Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754073AbaJ1M3u (ORCPT ); Tue, 28 Oct 2014 08:29:50 -0400 Received: from mx1.redhat.com ([209.132.183.28]:54682 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750857AbaJ1M3s (ORCPT ); Tue, 28 Oct 2014 08:29:48 -0400 Date: Tue, 28 Oct 2014 08:29:00 -0400 From: Vivek Goyal To: Prarit Bhargava Cc: Andi Kleen , linux-kernel@vger.kernel.org, Jonathan Corbet , Andrew Morton , Rusty Russell , "H. Peter Anvin" , Masami Hiramatsu , Fabian Frederick , isimatu.yasuaki@jp.fujitsu.com, linux-doc@vger.kernel.org, kexec@lists.infradead.org, linux-api@vger.kernel.org, jason.wessel@windriver.com Subject: Re: [PATCH V4] kernel, add bug_on_warn Message-ID: <20141028122900.GA10632@redhat.com> References: <1414155207-29839-1-git-send-email-prarit@redhat.com> <20141028121636.GC3274@tassilo.jf.intel.com> <544F8A78.9070008@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <544F8A78.9070008@redhat.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 28, 2014 at 08:22:16AM -0400, Prarit Bhargava wrote: > > > On 10/28/2014 08:16 AM, Andi Kleen wrote: > > On Fri, Oct 24, 2014 at 08:53:27AM -0400, Prarit Bhargava wrote: > >> There have been several times where I have had to rebuild a kernel to > >> cause a panic when hitting a WARN() in the code in order to get a crash > >> dump from a system. Sometimes this is easy to do, other times (such as > >> in the case of a remote admin) it is not trivial to send new images to the > >> user. > >> > >> A much easier method would be a switch to change the WARN() over to a > >> BUG(). This makes debugging easier in that I can now test the actual > >> image the WARN() was seen on and I do not have to engage in remote > >> debugging. > > > > IMHO this would be better and far more generically done with kdb. > > You would need two things: > > > > - Extend the break point command to run another command on a break point. > > - Add a command line (or possibly /proc) option to execute some kdb commands at > > kernel boot. > > I suppose ... but that would mean I would have to explain to an end user the > elaborate process of enabling kdb, inserting a break point, etc. The whole > purpose of this is to let an end user panic on WARN() easily. > > Asking an end user to enable kdb is magnitudes worse than asking them to > recompile a kernel. Agreed. Asking a customer to setup and run kdb and put breakpoints is much more pain than simply asking to reboot kernel with a command line option. Thanks Vivek -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/