Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp61586pxb; Mon, 31 Jan 2022 15:15:25 -0800 (PST) X-Google-Smtp-Source: ABdhPJxJJhNZFdwuSoPMzFjErWxHvLlR9/x88JPw0VaD4jBPZ12QN43UuQVMuBpRHYYDWgqupsQ1 X-Received: by 2002:a17:902:6942:: with SMTP id k2mr22481554plt.133.1643670924891; Mon, 31 Jan 2022 15:15:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643670924; cv=none; d=google.com; s=arc-20160816; b=RHoVBU0dWuFP94oY8Pa+QgbfmaR0Z5D/ZOkraQg9QMbWs6iy0qDmP5zBfwx67AyQ9h IF43aW6kg2kvKLBC6fqZw34Br+hSXuuDnTgoOo+HCD4ZFxXC+2oi2ixWm8681e3WCHc1 EK3NVurKrdIzjKK0N9a2WTmY8II4Lk2L90xf0A6iubnN2YVInR5Ejxe4nTHUtXOEv1Sn zaN/0zA3dVaLOUhqYEnlgivYhbyrReaDee2liz/u2VMchF4VFVR1XjoHUonM0fQEWRs8 bKSSi/ijmH8tomjoyUtX0u5oMwbouZ0Csajz6rVerwhxpjXhs9OVUlqiPxUMl7rQwA17 fU1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=Boh0N+dAPGm0iYjv0ZqD/px1GgxIFNR/KyuZxha160Q=; b=z1cQilMhNlmcVG3KxgxMsXHylrnaGLYBMYoAqwooPs9LUheyonexJ3eJSMPz8GL0Zh 5xGNfpDinunUNYpNcBAePWedLM5am2WF4Z5io0jnCWSFyZa/BTFIgeApQLZb26+tqVsg DSFgVRzSKKvpM9t1CCmw5S9+wg8o/WDVKWBChwpTLnUFj2tukjJee8eE1aF4NNur9MST HIQ9Lm8nILXLRESggJ/jA5vjtvbC00ks44m1utdop9fjg05dL6faqPKU/kubtKaSCAu3 o6y79Jh7b79oX3JOBf8LXtufn71LDnL9cbyO0ihJj79uT5CHAB8F17pfNIcVtDBdXVnk 6q2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=H2hMmRF9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r20si15801436pgv.433.2022.01.31.15.15.12; Mon, 31 Jan 2022 15:15:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=H2hMmRF9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345000AbiA2IAy (ORCPT + 99 others); Sat, 29 Jan 2022 03:00:54 -0500 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]:39826 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344921AbiA2IAw (ORCPT ); Sat, 29 Jan 2022 03:00:52 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1643443252; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Boh0N+dAPGm0iYjv0ZqD/px1GgxIFNR/KyuZxha160Q=; b=H2hMmRF9aqkC54+HcehJEW9B8Xk/m1itepmMxdN7LIUcBi+maUo/Ch8Ws0hpmTRlM9g7O2 e44zhzYHJUMGyWFM/C/mEo1qFkteeFE79W5Op3jJILHwkPn6Oa269aVnlBOxg798ZjuUUr l9l6eDhd4OLqSlVEIHUCGuyXL21W7jI= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-329-bidJBjLOMeax8f4xkwMVzQ-1; Sat, 29 Jan 2022 03:00:46 -0500 X-MC-Unique: bidJBjLOMeax8f4xkwMVzQ-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 1536A8144E3; Sat, 29 Jan 2022 08:00:44 +0000 (UTC) Received: from localhost (ovpn-12-33.pek2.redhat.com [10.72.12.33]) by smtp.corp.redhat.com (Postfix) with ESMTPS id BE2FA6E4AC; Sat, 29 Jan 2022 08:00:30 +0000 (UTC) Date: Sat, 29 Jan 2022 16:00:27 +0800 From: Baoquan He To: Petr Mladek Cc: "Michael Kelley (LINUX)" , "Guilherme G. Piccoli" , "linux-kernel@vger.kernel.org" , "akpm@linux-foundation.org" , "kernel@gpiccoli.net" , "senozhatsky@chromium.org" , "rostedt@goodmis.org" , "john.ogness@linutronix.de" , "feng.tang@intel.com" , "kexec@lists.infradead.org" , "dyoung@redhat.com" , "keescook@chromium.org" , "anton@enomsg.org" , "ccross@android.com" , "tony.luck@intel.com" Subject: Re: [PATCH V3] panic: Move panic_print before kmsg dumpers Message-ID: <20220129080027.GC17613@MiWiFi-R3L-srv> References: <20220114183046.428796-1-gpiccoli@igalia.com> <20220119071318.GA4977@MiWiFi-R3L-srv> <20220120085115.GB18398@MiWiFi-R3L-srv> <63621138-2a41-26c2-524e-d889068f157a@igalia.com> <20220121023119.GB4579@MiWiFi-R3L-srv> <20220122043351.GA2596@MiWiFi-R3L-srv> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/26/22 at 12:51pm, Petr Mladek wrote: > On Mon 2022-01-24 16:57:17, Michael Kelley (LINUX) wrote: > > From: Baoquan He Sent: Friday, January 21, 2022 8:34 PM > > > > > > On 01/21/22 at 03:00pm, Michael Kelley (LINUX) wrote: > > > > From: Baoquan He Sent: Thursday, January 20, 2022 6:31 PM > > > > > > > > > > On 01/20/22 at 06:36pm, Guilherme G. Piccoli wrote: > > > > > > Hi Baoquan, some comments inline below: > > > > > > > > > > > > On 20/01/2022 05:51, Baoquan He wrote: > > > > [snip] > > > > > > > > Do you think it should be necessary? > > > > > > How about if we allow users to just "panic_print" with or without the > > > > > > "crash_kexec_post_notifiers", then we pursue Petr suggestion of > > > > > > refactoring the panic notifiers? So, after this future refactor, we > > > > > > might have a much clear code. > > > > > > > > > > I haven't read Petr's reply in another panic notifier filter thread. For > > > > > panic notifier, it's only enforced to use on HyperV platform, excepto of > > > > > that, users need to explicitly add "crash_kexec_post_notifiers=1" to enable > > > > > it. And we got bug report on the HyperV issue. In our internal discussion, > > > > > we strongly suggest HyperV dev to change the default enablement, instead > > > > > leave it to user to decide. > > > > > > > > > > > > > Regarding Hyper-V: Invoking the Hyper-V notifier prior to running the > > > > kdump kernel is necessary for correctness. During initial boot of the > > > > main kernel, the Hyper-V and VMbus code in Linux sets up several guest > > > > physical memory pages that are shared with Hyper-V, and that Hyper-V > > > > may write to. A VMbus connection is also established. Before kexec'ing > > > > into the kdump kernel, the sharing of these pages must be rescinded > > > > and the VMbus connection must be terminated. If this isn't done, the > > > > kdump kernel will see strange memory overwrites if these shared guest > > > > physical memory pages get used for something else. > > > > In the Azure cloud, collecting data before crash dumps is a motivation > > as well for setting crash_kexec_post_notifiers to true. That way as > > cloud operator we can see broad failure trends, and in specific cases > > customers often expect the cloud operator to be able to provide info > > about a problem even if they have taken a kdump. Where did you > > envision adding a comment in the code to help clarify these intentions? > > > > I looked at the code again, and should revise my previous comments > > somewhat. The Hyper-V resets that I described indeed must be done > > prior to kexec'ing the kdump kernel. Most such resets are actually > > done via __crash_kexec() -> machine_crash_shutdown(), not via the > > panic notifier. However, the Hyper-V panic notifier must terminate the > > VMbus connection, because that must be done even if kdump is not > > being invoked. See commit 74347a99e73. > > > > Most of the hangs seen in getting into the kdump kernel on Hyper-V/Azure > > were probably due to the machine_crash_shutdown() path, and not due > > to running the panic notifiers prior to kexec'ing the kdump kernel. The > > exception is terminating the VMbus connection, which had problems that > > are hopefully now fixed because of adding a timeout. > > My undestanding is that we could split the actions into three groups: > > 1. Actions that has to be before kexec'ing kdump kernel, like > resetting physicall memory shared with Hyper-V. > > These operation(s) are needed only for kexec and can be done > in kexec. > > > 2. Notify Hyper-V so that, for example, Azure cloud, could collect > data before crash dump. > > It is nice to have. > > It should be configurable if it is not completely safe. I mean > that there should be a way to disable it when it might increase > the risk that kexec'ing kdump kernel might fail. > > > 3. Some actions are needed only when panic() ends up in the > infinite loop. > > For example, unloading vmbus channel. At least the commit > 74347a99e73ae00b8385f ("x86/Hyper-V: Unload vmbus channel in > hv panic callback") says that it is done in kdump path > out of box. > > All these operations are needed and used only when the kernel is > running under Hyper-V. > > My mine intention is to understand if we need 2 or 3 notifier lists > or the current one is enough. > > The 3 notifier lists would be: > > + always do (even before kdump) > + optionally do before or after kdump > + needed only when kdump is not called Totally agree with above suggesitons for Hyper-V. Cleanup as ablove seems necesary. Stuffing them into panic_notifiers package is not appropriate.