Received: by 10.192.165.156 with SMTP id m28csp125826imm; Wed, 18 Apr 2018 18:42:19 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+sYc6RIvDaUcxyJCS0ES/Ot5gRFJnKbk2re82S1IYbO1Q2mcCNBatbySufcFUCt8HzcY8M X-Received: by 10.101.82.197 with SMTP id z5mr3532352pgp.45.1524102139060; Wed, 18 Apr 2018 18:42:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524102139; cv=none; d=google.com; s=arc-20160816; b=mkfhaonUb1G9GqLyYm3Mo8aBZA01a857kyDz6UuKdvBo7zdT9m7G3HgHM4LJd/CETL AV8t8m9/uCSTRu3g0UzHI4FiG9C7LIwfAOulkVbXABGJ6pFycGobSviZXN70HCDjOT2Q SZ97xUK4ncc8jNHqZTxELpqc8sh+Bl5e23TPev8t1269ECp/ru5Nrr2Yp2fU9bozIM5O Z/svgFm3//i9hyhcTKXQjKQ3gRtXgwUwY5VwlkLDHwbergs2QSEKwYv5QQ0uMI9w6ukU R2p3Pkf5X7IFesU0VLVd2YQQMeTPZQtt3uk5MLBOibtArjumjes3FewUQ9iRjsdJMKD1 s4LQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=EII/+6HlVQF0715YVxH+HnCbPAAUtVDO4ELHG5opik4=; b=urAHmQdrYfBZSSW7JOppdVegVj54Ciq3pm8gkBcKSEeYjqfomSbTmxXC1lKzrK4DZA HcVqFAgoPY/hXNEVY/wY+Wx41b7O/MRK5a97MYP6KA58jmOxba/LmwPYDlLw/R/mDhjb mrWZ41g9qN+rM2LXtRAPMTKyWXZs077fhZli+NPMw3ZQcaPfVDDdg5orhBLuSHWXh5Y7 g45BW6HqxfUoINLM2r+S5RREq3nGgxSYXLTMIOov8Amwd/go5BaXpECFjAHOoH6hiBIe XbzC8f45M3Xof0cnDd3T2kCWA8qTRrSfK4lFZN/RCgnNGJKuXdfLhYhyp0KnH+FGMhKC 9Y3Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a63si2230546pfc.131.2018.04.18.18.42.05; Wed, 18 Apr 2018 18:42:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752826AbeDSBkw (ORCPT + 99 others); Wed, 18 Apr 2018 21:40:52 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:39632 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752116AbeDSBku (ORCPT ); Wed, 18 Apr 2018 21:40:50 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 21D6E81A88D6; Thu, 19 Apr 2018 01:40:50 +0000 (UTC) Received: from dhcp-128-65.nay.redhat.com (ovpn-12-48.pek2.redhat.com [10.72.12.48]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 20A292026E04; Thu, 19 Apr 2018 01:40:36 +0000 (UTC) Date: Thu, 19 Apr 2018 09:40:30 +0800 From: Dave Young To: Rahul Lakkireddy Cc: "netdev@vger.kernel.org" , "kexec@lists.infradead.org" , "linux-fsdevel@vger.kernel.org" , "linux-kernel@vger.kernel.org" , Indranil Choudhury , Nirranjan Kirubaharan , "stephen@networkplumber.org" , Ganesh GR , "ebiederm@xmission.com" , "akpm@linux-foundation.org" , "torvalds@linux-foundation.org" , "davem@davemloft.net" , "viro@zeniv.linux.org.uk" Subject: Re: [PATCH net-next v4 0/3] kernel: add support to collect hardware logs in crash recovery kernel Message-ID: <20180419014030.GA2340@dhcp-128-65.nay.redhat.com> References: <20180418061546.GA4551@dhcp-128-65.nay.redhat.com> <20180418123114.GA19159@chelsio.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180418123114.GA19159@chelsio.com> User-Agent: Mutt/1.9.1 (2017-09-22) X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Thu, 19 Apr 2018 01:40:50 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Thu, 19 Apr 2018 01:40:50 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'dyoung@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/18/18 at 06:01pm, Rahul Lakkireddy wrote: > On Wednesday, April 04/18/18, 2018 at 11:45:46 +0530, Dave Young wrote: > > Hi Rahul, > > On 04/17/18 at 01:14pm, Rahul Lakkireddy wrote: > > > On production servers running variety of workloads over time, kernel > > > panic can happen sporadically after days or even months. It is > > > important to collect as much debug logs as possible to root cause > > > and fix the problem, that may not be easy to reproduce. Snapshot of > > > underlying hardware/firmware state (like register dump, firmware > > > logs, adapter memory, etc.), at the time of kernel panic will be very > > > helpful while debugging the culprit device driver. > > > > > > This series of patches add new generic framework that enable device > > > drivers to collect device specific snapshot of the hardware/firmware > > > state of the underlying device in the crash recovery kernel. In crash > > > recovery kernel, the collected logs are added as elf notes to > > > /proc/vmcore, which is copied by user space scripts for post-analysis. > > > > > > The sequence of actions done by device drivers to append their device > > > specific hardware/firmware logs to /proc/vmcore are as follows: > > > > > > 1. During probe (before hardware is initialized), device drivers > > > register to the vmcore module (via vmcore_add_device_dump()), with > > > callback function, along with buffer size and log name needed for > > > firmware/hardware log collection. > > > > I assumed the elf notes info should be prepared while kexec_[file_]load > > phase. But I did not read the old comment, not sure if it has been discussed > > or not. > > > > We must not collect dumps in crashing kernel. Adding more things in > crash dump path risks not collecting vmcore at all. Eric had > discussed this in more detail at: > > https://lkml.org/lkml/2018/3/24/319 > > We are safe to collect dumps in the second kernel. Each device dump > will be exported as an elf note in /proc/vmcore. I understand that we should avoid adding anything in crash path. And I also agree to collect device dump in second kernel. I just assumed device dump use some memory area to store the debug info and the memory is persistent so that this can be done in 2 steps, first register the address in elf header in kexec_load, then collect the dump in 2nd kernel. But it seems the driver is doing some other logic to collect the info instead of just that simple like I thought. > > > If do this in 2nd kernel a question is driver can be loaded later than vmcore init. > > Yes, drivers will add their device dumps after vmcore init. > > > How to guarantee the function works if vmcore reading happens before > > the driver is loaded? > > > > Also it is possible that kdump initramfs does not contains the driver > > module. > > > > Am I missing something? > > > > Yes, driver must be in initramfs if it wants to collect and add device > dump to /proc/vmcore in second kernel. In RH/Fedora kdump scripts we only add the things are required to bring up the dump target, so that we can use as less memory as we can. For example, if a net driver panicked, and the dump target is rootfs which is a scsi disk, then no network related stuff will be added in initramfs. In this case the device dump info will be not collected.. > > > > > > > 2. vmcore module allocates the buffer with requested size. It adds > > > an elf note and invokes the device driver's registered callback > > > function. > > > > > > 3. Device driver collects all hardware/firmware logs into the buffer > > > and returns control back to vmcore module. > > > > > > The device specific hardware/firmware logs can be seen as elf notes: > > > > > > # readelf -n /proc/vmcore > > > > > > Displaying notes found at file offset 0x00001000 with length 0x04003288: > > > Owner Data size Description > > > VMCOREDD_cxgb4_0000:02:00.4 0x02000fd8 Unknown note type: (0x00000700) > > > VMCOREDD_cxgb4_0000:04:00.4 0x02000fd8 Unknown note type: (0x00000700) > > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > > CORE 0x00000150 NT_PRSTATUS (prstatus structure) > > > VMCOREINFO 0x0000074f Unknown note type: (0x00000000) > > > > > > Patch 1 adds API to vmcore module to allow drivers to register callback > > > to collect the device specific hardware/firmware logs. The logs will > > > be added to /proc/vmcore as elf notes. > > > > > > Patch 2 updates read and mmap logic to append device specific hardware/ > > > firmware logs as elf notes. > > > > > > Patch 3 shows a cxgb4 driver example using the API to collect > > > hardware/firmware logs in crash recovery kernel, before hardware is > > > initialized. > > > > > > Thanks, > > > Rahul > > > > > > RFC v1: https://lkml.org/lkml/2018/3/2/542 > > > RFC v2: https://lkml.org/lkml/2018/3/16/326 > > > > [...] > > Thanks, > Rahul Thanks Dave