Date: Tue, 29 Oct 2013 03:32:19 -0700 From: Colin Percival <cperciva@freebsd.org> To: freebsd-hackers@freebsd.org Subject: Automated submission of kernel panic reports Message-ID: <526F8EB3.1040205@freebsd.org>
next in thread | raw e-mail | index | archive | help
Hi all, I've written some code for automatically submitting kernel panic reports, and I'd like some feedback before I place it into the ports tree. I am aware of a recent Summer of Code project in this area, but I understand that it focused mainly on the processing of kernel panics after they have been collected (identifying matching backtraces, etc.) rather than the initial collection of panics. In my work on FreeBSD/EC2 I have been collecting panics for a couple of years, and despite the small install base (I estimate about 100 EC2 instances running FreeBSD at any given time) it has proven useful, for example by allowing me to identify that the ARP bug fixed in r214675 was causing severe stability issues in the EC2 environment. My current code is an rc.d script which, running after savecore, checks to see if the most recent panic (if any) has been reported yet. If not, it gathers the dump header (/var/crash/info.N) and a backtrace for the panic. If ${panicmail_autosubmit} is set to YES, this information is encrypted and submitted via email. The email which is sent looks like this: http://pastebin.com/AaCuxvDg If ${panicmail_autosubmit} is set to NO, an email is sent to root containing the panic data in both decrypted and encrypted forms. The system administrator can then review the information and decide whether to allow it to be submitted. Such emails look like this: http://pastebin.com/w18pXah8 The code is in http://svnweb.freebsd.org/base/user/cperciva/panicmail/ and it uses my FreeBSD-base-system-only public-key encryption code: http://svnweb.freebsd.org/base/user/cperciva/pkesh/ My plan is to get this into the ports tree, encourage people to install and enable it, and then assuming it proves useful see it added into the FreeBSD base system some day. At least initially I'd have panics coming to me, using an encryption key which I hold; if/when it enters the FreeBSD base system, some decision would need to be made (by core?) as to who should have access to the panics. Comments? -- Colin Percival Security Officer Emeritus, FreeBSD | The power to serve Founder, Tarsnap | www.tarsnap.com | Online backups for the truly paranoid
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?526F8EB3.1040205>