Received: by 10.213.65.68 with SMTP id h4csp421313imn; Tue, 20 Mar 2018 06:35:23 -0700 (PDT) X-Google-Smtp-Source: AG47ELsaLJplWCKa28uPTzZO7PiSFJ/V7x8pLYGnFftFEtpF0rlxMhxXYbwDIG3+0cgUYKRy/vsN X-Received: by 10.99.96.130 with SMTP id u124mr12265420pgb.252.1521552923421; Tue, 20 Mar 2018 06:35:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521552923; cv=none; d=google.com; s=arc-20160816; b=qbVuglz5ktBoO6XE/tdlzxoBJ0T0RBh2ZEhFMftlmsVq/PKg3EQtnonPiooJK43uq+ mtPoFN+FJyA+kvYxH47RGdS/JEUj95qeZ8rzLpoCjwH4czUpSf9I1rqbrPUesQfqNwNF /U/Yt/WGl8RKO62yGRyp4phpqSDqna7rm6tANd4RnUKk3LA9wglgnFWkHvSl90az1psS eJU/Lr7SpSOkHkhkGZX0EkRb/nsGPCmPq8QPW0BCog5vOkFbpTs+8lxBtMKf8yIKvuNZ lyBgtDVZ677lYw5H+rjZr0+3QxNgCm+ozrCBGq3U+B15tzizIwTtxK+dMTBUTIvny1XQ HWdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=dv6oGdT/i940Z14fp+RrNVPhOaZDwKT3ia76BMC/LL4=; b=wJjAII1DNG0XXJr6xjIvbENaiE8WJHTJDA4nSdoYdT8/BWiWwLBrYZasmc9fZ3ol53 9D9c+Ghs6NZF6YG1zgy7Uivc9+EIN+PQyyaW/aEXYkO7R7oqgcl9S2h/xUaGIberObgT 7fS6fq6Vker9KSfQDr2zLUEZ/ithJ8z+4IDCMdMyECFkJIKAaJgzgZF38GXN1s1WFz40 /+BhW/3TwwMJ94j3XVJb2Fcz9QoX0M5tMPxWNqBEnk068skiAP6J3yZErDXCIKx5eOoc lcdDlGYr5hnwlgxHbmlsXGPWnxS69Ke3G7aAzF0lmLPvrxcxaoo83726uoOmbtNBWBvC 8Hww== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h185si1320784pfe.168.2018.03.20.06.35.08; Tue, 20 Mar 2018 06:35:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753424AbeCTNdC (ORCPT + 99 others); Tue, 20 Mar 2018 09:33:02 -0400 Received: from stargate.chelsio.com ([12.32.117.8]:59336 "EHLO stargate.chelsio.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753361AbeCTNbb (ORCPT ); Tue, 20 Mar 2018 09:31:31 -0400 Received: from localhost (scalar.blr.asicdesigners.com [10.193.185.94]) by stargate.chelsio.com (8.13.8/8.13.8) with ESMTP id w2KDUtEu021406; Tue, 20 Mar 2018 06:30:55 -0700 Date: Tue, 20 Mar 2018 19:00:11 +0530 From: Rahul Lakkireddy To: Stephen Hemminger Cc: "linux-kernel@vger.kernel.org" , "netdev@vger.kernel.org" , "kexec@lists.infradead.org" , "davem@davemloft.net" , "ebiederm@xmission.com" , "akpm@linux-foundation.org" , "torvalds@linux-foundation.org" , Ganesh GR , Nirranjan Kirubaharan , Indranil Choudhury Subject: Re: [RFC v2 0/2] kernel: add support to collect hardware logs in crash recovery kernel Message-ID: <20180320133010.GA25574@chelsio.com> References: <1521198725-13463-1-git-send-email-rahul.lakkireddy@chelsio.com> <20180319075555.GA22955@chelsio.com> <20180319082211.6651b45a@xeon-e3> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180319082211.6651b45a@xeon-e3> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Monday, March 03/19/18, 2018 at 20:52:11 +0530, Stephen Hemminger wrote: > On Mon, 19 Mar 2018 13:25:56 +0530 > Rahul Lakkireddy wrote: > > > On Friday, March 03/16/18, 2018 at 16:42:03 +0530, Rahul Lakkireddy wrote: > > > On production servers running variety of workloads over time, kernel > > > panic can happen sporadically after days or even months. It is > > > important to collect as much debug logs as possible to root cause > > > and fix the problem, that may not be easy to reproduce. Snapshot of > > > underlying hardware/firmware state (like register dump, firmware > > > logs, adapter memory, etc.), at the time of kernel panic will be very > > > helpful while debugging the culprit device driver. > > > > > > This series of patches add new generic framework that enable device > > > drivers to collect device specific snapshot of the hardware/firmware > > > state of the underlying device in the crash recovery kernel. In crash > > > recovery kernel, the collected logs are exposed via /proc/crashdd/ > > > directory, which is copied by user space scripts for post-analysis. > > > > > > A kernel module crashdd is newly added. In crash recovery kernel, > > > crashdd exposes /proc/crashdd/ directory containing device specific > > > hardware/firmware logs. > > > > > > The sequence of actions done by device drivers to append their device > > > specific hardware/firmware logs to /proc/crashdd/ directory are as > > > follows: > > > > > > 1. During probe (before hardware is initialized), device drivers > > > register to the crashdd module (via crashdd_add_dump()), with > > > callback function, along with buffer size and log name needed for > > > firmware/hardware log collection. > > > > > > 2. Crashdd creates a driver's directory under /proc/crashdd/. > > > Then, it allocates the buffer with requested size and invokes the > > > device driver's registered callback function. > > > > > > 3. Device driver collects all hardware/firmware logs into the buffer > > > and returns control back to crashdd. > > > > > > 4. Crashdd exposes the buffer as a file via > > > /proc/crashdd//. > > > > > > 5. User space script (/usr/lib/kdump/kdump-lib-initramfs.sh) copies > > > the entire /proc/crashdd/ directory to /var/crash/ directory. > > > > > > Patch 1 adds crashdd module to allow drivers to register callback to > > > collect the device specific hardware/firmware logs. The module also > > > exports /proc/crashdd/ directory containing the hardware/firmware logs. > > > > > > Patch 2 shows a cxgb4 driver example using the API to collect > > > hardware/firmware logs in crash recovery kernel, before hardware is > > > initialized. The logs for the devices are made available under > > > /proc/crashdd/cxgb4/ directory. > > > > > > Suggestions and feedback will be much appreciated. > > > > > > Thanks, > > > Rahul > > > > > > RFC v1: https://www.spinics.net/lists/netdev/msg486562.html > > > > > > --- > > > v2: > > > - Added new crashdd module that exports /proc/crashdd/ containing > > > driver's registered hardware/firmware logs in patch 1. > > > - Replaced the API to allow drivers to register their hardware/firmware > > > log collect routine in crash recovery kernel in patch 1. > > > - Updated patch 2 to use the new API in patch 1. > > > > > > Rahul Lakkireddy (2): > > > proc/crashdd: add API to collect hardware dump in second kernel > > > cxgb4: collect hardware dump in second kernel > > > > > > drivers/net/ethernet/chelsio/cxgb4/cxgb4.h | 4 + > > > drivers/net/ethernet/chelsio/cxgb4/cxgb4_cudbg.c | 25 +++ > > > drivers/net/ethernet/chelsio/cxgb4/cxgb4_cudbg.h | 3 + > > > drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c | 12 ++ > > > fs/proc/Kconfig | 11 + > > > fs/proc/Makefile | 1 + > > > fs/proc/crashdd.c | 263 +++++++++++++++++++++++ > > > include/linux/crashdd.h | 43 ++++ > > > 8 files changed, 362 insertions(+) > > > create mode 100644 fs/proc/crashdd.c > > > create mode 100644 include/linux/crashdd.h > > > > > > -- > > > 2.14.1 > > > > > > > Does anyone have any comments with this approach? If there are no > > comments, then I'll re-spin this RFC to Patch series. > > > > Thanks, > > Rahul > > This does look like it gives useful data, but it is not clear that this can > not already be done with existing API's or small extensions. > > Introducing a new /proc interface and one that is mostly device specific is > unlikely to be greeted with a warm reception by the current Linux kernel community. > > For example, getting firmware logs seems like something more related to > ethtool or sysfs. The /proc/crashdd/ is only exposed in 2nd (crash recovery) kernel. This is similar to /proc/vmcore. Since vmcore is exported via /proc/ interface, I've exported the device specific logs also via /proc/crashdd/. I can change to sysfs if that is the preferred approach. Does /sys/crashdd/ sound good? Thanks, Rahul