1================================================================ 2Documentation for Kdump - The kexec-based Crash Dumping Solution 3================================================================ 4 5This document includes overview, setup, installation, and analysis 6information. 7 8Overview 9======== 10 11Kdump uses kexec to quickly boot to a dump-capture kernel whenever a 12dump of the system kernel's memory needs to be taken (for example, when 13the system panics). The system kernel's memory image is preserved across 14the reboot and is accessible to the dump-capture kernel. 15 16You can use common commands, such as cp, scp or makedumpfile to copy 17the memory image to a dump file on the local disk, or across the network 18to a remote system. 19 20Kdump and kexec are currently supported on the x86, x86_64, ppc64, 21s390x, arm and arm64 architectures. 22 23When the system kernel boots, it reserves a small section of memory for 24the dump-capture kernel. This ensures that ongoing Direct Memory Access 25(DMA) from the system kernel does not corrupt the dump-capture kernel. 26The kexec -p command loads the dump-capture kernel into this reserved 27memory. 28 29On x86 machines, the first 640 KB of physical memory is needed for boot, 30regardless of where the kernel loads. For simpler handling, the whole 31low 1M is reserved to avoid any later kernel or device driver writing 32data into this area. Like this, the low 1M can be reused as system RAM 33by kdump kernel without extra handling. 34 35On PPC64 machines first 32KB of physical memory is needed for booting 36regardless of where the kernel is loaded and to support 64K page size 37kexec backs up the first 64KB memory. 38 39For s390x, when kdump is triggered, the crashkernel region is exchanged 40with the region [0, crashkernel region size] and then the kdump kernel 41runs in [0, crashkernel region size]. Therefore no relocatable kernel is 42needed for s390x. 43 44All of the necessary information about the system kernel's core image is 45encoded in the ELF format, and stored in a reserved area of memory 46before a crash. The physical address of the start of the ELF header is 47passed to the dump-capture kernel through the elfcorehdr= boot 48parameter. Optionally the size of the ELF header can also be passed 49when using the elfcorehdr=[size[KMG]@]offset[KMG] syntax. 50 51With the dump-capture kernel, you can access the memory image through 52/proc/vmcore. This exports the dump as an ELF-format file that you can 53write out using file copy commands such as cp or scp. You can also use 54makedumpfile utility to analyze and write out filtered contents with 55options, e.g with '-d 31' it will only write out kernel data. Further, 56you can use analysis tools such as the GNU Debugger (GDB) and the Crash 57tool to debug the dump file. This method ensures that the dump pages are 58correctly ordered. 59 60Setup and Installation 61====================== 62 63Install kexec-tools 64------------------- 65 661) Login as the root user. 67 682) Download the kexec-tools user-space package from the following URL: 69 70http://kernel.org/pub/linux/utils/kernel/kexec/kexec-tools.tar.gz 71 72This is a symlink to the latest version. 73 74The latest kexec-tools git tree is available at: 75 76- git://git.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.git 77- http://www.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.git 78 79There is also a gitweb interface available at 80http://www.kernel.org/git/?p=utils/kernel/kexec/kexec-tools.git 81 82More information about kexec-tools can be found at 83http://horms.net/projects/kexec/ 84 853) Unpack the tarball with the tar command, as follows:: 86 87 tar xvpzf kexec-tools.tar.gz 88 894) Change to the kexec-tools directory, as follows:: 90 91 cd kexec-tools-VERSION 92 935) Configure the package, as follows:: 94 95 ./configure 96 976) Compile the package, as follows:: 98 99 make 100 1017) Install the package, as follows:: 102 103 make install 104 105 106Build the system and dump-capture kernels 107----------------------------------------- 108There are two possible methods of using Kdump. 109 1101) Build a separate custom dump-capture kernel for capturing the 111 kernel core dump. 112 1132) Or use the system kernel binary itself as dump-capture kernel and there is 114 no need to build a separate dump-capture kernel. This is possible 115 only with the architectures which support a relocatable kernel. As 116 of today, i386, x86_64, ppc64, arm and arm64 architectures support 117 relocatable kernel. 118 119Building a relocatable kernel is advantageous from the point of view that 120one does not have to build a second kernel for capturing the dump. But 121at the same time one might want to build a custom dump capture kernel 122suitable to his needs. 123 124Following are the configuration setting required for system and 125dump-capture kernels for enabling kdump support. 126 127System kernel config options 128---------------------------- 129 1301) Enable "kexec system call" or "kexec file based system call" in 131 "Processor type and features.":: 132 133 CONFIG_KEXEC=y or CONFIG_KEXEC_FILE=y 134 135 And both of them will select KEXEC_CORE:: 136 137 CONFIG_KEXEC_CORE=y 138 1392) Enable "sysfs file system support" in "Filesystem" -> "Pseudo 140 filesystems." This is usually enabled by default:: 141 142 CONFIG_SYSFS=y 143 144 Note that "sysfs file system support" might not appear in the "Pseudo 145 filesystems" menu if "Configure standard kernel features (expert users)" 146 is not enabled in "General Setup." In this case, check the .config file 147 itself to ensure that sysfs is turned on, as follows:: 148 149 grep 'CONFIG_SYSFS' .config 150 1513) Enable "Compile the kernel with debug info" in "Kernel hacking.":: 152 153 CONFIG_DEBUG_INFO=Y 154 155 This causes the kernel to be built with debug symbols. The dump 156 analysis tools require a vmlinux with debug symbols in order to read 157 and analyze a dump file. 158 159Dump-capture kernel config options (Arch Independent) 160----------------------------------------------------- 161 1621) Enable "kernel crash dumps" support under "Processor type and 163 features":: 164 165 CONFIG_CRASH_DUMP=y 166 167 And this will select VMCORE_INFO and CRASH_RESERVE:: 168 CONFIG_VMCORE_INFO=y 169 CONFIG_CRASH_RESERVE=y 170 1712) Enable "/proc/vmcore support" under "Filesystems" -> "Pseudo filesystems":: 172 173 CONFIG_PROC_VMCORE=y 174 175 (CONFIG_PROC_VMCORE is set by default when CONFIG_CRASH_DUMP is selected.) 176 177Dump-capture kernel config options (Arch Dependent, i386 and x86_64) 178-------------------------------------------------------------------- 179 1801) On i386, enable high memory support under "Processor type and 181 features":: 182 183 CONFIG_HIGHMEM4G 184 1852) With CONFIG_SMP=y, usually nr_cpus=1 need specified on the kernel 186 command line when loading the dump-capture kernel because one 187 CPU is enough for kdump kernel to dump vmcore on most of systems. 188 189 However, you can also specify nr_cpus=X to enable multiple processors 190 in kdump kernel. 191 192 With CONFIG_SMP=n, the above things are not related. 193 1943) A relocatable kernel is suggested to be built by default. If not yet, 195 enable "Build a relocatable kernel" support under "Processor type and 196 features":: 197 198 CONFIG_RELOCATABLE=y 199 2004) Use a suitable value for "Physical address where the kernel is 201 loaded" (under "Processor type and features"). This only appears when 202 "kernel crash dumps" is enabled. A suitable value depends upon 203 whether kernel is relocatable or not. 204 205 If you are using a relocatable kernel use CONFIG_PHYSICAL_START=0x100000 206 This will compile the kernel for physical address 1MB, but given the fact 207 kernel is relocatable, it can be run from any physical address hence 208 kexec boot loader will load it in memory region reserved for dump-capture 209 kernel. 210 211 Otherwise it should be the start of memory region reserved for 212 second kernel using boot parameter "crashkernel=Y@X". Here X is 213 start of memory region reserved for dump-capture kernel. 214 Generally X is 16MB (0x1000000). So you can set 215 CONFIG_PHYSICAL_START=0x1000000 216 2175) Make and install the kernel and its modules. DO NOT add this kernel 218 to the boot loader configuration files. 219 220Dump-capture kernel config options (Arch Dependent, ppc64) 221---------------------------------------------------------- 222 2231) Enable "Build a kdump crash kernel" support under "Kernel" options:: 224 225 CONFIG_CRASH_DUMP=y 226 2272) Enable "Build a relocatable kernel" support:: 228 229 CONFIG_RELOCATABLE=y 230 231 Make and install the kernel and its modules. 232 233Dump-capture kernel config options (Arch Dependent, arm) 234---------------------------------------------------------- 235 236- To use a relocatable kernel, 237 Enable "AUTO_ZRELADDR" support under "Boot" options:: 238 239 AUTO_ZRELADDR=y 240 241Dump-capture kernel config options (Arch Dependent, arm64) 242---------------------------------------------------------- 243 244- Please note that kvm of the dump-capture kernel will not be enabled 245 on non-VHE systems even if it is configured. This is because the CPU 246 will not be reset to EL2 on panic. 247 248crashkernel syntax 249=========================== 2501) crashkernel=size@offset 251 252 Here 'size' specifies how much memory to reserve for the dump-capture kernel 253 and 'offset' specifies the beginning of this reserved memory. For example, 254 "crashkernel=64M@16M" tells the system kernel to reserve 64 MB of memory 255 starting at physical address 0x01000000 (16MB) for the dump-capture kernel. 256 257 The crashkernel region can be automatically placed by the system 258 kernel at run time. This is done by specifying the base address as 0, 259 or omitting it all together:: 260 261 crashkernel=256M@0 262 263 or:: 264 265 crashkernel=256M 266 267 If the start address is specified, note that the start address of the 268 kernel will be aligned to a value (which is Arch dependent), so if the 269 start address is not then any space below the alignment point will be 270 wasted. 271 2722) range1:size1[,range2:size2,...][@offset] 273 274 While the "crashkernel=size[@offset]" syntax is sufficient for most 275 configurations, sometimes it's handy to have the reserved memory dependent 276 on the value of System RAM -- that's mostly for distributors that pre-setup 277 the kernel command line to avoid a unbootable system after some memory has 278 been removed from the machine. 279 280 The syntax is:: 281 282 crashkernel=<range1>:<size1>[,<range2>:<size2>,...][@offset] 283 range=start-[end] 284 285 For example:: 286 287 crashkernel=512M-2G:64M,2G-:128M 288 289 This would mean: 290 291 1) if the RAM is smaller than 512M, then don't reserve anything 292 (this is the "rescue" case) 293 2) if the RAM size is between 512M and 2G (exclusive), then reserve 64M 294 3) if the RAM size is larger than 2G, then reserve 128M 295 2963) crashkernel=size,high and crashkernel=size,low 297 298 If memory above 4G is preferred, crashkernel=size,high can be used to 299 fulfill that. With it, physical memory is allowed to be allocated from top, 300 so could be above 4G if system has more than 4G RAM installed. Otherwise, 301 memory region will be allocated below 4G if available. 302 303 When crashkernel=X,high is passed, kernel could allocate physical memory 304 region above 4G, low memory under 4G is needed in this case. There are 305 three ways to get low memory: 306 307 1) Kernel will allocate at least 256M memory below 4G automatically 308 if crashkernel=Y,low is not specified. 309 2) Let user specify low memory size instead. 310 3) Specified value 0 will disable low memory allocation:: 311 312 crashkernel=0,low 313 314Boot into System Kernel 315----------------------- 3161) Update the boot loader (such as grub, yaboot, or lilo) configuration 317 files as necessary. 318 3192) Boot the system kernel with the boot parameter "crashkernel=Y@X". 320 321 On x86 and x86_64, use "crashkernel=Y[@X]". Most of the time, the 322 start address 'X' is not necessary, kernel will search a suitable 323 area. Unless an explicit start address is expected. 324 325 On ppc64, use "crashkernel=128M@32M". 326 327 On s390x, typically use "crashkernel=xxM". The value of xx is dependent 328 on the memory consumption of the kdump system. In general this is not 329 dependent on the memory size of the production system. 330 331 On arm, the use of "crashkernel=Y@X" is no longer necessary; the 332 kernel will automatically locate the crash kernel image within the 333 first 512MB of RAM if X is not given. 334 335 On arm64, use "crashkernel=Y[@X]". Note that the start address of 336 the kernel, X if explicitly specified, must be aligned to 2MiB (0x200000). 337 338Load the Dump-capture Kernel 339============================ 340 341After booting to the system kernel, dump-capture kernel needs to be 342loaded. 343 344Based on the architecture and type of image (relocatable or not), one 345can choose to load the uncompressed vmlinux or compressed bzImage/vmlinuz 346of dump-capture kernel. Following is the summary. 347 348For i386 and x86_64: 349 350 - Use bzImage/vmlinuz if kernel is relocatable. 351 - Use vmlinux if kernel is not relocatable. 352 353For ppc64: 354 355 - Use vmlinux 356 357For s390x: 358 359 - Use image or bzImage 360 361For arm: 362 363 - Use zImage 364 365For arm64: 366 367 - Use vmlinux or Image 368 369If you are using an uncompressed vmlinux image then use following command 370to load dump-capture kernel:: 371 372 kexec -p <dump-capture-kernel-vmlinux-image> \ 373 --initrd=<initrd-for-dump-capture-kernel> --args-linux \ 374 --append="root=<root-dev> <arch-specific-options>" 375 376If you are using a compressed bzImage/vmlinuz, then use following command 377to load dump-capture kernel:: 378 379 kexec -p <dump-capture-kernel-bzImage> \ 380 --initrd=<initrd-for-dump-capture-kernel> \ 381 --append="root=<root-dev> <arch-specific-options>" 382 383If you are using a compressed zImage, then use following command 384to load dump-capture kernel:: 385 386 kexec --type zImage -p <dump-capture-kernel-bzImage> \ 387 --initrd=<initrd-for-dump-capture-kernel> \ 388 --dtb=<dtb-for-dump-capture-kernel> \ 389 --append="root=<root-dev> <arch-specific-options>" 390 391If you are using an uncompressed Image, then use following command 392to load dump-capture kernel:: 393 394 kexec -p <dump-capture-kernel-Image> \ 395 --initrd=<initrd-for-dump-capture-kernel> \ 396 --append="root=<root-dev> <arch-specific-options>" 397 398Following are the arch specific command line options to be used while 399loading dump-capture kernel. 400 401For i386 and x86_64: 402 403 "1 irqpoll nr_cpus=1 reset_devices" 404 405For ppc64: 406 407 "1 maxcpus=1 noirqdistrib reset_devices" 408 409For s390x: 410 411 "1 nr_cpus=1 cgroup_disable=memory" 412 413For arm: 414 415 "1 maxcpus=1 reset_devices" 416 417For arm64: 418 419 "1 nr_cpus=1 reset_devices" 420 421Notes on loading the dump-capture kernel: 422 423* By default, the ELF headers are stored in ELF64 format to support 424 systems with more than 4GB memory. On i386, kexec automatically checks if 425 the physical RAM size exceeds the 4 GB limit and if not, uses ELF32. 426 So, on non-PAE systems, ELF32 is always used. 427 428 The --elf32-core-headers option can be used to force the generation of ELF32 429 headers. This is necessary because GDB currently cannot open vmcore files 430 with ELF64 headers on 32-bit systems. 431 432* The "irqpoll" boot parameter reduces driver initialization failures 433 due to shared interrupts in the dump-capture kernel. 434 435* You must specify <root-dev> in the format corresponding to the root 436 device name in the output of mount command. 437 438* Boot parameter "1" boots the dump-capture kernel into single-user 439 mode without networking. If you want networking, use "3". 440 441* We generally don't have to bring up a SMP kernel just to capture the 442 dump. Hence generally it is useful either to build a UP dump-capture 443 kernel or specify maxcpus=1 option while loading dump-capture kernel. 444 Note, though maxcpus always works, you had better replace it with 445 nr_cpus to save memory if supported by the current ARCH, such as x86. 446 447* You should enable multi-cpu support in dump-capture kernel if you intend 448 to use multi-thread programs with it, such as parallel dump feature of 449 makedumpfile. Otherwise, the multi-thread program may have a great 450 performance degradation. To enable multi-cpu support, you should bring up an 451 SMP dump-capture kernel and specify maxcpus/nr_cpus options while loading it. 452 453* For s390x there are two kdump modes: If a ELF header is specified with 454 the elfcorehdr= kernel parameter, it is used by the kdump kernel as it 455 is done on all other architectures. If no elfcorehdr= kernel parameter is 456 specified, the s390x kdump kernel dynamically creates the header. The 457 second mode has the advantage that for CPU and memory hotplug, kdump has 458 not to be reloaded with kexec_load(). 459 460* For s390x systems with many attached devices the "cio_ignore" kernel 461 parameter should be used for the kdump kernel in order to prevent allocation 462 of kernel memory for devices that are not relevant for kdump. The same 463 applies to systems that use SCSI/FCP devices. In that case the 464 "allow_lun_scan" zfcp module parameter should be set to zero before 465 setting FCP devices online. 466 467Kernel Panic 468============ 469 470After successfully loading the dump-capture kernel as previously 471described, the system will reboot into the dump-capture kernel if a 472system crash is triggered. Trigger points are located in panic(), 473die(), die_nmi() and in the sysrq handler (ALT-SysRq-c). 474 475The following conditions will execute a crash trigger point: 476 477If a hard lockup is detected and "NMI watchdog" is configured, the system 478will boot into the dump-capture kernel ( die_nmi() ). 479 480If die() is called, and it happens to be a thread with pid 0 or 1, or die() 481is called inside interrupt context or die() is called and panic_on_oops is set, 482the system will boot into the dump-capture kernel. 483 484On powerpc systems when a soft-reset is generated, die() is called by all cpus 485and the system will boot into the dump-capture kernel. 486 487For testing purposes, you can trigger a crash by using "ALT-SysRq-c", 488"echo c > /proc/sysrq-trigger" or write a module to force the panic. 489 490Write Out the Dump File 491======================= 492 493After the dump-capture kernel is booted, write out the dump file with 494the following command:: 495 496 cp /proc/vmcore <dump-file> 497 498or use scp to write out the dump file between hosts on a network, e.g:: 499 500 scp /proc/vmcore remote_username@remote_ip:<dump-file> 501 502You can also use makedumpfile utility to write out the dump file 503with specified options to filter out unwanted contents, e.g:: 504 505 makedumpfile -l --message-level 1 -d 31 /proc/vmcore <dump-file> 506 507Analysis 508======== 509 510Before analyzing the dump image, you should reboot into a stable kernel. 511 512You can do limited analysis using GDB on the dump file copied out of 513/proc/vmcore. Use the debug vmlinux built with -g and run the following 514command:: 515 516 gdb vmlinux <dump-file> 517 518Stack trace for the task on processor 0, register display, and memory 519display work fine. 520 521Note: GDB cannot analyze core files generated in ELF64 format for x86. 522On systems with a maximum of 4GB of memory, you can generate 523ELF32-format headers using the --elf32-core-headers kernel option on the 524dump kernel. 525 526You can also use the Crash utility to analyze dump files in Kdump 527format. Crash is available at the following URL: 528 529 https://github.com/crash-utility/crash 530 531Crash document can be found at: 532 https://crash-utility.github.io/ 533 534Trigger Kdump on WARN() 535======================= 536 537The kernel parameter, panic_on_warn, calls panic() in all WARN() paths. This 538will cause a kdump to occur at the panic() call. In cases where a user wants 539to specify this during runtime, /proc/sys/kernel/panic_on_warn can be set to 1 540to achieve the same behaviour. 541 542Trigger Kdump on add_taint() 543============================ 544 545The kernel parameter panic_on_taint facilitates a conditional call to panic() 546from within add_taint() whenever the value set in this bitmask matches with the 547bit flag being set by add_taint(). 548This will cause a kdump to occur at the add_taint()->panic() call. 549 550Write the dump file to encrypted disk volume 551============================================ 552 553CONFIG_CRASH_DM_CRYPT can be enabled to support saving the dump file to an 554encrypted disk volume (only x86_64 supported for now). User space can interact 555with /sys/kernel/config/crash_dm_crypt_keys for setup, 556 5571. Tell the first kernel what logon keys are needed to unlock the disk volumes, 558 # Add key #1 559 mkdir /sys/kernel/config/crash_dm_crypt_keys/7d26b7b4-e342-4d2d-b660-7426b0996720 560 # Add key #1's description 561 echo cryptsetup:7d26b7b4-e342-4d2d-b660-7426b0996720 > /sys/kernel/config/crash_dm_crypt_keys/description 562 563 # how many keys do we have now? 564 cat /sys/kernel/config/crash_dm_crypt_keys/count 565 1 566 567 # Add key #2 in the same way 568 569 # how many keys do we have now? 570 cat /sys/kernel/config/crash_dm_crypt_keys/count 571 2 572 573 # To support CPU/memory hot-plugging, re-use keys already saved to reserved 574 # memory 575 echo true > /sys/kernel/config/crash_dm_crypt_key/reuse 576 5772. Load the dump-capture kernel 578 5793. After the dump-capture kerne get booted, restore the keys to user keyring 580 echo yes > /sys/kernel/crash_dm_crypt_keys/restore 581 582Contact 583======= 584 585- kexec@lists.infradead.org 586 587GDB macros 588========== 589 590.. include:: gdbmacros.txt 591 :literal: 592