Bug 104912
Summary: | RFE: would like echo p > /proc/sysrq-trigger to show registers | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 2.1 | Reporter: | David Truchan <david.truchan-contr> |
Component: | kernel | Assignee: | dff <dff> |
Status: | CLOSED NOTABUG | QA Contact: | Brian Brock <bbrock> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 2.1 | CC: | dff, riel |
Target Milestone: | --- | Keywords: | FutureFeature |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Enhancement | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2005-05-04 20:53:30 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
David Truchan
2003-09-23 14:59:57 UTC
If "echo p > /proc/sysrq-trigger" dumps the registers, you are almost certain to see a process in the middle of sys_write(2), to a file in /proc. More precisely, it'll be writing to /proc/sysrq-trigger. I'm not sure how dumping that info would be very useful, since you know what's happening on your cpu when you echo something to /proc/sysrq-trigger ... However, let me know if I've overlooked something (I wouldn't be surprised). You bring up a good point, if the only info you'll gather is capturing a syswrite from the "echo p" process, than I guess that doesn't make a whole lot of sense. Is there any way to dump the regs remotely if you're not in front of the console? Over serial console you can trigger sysrq commands. By default you need to send a break, followed by the sysrq letter. In /proc/sys/kernel/sysrq-key you can configure another special key, which is useful if your terminal program doesn't want to send a break. Closing as this appears to be resolved. |