[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YJpu9mC8J+Kb6qWg@alley>
Date: Tue, 11 May 2021 13:48:06 +0200
From: Petr Mladek <pmladek@...e.com>
To: Stephen Boyd <swboyd@...omium.org>
Cc: Andrew Morton <akpm@...ux-foundation.org>,
linux-kernel@...r.kernel.org, Alexei Starovoitov <ast@...nel.org>,
Andy Shevchenko <andriy.shevchenko@...ux.intel.com>,
Baoquan He <bhe@...hat.com>, Borislav Petkov <bp@...en8.de>,
Catalin Marinas <catalin.marinas@....com>,
Dave Young <dyoung@...hat.com>,
Evan Green <evgreen@...omium.org>,
Hsin-Yi Wang <hsinyi@...omium.org>,
Ingo Molnar <mingo@...hat.com>, Jessica Yu <jeyu@...nel.org>,
Jiri Olsa <jolsa@...nel.org>, kexec@...ts.infradead.org,
Konstantin Khlebnikov <khlebnikov@...dex-team.ru>,
linux-arm-kernel@...ts.infradead.org, linux-doc@...r.kernel.org,
Matthew Wilcox <willy@...radead.org>,
Rasmus Villemoes <linux@...musvillemoes.dk>,
Sasha Levin <sashal@...nel.org>,
Sergey Senozhatsky <sergey.senozhatsky@...il.com>,
Steven Rostedt <rostedt@...dmis.org>,
Thomas Gleixner <tglx@...utronix.de>,
Vivek Goyal <vgoyal@...hat.com>, Will Deacon <will@...nel.org>,
x86@...nel.org, Christoph Hellwig <hch@...radead.org>,
peter enderborg <peter.enderborg@...y.com>
Subject: Re: [PATCH v6 00/13] Add build ID to stacktraces
On Mon 2021-05-10 17:38:32, Stephen Boyd wrote:
> This series adds the kernel's build ID[1] to the stacktrace header
> printed in oops messages, warnings, etc. and the build ID for any module
> that appears in the stacktrace after the module name. The goal is to
> make the stacktrace more self-contained and descriptive by including the
> relevant build IDs in the kernel logs when something goes wrong. This
> can be used by post processing tools like script/decode_stacktrace.sh
> and kernel developers to easily locate the debug info associated with a
> kernel crash and line up what line and file things started falling apart
> at.
The entire series looks good to me.
I reviewed carefully only the 5th patch touching printk/kallsyms/module
code. I just scanned over the other patches touching kernel code
and did not notice any obvious problem. I did not check the changes
in decode_stacktrace.sh at all.
I tried to get stacktraces on x86_64 and it worked as expected.
Best Regards,
Petr
Powered by blists - more mailing lists