> > Is anybody planning on fixing the bug in dmesg so it reads the FULL
> > message buffer rather than just the first 4k of it?
>
> It's not a bug...it's life. The message buffer has to be limited, or it
> opens the kernel up to DoS attacks if the buffer can grow without limit
> and consume all memory. It might be nice if the buffer size were made
> tunable so that on big systems, you can see all the bootup messages before
> the buffer fills.
Sure it is a bug. We are talking about the fact that current dmesg(8)
implementations only copy 4k of the kernel ring buffer, even though it can
be (and usually is?) larger.
Peter
-- Peter Svensson ! Pgp key available by finger, fingerprint: <petersv@df.lth.se> ! 8A E9 20 98 C1 FF 43 E3 07 FD B9 0A 80 72 70 AF ------------------------------------------------------------------------ Remember, Luke, your source will be with you... always...
- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu