Received: by 10.223.176.46 with SMTP id f43csp1979490wra; Thu, 25 Jan 2018 03:04:50 -0800 (PST) X-Google-Smtp-Source: AH8x224o2qO0umUjNxlMwG1z9W9twmUSrJVAt0agOUDw4fUz7v6PXHNQkSXH6tQ+t5ndi7hF01oe X-Received: by 2002:a17:902:3083:: with SMTP id v3-v6mr11098416plb.426.1516878290331; Thu, 25 Jan 2018 03:04:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516878290; cv=none; d=google.com; s=arc-20160816; b=KQoEXTfxMGOopDL6FiFq25aQ+souKPJqsE7GJovI8O7u3+fDOXPpPxWJv0K1Mn0z7/ UnxobPhQcO7izqfoOLdVEt8MxUkhKzpxHq2gNio+6vcUcsFSDIzdv8SOpT3DbH2clSsu tLyd/xljThhrcC649YHNs1jr3Q5hWlJq59uI5eGJGN/V+J4NM2BIr/540JJvhujQEgBN DbH4cE2u1MihSEJYjsOH8WWFi40df+jQ/eW3jlkqNIHEE8AepTjgmo6IJGxoSTgoVclf iae4l8wqRq9SVuqPa/SqojGKdkI9T5QrxCy4M3ygbTW6avlOUVmdGrvaalQpz7ynZ8NY +WgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dmarc-filter:arc-authentication-results; bh=AlLALzhi7pDYY19aC8bR8oAK2okHTCBhBUqTejfRNag=; b=W3NygsxECiKN9n+XrGoXZZ7ckocobejnlfSOinWnf1VGzXGR0+wWn92Odx1688X5j0 7aX7h9fQ+/m6VF4Zkiv1RX32ctsKbgp3E3wmb2fFUiNtfHp2rb7wI3hEMuwl/rMsCTM7 VltoFBUl3iWMn9I76eRDzCFhj+WS/Evmjzxs8v1GW9/G5J2AAguj2uRtsp6iS2Rp1nCK Y7gAkfGzJ73X3bLcGrk0EKkrsKkAbEoNsvgH/lEkeljaklzkvnWbDgvDByUAhgatJ0Hw KLLAckDAWEGRy97anCuTyPuM5kj0c5L6aghd//q8XMtYOiKJC1HLakmAGiqLycl4ewOl hEJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a18si4440221pfg.271.2018.01.25.03.04.36; Thu, 25 Jan 2018 03:04:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751546AbeAYLDl (ORCPT + 99 others); Thu, 25 Jan 2018 06:03:41 -0500 Received: from mail.kernel.org ([198.145.29.99]:41646 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751188AbeAYLDj (ORCPT ); Thu, 25 Jan 2018 06:03:39 -0500 Received: from vmware.local.home (cz5.datarail.eu [185.14.255.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6AA5C21778; Thu, 25 Jan 2018 11:03:36 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 6AA5C21778 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=goodmis.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=rostedt@goodmis.org Date: Thu, 25 Jan 2018 06:03:30 -0500 From: Steven Rostedt To: Frank Rowand Cc: Wolfram Sang , devicetree@vger.kernel.org, Tyrel Datwyler , Geert Uytterhoeven , linux-renesas-soc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, Rob Herring , linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH v2 0/1] of: easier debugging for node life cycle issues Message-ID: <20180125060330.781667e9@vmware.local.home> In-Reply-To: <00fc90ee-de26-f819-9c81-27d06918564d@gmail.com> References: <20180121143117.19805-1-wsa+renesas@sang-engineering.com> <00fc90ee-de26-f819-9c81-27d06918564d@gmail.com> X-Mailer: Claws Mail 3.15.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 24 Jan 2018 22:55:13 -0800 Frank Rowand wrote: > Hi Steve, > > Off the top of your head, can you tell me know early in the boot > process a trace_event can be called and successfully provide the > data to someone trying to debug early boot issues? The trace events are enabled by early_initcall(). > > Also, way back when version 1 of this patch was being discussed, > a question about stacktrace triggers: > > >>> # echo stacktrace > /sys/kernel/debug/tracing/trace_options > >>> # cat trace | grep -A6 "/pci@800000020000018" > >> > >> Just to let you know that there is now stacktrace event triggers, where > >> you don't need to stacktrace all events, you can pick and choose. And > >> even filter the stack trace on specific fields of the event. > > > > This is great, and I did figure that out this afternoon. One thing I was > > still trying to determine though was whether its possible to set these > > triggers at boot? As far as I could tell I'm still limited to > > "trace_options=stacktrace" as a kernel boot parameter to get the stack > > for event tracepoints. > > No not yet. But I'll add that to the todo list. > > Thanks, > > -- Steve > > Is this still on your todo list, or is it now available? Still on the todo list. As someone once said, there really is no todo list, but just work on the stuff that people are yelling the loudest about. Yell louder, and it will get done quicker ;-) -- Steve