lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID:  <g7otmh$h3o$2@ger.gmane.org>
Date:	Mon, 11 Aug 2008 09:36:33 +0100
From:	Alan Jenkins <alan-jenkins@...fmail.co.uk>
To:	linux-kernel@...r.kernel.org
Subject:  Re: Segmentation fault details?

Wang Yi wrote:

> Hi, all!
> 
>  I'd like to know some details about segmentation fault.
>  What I mean is when a program accesses invalid memory area, it will
> get a SIGSEGV signal from kernel, and a message "Segmentation fault".
> 
>  I also find that dmesg can show we something like this:
>  ProgramName[Pid]: segfault at xxxx eip xxxx esp xxxx error x
>  It is useful and provides the first-step information for further
> debug/analysis.
> 
>  My question is how dmesg gets the information, and if there are any
> "decent" way to get this and maybe more information(An "indecent" way
> I came to is grep dmesg)
> so that I can perform some basic auto analysis.
> 
>  Thank you.
> 
> Leo

Core dumps.

You might also like to look at Ubuntu's "apport" bug reporting tool.  IIRC
the necessary kernel support is now in mainline.  I believe it provides the
option to dump core by piping it through an arbitrary program.  The aim of
apport is to capture these core dumps, notify the user, and give them the
option to submit it to the Ubuntu developers.

One advantage of this last feature is that you don't need to search the
filesystem for core files.  (They're dumped in the current directory, but
you may not know what directory the program was in when it crashed).

Alan

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ