[PATCH v12 0/5] Enhance Kdump to support ipv6 protocol
by Minfei Huang
Talked with Dave Young, we decide to simplify the patch to only support
non local ipv6 address from this patchset, and will support local ipv6
address in later patch. The reason why do this is it is hard to handle
and review the patchset which supports both modes.
Now the patchset is clear enough to be reviewed.
The patchset support the below cases:
1. nfs with non local ipv6 address
2. ssh with non local ipv6 address
Minfei Huang (5):
dracut-kdump: Use the first filtered ip address as dump directory
dracut-module-setup: Support the static route for ipv6 protocol
Use "getent ahosts", instead of "getent hosts" to get ip address
dracut-module-setup: Setup network route to support ipv6 protocol
dracut-module-setup: Enhance ISCSI to support ipv6 protocol
dracut-kdump.sh | 4 +--
dracut-module-setup.sh | 56 +++++++++++++++--------------
kdump-lib.sh | 97 ++++++++++++++++++++++++++++++++++++++++++++++++++
3 files changed, 128 insertions(+), 29 deletions(-)
--
2.1.0
8 years, 8 months
[PATCH v11 0/5] Enhance Kdump to support ipv6 protocol
by Minfei Huang
Talked with Dave Young, we decide to simplify the patch to only support
non local ipv6 address from this patchset, and will support local ipv6
address in later patch. The reason why do this is it is hard to handle
and review the patchset which supports both modes.
Now the patchset is clear enough to be reviewed.
The patchset support the below cases:
1. nfs with non local ipv6 address
2. ssh with non local ipv6 address
Minfei Huang (5):
dracut-kdump: Use the first filtered ip address as dump directory
dracut-module-setup: Support the static route for ipv6 protocol
Use "getent ahosts", instead of "getent hosts" to get ip address
dracut-module-setup: Setup network route to support ipv6 protocol
dracut-module-setup: Enhance ISCSI to support ipv6 protocol
dracut-kdump.sh | 4 +--
dracut-module-setup.sh | 88 ++++++++++++++++++++++++++++++++++++--------------
kdump-lib.sh | 33 +++++++++++++++++++
3 files changed, 99 insertions(+), 26 deletions(-)
--
2.1.0
8 years, 8 months
[PATCH] remove the incomplete kdump.img
by Chao Fan
If the directory where the kdump.img saved has not enough space for the
kdump.img, after restart kdump, it will get an incomplete file named
initramfs-xxxkdump.img, the restart of kdump failed, but did not remove the
incomplete file. So when reboot the system, kdump will load the incomplete
file, and then when kernel crash, the kdump will fail because the file
initramfs-xxxkdump.img is incomplete.
So, when the dracut failed build the initramfs-xxxkdump.img, kdump should
remove the file initramfs-xxxkdump.img so that kdump will not load a wrong
initramfs-xxxkdump.img when reboot the system.
Signed-off-by: Chao Fan <cfan(a)redhat.com>
---
kdumpctl | 1 +
1 file changed, 1 insertion(+)
diff --git a/kdumpctl b/kdumpctl
index eaf7f67..b82e3f0 100755
--- a/kdumpctl
+++ b/kdumpctl
@@ -175,6 +175,7 @@ rebuild_kdump_initrd()
$MKDUMPRD $TARGET_INITRD $kdump_kver
if [ $? != 0 ]; then
echo "mkdumprd: failed to make kdump initrd" >&2
+ rm $TARGET_INITRD
return 1
fi
--
2.1.0
8 years, 8 months
[PATCH v2] dracut-module-setup: Apply the manual DNS to the 2nd kernel
by Minfei Huang
Now Kdump will ingore the DNS config in /etc/resolv.conf, when it
generates the initram. And most users do not concern about this issue,
because they never use deployment tools to configure machines
environment, like puppet.
It is more convenient to add the DNS config to /etc/resolv.conf for
people who use deployment tools to configure machines concurrently.
Signed-off-by: Minfei Huang <mhuang(a)redhat.com>
---
v1:
- check the file existence firstly, then print the file content
---
dracut-module-setup.sh | 17 ++++++++++++++++-
1 file changed, 16 insertions(+), 1 deletion(-)
diff --git a/dracut-module-setup.sh b/dracut-module-setup.sh
index 228fae2..957e53e 100755
--- a/dracut-module-setup.sh
+++ b/dracut-module-setup.sh
@@ -64,10 +64,25 @@ kdump_is_vlan() {
# $1: netdev name
kdump_setup_dns() {
- _dnsfile=${initdir}/etc/cmdline.d/42dns.conf
+ local _nameserver _dns
+ local _dnsfile=${initdir}/etc/cmdline.d/42dns.conf
. /etc/sysconfig/network-scripts/ifcfg-$1
+
[ -n "$DNS1" ] && echo "nameserver=$DNS1" > "$_dnsfile"
[ -n "$DNS2" ] && echo "nameserver=$DNS2" >> "$_dnsfile"
+
+ while read content;
+ do
+ _nameserver=$(echo $content | grep ^nameserver)
+ [ -z "$_nameserver" ] && continue
+
+ _dns=$(echo $_nameserver | cut -d' ' -f2)
+ [ -z "$_dns" ] && continue
+
+ if [ ! -f $_dnsfile ] || [ ! $(cat $_dnsfile | grep -q $_dns) ]; then
+ echo "nameserver=$_dns" >> "$_dnsfile"
+ fi
+ done < "/etc/resolv.conf"
}
#$1: netdev name
--
2.1.0
8 years, 8 months
Re: [ANNOUNCE] kexec-tools 2.0.10
by Dave Young
On 07/02/15 at 09:48am, Peter Robinson wrote:
> On Thu, Jul 2, 2015 at 4:06 AM, Dave Young <dyoung(a)redhat.com> wrote:
> > On 07/01/15 at 09:08am, Peter Robinson wrote:
> >> On Wed, Jul 1, 2015 at 1:36 AM, Dave Young <dyoung(a)redhat.com> wrote:
> >> > Pratyush,
> >> >
> >> > Thanks for the effort, let's cc Fedora devel list, see if we can get help
> >> > from Fedora experts.
> >> >
> >> > Summary the problem:
> >> > Latest kexec-tools koji build in rawhide results in a wrong kexec binary,
> >> > kexec load fails with something like below:
> >> > R_X86_64_29
> >> > Unhandled rela relocation: R_X86_64_29
> >> >
> >> > This kinds of errors usually caused by gcc unnecesarrily add options like
> >> > -fexception, -fPIC, -fstack-protetor-* for building kexec purgatory which
> >> > runs in kernel mode.
> >> >
> >> > I filed a bug below:
> >> > https://bugzilla.redhat.com/show_bug.cgi?id=1236456
> >> >
> >> > Appreciate for any hints how to fix the problem.
> >>
> >> I commented on the BZ
> >>
> >
> > Peter, thank you. Resolved with your suggestion.
>
> Excellent, btw what's the status of aarch64 support landing upstream
> so we can enable it in Fedora?
arm64 patches are still not accepted in upstream, Geoff need resend the whole
series for review. Will ping them in list.
Thanks
Dave
8 years, 9 months
Re: [ANNOUNCE] kexec-tools 2.0.10
by Dave Young
On 07/01/15 at 09:08am, Peter Robinson wrote:
> On Wed, Jul 1, 2015 at 1:36 AM, Dave Young <dyoung(a)redhat.com> wrote:
> > Pratyush,
> >
> > Thanks for the effort, let's cc Fedora devel list, see if we can get help
> > from Fedora experts.
> >
> > Summary the problem:
> > Latest kexec-tools koji build in rawhide results in a wrong kexec binary,
> > kexec load fails with something like below:
> > R_X86_64_29
> > Unhandled rela relocation: R_X86_64_29
> >
> > This kinds of errors usually caused by gcc unnecesarrily add options like
> > -fexception, -fPIC, -fstack-protetor-* for building kexec purgatory which
> > runs in kernel mode.
> >
> > I filed a bug below:
> > https://bugzilla.redhat.com/show_bug.cgi?id=1236456
> >
> > Appreciate for any hints how to fix the problem.
>
> I commented on the BZ
>
Peter, thank you. Resolved with your suggestion.
Thanks
Dave
8 years, 9 months
Re: [ANNOUNCE] kexec-tools 2.0.10
by Dave Young
Pratyush,
Thanks for the effort, let's cc Fedora devel list, see if we can get help
from Fedora experts.
Summary the problem:
Latest kexec-tools koji build in rawhide results in a wrong kexec binary,
kexec load fails with something like below:
R_X86_64_29
Unhandled rela relocation: R_X86_64_29
This kinds of errors usually caused by gcc unnecesarrily add options like
-fexception, -fPIC, -fstack-protetor-* for building kexec purgatory which
runs in kernel mode.
I filed a bug below:
https://bugzilla.redhat.com/show_bug.cgi?id=1236456
Appreciate for any hints how to fix the problem.
On 06/30/15 at 04:05pm, Pratyush Anand wrote:
> Hi Dave,
>
> Really not able to get whats the issue..let koji people look into..
>
> kexec-tools-2.0.7-11.fc23.x86_64.rpm build failed
> http://koji.fedoraproject.org/koji/taskinfo?taskID=10249484
>
> kexec-tools-2.0.9-1.fc23.x86_64.rpm does not work
> http://koji.fedoraproject.org/koji/taskinfo?taskID=10249201
>
> kexec-tools-2.0.8-12.fc23.x86_64.rpm does not work
> http://koji.fedoraproject.org/koji/taskinfo?taskID=10249377
>
> - so may be its not kexec-tools version issue
>
> kexec-tools-2.0.7-26.el7.x86_64.rpm work
> https://brewweb.devel.redhat.com/taskinfo?taskID=9439045
>
> The only difference which I noticed between working brew and not
> working koji is that koji introduces
> "-specs=/usr/lib/rpm/redhat/redhat-hardened-cc1" into gcc command
> line.
>
> However, I tried -fno-enforce-eh-specs
> (http://koji.fedoraproject.org/koji/taskinfo?taskID=10250889), but it
> did not work :(
>
> Only thing remaining is to try 2.0.9/8 in brew..will try that too.
>
> ~Pratyush
>
8 years, 9 months