From patchwork Fri Aug 4 21:03:58 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eric DeVolder X-Patchwork-Id: 131403 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:c44e:0:b0:3f2:4152:657d with SMTP id w14csp156784vqr; Fri, 4 Aug 2023 16:16:53 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFlzVRC02MBCUx/GK0lnj5ji7UsmJxtmb7ex92Qc1exITetGcO75IoghEgrAfjaj3CP7F7J X-Received: by 2002:a05:6808:221c:b0:3a4:31da:34c5 with SMTP id bd28-20020a056808221c00b003a431da34c5mr4423419oib.39.1691191013636; Fri, 04 Aug 2023 16:16:53 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1691191013; cv=pass; d=google.com; s=arc-20160816; b=xT3TzQcfqr4V/uB4rUU7ZaXlvpeBFLj5nOYgsJp7poH/lp696iq63k+z4HFyEp489r KwEfdwjB/YgwY1w6HZUlit+a3aXtt27vQFbvBE0qpkjC5P1JLOZ0dPBLkNepnPCc0NxY SvP2XW6gwAsSC/zepnZ8vslp06C2Xv6CHxpwLcUfvK1iet0jDG+S5Y4zKkTwqRSm7sIK SMrPKpGHHtaDcJQvLrfF9BXDD/XYep7Bi82Mq0eisp70o7pMbQdUsWYbRi5b/9Rryrxj IEGXAaJLkMRjfTp/wgE0e/aP5M1I+0L73BfbFTaTcxTz3+yEtguhY63pEBLAg+AJbnF2 20SQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature; bh=kqZzUcUI7g9GrNNQb568EFpHtig8R3NmjYR2Lpu3gEg=; fh=ZbNC38sm56YRcxo0eY5DlCjDElPeJYCNHKxhiyVbz2E=; b=rXlLOKjDMwVz4azlIxdo+vWFxyOpOw4Lcnp6O4KucCi75B4Ibj3kQG+AOba/BI2Lco B2M3N2KNa3ND9AFMErJ/vS0HHje43HIXJQMG5lkmX9VaQ81Z/zLV2zbvWWAvSr9WIpB/ iTiYxmptjO3zWP6rd9XhSiGlgJxFQ6U4yucKuCjit4mOzmRgj4bXN2bb/J7bscNKKMTZ skZ8yDXvpPw0dJvGanDygBCrIOxZMP2je2jt+8B1mJd4TVUDEv/ULclMyifHAR7G6O21 MDoLV+c0K7Y+DHgyuA3NFGLuQl+CH+YL8X+VJbrriyfjaJZmNR7jD7lU3+dKTmRMCtzn 4OKw== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b="HbIgzU//"; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=him0vZtv; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i64-20020a636d43000000b005640a32d25esi2326582pgc.517.2023.08.04.16.16.40; Fri, 04 Aug 2023 16:16:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b="HbIgzU//"; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=him0vZtv; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229795AbjHDWdY (ORCPT + 99 others); Fri, 4 Aug 2023 18:33:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42324 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229449AbjHDWdW (ORCPT ); Fri, 4 Aug 2023 18:33:22 -0400 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6E8D8170D; Fri, 4 Aug 2023 15:33:21 -0700 (PDT) Received: from pps.filterd (m0246631.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 374JCask019548; Fri, 4 Aug 2023 21:04:31 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : content-transfer-encoding : content-type : mime-version; s=corp-2023-03-30; bh=kqZzUcUI7g9GrNNQb568EFpHtig8R3NmjYR2Lpu3gEg=; b=HbIgzU//lmaS2pdv9E9LsMM2eFU3GsqUKNWEgAWLGEq31wVN7n3d6/x3wTAuVnwgzIwt NdOSFuh3xW/9lumim2apr+pbVyxFXhJSZbe3egQw79y5wzyKxK7wBFDfOrumMwuqjqYa Gub3kmkEMrfFwG201uqE1CnvxgPOeF+IVq6h/McEOr8eF2Inp0t0QIVWOoocQNZZFBDU DN6VPi9MoYQQI5r35eDa9gCOk0YOCs75kcJmwHV/Q7xaAi2G5QAGxaiZhDTDRUGVSvgC 4GRNbiOl5R68OSAcNZkU8wSsTTjP0nj+0glFvic1gb4SEqcv5D2Y6s0k7xGilmMqZXAb rQ== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3s79vbxr1b-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 04 Aug 2023 21:04:31 +0000 Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 374L0f7t035025; Fri, 4 Aug 2023 21:04:30 GMT Received: from nam10-mw2-obe.outbound.protection.outlook.com (mail-mw2nam10lp2105.outbound.protection.outlook.com [104.47.55.105]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3s8m09x0uu-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 04 Aug 2023 21:04:30 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kHXVipYslLFjbjV89o6jSjTpB3H9LsEaUa9/WdbopJ74e+xI+hcx2sVDslA5efxB5AaEMHtEcNK5strLOk7dsylx31Hb3xgiXHcZkJeNxK0Pg2AI7ppHkMaNNvTeRqAINHNiv6gCT4YNXmvjyIK1xSzvtqleQCF89zWViy9x0myxvbtTX8BkYPfoK13VMhXNflTgW5xZV4ZMPHevxkZWHPjSKq/sB9+r85cATJN7O9oR8EUB6480h8jhNbZpkX+Orjm2U+l9Mvpba9TbAG5mhPOTd5Z2GTqLkUjiJdc4S+6rl+0OG790go19f5XmyhV5smNkvEhTBeNqLChoP5rINw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kqZzUcUI7g9GrNNQb568EFpHtig8R3NmjYR2Lpu3gEg=; b=HHWJJHZTnUINyoxDg8SLUOX44p7gXJyaBqyces0VVZa5EKJ1TmlIgEQwUkt4vh9yuow3ApP4zAw8OWT1qSwuTWUWuZcDUbxwYU657I8XE3lrsl3mGBR9v1LLcoov92B8Hzp3i0qjCVLKCGNIQfRVOtCgpNmmsglzo/R5W6YRmKsZv8cWZESb5UXNwY7zYdA9PQHfciEGbPVzzAcWFC/FI0meKBLpMy5m0A8hYQcJfFUwCMn+lwHCbFWhxZIeqMuU3vSvHgiEppX4bxfxxULZXtjJYF2PnHndR/BcgpeKDEEcyUXWmrl000zXNo1qKyQWC0PJtY6xUpPQV+bW9z5Lwg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kqZzUcUI7g9GrNNQb568EFpHtig8R3NmjYR2Lpu3gEg=; b=him0vZtv8PyA4cUSInkfOCTMyvP5ccfNeZu/oqz332srw2CUklstB27Oyxoc+B8CXjBL4wvmsfxdQ21kPVYXoLsjTKO7MaPivpJF933U9DyPT5UJq2fYMLAQgnCbQ/20oYKEgPoxUIFnAJYaMoYr+YoTibwhgIboJRIc+in1YCs= Received: from CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) by BLAPR10MB5330.namprd10.prod.outlook.com (2603:10b6:208:333::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6652.22; Fri, 4 Aug 2023 21:04:27 +0000 Received: from CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::9a1:a343:e04c:5150]) by CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::9a1:a343:e04c:5150%4]) with mapi id 15.20.6652.020; Fri, 4 Aug 2023 21:04:27 +0000 From: Eric DeVolder To: linux-kernel@vger.kernel.org, david@redhat.com, osalvador@suse.de, corbet@lwn.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, bhe@redhat.com, ebiederm@xmission.com, kexec@lists.infradead.org Cc: hpa@zytor.com, gregkh@linuxfoundation.org, rafael@kernel.org, vgoyal@redhat.com, dyoung@redhat.com, lf32.dev@gmail.com, akpm@linux-foundation.org, naveen.n.rao@linux.vnet.ibm.com, zohar@linux.ibm.com, bhelgaas@google.com, vbabka@suse.cz, tiwai@suse.de, seanjc@google.com, linux@weissschuh.net, vschneid@redhat.com, linux-mm@kvack.org, linux-doc@vger.kernel.org, sourabhjain@linux.ibm.com, konrad.wilk@oracle.com, boris.ostrovsky@oracle.com, eric.devolder@oracle.com Subject: [PATCH v26 7/8] crash: change crash_prepare_elf64_headers() to for_each_possible_cpu() Date: Fri, 4 Aug 2023 17:03:58 -0400 Message-Id: <20230804210359.8321-8-eric.devolder@oracle.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20230804210359.8321-1-eric.devolder@oracle.com> References: <20230804210359.8321-1-eric.devolder@oracle.com> X-ClientProxiedBy: DM6PR07CA0053.namprd07.prod.outlook.com (2603:10b6:5:74::30) To CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CO1PR10MB4531:EE_|BLAPR10MB5330:EE_ X-MS-Office365-Filtering-Correlation-Id: 1a3adb53-a01e-4218-70d6-08db952e6338 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR10MB4531.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(136003)(366004)(376002)(39860400002)(396003)(346002)(451199021)(186006)(1800799003)(6486002)(6666004)(6512007)(86362001)(921005)(26005)(1076003)(6506007)(107886003)(2616005)(36756003)(83380400001)(38100700002)(66556008)(66476007)(66946007)(4326008)(2906002)(316002)(5660300002)(7406005)(7416002)(8936002)(8676002)(478600001)(41300700001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1a3adb53-a01e-4218-70d6-08db952e6338 X-MS-Exchange-CrossTenant-AuthSource: CO1PR10MB4531.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Aug 2023 21:04:27.1132 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: J1T9Vwa2fbTqWHOlYeOtUDGnlLxsYBPygLSIWSyv47JONol+ugOURVk5/0lB/2vtawi8Z65HHIFUhPNGphjbYmOdhtF7ZMByaxFK/uOnCug= X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLAPR10MB5330 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.267,Aquarius:18.0.957,Hydra:6.0.591,FMLib:17.11.176.26 definitions=2023-08-04_21,2023-08-03_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 mlxscore=0 phishscore=0 bulkscore=0 suspectscore=0 mlxlogscore=999 spamscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2306200000 definitions=main-2308040190 X-Proofpoint-GUID: G46q33Rz9DbrPTqOwKfUX7Ic2PWFg7f1 X-Proofpoint-ORIG-GUID: G46q33Rz9DbrPTqOwKfUX7Ic2PWFg7f1 X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1773342308113996778 X-GMAIL-MSGID: 1773342308113996778 The function crash_prepare_elf64_headers() generates the elfcorehdr which describes the CPUs and memory in the system for the crash kernel. In particular, it writes out ELF PT_NOTEs for memory regions and the CPUs in the system. With respect to the CPUs, the current implementation utilizes for_each_present_cpu() which means that as CPUs are added and removed, the elfcorehdr must again be updated to reflect the new set of CPUs. The reasoning behind the move to use for_each_possible_cpu(), is: - At kernel boot time, all percpu crash_notes are allocated for all possible CPUs; that is, crash_notes are not allocated dynamically when CPUs are plugged/unplugged. Thus the crash_notes for each possible CPU are always available. - The crash_prepare_elf64_headers() creates an ELF PT_NOTE per CPU. Changing to for_each_possible_cpu() is valid as the crash_notes pointed to by each CPU PT_NOTE are present and always valid. Furthermore, examining a common crash processing path of: kernel panic -> crash kernel -> makedumpfile -> 'crash' analyzer elfcorehdr /proc/vmcore vmcore reveals how the ELF CPU PT_NOTEs are utilized: - Upon panic, each CPU is sent an IPI and shuts itself down, recording its state in its crash_notes. When all CPUs are shutdown, the crash kernel is launched with a pointer to the elfcorehdr. - The crash kernel via linux/fs/proc/vmcore.c does not examine or use the contents of the PT_NOTEs, it exposes them via /proc/vmcore. - The makedumpfile utility uses /proc/vmcore and reads the CPU PT_NOTEs to craft a nr_cpus variable, which is reported in a header but otherwise generally unused. Makedumpfile creates the vmcore. - The 'crash' dump analyzer does not appear to reference the CPU PT_NOTEs. Instead it looks-up the cpu_[possible|present|onlin]_mask symbols and directly examines those structure contents from vmcore memory. From that information it is able to determine which CPUs are present and online, and locate the corresponding crash_notes. Said differently, it appears that 'crash' analyzer does not rely on the ELF PT_NOTEs for CPUs; rather it obtains the information directly via kernel symbols and the memory within the vmcore. (There maybe other vmcore generating and analysis tools that do use these PT_NOTEs, but 'makedumpfile' and 'crash' seems to be the most common solution.) This results in the benefit of having all CPUs described in the elfcorehdr, and therefore reducing the need to re-generate the elfcorehdr on CPU changes, at the small expense of an additional 56 bytes per PT_NOTE for not-present-but-possible CPUs. On systems where kexec_file_load() syscall is utilized, all the above is valid. On systems where kexec_load() syscall is utilized, there may be the need for the elfcorehdr to be regenerated once. The reason being that some archs only populate the 'present' CPUs from the /sys/devices/system/cpus entries, which the userspace 'kexec' utility uses to generate the userspace-supplied elfcorehdr. In this situation, one memory or CPU change will rewrite the elfcorehdr via the crash_prepare_elf64_headers() function and now all possible CPUs will be described, just as with kexec_file_load() syscall. Suggested-by: Sourabh Jain Signed-off-by: Eric DeVolder Reviewed-by: Sourabh Jain Acked-by: Hari Bathini Acked-by: Baoquan He --- kernel/crash_core.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/kernel/crash_core.c b/kernel/crash_core.c index fa918176d46d..7378b501fada 100644 --- a/kernel/crash_core.c +++ b/kernel/crash_core.c @@ -364,8 +364,8 @@ int crash_prepare_elf64_headers(struct crash_mem *mem, int need_kernel_map, ehdr->e_ehsize = sizeof(Elf64_Ehdr); ehdr->e_phentsize = sizeof(Elf64_Phdr); - /* Prepare one phdr of type PT_NOTE for each present CPU */ - for_each_present_cpu(cpu) { + /* Prepare one phdr of type PT_NOTE for each possible CPU */ + for_each_possible_cpu(cpu) { phdr->p_type = PT_NOTE; notes_addr = per_cpu_ptr_to_phys(per_cpu_ptr(crash_notes, cpu)); phdr->p_offset = phdr->p_paddr = notes_addr;