Received: by 10.192.165.156 with SMTP id m28csp1175681imm; Wed, 18 Apr 2018 05:33:37 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+8dq7IOACnhbAYZSc8U1KaJL1+M11V2jN2R/H7WMXclWhlke83OWC+YPfDDmXdLLu7uBxU X-Received: by 10.99.100.6 with SMTP id y6mr1626429pgb.205.1524054817396; Wed, 18 Apr 2018 05:33:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524054817; cv=none; d=google.com; s=arc-20160816; b=SR7zyiL/Kp+6sk4RWQ2pvt6IEGAWS0uNMCgmUKhBqD1bVTacTj70kQrjyjrE1yZsxM oEbXHGkCP87/t5yDr3zoL50bAVU/M/1dPfBKOTkzGx681BmI1C+nYPLMx9eQ5lUZxPoK k5RR2+j/R9jB7T8E6ZBXjImbtrXF/L8/AiFYBdtW4xeAMFjNQ7gSDddeJ6eIjR5IXIZ3 i0RrP5a9oyPPQ1yrGpeRKZ3gSfRRtPMTQ7d1fbMVf08uX8ohDrL6xDbtSHVgcsIXdcbY jVynqZ/EJsulqCiAo/DBBnjjGXhXEF1rJZiSmdiiLD51dJ/808fwui+okavl9FdThTMe mlmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=I9oC9xNhWbOIQzrjkt3JfG2LEM/B5H5yd8XiOKOaiSU=; b=O7BmH1N+woX7KjWIOC9yYgdQ9I15osOF+YoJ/XN4PTbCydOYfRxhVaQpq2ySDq7ArE j3cZcfxGFhI3mjux9Ab815LpoP60C6/mf1Et3+vaE+Sbrm+RCAj+kC05szvbR2mJRlw+ PnFYozb1oC1PqaGprv1WHjrH+ZYYxN9NYu3O4yh2RjFL6kP52JuJxVVe25c0JOnC40up vYyD3qfocKrFcm9pMT4XOOWhGL49c60Mwcpbp73EyuIj1runILrf/IprzgWrUX94YDh+ kzln+EUyc16rGFHd8/6o6qBIi20uRFKad0Z2CUJxmOQAWFgpmT7cbeY+CMc+iY+NvrND PvHg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a13-v6si1396504plt.142.2018.04.18.05.33.22; Wed, 18 Apr 2018 05:33:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753694AbeDRMcJ (ORCPT + 99 others); Wed, 18 Apr 2018 08:32:09 -0400 Received: from stargate.chelsio.com ([12.32.117.8]:44790 "EHLO stargate.chelsio.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752027AbeDRMcE (ORCPT ); Wed, 18 Apr 2018 08:32:04 -0400 Received: from localhost (scalar.blr.asicdesigners.com [10.193.185.94]) by stargate.chelsio.com (8.13.8/8.13.8) with ESMTP id w3ICVfEC007095; Wed, 18 Apr 2018 05:31:42 -0700 Date: Wed, 18 Apr 2018 18:01:16 +0530 From: Rahul Lakkireddy To: Dave Young Cc: "netdev@vger.kernel.org" , "kexec@lists.infradead.org" , "linux-fsdevel@vger.kernel.org" , "linux-kernel@vger.kernel.org" , Indranil Choudhury , Nirranjan Kirubaharan , "stephen@networkplumber.org" , Ganesh GR , "ebiederm@xmission.com" , "akpm@linux-foundation.org" , "torvalds@linux-foundation.org" , "davem@davemloft.net" , "viro@zeniv.linux.org.uk" Subject: Re: [PATCH net-next v4 0/3] kernel: add support to collect hardware logs in crash recovery kernel Message-ID: <20180418123114.GA19159@chelsio.com> References: <20180418061546.GA4551@dhcp-128-65.nay.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180418061546.GA4551@dhcp-128-65.nay.redhat.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wednesday, April 04/18/18, 2018 at 11:45:46 +0530, Dave Young wrote: > Hi Rahul, > On 04/17/18 at 01:14pm, Rahul Lakkireddy wrote: > > On production servers running variety of workloads over time, kernel > > panic can happen sporadically after days or even months. It is > > important to collect as much debug logs as possible to root cause > > and fix the problem, that may not be easy to reproduce. Snapshot of > > underlying hardware/firmware state (like register dump, firmware > > logs, adapter memory, etc.), at the time of kernel panic will be very > > helpful while debugging the culprit device driver. > > > > This series of patches add new generic framework that enable device > > drivers to collect device specific snapshot of the hardware/firmware > > state of the underlying device in the crash recovery kernel. In crash > > recovery kernel, the collected logs are added as elf notes to > > /proc/vmcore, which is copied by user space scripts for post-analysis. > > > > The sequence of actions done by device drivers to append their device > > specific hardware/firmware logs to /proc/vmcore are as follows: > > > > 1. During probe (before hardware is initialized), device drivers > > register to the vmcore module (via vmcore_add_device_dump()), with > > callback function, along with buffer size and log name needed for > > firmware/hardware log collection. > > I assumed the elf notes info should be prepared while kexec_[file_]load > phase. But I did not read the old comment, not sure if it has been discussed > or not. > We must not collect dumps in crashing kernel. Adding more things in crash dump path risks not collecting vmcore at all. Eric had discussed this in more detail at: https://lkml.org/lkml/2018/3/24/319 We are safe to collect dumps in the second kernel. Each device dump will be exported as an elf note in /proc/vmcore. > If do this in 2nd kernel a question is driver can be loaded later than vmcore init. Yes, drivers will add their device dumps after vmcore init. > How to guarantee the function works if vmcore reading happens before > the driver is loaded? > > Also it is possible that kdump initramfs does not contains the driver > module. > > Am I missing something? > Yes, driver must be in initramfs if it wants to collect and add device dump to /proc/vmcore in second kernel. > > > > 2. vmcore module allocates the buffer with requested size. It adds > > an elf note and invokes the device driver's registered callback > > function. > > > > 3. Device driver collects all hardware/firmware logs into the buffer > > and returns control back to vmcore module. > > > > The device specific hardware/firmware logs can be seen as elf notes: > > > > # readelf -n /proc/vmcore > > > > Displaying notes found at file offset 0x00001000 with length 0x04003288: > > Owner Data size Description > > VMCOREDD_cxgb4_0000:02:00.4 0x02000fd8 Unknown note type: (0x00000700) > > VMCOREDD_cxgb4_0000:04:00.4 0x02000fd8 Unknown note type: (0x00000700) > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > VMCOREINFO 0x0000074f Unknown note type: (0x00000000) > > > > Patch 1 adds API to vmcore module to allow drivers to register callback > > to collect the device specific hardware/firmware logs. The logs will > > be added to /proc/vmcore as elf notes. > > > > Patch 2 updates read and mmap logic to append device specific hardware/ > > firmware logs as elf notes. > > > > Patch 3 shows a cxgb4 driver example using the API to collect > > hardware/firmware logs in crash recovery kernel, before hardware is > > initialized. > > > > Thanks, > > Rahul > > > > RFC v1: https://lkml.org/lkml/2018/3/2/542 > > RFC v2: https://lkml.org/lkml/2018/3/16/326 > > [...] Thanks, Rahul