Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S964934AbXLQVhx (ORCPT ); Mon, 17 Dec 2007 16:37:53 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755045AbXLQVhl (ORCPT ); Mon, 17 Dec 2007 16:37:41 -0500 Received: from pentafluge.infradead.org ([213.146.154.40]:52884 "EHLO pentafluge.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754290AbXLQVhi (ORCPT ); Mon, 17 Dec 2007 16:37:38 -0500 Date: Mon, 17 Dec 2007 13:36:31 -0800 From: Arjan van de Ven To: Ingo Molnar Cc: linux-kernel@vger.kernel.org, Andrew Morton , Linus Torvalds , protasnb@gmail.com, tytso@thunk.org Subject: Re: Top kernel oopses/warnings this week Message-ID: <20071217133631.5bbc5842@laptopd505.fenrus.org> In-Reply-To: <20071217172331.GA23070@elte.hu> References: <4762CF8C.90808@linux.intel.com> <20071217172331.GA23070@elte.hu> Organization: Intel X-Mailer: Claws Mail 3.0.2 (GTK+ 2.12.1; i386-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4485 Lines: 129 On Mon, 17 Dec 2007 18:23:31 +0100 Ingo Molnar wrote: > > * Arjan van de Ven wrote: > > > The http://www.kerneloops.org website collects kernel oops and > > warning reports from various mailing lists and bugzillas; below is > > a top 10 list of the oopses collected in the last 7 days. (Reports > > prior to 2.6.23 have been omitted in collecting the top 10) > > cool stuff! I cannot over-emphasise how useful this will be. > > Let us know if you need any additional WARN_ON()s or other dmesg > annotations to make parsing easier / more intelligent. At least as > far as arch/x86 and the scheduler is related it's going to be applied > to the fast-track queue ;-) > the following patch would help a lot; it ads a very nice parsable end-marker to oopses, as well as printing the boot UUID as part of the oops, which makes it easier to de-dupe oopses. The UUID is just a random number and not privacy-tracable to any system. -- Subject: [patch] terminate the oops printing with a defined string/uuid From: Arjan van de Ven Right now, it's hard for automated tools to determine when an oops has ended; there's no clear marker for this. In addition, there's no good way to find out if an oops is unique. Sometimes it's the same oops just reported multiple times, while other times it's a different instance of the crash with the same signature. Printing the boot UUID as part of the end string resolves this ambiguity. Signed-off-by: Arjan van de Ven CC: Ted Ts'o --- drivers/char/random.c | 35 ++++++++++++++++++++++++++++++++++- include/linux/random.h | 1 + kernel/panic.c | 2 ++ 3 files changed, 37 insertions(+), 1 deletion(-) Index: linux-2.6.24-rc5/drivers/char/random.c =================================================================== --- linux-2.6.24-rc5.orig/drivers/char/random.c +++ linux-2.6.24-rc5/drivers/char/random.c @@ -1176,8 +1176,41 @@ static int max_read_thresh = INPUT_POOL_ static int max_write_thresh = INPUT_POOL_WORDS * 32; static char sysctl_bootid[16]; +/** + * get_boot_uuid - return a string pointer to a system wide boot UUID + * + * Returns a pointer to the boot UUID. This UUID is unique per system + * boot but persistent for one boot session. + * + * The memory returned via the return pointer is static allocated and + * owned by the random.c driver; this should not be kfree()'d. + * + * Locking: none + */ + */ +char *get_boot_uuid(void) +{ + static char target[80]; + unsigned char *uuid; + + if (sysctl_bootid[8] == 0) + generate_random_uuid(sysctl_bootid); + /* sysctl_bootid is signed, to print we need unsigned .. */ + uuid = sysctl_bootid; + + if (target[0] == 0) { + sprintf(target, "%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-" + "%02x%02x%02x%02x%02x%02x", + uuid[0], uuid[1], uuid[2], uuid[3], uuid[4], + uuid[5], uuid[6], uuid[7], uuid[8], uuid[9], + uuid[10], uuid[11], uuid[12], uuid[13], uuid[14], + uuid[15]); + } + return target; +} + /* - * These functions is used to return both the bootid UUID, and random + * These functions are used to return both the bootid UUID, and random * UUID. The difference is in whether table->data is NULL; if it is, * then a new UUID is generated and returned to the user. * Index: linux-2.6.24-rc5/include/linux/random.h =================================================================== --- linux-2.6.24-rc5.orig/include/linux/random.h +++ linux-2.6.24-rc5/include/linux/random.h @@ -71,6 +71,7 @@ unsigned long randomize_range(unsigned l u32 random32(void); void srandom32(u32 seed); +char *get_boot_uuid(void); #endif /* __KERNEL___ */ Index: linux-2.6.24-rc5/kernel/panic.c =================================================================== --- linux-2.6.24-rc5.orig/kernel/panic.c +++ linux-2.6.24-rc5/kernel/panic.c @@ -19,6 +19,7 @@ #include #include #include +#include int panic_on_oops; int tainted; @@ -272,6 +273,7 @@ void oops_enter(void) void oops_exit(void) { do_oops_enter_exit(); + printk("---[ end of trace %s ]---\n", get_boot_uuid()); } #ifdef CONFIG_CC_STACKPROTECTOR -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/