Q.) How do I configure kdump on RHEL systems?
Bonus Q.) Explain this :
INFO: task <process>:<pid> blocked for more than 120 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
How to enable collection of a vmcore, via a panic, when a block task event is encountered?
Q.) How will you troubleshoot this issue : kdump service restart failed with below error :
Your running kernel is using more than 70% of the amount of space you reserved for kdump, you should consider increasing your crashkernel reservation
Q.) How will you check / analyze virtual memory info from the core dump ?
Level L3 and above
I'll be posting a series of Linux-related questions covering various skill levels. Feel free to share your insights and expertise. Your contributions will benefit learners at all stages, from those in current roles to those preparing for Linux interviews.
Let's have a look at that last question first:
Q.) How will you check / analyze virtual memory info from the core dump ?
To address this question, I'm going to recommend crash - a dedicated
debugging tool on Linux systems, that allows the examination of
various aspects of the kernel memory, including virtual addresses,
page tables, and memory regions, within the core dump file. The
crash tool can provide detailed information about the virtual memory
state of the Linux system at the time of a crash. Again, this is my
recommendation because the question is making reference to a
core dump (kernel core dump) file.
crash is not only a debugging tool, but it's interactive. What this means
is that when its launched, you interact with it via its internal prompt.
There are several commands within the crash tool that allow you to
perform an interrogation of a kernel core dump file. To analyze the
virtual memory info referenced in this quesiton, the primary crash tool
command will be "vm". Along with the "vm" command, there are several
options/switches that allow an expanded interrogation of the virtual
memory information. The "vm" command shows anything loaded in the
virtual memory at the time of the crash.
If you would like to examine the use of the crash debugging tool, creating
a core dump file would certainly be beneficial. If you'd like to see how to go
about this, let me know, and I'll post the steps that you'll need to follow
in order to put the necessary pieces in place.
Kernel core dumps are complex! They are not simply copies of system
memory. In my opinion, a healthy familiarity with kernel memory
management concepts, like "page tables" and "virtual address spaces",
would be most beneficial in digesting the information provided by the
crash tool.
Let's have a look at that last question first:
Q.) How will you check / analyze virtual memory info from the core dump ?
To address this question, I'm going to recommend crash - a dedicated
debugging tool on Linux systems, that allows the examination of
various aspects of the kernel memory, including virtual addresses,
page tables, and memory regions, within the core dump file. The
crash tool can provide detailed information about the virtual memory
state of the Linux system at the time of a crash. Again, this is my
recommendation because the question is making reference to a
core dump (kernel core dump) file.
crash is not only a debugging tool, but it's interactive. What this means
is that when its launched, you interact with it via its internal prompt.
There are several commands within the crash tool that allow you to
perform an interrogation of a kernel core dump file. To analyze the
virtual memory info referenced in this quesiton, the primary crash tool
command will be "vm". Along with the "vm" command, there are several
options/switches that allow an expanded interrogation of the virtual
memory information. The "vm" command shows anything loaded in the
virtual memory at the time of the crash.
If you would like to examine the use of the crash debugging tool, creating
a core dump file would certainly be beneficial. If you'd like to see how to go
about this, let me know, and I'll post the steps that you'll need to follow
in order to put the necessary pieces in place.
Kernel core dumps are complex! They are not simply copies of system
memory. In my opinion, a healthy familiarity with kernel memory
management concepts, like "page tables" and "virtual address spaces",
would be most beneficial in digesting the information provided by the
crash tool.
@Trevor wonderfully explained!
I'd like to now attempt to address that first question:
Q.) How do I configure kdump on RHEL systems?
Answer:
Red Hat
Learning Community
A collaborative learning environment, enabling open source skill development.