Hi Takahiro,
On 13/06/2016:05:10:08 PM, AKASHI Takahiro wrote:
> In my next version of kdump patch, the following VMCOREINFO will be
> added:
> NUMBER(VA_BITS)
> NUMBER(kimage_voffset)
> NUMBER(PHYS_OFFSET)
> KERNELOFFSET
>
> I think that those will also satisfy mkdumpfile
On 30/05/2016:03:46:07 PM, AKASHI Takahiro wrote:
> In kernel v4.6, Kernel ASLR (KASLR) is supported on arm64, and the start
> address of the kernel image can be randomized if CONFIG_RANDOMIZE_BASE is
> enabled.
> Even worse, the kernel image is no more mapped in the linear mapping, but
> in
On 24/05/2016:01:59:06 PM, Dave Anderson wrote:
>
>
> - Original Message -
> > Yet some issues, but ...
> >
>
> Hi Takahiro,
>
> Here are my general comments on my testing of the v2 patch, followed
> by a few comments in the patch itself.
>
> First, the combination of the new memory
if (s[j] != '\0') {
~Pratyush
>
> I will add this to my next kdump patch.
>
> Thanks,
> -Takahiro AKASHI
>
>
> On Thu, May 26, 2016 at 10:58:24AM +0530, Pratyush Anand wrote:
> > On 24/05/2016:01:59:06 PM, Dave Anderson wrote:
> > >
> > >
> &g
On 27/05/2016:01:03:56 PM, AKASHI Takahiro wrote:
> On Thu, May 26, 2016 at 03:09:55PM +0530, Pratyush Anand wrote:
> > On 26/05/2016:05:13:30 PM, AKASHI Takahiro wrote:
> > > On Wed, May 25, 2016 at 10:28:10AM -0400, Dave Anderson wrote:
> >
> > [...]
> >
On 26/05/2016:05:13:30 PM, AKASHI Takahiro wrote:
> On Wed, May 25, 2016 at 10:28:10AM -0400, Dave Anderson wrote:
[...]
> > > (This is the reason that I don't think we need a VMCOREINFO for
> > > CONFIG_RANDOMIZE_BASE.)
> >
> > Well, as long as there's a way to avoid that unnecessary/confusing
On 27/05/2016:03:43:33 PM, AKASHI Takahiro wrote:
> On Fri, May 27, 2016 at 10:37:38AM +0530, Pratyush Anand wrote:
> > On 27/05/2016:01:03:56 PM, AKASHI Takahiro wrote:
> > > On Thu, May 26, 2016 at 03:09:55PM +0530, Pratyush Anand wrote:
> > > > On 26/05/2016:05:1
50f464: SIZE_verify.part.29+72
50f4e0: store_module_kallsyms_v1.part.30+0
4c7cd0: show_kernel_taints+352
4cb49c: is_livepatch+44
Signed-off-by: Pratyush Anand <pan...@redhat.com>
---
defs.h| 1 +
kernel.c | 56 +++
v4.10-rc1 has simplified global and module taint flags handling. This
patchset caters corresponding modifications for crash utility.
v1->v2:
- changed as per comments from Dave Andersan for v1 patches.
- unnecessary checks removed
- also fixes for module taint flags changes now
Pratyush An
commit 7fd8329ba502ef76dd91db561c7aed696b2c7720 simplified module taint
flags handling. Modify crash code to cater the kernel changes.
Signed-off-by: Pratyush Anand <pan...@redhat.com>
---
defs.h| 1 +
kernel.c
rash: invalid structure size: tnt
FILE: kernel.c LINE: 10459 FUNCTION: show_kernel_taints()
[./crash] error trace: 4cb49c => 4c7cd0 => 50f4e0 => 50f464
50f464: SIZE_verify.part.29+72
50f4e0: store_module_kallsyms_v1.part.30+0
4c7cd0: show_kernel_taints+352
50f464: SIZE_verify.part.29+72
50f4e0: store_module_kallsyms_v1.part.30+0
4c7cd0: show_kernel_taints+352
4cb49c: is_livepatch+44
Signed-off-by: Pratyush Anand <pan...@redhat.com>
---
defs.h | 1 +
kernel.c | 66
12 matches
Mail list logo