lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <MN0PR12MB5953557EB8909B66B4D09B28B7E0A@MN0PR12MB5953.namprd12.prod.outlook.com>
Date:   Mon, 28 Aug 2023 17:39:27 +0000
From:   "Pandey, Radhey Shyam" <radhey.shyam.pandey@....com>
To:     Alexander Kamensky <alexander.kamensky42@...il.com>
CC:     "bhe@...hat.com" <bhe@...hat.com>,
        "piliu@...hat.com" <piliu@...hat.com>,
        "kexec@...ts.infradead.org" <kexec@...ts.infradead.org>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "Sarangi, Anirudha" <anirudha.sarangi@....com>
Subject: RE: kexec reports "Cannot get kernel _text symbol address" on arm64
 platform

> -----Original Message-----
> From: Alexander Kamensky <alexander.kamensky42@...il.com>
> Sent: Thursday, August 24, 2023 8:35 PM
> To: Pandey, Radhey Shyam <radhey.shyam.pandey@....com>
> Cc: bhe@...hat.com; piliu@...hat.com; kexec@...ts.infradead.org; linux-
> kernel@...r.kernel.org; Sarangi, Anirudha <anirudha.sarangi@....com>
> Subject: Re: kexec reports "Cannot get kernel _text symbol address" on
> arm64 platform
> 
> On Wed, Aug 23, 2023 at 12:09 PM Pandey, Radhey Shyam
> <radhey.shyam.pandey@....com> wrote:
> >
> > > -----Original Message-----
> > > From: Alexander Kamensky <alexander.kamensky42@...il.com>
> > > Sent: Tuesday, August 22, 2023 9:24 AM
> > > To: Pandey, Radhey Shyam <radhey.shyam.pandey@....com>
> > > Cc: bhe@...hat.com; piliu@...hat.com; kexec@...ts.infradead.org;
> > > linux- kernel@...r.kernel.org; Sarangi, Anirudha
> > > <anirudha.sarangi@....com>
> > > Subject: Re: kexec reports "Cannot get kernel _text symbol address"
> > > on
> > > arm64 platform
> > >
> > > Hi All,
> > >
> > > Sorry for the top post, but I believe that I might have posted a fix
> > > for this issue a couple days ago.
> > >
> > > Please check and see if it helps
> > > https://lore.kernel.org/kexec/20230819191119.975299-1-
> > > alexander.kamensky42@...il.com/T/#u
> > >
> > > Explanation for the issue I observed with a similar secondary kernel
> > > traceback on arm64 is in the commit message.
> >
> > I fetched latest kexec sources
> > (777ca453ca69e46f7376b07ba6727bd261ec97ef)
> > and applied above patch, a bit improved but still vmcore size is huge.
> >
> > / # ls -lrth /proc/vmcore
> > -r--------    1 root     root       15.5G Aug 23 18:55 /proc/vmcore
> >
> How big is your system memory? If it is 16G then the above is normal.

Yes, it's 16G.

> 
> The most important thing is can your secondary kernel read it? For example
> 
> cat /proc/vmcore > /dev/null

This runs fine and I can read /proc/vmcore

> 
> If you want to capture only kernel core out of /proc/vmcore you need to use
> makedumpfile to filter out the rest of the memory.

Thanks for the pointers. I could use makedumpfile to extract dmesg dump 
and it pointed to system Kernel dump correctly also compress dump data.

Further exploring on it and will report how the analysis goes.

xilinx-vck190-20232:/run/media/mmcblk0p1# makedumpfile -c --split -d 3   /proc/vmcore dumpfile1 dumpfile2
The kernel version is not supported.
The makedumpfile operation may be incomplete.
Checking for memory holes                         : [100.0 %] |                  Checking for memory holes                         : [100.0 %] |             
Checking for memory holes                         : [100.0 %] /                  Checking for memory holes                         : [100.0 %] /             
Checking for memory holes                         : [100.0 %] |                  Checking for memory holes                         : [100.0 %] |             
Checking for memory holes                         : [100.0 %] \                  Checking for memory holes                         : [100.0 %] \             
Checking for memory holes                         : [100.0 %] |                  Checking for memory holes                         : [100.0 %] |             
Checking for memory holes                         : [100.0 %] -                  Checking for memory holes                         : [100.0 %] -             
Copying data                                      : [ 45.7 %] -        eta: 6m13s
Copying data                                      : [ 54.1 %] -           eta: 1s

The dumpfiles are saved to dumpfile1, and dumpfile2.

makedumpfile Completed. 

> 
> Thanks,
> Alexander
> 
> > Thanks,
> > Radhey

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ