work on it.
Jeff
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
include/asm
time option also allows conditional breakpoints to be set in the kernel
where these macros have been previously placed.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
lib
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
arch/x86/include
On 2/1/16, Jeffrey Merkey wrote:
> On 2/1/16, kbuild test robot wrote:
>> Hi Jeffrey,
>>
>> [auto build test WARNING on v4.5-rc2]
>> [also build test WARNING on next-20160201]
>> [cannot apply to tip/x86/core]
>> [if your patch is applied to the wrong git
tem]
>
> url:
> https://github.com/0day-ci/linux/commits/Jeffrey-Merkey/Add-BUG_XX-debugging-options/20160202-040506
> config: x86_64-randconfig-x012-201605 (attached as .config)
> reproduce:
> # save the attached .config to linux build tree
> make ARCH=
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
lib
time option also allows conditional breakpoints to be set in the kernel
where these macros have been previously placed.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
arch/x86/include
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
---
include/asm
time option also allows conditional breakpoints to be set in the kernel
where these macros have been previously placed.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
On 2/1/16, Jeffrey Merkey <jeffmer...@gmail.com> wrote:
> On 2/1/16, kbuild test robot <l...@intel.com> wrote:
>> Hi Jeffrey,
>>
>> [auto build test WARNING on v4.5-rc2]
>> [also build test WARNING on next-20160201]
>> [cannot apply to tip/x86/core]
>>
>> +WARN(1, "Watchdog detected hard LOCKUP on cpu %d", this_cpu);
>> +
>
> So we repeat the same exact print message and dump the same stack again as
> we do a few lines above? That doesn't make any sense.
>
> Cheers,
> Don
>
Agreed. I'll go back and work on it.
Jeff
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
time option also allows conditional breakpoints to be set in the kernel
where these macros have been previously placed.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
; help improving the system]
>
> url:
> https://github.com/0day-ci/linux/commits/Jeffrey-Merkey/Add-BUG_XX-debugging-options/20160202-040506
> config: x86_64-randconfig-x012-201605 (attached as .config)
> reproduce:
> # save the attached .config to linux build tree
>
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.com>
---
allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.com>
--
On 2/1/16, Steven Rostedt <rost...@goodmis.org> wrote:
> On Mon, 1 Feb 2016 16:35:52 -0700
> Jeffrey Merkey <jeffmer...@gmail.com> wrote:
>> ---
>> include/linux/printk.h | 8
>> 1 file changed, 8 insertions(+)
>>
>> diff --git a/include/
option also allows conditional breakpoints to be set in the
kernel with these currently used macros.
This addition is extremely useful for debugging hard and soft lockups
real time and quickly from a console debugger, and other areas of the
kernel.
Signed-off-by: Jeffrey Merkey <jeffmer...@gmail.
On 1/29/16, Ingo Molnar wrote:
>
> * Jeffrey Merkey wrote:
>
>> On 1/28/16, Thomas Gleixner wrote:
>> > On Thu, 28 Jan 2016, Jeffrey Merkey wrote:
>> >> On 1/28/16, Thomas Gleixner wrote:
>> >> > I'm probably missing something obvious here.
1 - 100 of 277 matches
Mail list logo