lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <1255723078.14249.16.camel@calx> Date: Fri, 16 Oct 2009 14:57:58 -0500 From: Matt Mackall <mpm@...enic.com> To: Nix <nix@...eri.org.uk> Cc: linux-kernel@...r.kernel.org Subject: Re: Keeping network device renaming working in the presence of netconsole? On Fri, 2009-10-16 at 20:43 +0100, Nix wrote: > So I'm testing suspend/resume and getting a lot of wildly variable > panics on resume. I'd like to report them, so I need to capture them > somehow. > > Netconsole looks like just the thing: it even says it's nonintrusive. > > Unfortunately it intrudes in one very unfortunate way: if netconsole is > jabbering out of some network interface, that interface is up, so you > can't rename it: and because (to catch early panics) netconsole has to > start before userspace kicks up, this means that there is *no* > opportunity to rename network interfaces that netconsole is operating > over. > > This breaks userspace more than slightly if you rely on udev's > persistent net generator rules to keep network interface names constant, > or if you rename the lot to something more memorable than ethN. Any > userspace setup of that interface, assignment of additional addresses, > routing, MTU setting et al is all toast: and you can't stop using > interface renaming unless you like your interfaces to change identities > intermittently (but we've had that flamewar). A device definitely does have to be up for netconsole to work. But as far as I know, there's no good reason you can't rename an interface that's up. But back to your original problem: netconsole is actually probably a poor match for debugging suspend/resume as getting from an off state to a working state in the network driver takes a non-trivial amount of code. A useful technique here is capturing kernel message buffers in RAM across resets, something that can be done on most systems (provided you can disable memory test). Alternately, you might look at firewire techniques. -- http://selenic.com : development and support for Mercurial and Linux -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists