From: Arjan van de Ven <arjan@linux.intel.com>
To: Adrian Bunk <bunk@kernel.org>
Cc: Linux Kernel Mailing List <linux-kernel@vger.kernel.org>,
Linus Torvalds <torvalds@linux-foundation.org>,
Andrew.Morton@hera.kernel.org
Subject: Re: Top 10 kernel oopses for the week ending January 12th, 2008
Date: Sat, 12 Jan 2008 15:41:21 -0800 [thread overview]
Message-ID: <47895021.5090306@linux.intel.com> (raw)
In-Reply-To: <20080112233355.GF17276@does.not.exist>
Adrian Bunk wrote:
> On Sat, Jan 12, 2008 at 03:13:29PM -0800, Arjan van de Ven wrote:
>> Adrian Bunk wrote:
>>> All the other reports only contain the plain trace. Is there any way to
>>> get more information whether the former is a pattern or not, and to
>>> get this information somehow displayed on the webpage?
>> IF the kernel prints that its tainted or whatever it'll be shown, as well
>> as the exact versions etc etc if they are there.
>> Sadly none of this information is there prior to 2.6.24-rc4.
>> ...
>
> OK, the problem might actually not be the omission of displaying the
> tainted information but the omission of considering any relevant
> context.
>
> Looking deeper:
>
> Number #2424 is WARN_ON-after-tainted-oops.
>
> Is your rank 1 just a symptom that the system is in a bad state after
> running in what is your rank 8?
>
> In this case the information when following e.g. #2827 is quite useless
> since wherever you got this trace from all related context information
> like e.g. whether it's like #2424 just the symptom of a previous Oops is
> not displayed.
the tainted flags have a flag for "there was a previous oops", and if that's set,
the kerneloops.org website ignores the report. Simple as that.
> In the worst case, an entry might only contain WARN_ON traces without
> any information where the traces came from and whether it's worth
> looking at them or whether the system always already was in a known-bad
> state when they occured?
again as of 2.6.24-rc4 or so, this is just no longer the case. The problem is with
older kernels which had a WARN_ON() that didn't print ANY information other than
a plain backtrace.
next prev parent reply other threads:[~2008-01-12 23:46 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-01-12 18:48 Top 10 kernel oopses for the week ending January 12th, 2008 Arjan van de Ven
2008-01-12 22:23 ` Adrian Bunk
2008-01-12 23:13 ` Arjan van de Ven
2008-01-12 23:33 ` Adrian Bunk
2008-01-12 23:41 ` Arjan van de Ven [this message]
2008-01-15 10:36 ` Jiri Kosina
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=47895021.5090306@linux.intel.com \
--to=arjan@linux.intel.com \
--cc=Andrew.Morton@hera.kernel.org \
--cc=bunk@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox