Re: [RFC] how to perform a safe NMI stack trace on all CPUs on x86?
From: long.wanglong
Date: Thu May 14 2015 - 07:18:08 EST
On 2015/5/13 22:22, Steven Rostedt wrote:
> On Wed, 13 May 2015 22:14:54 +0800
> "çé" <wanglong@xxxxxxxxxxxxx> wrote:
>
>
>> context. But how do we fix this problem in older version of kernel(eg, 3.10 stable)?
>> The 3.10 stable has no "switch printk routine" and "seq_buf" infrastructures.
>>
>> Could anyone give me some ideas?
>>
>
> Backport the necessary patches.
>
> -- Steve
>
Hi Steve,
Thank you for your reply, I will backport necessary patches to 3.10 stable.
Welcome you to review my backport patches.
Best Regards
Wang Long
> .
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/