lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87iq60a3rh.wl%vmayatsk@redhat.com>
Date:	Thu, 03 Jun 2010 11:01:38 +0200
From:	Vitaly Mayatskikh <v.mayatskih@...il.com>
To:	Vivek Goyal <vgoyal@...hat.com>
Cc:	Vitaly Mayatskikh <v.mayatskih@...il.com>,
	linux-kernel@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>,
	Thomas Gleixner <tglx@...utronix.de>,
	Ingo Molnar <mingo@...hat.com>,
	"H. Peter Anvin" <hpa@...or.com>,
	Randy Dunlap <rdunlap@...otime.net>
Subject: Re: [PATCH 0/5] kdump: extract log buffer and registers from	vmcore on NMI button pressing

At Wed, 2 Jun 2010 11:16:11 -0400, Vivek Goyal wrote:
 
> I am not sure what is the problem we are trying to solve here. If we are
> unable to capture the dump because second kernel did not boot due to
> some dirver issue etc, above patch is not going to help either.
> 
> If kernel has booted, then one should be able to capture the dump, filter
> it and look at the log buffers and cpu registers.
> 
> Most of the failures I have seen in capture kernel is that it was unable
> to boot due to either deivce issues or failure in early boot. Once it has
> crossed those hurdles, after that capturing the dump is easy part.
> 
> How many times does it happen in second kernel that kernel is spinning in
> a loop and NMI can still get you information out.
> 
> So can you please give some more information about what kind of failures
> while capturing the dump you are addressing by this patchset.

Obviously, this change doesn't help if 2nd kernel is not able to
boot. But there are other problems, which may prevent vmcore to be
captured. For example, machine has RAM > HDD and it may save vmcore
only over network. If network fails (e.g., due to bugs in NIC drivers
or NFS, what is not so rare), and dump capture environment is
non-interactive, or it doesn't have development tools like `crash',
there's no chance even to guess what has happened.

Other possibilities of failure may include broken RAID controller,
HDD, RAM. NMI button in such situations is a last chance to see old
log.

-- 
wbr, Vitaly
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ