lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100602151611.GA3174@redhat.com>
Date:	Wed, 2 Jun 2010 11:16:11 -0400
From:	Vivek Goyal <vgoyal@...hat.com>
To:	Vitaly Mayatskikh <v.mayatskih@...il.com>
Cc:	linux-kernel@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>,
	Thomas Gleixner <tglx@...utronix.de>,
	Ingo Molnar <mingo@...hat.com>,
	"H. Peter Anvin" <hpa@...or.com>,
	Randy Dunlap <rdunlap@...otime.net>
Subject: Re: [PATCH 0/5] kdump: extract log buffer and registers from
	vmcore on NMI button pressing

On Wed, Jun 02, 2010 at 09:39:14AM +0200, Vitaly Mayatskikh wrote:
> Sometimes non-interactive dump capture environment silently fails to
> store vmcore due to hardware or software bug. It is hard then to
> understand and fix reasons of system failure in both production and
> dump capture environments to prevent this failure to reoccur. It would
> be quite usefull to see log buffer contents of crashed kernel at
> least.
> 
> This patchset adds possibility for dump capture mode to extract and
> print log buffer and CPU registers from captured vmcore. Also the
> state of running kernel is printed. This action can be triggered via
> NMI button.

Hi Vitaly,

I am not sure what is the problem we are trying to solve here. If we are
unable to capture the dump because second kernel did not boot due to
some dirver issue etc, above patch is not going to help either.

If kernel has booted, then one should be able to capture the dump, filter
it and look at the log buffers and cpu registers.

Most of the failures I have seen in capture kernel is that it was unable
to boot due to either deivce issues or failure in early boot. Once it has
crossed those hurdles, after that capturing the dump is easy part.

How many times does it happen in second kernel that kernel is spinning in
a loop and NMI can still get you information out.

So can you please give some more information about what kind of failures
while capturing the dump you are addressing by this patchset.

Thanks
Vivek
> 
> Signed-off-by: Vitaly Mayatskikh <v.mayatskih@...il.com>
> 
>  arch/x86/include/asm/elf.h    |   46 +++++
>  arch/x86/include/asm/kdebug.h |    1 +
>  arch/x86/include/asm/nmi.h    |    1 +
>  arch/x86/kernel/apic/nmi.c    |   27 +++
>  arch/x86/kernel/process_32.c  |   22 ++-
>  arch/x86/kernel/process_64.c  |   20 ++-
>  fs/proc/vmcore.c              |  365 +++++++++++++++++++++++++++++++++++++++--
>  include/linux/sysctl.h        |    1 +
>  kernel/sysctl.c               |    7 +
>  kernel/sysctl_binary.c        |    1 +
>  10 files changed, 463 insertions(+), 28 deletions(-)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ