On Mon, Oct 16, 2017 at 03:33:45PM -0400, Dave Anderson wrote:
>
> Hi Takahiro,
>
> One question about a segment of your patch that I can't test because
> I don't have a 4.14 dumpfile. Here in arm64_switch_stack(), you have
> conditionalized the display of the exception frame:
>
> @@ -2669,7
Hi Dave, Hatayama-san,
Hatayama-san, thanks for your review, I updated may patch.
These patch series fix a problem that crash cannot open a dumpfile which is
captured by sadump on KASLR enabled kernel.
When KASLR feature is enabled, a kernel is placed on the memory randomly and
therefore crash
This patch introduces new function x86_64_kvtop_pagetable() to translate
virtual address to physical address. Unlike x86_64_kvtop(),
x86_64_kvtop_pagetable() simply converts given virtual address to
physical address using pagetable.
To solve kaslr problem of virsh dump and sadump, kaslr offset
This patch fix a problem that crash cannot open a dumpfile which is
captured by sadump in KASLR enabled kernel.
When KASLR feature is enabled, a kernel is placed on the memory randomly
and therefore crash cannot open a dumpfile captured by sadump because
addresses of kernel symbols in System.map