Question about dev_queue_xmit and guaranteed packet transmission

2019-05-08 Thread Jeffrey Merkey
I noticed that Linux has been updated on later versions to always consume the skb in calls to dev_queue_xmit, and may even drop the skb after returning a return code of NETDEV_TX_OK which seems kind of broken. I have an application which requires guaranteed skb transmission and the following code

Re: [GIT PULL] MDB Linux Kernel Debugger v4.8 (for kbuild robot testing)

2016-10-03 Thread Jeffrey Merkey
On 10/3/16, Jeffrey Merkey wrote: > On 10/3/16, Joe Perches wrote: >> >> On Tue, 2016-10-04 at 13:29 +1100, Stephen Rothwell wrote: >>> Hi Joe, >> >> Hi Stephen. >> >>> On Mon, 03 Oct 2016 18:47:04 -0700 Joe Perches wrote: >>> >

Re: [GIT PULL] MDB Linux Kernel Debugger v4.8 (for kbuild robot testing)

2016-10-03 Thread Jeffrey Merkey
On 10/3/16, Joe Perches wrote: > > On Tue, 2016-10-04 at 13:29 +1100, Stephen Rothwell wrote: >> Hi Joe, > > Hi Stephen. > >> On Mon, 03 Oct 2016 18:47:04 -0700 Joe Perches wrote: >> > >> > On Mon, 2016-10-03 at 18:17 -0600, Jeffrey Merkey wro

[GIT PULL] MDB Linux Kernel Debugger v4.8 (for kbuild robot testing)

2016-10-03 Thread Jeffrey Merkey
Debugger to Linux Kernel v4.8 (2016-10-02 20:33:55 -0600) Jeffrey Merkey (1): Add MDB Debugger to Linux Kernel v4.8 Documentation/sysrq.txt|2 +- MAINTAINERS|6 + arch

[GIT PULL] MDB Linux Kernel Debugger v4.8 (for kbuild robot testing)

2016-10-03 Thread Jeffrey Merkey
Debugger to Linux Kernel v4.8 (2016-10-02 20:33:55 -0600) Jeffrey Merkey (1): Add MDB Debugger to Linux Kernel v4.8 Documentation/sysrq.txt|2 +- MAINTAINERS|6 + arch

[ANNOUNCE] MDB Linux Kernel Debugger Linux v4.6

2016-05-16 Thread Jeffrey Merkey
01-Add-MDB-Linux-Kernel-Debugger-to-Linux-v4.6.patch has no obvious style problems and is ready for submission. -------- Jeffrey Merkey (1): Add MDB Linux Kernel Debugger to Linux v4.6 Documentation/sysrq.txt

Re: [GIT PULL v4.6] MDB Linux Kernel Debugger x86/x86_64

2016-03-25 Thread Jeffrey Merkey
On 3/25/16, Stephen Rothwell wrote: > Hi Jeff, > > On Fri, 25 Mar 2016 17:01:27 -0600 Jeffrey Merkey > wrote: >> >> I went back and checked the code and as it turns out, none of the >> patches you nak'd are in the current branch, there are different >> p

Re: [GIT PULL v4.6] MDB Linux Kernel Debugger x86/x86_64

2016-03-25 Thread Jeffrey Merkey
On 3/25/16, Jeffrey Merkey wrote: > On 3/25/16, Jeffrey Merkey wrote: >> On 3/25/16, Jeffrey Merkey wrote: >>> On 3/25/16, Ingo Molnar wrote: >>>> >>>> * Stephen Rothwell wrote: >>>> >>>>> Hi Joe, >>>>> >&

Re: [GIT PULL v4.6] MDB Linux Kernel Debugger x86/x86_64

2016-03-25 Thread Jeffrey Merkey
On 3/25/16, Jeffrey Merkey wrote: > On 3/25/16, Jeffrey Merkey wrote: >> On 3/25/16, Ingo Molnar wrote: >>> >>> * Stephen Rothwell wrote: >>> >>>> Hi Joe, >>>> >>>> On Mon, 14 Mar 2016 16:57:03 -0700 Joe Perches wrot

Re: [GIT PULL v4.6] MDB Linux Kernel Debugger x86/x86_64

2016-03-25 Thread Jeffrey Merkey
On 3/25/16, Jeffrey Merkey wrote: > On 3/25/16, Ingo Molnar wrote: >> >> * Stephen Rothwell wrote: >> >>> Hi Joe, >>> >>> On Mon, 14 Mar 2016 16:57:03 -0700 Joe Perches wrote: >>> > >>> > On Mon, 2016-03-14 at 17:50

Re: [GIT PULL v4.6] MDB Linux Kernel Debugger x86/x86_64

2016-03-25 Thread Jeffrey Merkey
On 3/25/16, Ingo Molnar wrote: > > * Stephen Rothwell wrote: > >> Hi Joe, >> >> On Mon, 14 Mar 2016 16:57:03 -0700 Joe Perches wrote: >> > >> > On Mon, 2016-03-14 at 17:50 -0600, Jeffrey Merkey wrote: >> > > The following changes sin

Re: [GIT PULL v4.6] MDB Linux Kernel Debugger x86/x86_64

2016-03-19 Thread Jeffrey Merkey
On 3/17/16, Joe Perches wrote: > On Thu, 2016-03-17 at 23:31 -0600, Jeffrey Merkey wrote: >> On 3/16/16, Jeffrey Merkey wrote: >> > On 3/15/16, Theodore Ts'o wrote: >> > > On Tue, Mar 15, 2016 at 01:03:39PM +1100, Stephen Rothwell wrote: >> > &g

Re: [GIT PULL v4.6] MDB Linux Kernel Debugger x86/x86_64

2016-03-18 Thread Jeffrey Merkey
On 3/15/16, Theodore Ts'o wrote: > On Tue, Mar 15, 2016 at 01:03:39PM +1100, Stephen Rothwell wrote: >> We don't generally PGP (GPG) sign commits in the kernel tree (so "-S" >> is not required), just tags. However we always require that anyone who >> handles a patch adds a Signed-off-by line to t

Re: [GIT PULL v4.6] MDB Linux Kernel Debugger x86/x86_64

2016-03-18 Thread Jeffrey Merkey
On 3/16/16, Jeffrey Merkey wrote: > On 3/15/16, Theodore Ts'o wrote: >> On Tue, Mar 15, 2016 at 01:03:39PM +1100, Stephen Rothwell wrote: >>> We don't generally PGP (GPG) sign commits in the kernel tree (so "-S" >>> is not required), just t

Re: [GIT PULL v4.6] MDB Linux Kernel Debugger x86/x86_64

2016-03-14 Thread Jeffrey Merkey
On 3/14/16, Stephen Rothwell wrote: > Hi Joe, > > On Mon, 14 Mar 2016 16:57:03 -0700 Joe Perches wrote: >> >> On Mon, 2016-03-14 at 17:50 -0600, Jeffrey Merkey wrote: >> > The following changes since commit >> > b562e44f507e863c6792946e4e1b1449fbbac85d: >

[GIT PULL v4.6] MDB Linux Kernel Debugger x86/x86_64

2016-03-14 Thread Jeffrey Merkey
problems and is ready for submission. Jeffrey Merkey (1): Add MDB Debugger to linux v4.5 Documentation/sysrq.txt|2 +- MAINTAINERS|6 + arch/x86/include/asm/bug.h

[GIT PULL v4.6 UPDATED] Add MDB Kernel Debugger Linux v4.6

2016-02-29 Thread Jeffrey Merkey
s and is ready for submission. ------------ Jeffrey Merkey (3): Add MDB Kernel Debugger for Linux to Linus' Tree Add Kconfig.debug options for build Add kbuild-test-robot fixes for CONFIG_VT Documentation/sysrq.txt

[GIT PULL v4.6] Add MDB Kernel Debugger to Linux Kernel v4.6

2016-02-29 Thread Jeffrey Merkey
s and is ready for submission. ------------ Jeffrey Merkey (3): Add MDB Kernel Debugger for Linux to Linus' Tree Add Kconfig.debug options for build Add kbuild-test-robot fixes for CONFIG_VT Documentation/sysrq.txt

[PATCH] Add fix case for open braces

2016-02-15 Thread Jeffrey Merkey
Some quite excellent fixes from Joe Perches that belong back in the original. Submitting to Joe for inclusion. Joe was the original author of these fixes that save a lot of time rewriting code. Thanks Joe. Signed-off-by: Jeffrey Merkey --- scripts/checkpatch.pl | 23

Re: [PATCH v5 3/3] Add BUG_XX() debugging hard/soft lockup detection

2016-02-03 Thread Jeffrey Merkey
>> So, if you disable 'sysctl_hardlockup_all_cpu_backtrace' and enable >> 'hardlockup_panic', you should be able to achieve what you want, no? >> >> But you mentioned you wanted to recover? Hence avoiding the panic? >> >> Cheers, >> Don >> > > Yes. Avoiding the panic is what I wanted to do. Thes

Re: [PATCH v5 3/3] Add BUG_XX() debugging hard/soft lockup detection

2016-02-03 Thread Jeffrey Merkey
On 2/3/16, Don Zickus wrote: > On Wed, Feb 03, 2016 at 10:23:42AM -0700, Jeffrey Merkey wrote: >> > Hmm, I am confused here. So you are saying because we are in the nmi >> > handler you can not break into the system? The nmi handler prints some >> > stuff to the s

Re: [PATCH v5 3/3] Add BUG_XX() debugging hard/soft lockup detection

2016-02-03 Thread Jeffrey Merkey
On 2/3/16, Don Zickus wrote: > On Tue, Feb 02, 2016 at 03:40:34PM -0700, Jeffrey Merkey wrote: >> > >> > Please remember to add version history, so I can tell what changed. >> > >> >> What command do I give to git when it creates the patch from git

Re: [PATCH v5 3/3] Add BUG_XX() debugging hard/soft lockup detection

2016-02-03 Thread Jeffrey Merkey
> Hmm, I am confused here. So you are saying because we are in the nmi > handler you can not break into the system? The nmi handler prints some > stuff to the screen, pokes the other cpus to print stuff to the screen and > then returns to a normal operation. Unless you are saying the act of > se

Re: [PATCH v5 3/3] Add BUG_XX() debugging hard/soft lockup detection

2016-02-02 Thread Jeffrey Merkey
On 2/2/16, Jeffrey Merkey wrote: >> Because when you catch a bug in the hard lockup detector the system >> just sits there hard hung and you are not able to get into a debugger >> console since the system has crashed and the watchdog code has already >> killed off the oth

Re: [PATCH v5 3/3] Add BUG_XX() debugging hard/soft lockup detection

2016-02-02 Thread Jeffrey Merkey
> Because when you catch a bug in the hard lockup detector the system > just sits there hard hung and you are not able to get into a debugger > console since the system has crashed and the watchdog code has already > killed off the other processors and locked up all the NMI interrupt > handlers, th

Re: [PATCH v5 3/3] Add BUG_XX() debugging hard/soft lockup detection

2016-02-02 Thread Jeffrey Merkey
> > Please remember to add version history, so I can tell what changed. > What command do I give to git when it creates the patch from git format-patch that outputs what you are looking for or do I have to add that manually. The diff of files changed? > > I am not sure I am a fan of this. You a

Re: [PATCH v4 4/4] pr_emerg add WARN_XX() debugger options

2016-02-02 Thread Jeffrey Merkey
On 2/2/16, Maciej W. Rozycki wrote: > On Mon, 1 Feb 2016, Jeffrey Merkey wrote: > >> If a debugger is loaded it will not crash, just enter the debugger. >> But yes, it will int3 if set and no debugger has been loaded to handle >> the int3 condition. Hmmm. Maybe its bet

[PATCH v5 1/3] Add BUG_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- arch/x86/include/asm/bug.h

[PATCH v5 2/3] Add BUG_XX() debugging options Kconfig.debug

2016-02-01 Thread Jeffrey Merkey
allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- lib/Kconfig.debug | 11

[PATCH v5 3/3] Add BUG_XX() debugging hard/soft lockup detection

2016-02-01 Thread Jeffrey Merkey
allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- kernel/watchdog.c | 10

Re: [PATCH v4 4/4] pr_emerg add WARN_XX() debugger options

2016-02-01 Thread Jeffrey Merkey
On 2/1/16, Steven Rostedt wrote: > On Mon, 1 Feb 2016 16:35:52 -0700 > Jeffrey Merkey wrote: >> --- >> include/linux/printk.h | 8 >> 1 file changed, 8 insertions(+) >> >> diff --git a/include/linux/printk.h b/include/linux/printk.h >> inde

[PATCH v4 1/4] Add BUG_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- arch/x86/include

[PATCH v4 2/4] Add WARN_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- include/asm

[PATCH v4 3/4] Add BUG_XX() and WARN_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- lib

[PATCH v4 4/4] pr_emerg add WARN_XX() debugger options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- include/linux

[PATCH v3 4/4] pr_emerg add WARN_XX() debugger options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- include/linux

[PATCH v3 1/4] Add BUG_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- arch/x86/include

[PATCH v3 2/4] Add WARN_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- include/asm

[PATCH v3 3/4] Add BUG_XX() and WARN_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- lib

Re: [PATCH v2 4/4] Add WARN() function call to hard-soft lockup

2016-02-01 Thread Jeffrey Merkey
>> >> +WARN(1, "Watchdog detected hard LOCKUP on cpu %d", this_cpu); >> + > > So we repeat the same exact print message and dump the same stack again as > we do a few lines above? That doesn't make any sense. > > Cheers, > Don > Agreed. I'll go back and work on it. Jeff

[PATCH v2 2/4] Add WARN_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- include/asm

[PATCH v2 4/4] Add WARN() function call to hard-soft lockup

2016-02-01 Thread Jeffrey Merkey
time option also allows conditional breakpoints to be set in the kernel where these macros have been previously placed. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey

[PATCH v2 3/4] Add BUG_XX() and WARN_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- lib

[PATCH v2 1/4] Add BUG_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- arch/x86/include

Re: [PATCH 1/4] Add BUG_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
On 2/1/16, Jeffrey Merkey wrote: > On 2/1/16, kbuild test robot wrote: >> Hi Jeffrey, >> >> [auto build test WARNING on v4.5-rc2] >> [also build test WARNING on next-20160201] >> [cannot apply to tip/x86/core] >> [if your patch is applied to the wrong git

Re: [PATCH 1/4] Add BUG_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
tem] > > url: > https://github.com/0day-ci/linux/commits/Jeffrey-Merkey/Add-BUG_XX-debugging-options/20160202-040506 > config: x86_64-randconfig-x012-201605 (attached as .config) > reproduce: > # save the attached .config to linux build tree > make ARCH=x86

[PATCH 3/4] Add BUG_XX() and WARN_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- lib

[PATCH 4/4] Add WARN() function call to hard-soft lockup

2016-02-01 Thread Jeffrey Merkey
time option also allows conditional breakpoints to be set in the kernel where these macros have been previously placed. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey

[PATCH 1/4] Add BUG_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- arch/x86/include

[PATCH 2/4] Add WARN_XX() debugging options

2016-02-01 Thread Jeffrey Merkey
option also allows conditional breakpoints to be set in the kernel with these currently used macros. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- include/asm

Re: [PATCH 01/31] Add hard/soft lockup debugger entry points

2016-01-29 Thread Jeffrey Merkey
On 1/29/16, Ingo Molnar wrote: > > * Jeffrey Merkey wrote: > >> On 1/28/16, Thomas Gleixner wrote: >> > On Thu, 28 Jan 2016, Jeffrey Merkey wrote: >> >> On 1/28/16, Thomas Gleixner wrote: >> >> > I'm probably missing something obvious

[PATCH 2/4] Add BUG() debugger entry points x86

2016-01-29 Thread Jeffrey Merkey
allows conditional breakpoints to be set anywhere in the kernel. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- arch/x86/include/asm/bug.h | 4 1 file

[PATCH 1/4] Add BUG() debugger entry points

2016-01-29 Thread Jeffrey Merkey
allows conditional breakpoints to be set anywhere in the kernel. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- kernel/watchdog.c | 6 ++ 1 file changed, 6

[PATCH 4/4] Fix kgdb/kdb to conform to int3 format

2016-01-29 Thread Jeffrey Merkey
. Signed-off-by: Jeffrey Merkey --- arch/x86/include/asm/kgdb.h | 2 +- kernel/debug/kdb/kdb_debugger.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/include/asm/kgdb.h b/arch/x86/include/asm/kgdb.h index 332f98c..e24908a 100644 --- a/arch/x86/include/asm/kgdb.h

[PATCH 3/4] Add BUG() debugger entry points Build Option

2016-01-29 Thread Jeffrey Merkey
allows conditional breakpoints to be set anywhere in the kernel. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger, and other areas of the kernel. Signed-off-by: Jeffrey Merkey --- lib/Kconfig.debug | 11 +++ 1 file

Re: [PATCH 01/31] Add hard/soft lockup debugger entry points

2016-01-29 Thread Jeffrey Merkey
On 1/29/16, Jeffrey Merkey wrote: > On 1/29/16, Ingo Molnar wrote: >> >> * Jeffrey Merkey wrote: >> >>> On 1/28/16, Thomas Gleixner wrote: >>> > On Thu, 28 Jan 2016, Jeffrey Merkey wrote: >>> >> On 1/28/16, Thomas Gleixner wr

Re: [PATCH 01/31] Add hard/soft lockup debugger entry points

2016-01-29 Thread Jeffrey Merkey
On 1/29/16, Ingo Molnar wrote: > > * Jeffrey Merkey wrote: > >> On 1/28/16, Thomas Gleixner wrote: >> > On Thu, 28 Jan 2016, Jeffrey Merkey wrote: >> >> On 1/28/16, Thomas Gleixner wrote: >> >> > I'm probably missing something obvious

Re: [PATCH 01/31] Add hard/soft lockup debugger entry points

2016-01-29 Thread Jeffrey Merkey
On 1/29/16, Ingo Molnar wrote: > > * Jeffrey Merkey wrote: > >> On 1/28/16, Thomas Gleixner wrote: >> > On Thu, 28 Jan 2016, Jeffrey Merkey wrote: >> >> On 1/28/16, Thomas Gleixner wrote: >> >> > I'm probably missing something obvious

Re: [PATCH 07/31] Add debugger entry points for NIOS2

2016-01-28 Thread Jeffrey Merkey
On 1/28/16, Ley Foon Tan wrote: > On Fri, Jan 29, 2016 at 3:46 AM, Jeffrey Merkey > wrote: >> This patch series adds an export which can be set by system debuggers to >> direct the hard lockup and soft lockup detector to trigger a breakpoint >> exception and enter a d

Re: [PATCH 01/31] Add hard/soft lockup debugger entry points

2016-01-28 Thread Jeffrey Merkey
> > You obviously completely ignored this part of my reply: > >> > If we follow your argumentation we need another gazillion of >> > conditional >> > breakpoints in the kernel Actually, I was not suggesting this at all. But now that you mention it, there is already a BUG() macro that inserts a a

Re: [PATCH 30/31] Add debugger entry points for SPARC

2016-01-28 Thread Jeffrey Merkey
On 1/28/16, Sam Ravnborg wrote: > Hi Jeff. > >> +++ b/arch/sparc/include/asm/kdebug.h >> @@ -5,4 +5,9 @@ >> #else >> #include >> #endif >> + >> +static inline void arch_breakpoint(void) >> +{ >> +asm("ta $0x7d"); >> +} >> #endif > There seems to be some debugger infrastructure present alr

Re: [PATCH 01/31] Add hard/soft lockup debugger entry points

2016-01-28 Thread Jeffrey Merkey
On 1/28/16, Thomas Gleixner wrote: > On Thu, 28 Jan 2016, Jeffrey Merkey wrote: >> On 1/28/16, Thomas Gleixner wrote: >> > I'm probably missing something obvious here. >> >> It's a pain in the butt to grep around through assembly language in a >&

Re: [PATCH 01/31] Add hard/soft lockup debugger entry points

2016-01-28 Thread Jeffrey Merkey
On 1/28/16, Chris Metcalf wrote: > On 01/28/2016 02:46 PM, Jeffrey Merkey wrote: >> This patch series adds an export which can be set by system debuggers to >> direct the hard lockup and soft lockup detector to trigger a breakpoint >> exception and enter a debugger if

Re: [PATCH 27/31] Add debugger entry points for M68K

2016-01-28 Thread Jeffrey Merkey
On 1/28/16, Geert Uytterhoeven wrote: > Hi Jeffrey, > > CC linux-arch > > On Thu, Jan 28, 2016 at 8:47 PM, Jeffrey Merkey > wrote: >> This patch series adds an export which can be set by system debuggers to >> direct the hard lockup and soft lockup detector to tri

Re: [PATCH 02/31] Add debugger entry points for X86

2016-01-28 Thread Jeffrey Merkey
On 1/28/16, H. Peter Anvin wrote: > On 01/28/16 11:46, Jeffrey Merkey wrote: >> This patch series adds an export which can be set by system debuggers to >> direct the hard lockup and soft lockup detector to trigger a breakpoint >> exception and enter a debugger if one is a

Re: [PATCH 03/31] Add debugger entry points for AVR32

2016-01-28 Thread Jeffrey Merkey
On 1/28/16, Hans-Christian Noren Egtvedt wrote: > Around Thu 28 Jan 2016 12:46:17 -0700 or thereabout, Jeffrey Merkey wrote: >> This patch series adds an export which can be set by system debuggers to >> direct the hard lockup and soft lockup detector to trigger a breakpoint &

Re: [PATCH 01/31] Add hard/soft lockup debugger entry points

2016-01-28 Thread Jeffrey Merkey
On 1/28/16, Thomas Gleixner wrote: > On Thu, 28 Jan 2016, Jeffrey Merkey wrote: > >> This patch series adds an export which can be set by system debuggers to >> direct the hard lockup and soft lockup detector to trigger a breakpoint >> exception and enter a debugger

[PATCH 17/31] Add debugger entry points for ARM

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/arm/include/asm/kdebug.h | 5 + 1 file changed, 5 insertions(+) create mode

[PATCH 16/31] Add debugger entry points for UM

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/um/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) create mode

[PATCH 13/31] Add debugger entry points for MICROBLAZE

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/microblaze/include/asm/kdebug.h | 5 + 1 file changed, 5 insertions(+) diff

[PATCH 12/31] Add debugger entry points for BLACKFIN

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/blackfin/include/asm/kdebug.h | 5 + 1 file changed, 5 insertions(+) create

[PATCH 01/31] Add hard/soft lockup debugger entry points

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- kernel/watchdog.c | 10 ++ 1 file changed, 10 insertions(+) diff --git a

[PATCH 07/31] Add debugger entry points for NIOS2

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/nios2/include/asm/kdebug.h | 5 + 1 file changed, 5 insertions(+) create

[PATCH 05/31] Add debugger entry points for IA64

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/ia64/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) diff --git a

[PATCH 11/31] Add debugger entry points for ARC

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/arc/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) diff --git a

[PATCH 03/31] Add debugger entry points for AVR32

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/avr32/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) diff --git

[PATCH 25/31] Add debugger entry points for CRIS

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/cris/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) create mode

[PATCH 24/31] Add debugger entry points for UNICORE32

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/unicore32/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) create

[PATCH 19/31] Add debugger entry points for H8300

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/h8300/include/asm/kdebug.h | 5 + 1 file changed, 5 insertions(+) create

[PATCH 30/31] Add debugger entry points for SPARC

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/sparc/include/asm/kdebug.h | 5 + 1 file changed, 5 insertions(+) diff --git

[PATCH 27/31] Add debugger entry points for M68K

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/m68k/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) create mode

[PATCH 22/31] Add debugger entry points for PARISC

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/parisc/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) create

[PATCH 26/31] Add debugger entry points for HEXAGON

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/hexagon/include/asm/kdebug.h | 5 + 1 file changed, 5 insertions(+) create

[PATCH 31/31] Add debugger entry points for ARM64

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/arm64/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) create mode

[PATCH 28/31] Add debugger entry points for MN10300

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/mn10300/include/asm/kdebug.h | 7 +++ 1 file changed, 7 insertions(+) diff

[PATCH 29/31] Add debugger entry points for POWERPC

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/powerpc/include/asm/kdebug.h | 5 + 1 file changed, 5 insertions(+) diff

[PATCH 21/31] Add debugger entry points for MIPS

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/mips/include/asm/kdebug.h | 12 1 file changed, 12 insertions

[PATCH 15/31] Add debugger entry points for SCORE

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/score/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) diff --git

[PATCH 14/31] Add debugger entry points for OPENRISC

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/openrisc/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) create

[PATCH 20/31] Add debugger entry points for M32R

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/m32r/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) diff --git a

[PATCH 23/31] Add debugger entry points for SH

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/sh/include/asm/kdebug.h | 5 + 1 file changed, 5 insertions(+) diff --git a

[PATCH 09/31] Add debugger entry points for TILE

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/tile/include/asm/kdebug.h | 6 ++ 1 file changed, 6 insertions(+) diff --git

[PATCH 06/31] Add debugger entry points for METAG

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/metag/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) create mode

[PATCH 18/31] Add debugger entry points for C6X

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/c6x/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) create mode

[PATCH 08/31] Add debugger entry points for S390

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/s390/include/asm/kdebug.h | 5 + 1 file changed, 5 insertions(+) diff --git

[PATCH 10/31] Add debugger entry points for XTENSA

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/xtensa/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) create

[PATCH 04/31] Add debugger entry points for FRV

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/frv/include/asm/kdebug.h | 4 1 file changed, 4 insertions(+) diff --git a

[PATCH 02/31] Add debugger entry points for X86

2016-01-28 Thread Jeffrey Merkey
actively loaded or registered via the notify die handler chain. This addition is extremely useful for debugging hard and soft lockups real time and quickly from a console debugger. Signed-off-by: Jeffrey Merkey --- arch/x86/include/asm/kdebug.h | 5 + 1 file changed, 5 insertions(+) diff --git a

[ANNOUNCE] MDB Kernel Debugger linux-stable v4.1.15, v4.3.2, v4.3.3, v4.2.8

2015-12-15 Thread Jeffrey Merkey
MDB Kernel Debugger Patches Released for v4.1.15, v4.3.2, v4.3.3, v4.2.8 on the linux-stable tree. Linux 4.x Patches * Linux v4.3.3 : https://github.com/jeffmerkey/linux-stable/compare/v4.3.3...jeffmerkey:mdb-v4.3.3.diff * Linux v4.3.2 : https://github.com/jeffmerkey/linux-stable/compare/v4.3.2..

[ANNOUNCE] MDB Linux Kernel debugger linux-stable 4.3.1 and 4.2.7

2015-12-09 Thread Jeffrey Merkey
MDB Linux Kernel Debugger Patches Released for 4.3.1 and 4.2.7 on the linux-stable tree. Linux 4.X Patches * Linux v4.3.1 : https://github.com/jeffmerkey/linux-stable/compare/v4.3.1...jeffmerkey:mdb-v4.3.1.diff * Linux v4.2.7 : https://github.com/jeffmerkey/linux-stable/compare/v4.2.7...jeffmerke

  1   2   >