From owner-freebsd-acpi@freebsd.org Tue Mar 26 18:44:52 2019 Return-Path: Delivered-To: freebsd-acpi@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 307F0155B8F4 for ; Tue, 26 Mar 2019 18:44:52 +0000 (UTC) (envelope-from peter@rulingia.com) Received: from vtr.rulingia.com (vtr.rulingia.com [IPv6:2001:19f0:5801:ebe:5400:1ff:fe53:30fd]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vtr.rulingia.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 23C2581773 for ; Tue, 26 Mar 2019 18:44:50 +0000 (UTC) (envelope-from peter@rulingia.com) Received: from server.rulingia.com (ppp59-167-167-3.static.internode.on.net [59.167.167.3]) by vtr.rulingia.com (8.15.2/8.15.2) with ESMTPS id x2QIic05016715 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 27 Mar 2019 05:44:45 +1100 (AEDT) (envelope-from peter@rulingia.com) X-Bogosity: Ham, spamicity=0.000000 Received: from server.rulingia.com (localhost.rulingia.com [127.0.0.1]) by server.rulingia.com (8.15.2/8.15.2) with ESMTPS id x2QIiXmE051464 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 27 Mar 2019 05:44:33 +1100 (AEDT) (envelope-from peter@server.rulingia.com) Received: (from peter@localhost) by server.rulingia.com (8.15.2/8.15.2/Submit) id x2QIiXk9051463; Wed, 27 Mar 2019 05:44:33 +1100 (AEDT) (envelope-from peter) Date: Wed, 27 Mar 2019 05:44:33 +1100 From: Peter Jeremy To: Shivaprashanth H Cc: "freebsd-acpi@freebsd.org" Subject: Re: loading the coredump file to memory Message-ID: <20190326184433.GE72367@server.rulingia.com> References: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="i0/AhcQY5QxfSsSZ" Content-Disposition: inline In-Reply-To: X-PGP-Key: http://www.rulingia.com/keys/peter.pgp User-Agent: Mutt/1.11.4 (2019-03-13) X-BeenThere: freebsd-acpi@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: ACPI and power management development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Mar 2019 18:44:52 -0000 --i0/AhcQY5QxfSsSZ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2019-Mar-26 13:16:40 +0000, Shivaprashanth H wrote: >using sysctl debug.kdb.panic=3D1 command, panic can be simulated which res= ults in system reboot and writing of system context(ram snapshot?) to a fil= e vmcore.x in /var/crash > >my question is, will it be possible to load this file back into memory? If you mean, can you take the crashdump and turn it back into a running sys= tem, no that's not possible. Maybe if you explain what your objective is, we mi= ght be able to make suggestions. (And, I'm not sure how this relates to ACPI). --=20 Peter Jeremy --i0/AhcQY5QxfSsSZ Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE7rKYbDBnHnTmXCJ+FqWXoOSiCzQFAlyacxFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEVF QjI5ODZDMzA2NzFFNzRFNjVDMjI3RTE2QTU5N0EwRTRBMjBCMzQACgkQFqWXoOSi CzS8fA/+JA34+Ls9a64ZKfYEfJsdEY+XDzrrx/rMW3CDP4Zy84CYSWgzI+Xkpp9a kiPx//pqtQAdzhDshy7Hy2m3K7o/NQgZeqBq7xxCX77bHWUKndQLBO0Sm1hEFO6n vIav2kBSXR2Ch2T/KoVt+BgdOHXmnAjTExAJ17gyEc54r/dWLg3E3G0zDq4oVIo/ Gj3Gj5HPNfO67RrTWEajbBLa8Kz5ks+kmQ1rRI/mviImKcdlltj+VkHe0pX3TTrh vneQRh/I9HboeOBHUMql+fLerQqo4zZ/Nv/124WV6x3yI32C6CdM1XGbSYvcuMw1 m30LcIsAB4RuGfw1LsaMwmMgd7udgZd64QAUE7kDitotg4IinEt/Grh4ctohDzNR 34OZHFuP4ohQEZa5Jua/rIx8pUgWCofANOaxXZ/mCxWuvFC6btP4pS7TDkTnUh2c IfomKPAnlayyjqBn3KKXjI1mE3QKjuOqwXY2bZc29gYYhll8/sNkluDjZ1hZv1L4 hMuup4Zk0NuhHVyqHuUrRzKNtbPTfDwG3d9Co6QEOjtYTStEIaiyXWnPpBeHUlF2 4zsRFLp2m+b86rAkhR1M1GCvECqWGeYbnqFEW+dE/teGwtTef02knawiF9mUoDPO MQuFA4fR1/4CXQDe+cCwx4LuZAFGgp09p4qg4JiwhkQauB9VcZ0= =kJC2 -----END PGP SIGNATURE----- --i0/AhcQY5QxfSsSZ--