sphinx.addnodesdocument)}( rawsourcechildren]( translations LanguagesNode)}(hhh](h pending_xref)}(hhh]docutils.nodesTextChinese (Simplified)}parenthsba attributes}(ids]classes]names]dupnames]backrefs] refdomainstdreftypedoc reftarget+/translations/zh_CN/admin-guide/kdump/kdumpmodnameN classnameN refexplicitutagnamehhh ubh)}(hhh]hChinese (Traditional)}hh2sbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget+/translations/zh_TW/admin-guide/kdump/kdumpmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hItalian}hhFsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget+/translations/it_IT/admin-guide/kdump/kdumpmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hJapanese}hhZsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget+/translations/ja_JP/admin-guide/kdump/kdumpmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hKorean}hhnsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget+/translations/ko_KR/admin-guide/kdump/kdumpmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hSpanish}hhsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget+/translations/sp_SP/admin-guide/kdump/kdumpmodnameN classnameN refexplicituh1hhh ubeh}(h]h ]h"]h$]h&]current_languageEnglishuh1h hh _documenthsourceNlineNubhsection)}(hhh](htitle)}(h@Documentation for Kdump - The kexec-based Crash Dumping Solutionh]h@Documentation for Kdump - The kexec-based Crash Dumping Solution}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhhhE/var/lib/git/docbuild/linux/Documentation/admin-guide/kdump/kdump.rsthKubh paragraph)}(hOThis document includes overview, setup, installation, and analysis information.h]hOThis document includes overview, setup, installation, and analysis information.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hhh](h)}(hOverviewh]hOverview}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhhhhhK ubh)}(hXKdump uses kexec to quickly boot to a dump-capture kernel whenever a dump of the system kernel's memory needs to be taken (for example, when the system panics). The system kernel's memory image is preserved across the reboot and is accessible to the dump-capture kernel.h]hXKdump uses kexec to quickly boot to a dump-capture kernel whenever a dump of the system kernel’s memory needs to be taken (for example, when the system panics). The system kernel’s memory image is preserved across the reboot and is accessible to the dump-capture kernel.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK hhhhubh)}(hYou can use common commands, such as cp, scp or makedumpfile to copy the memory image to a dump file on the local disk, or across the network to a remote system.h]hYou can use common commands, such as cp, scp or makedumpfile to copy the memory image to a dump file on the local disk, or across the network to a remote system.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hfKdump and kexec are currently supported on the x86, x86_64, ppc64, s390x, arm and arm64 architectures.h]hfKdump and kexec are currently supported on the x86, x86_64, ppc64, s390x, arm and arm64 architectures.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hX$When the system kernel boots, it reserves a small section of memory for the dump-capture kernel. This ensures that ongoing Direct Memory Access (DMA) from the system kernel does not corrupt the dump-capture kernel. The kexec -p command loads the dump-capture kernel into this reserved memory.h]hX$When the system kernel boots, it reserves a small section of memory for the dump-capture kernel. This ensures that ongoing Direct Memory Access (DMA) from the system kernel does not corrupt the dump-capture kernel. The kexec -p command loads the dump-capture kernel into this reserved memory.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hXCOn x86 machines, the first 640 KB of physical memory is needed for boot, regardless of where the kernel loads. For simpler handling, the whole low 1M is reserved to avoid any later kernel or device driver writing data into this area. Like this, the low 1M can be reused as system RAM by kdump kernel without extra handling.h]hXCOn x86 machines, the first 640 KB of physical memory is needed for boot, regardless of where the kernel loads. For simpler handling, the whole low 1M is reserved to avoid any later kernel or device driver writing data into this area. Like this, the low 1M can be reused as system RAM by kdump kernel without extra handling.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hOn PPC64 machines first 32KB of physical memory is needed for booting regardless of where the kernel is loaded and to support 64K page size kexec backs up the first 64KB memory.h]hOn PPC64 machines first 32KB of physical memory is needed for booting regardless of where the kernel is loaded and to support 64K page size kexec backs up the first 64KB memory.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK#hhhhubh)}(hFor s390x, when kdump is triggered, the crashkernel region is exchanged with the region [0, crashkernel region size] and then the kdump kernel runs in [0, crashkernel region size]. Therefore no relocatable kernel is needed for s390x.h]hFor s390x, when kdump is triggered, the crashkernel region is exchanged with the region [0, crashkernel region size] and then the kdump kernel runs in [0, crashkernel region size]. Therefore no relocatable kernel is needed for s390x.}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK'hhhhubh)}(hXAll of the necessary information about the system kernel's core image is encoded in the ELF format, and stored in a reserved area of memory before a crash. The physical address of the start of the ELF header is passed to the dump-capture kernel through the elfcorehdr= boot parameter. Optionally the size of the ELF header can also be passed when using the elfcorehdr=[size[KMG]@]offset[KMG] syntax.h]hXAll of the necessary information about the system kernel’s core image is encoded in the ELF format, and stored in a reserved area of memory before a crash. The physical address of the start of the ELF header is passed to the dump-capture kernel through the elfcorehdr= boot parameter. Optionally the size of the ELF header can also be passed when using the elfcorehdr=[size[KMG]@]offset[KMG] syntax.}(hj:hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK,hhhhubh)}(hXWith the dump-capture kernel, you can access the memory image through /proc/vmcore. This exports the dump as an ELF-format file that you can write out using file copy commands such as cp or scp. You can also use makedumpfile utility to analyze and write out filtered contents with options, e.g with '-d 31' it will only write out kernel data. Further, you can use analysis tools such as the GNU Debugger (GDB) and the Crash tool to debug the dump file. This method ensures that the dump pages are correctly ordered.h]hXWith the dump-capture kernel, you can access the memory image through /proc/vmcore. This exports the dump as an ELF-format file that you can write out using file copy commands such as cp or scp. You can also use makedumpfile utility to analyze and write out filtered contents with options, e.g with ‘-d 31’ it will only write out kernel data. Further, you can use analysis tools such as the GNU Debugger (GDB) and the Crash tool to debug the dump file. This method ensures that the dump pages are correctly ordered.}(hjHhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK3hhhhubeh}(h]overviewah ]h"]overviewah$]h&]uh1hhhhhhhhK ubh)}(hhh](h)}(hSetup and Installationh]hSetup and Installation}(hjahhhNhNubah}(h]h ]h"]h$]h&]uh1hhj^hhhhhK=ubh)}(hhh](h)}(hInstall kexec-toolsh]hInstall kexec-tools}(hjrhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjohhhhhK@ubhenumerated_list)}(hhh](h list_item)}(hLogin as the root user. h]h)}(hLogin as the root user.h]hLogin as the root user.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKBhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj)}(hDDownload the kexec-tools user-space package from the following URL: h]h)}(hCDownload the kexec-tools user-space package from the following URL:h]hCDownload the kexec-tools user-space package from the following URL:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKDhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h]h ]h"]h$]h&]enumtypearabicprefixhsuffix)uh1jhjohhhhhKBubh)}(hAhttp://kernel.org/pub/linux/utils/kernel/kexec/kexec-tools.tar.gzh]h reference)}(hjh]hAhttp://kernel.org/pub/linux/utils/kernel/kexec/kexec-tools.tar.gz}(hjhhhNhNubah}(h]h ]h"]h$]h&]refurijuh1jhjubah}(h]h ]h"]h$]h&]uh1hhhhKFhjohhubh)}(h(This is a symlink to the latest version.h]h(This is a symlink to the latest version.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKHhjohhubh)}(h0The latest kexec-tools git tree is available at:h]h0The latest kexec-tools git tree is available at:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKJhjohhubh bullet_list)}(hhh](j)}(h?git://git.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.gith]h)}(hjh]h?git://git.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.git}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKLhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj)}(hAhttp://www.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.git h]h)}(h@http://www.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.gith]j)}(hjh]h@http://www.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.git}(hjhhhNhNubah}(h]h ]h"]h$]h&]refurijuh1jhjubah}(h]h ]h"]h$]h&]uh1hhhhKMhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h]h ]h"]h$]h&]bullet-uh1jhhhKLhjohhubh)}(hmThere is also a gitweb interface available at http://www.kernel.org/git/?p=utils/kernel/kexec/kexec-tools.gith](h.There is also a gitweb interface available at }(hj>hhhNhNubj)}(h?http://www.kernel.org/git/?p=utils/kernel/kexec/kexec-tools.gith]h?http://www.kernel.org/git/?p=utils/kernel/kexec/kexec-tools.git}(hjFhhhNhNubah}(h]h ]h"]h$]h&]refurijHuh1jhj>ubeh}(h]h ]h"]h$]h&]uh1hhhhKOhjohhubh)}(hSMore information about kexec-tools can be found at http://horms.net/projects/kexec/h](h3More information about kexec-tools can be found at }(hj[hhhNhNubj)}(h http://horms.net/projects/kexec/h]h http://horms.net/projects/kexec/}(hjchhhNhNubah}(h]h ]h"]h$]h&]refurijeuh1jhj[ubeh}(h]h ]h"]h$]h&]uh1hhhhKRhjohhubj)}(hhh](j)}(hYUnpack the tarball with the tar command, as follows:: tar xvpzf kexec-tools.tar.gz h](h)}(h5Unpack the tarball with the tar command, as follows::h]h4Unpack the tarball with the tar command, as follows:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKUhj{ubh literal_block)}(htar xvpzf kexec-tools.tar.gzh]htar xvpzf kexec-tools.tar.gz}hjsbah}(h]h ]h"]h$]h&] xml:spacepreserveuh1jhhhKWhj{ubeh}(h]h ]h"]h$]h&]uh1jhjxhhhhhNubj)}(hOChange to the kexec-tools directory, as follows:: cd kexec-tools-VERSION h](h)}(h1Change to the kexec-tools directory, as follows::h]h0Change to the kexec-tools directory, as follows:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKYhjubj)}(hcd kexec-tools-VERSIONh]hcd kexec-tools-VERSION}hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhK[hjubeh}(h]h ]h"]h$]h&]uh1jhjxhhhhhNubj)}(h6Configure the package, as follows:: ./configure h](h)}(h#Configure the package, as follows::h]h"Configure the package, as follows:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK]hjubj)}(h ./configureh]h ./configure}hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhK_hjubeh}(h]h ]h"]h$]h&]uh1jhjxhhhhhNubj)}(h-Compile the package, as follows:: make h](h)}(h!Compile the package, as follows::h]h Compile the package, as follows:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKahjubj)}(hmakeh]hmake}hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhKchjubeh}(h]h ]h"]h$]h&]uh1jhjxhhhhhNubj)}(h6Install the package, as follows:: make install h](h)}(h!Install the package, as follows::h]h Install the package, as follows:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKehjubj)}(h make installh]h make install}hj)sbah}(h]h ]h"]h$]h&]jjuh1jhhhKghjubeh}(h]h ]h"]h$]h&]uh1jhjxhhhhhNubeh}(h]h ]h"]h$]h&]jjjhjjstartKuh1jhjohhhhhKUubeh}(h]install-kexec-toolsah ]h"]install kexec-toolsah$]h&]uh1hhj^hhhhhK@ubh)}(hhh](h)}(h)Build the system and dump-capture kernelsh]h)Build the system and dump-capture kernels}(hjOhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjLhhhhhKkubh)}(h.There are two possible methods of using Kdump.h]h.There are two possible methods of using Kdump.}(hj]hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKlhjLhhubj)}(hhh](j)}(hPBuild a separate custom dump-capture kernel for capturing the kernel core dump. h]h)}(hOBuild a separate custom dump-capture kernel for capturing the kernel core dump.h]hOBuild a separate custom dump-capture kernel for capturing the kernel core dump.}(hjrhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKnhjnubah}(h]h ]h"]h$]h&]uh1jhjkhhhhhNubj)}(hX'Or use the system kernel binary itself as dump-capture kernel and there is no need to build a separate dump-capture kernel. This is possible only with the architectures which support a relocatable kernel. As of today, i386, x86_64, ppc64, arm and arm64 architectures support relocatable kernel. h]h)}(hX&Or use the system kernel binary itself as dump-capture kernel and there is no need to build a separate dump-capture kernel. This is possible only with the architectures which support a relocatable kernel. As of today, i386, x86_64, ppc64, arm and arm64 architectures support relocatable kernel.h]hX&Or use the system kernel binary itself as dump-capture kernel and there is no need to build a separate dump-capture kernel. This is possible only with the architectures which support a relocatable kernel. As of today, i386, x86_64, ppc64, arm and arm64 architectures support relocatable kernel.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKqhjubah}(h]h ]h"]h$]h&]uh1jhjkhhhhhNubeh}(h]h ]h"]h$]h&]jjjhjjuh1jhjLhhhhhKnubh)}(hBuilding a relocatable kernel is advantageous from the point of view that one does not have to build a second kernel for capturing the dump. But at the same time one might want to build a custom dump capture kernel suitable to his needs.h]hBuilding a relocatable kernel is advantageous from the point of view that one does not have to build a second kernel for capturing the dump. But at the same time one might want to build a custom dump capture kernel suitable to his needs.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKwhjLhhubh)}(hpFollowing are the configuration setting required for system and dump-capture kernels for enabling kdump support.h]hpFollowing are the configuration setting required for system and dump-capture kernels for enabling kdump support.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK|hjLhhubeh}(h])build-the-system-and-dump-capture-kernelsah ]h"])build the system and dump-capture kernelsah$]h&]uh1hhj^hhhhhKkubh)}(hhh](h)}(hSystem kernel config optionsh]hSystem kernel config options}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKubj)}(hhh](j)}(hEnable "kexec system call" or "kexec file based system call" in "Processor type and features.":: CONFIG_KEXEC=y or CONFIG_KEXEC_FILE=y And both of them will select KEXEC_CORE:: CONFIG_KEXEC_CORE=y h](h)}(h`Enable "kexec system call" or "kexec file based system call" in "Processor type and features."::h]hkEnable “kexec system call” or “kexec file based system call” in “Processor type and features.”:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubj)}(h%CONFIG_KEXEC=y or CONFIG_KEXEC_FILE=yh]h%CONFIG_KEXEC=y or CONFIG_KEXEC_FILE=y}hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhKhjubh)}(h)And both of them will select KEXEC_CORE::h]h(And both of them will select KEXEC_CORE:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubj)}(hCONFIG_KEXEC_CORE=yh]hCONFIG_KEXEC_CORE=y}hj sbah}(h]h ]h"]h$]h&]jjuh1jhhhKhjubeh}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj)}(hXEnable "sysfs file system support" in "Filesystem" -> "Pseudo filesystems." This is usually enabled by default:: CONFIG_SYSFS=y Note that "sysfs file system support" might not appear in the "Pseudo filesystems" menu if "Configure standard kernel features (expert users)" is not enabled in "General Setup." In this case, check the .config file itself to ensure that sysfs is turned on, as follows:: grep 'CONFIG_SYSFS' .config h](h)}(hpEnable "sysfs file system support" in "Filesystem" -> "Pseudo filesystems." This is usually enabled by default::h]h{Enable “sysfs file system support” in “Filesystem” -> “Pseudo filesystems.” This is usually enabled by default:}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubj)}(hCONFIG_SYSFS=yh]hCONFIG_SYSFS=y}hj0sbah}(h]h ]h"]h$]h&]jjuh1jhhhKhjubh)}(hX Note that "sysfs file system support" might not appear in the "Pseudo filesystems" menu if "Configure standard kernel features (expert users)" is not enabled in "General Setup." In this case, check the .config file itself to ensure that sysfs is turned on, as follows::h]hXNote that “sysfs file system support” might not appear in the “Pseudo filesystems” menu if “Configure standard kernel features (expert users)” is not enabled in “General Setup.” In this case, check the .config file itself to ensure that sysfs is turned on, as follows:}(hj>hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubj)}(hgrep 'CONFIG_SYSFS' .configh]hgrep 'CONFIG_SYSFS' .config}hjLsbah}(h]h ]h"]h$]h&]jjuh1jhhhKhjubeh}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj)}(hEnable "Compile the kernel with debug info" in "Kernel hacking.":: CONFIG_DEBUG_INFO=Y This causes the kernel to be built with debug symbols. The dump analysis tools require a vmlinux with debug symbols in order to read and analyze a dump file. h](h)}(hBEnable "Compile the kernel with debug info" in "Kernel hacking."::h]hIEnable “Compile the kernel with debug info” in “Kernel hacking.”:}(hjdhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj`ubj)}(hCONFIG_DEBUG_INFO=Yh]hCONFIG_DEBUG_INFO=Y}hjrsbah}(h]h ]h"]h$]h&]jjuh1jhhhKhj`ubh)}(hThis causes the kernel to be built with debug symbols. The dump analysis tools require a vmlinux with debug symbols in order to read and analyze a dump file.h]hThis causes the kernel to be built with debug symbols. The dump analysis tools require a vmlinux with debug symbols in order to read and analyze a dump file.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj`ubeh}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h]h ]h"]h$]h&]jjjhjjuh1jhjhhhhhKubeh}(h]system-kernel-config-optionsah ]h"]system kernel config optionsah$]h&]uh1hhj^hhhhhKubh)}(hhh](h)}(h5Dump-capture kernel config options (Arch Independent)h]h5Dump-capture kernel config options (Arch Independent)}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKubj)}(hhh](j)}(hEnable "kernel crash dumps" support under "Processor type and features":: CONFIG_CRASH_DUMP=y And this will select VMCORE_INFO and CRASH_RESERVE:: CONFIG_VMCORE_INFO=y CONFIG_CRASH_RESERVE=y h](h)}(hIEnable "kernel crash dumps" support under "Processor type and features"::h]hPEnable “kernel crash dumps” support under “Processor type and features”:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubj)}(hCONFIG_CRASH_DUMP=yh]hCONFIG_CRASH_DUMP=y}hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhKhjubhdefinition_list)}(hhh]hdefinition_list_item)}(haAnd this will select VMCORE_INFO and CRASH_RESERVE:: CONFIG_VMCORE_INFO=y CONFIG_CRASH_RESERVE=y h](hterm)}(h4And this will select VMCORE_INFO and CRASH_RESERVE::h]h4And this will select VMCORE_INFO and CRASH_RESERVE::}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1jhhhKhjubh definition)}(hhh]h)}(h+CONFIG_VMCORE_INFO=y CONFIG_CRASH_RESERVE=yh]h+CONFIG_VMCORE_INFO=y CONFIG_CRASH_RESERVE=y}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jhjubeh}(h]h ]h"]h$]h&]uh1jhhhKhjubah}(h]h ]h"]h$]h&]uh1jhjubeh}(h]h ]h"]h$]h&]uh1jhjhhhNhNubj)}(hEnable "/proc/vmcore support" under "Filesystems" -> "Pseudo filesystems":: CONFIG_PROC_VMCORE=y (CONFIG_PROC_VMCORE is set by default when CONFIG_CRASH_DUMP is selected.) h](h)}(hKEnable "/proc/vmcore support" under "Filesystems" -> "Pseudo filesystems"::h]hVEnable “/proc/vmcore support” under “Filesystems” -> “Pseudo filesystems”:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubj)}(hCONFIG_PROC_VMCORE=yh]hCONFIG_PROC_VMCORE=y}hj.sbah}(h]h ]h"]h$]h&]jjuh1jhhhKhjubh)}(hJ(CONFIG_PROC_VMCORE is set by default when CONFIG_CRASH_DUMP is selected.)h]hJ(CONFIG_PROC_VMCORE is set by default when CONFIG_CRASH_DUMP is selected.)}(hj<hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubeh}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h]h ]h"]h$]h&]jjjhjjuh1jhjhhhhhKubeh}(h]3dump-capture-kernel-config-options-arch-independentah ]h"]5dump-capture kernel config options (arch independent)ah$]h&]uh1hhj^hhhhhKubh)}(hhh](h)}(hDDump-capture kernel config options (Arch Dependent, i386 and x86_64)h]hDDump-capture kernel config options (Arch Dependent, i386 and x86_64)}(hjahhhNhNubah}(h]h ]h"]h$]h&]uh1hhj^hhhhhKubj)}(hhh](j)}(haOn i386, enable high memory support under "Processor type and features":: CONFIG_HIGHMEM4G h](h)}(hIOn i386, enable high memory support under "Processor type and features"::h]hLOn i386, enable high memory support under “Processor type and features”:}(hjvhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjrubj)}(hCONFIG_HIGHMEM4Gh]hCONFIG_HIGHMEM4G}hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhKhjrubeh}(h]h ]h"]h$]h&]uh1jhjohhhhhNubj)}(hXPWith CONFIG_SMP=y, usually nr_cpus=1 need specified on the kernel command line when loading the dump-capture kernel because one CPU is enough for kdump kernel to dump vmcore on most of systems. However, you can also specify nr_cpus=X to enable multiple processors in kdump kernel. With CONFIG_SMP=n, the above things are not related. h](h)}(hWith CONFIG_SMP=y, usually nr_cpus=1 need specified on the kernel command line when loading the dump-capture kernel because one CPU is enough for kdump kernel to dump vmcore on most of systems.h]hWith CONFIG_SMP=y, usually nr_cpus=1 need specified on the kernel command line when loading the dump-capture kernel because one CPU is enough for kdump kernel to dump vmcore on most of systems.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hVHowever, you can also specify nr_cpus=X to enable multiple processors in kdump kernel.h]hVHowever, you can also specify nr_cpus=X to enable multiple processors in kdump kernel.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(h4With CONFIG_SMP=n, the above things are not related.h]h4With CONFIG_SMP=n, the above things are not related.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubeh}(h]h ]h"]h$]h&]uh1jhjohhhhhNubj)}(hA relocatable kernel is suggested to be built by default. If not yet, enable "Build a relocatable kernel" support under "Processor type and features":: CONFIG_RELOCATABLE=y h](h)}(hA relocatable kernel is suggested to be built by default. If not yet, enable "Build a relocatable kernel" support under "Processor type and features"::h]hA relocatable kernel is suggested to be built by default. If not yet, enable “Build a relocatable kernel” support under “Processor type and features”:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubj)}(hCONFIG_RELOCATABLE=yh]hCONFIG_RELOCATABLE=y}hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhKhjubeh}(h]h ]h"]h$]h&]uh1jhjohhhhhNubj)}(hXUse a suitable value for "Physical address where the kernel is loaded" (under "Processor type and features"). This only appears when "kernel crash dumps" is enabled. A suitable value depends upon whether kernel is relocatable or not. If you are using a relocatable kernel use CONFIG_PHYSICAL_START=0x100000 This will compile the kernel for physical address 1MB, but given the fact kernel is relocatable, it can be run from any physical address hence kexec boot loader will load it in memory region reserved for dump-capture kernel. Otherwise it should be the start of memory region reserved for second kernel using boot parameter "crashkernel=Y@X". Here X is start of memory region reserved for dump-capture kernel. Generally X is 16MB (0x1000000). So you can set CONFIG_PHYSICAL_START=0x1000000 h](h)}(hUse a suitable value for "Physical address where the kernel is loaded" (under "Processor type and features"). This only appears when "kernel crash dumps" is enabled. A suitable value depends upon whether kernel is relocatable or not.h]hUse a suitable value for “Physical address where the kernel is loaded” (under “Processor type and features”). This only appears when “kernel crash dumps” is enabled. A suitable value depends upon whether kernel is relocatable or not.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hX)If you are using a relocatable kernel use CONFIG_PHYSICAL_START=0x100000 This will compile the kernel for physical address 1MB, but given the fact kernel is relocatable, it can be run from any physical address hence kexec boot loader will load it in memory region reserved for dump-capture kernel.h]hX)If you are using a relocatable kernel use CONFIG_PHYSICAL_START=0x100000 This will compile the kernel for physical address 1MB, but given the fact kernel is relocatable, it can be run from any physical address hence kexec boot loader will load it in memory region reserved for dump-capture kernel.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hXOtherwise it should be the start of memory region reserved for second kernel using boot parameter "crashkernel=Y@X". Here X is start of memory region reserved for dump-capture kernel. Generally X is 16MB (0x1000000). So you can set CONFIG_PHYSICAL_START=0x1000000h]hX Otherwise it should be the start of memory region reserved for second kernel using boot parameter “crashkernel=Y@X”. Here X is start of memory region reserved for dump-capture kernel. Generally X is 16MB (0x1000000). So you can set CONFIG_PHYSICAL_START=0x1000000}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubeh}(h]h ]h"]h$]h&]uh1jhjohhhhhNubj)}(hlMake and install the kernel and its modules. DO NOT add this kernel to the boot loader configuration files. h]h)}(hkMake and install the kernel and its modules. DO NOT add this kernel to the boot loader configuration files.h]hkMake and install the kernel and its modules. DO NOT add this kernel to the boot loader configuration files.}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj&ubah}(h]h ]h"]h$]h&]uh1jhjohhhhhNubeh}(h]h ]h"]h$]h&]jjjhjjuh1jhj^hhhhhKubeh}(h]Adump-capture-kernel-config-options-arch-dependent-i386-and-x86-64ah ]h"]Ddump-capture kernel config options (arch dependent, i386 and x86_64)ah$]h&]uh1hhj^hhhhhKubh)}(hhh](h)}(h:Dump-capture kernel config options (Arch Dependent, ppc64)h]h:Dump-capture kernel config options (Arch Dependent, ppc64)}(hjOhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjLhhhhhKubj)}(hhh](j)}(h_Enable "Build a kdump crash kernel" support under "Kernel" options:: CONFIG_CRASH_DUMP=y h](h)}(hDEnable "Build a kdump crash kernel" support under "Kernel" options::h]hKEnable “Build a kdump crash kernel” support under “Kernel” options:}(hjdhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj`ubj)}(hCONFIG_CRASH_DUMP=yh]hCONFIG_CRASH_DUMP=y}hjrsbah}(h]h ]h"]h$]h&]jjuh1jhhhKhj`ubeh}(h]h ]h"]h$]h&]uh1jhj]hhhhhNubj)}(hGEnable "Build a relocatable kernel" support:: CONFIG_RELOCATABLE=y h](h)}(h-Enable "Build a relocatable kernel" support::h]h0Enable “Build a relocatable kernel” support:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubj)}(hCONFIG_RELOCATABLE=yh]hCONFIG_RELOCATABLE=y}hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhKhjubeh}(h]h ]h"]h$]h&]uh1jhj]hhhhhNubeh}(h]h ]h"]h$]h&]jjjhjjuh1jhjLhhhhhKubh block_quote)}(h-Make and install the kernel and its modules. h]h)}(h,Make and install the kernel and its modules.h]h,Make and install the kernel and its modules.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jhhhKhjLhhubeh}(h]7dump-capture-kernel-config-options-arch-dependent-ppc64ah ]h"]:dump-capture kernel config options (arch dependent, ppc64)ah$]h&]uh1hhj^hhhhhKubh)}(hhh](h)}(h8Dump-capture kernel config options (Arch Dependent, arm)h]h8Dump-capture kernel config options (Arch Dependent, arm)}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKubj)}(hhh]j)}(hhTo use a relocatable kernel, Enable "AUTO_ZRELADDR" support under "Boot" options:: AUTO_ZRELADDR=y h](h)}(hRTo use a relocatable kernel, Enable "AUTO_ZRELADDR" support under "Boot" options::h]hYTo use a relocatable kernel, Enable “AUTO_ZRELADDR” support under “Boot” options:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubj)}(hAUTO_ZRELADDR=yh]hAUTO_ZRELADDR=y}hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhKhjubeh}(h]h ]h"]h$]h&]uh1jhjhhhhhNubah}(h]h ]h"]h$]h&]j<j=uh1jhhhKhjhhubeh}(h]5dump-capture-kernel-config-options-arch-dependent-armah ]h"]8dump-capture kernel config options (arch dependent, arm)ah$]h&]uh1hhj^hhhhhKubh)}(hhh](h)}(h:Dump-capture kernel config options (Arch Dependent, arm64)h]h:Dump-capture kernel config options (Arch Dependent, arm64)}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKubj)}(hhh]j)}(hPlease note that kvm of the dump-capture kernel will not be enabled on non-VHE systems even if it is configured. This is because the CPU will not be reset to EL2 on panic. h]h)}(hPlease note that kvm of the dump-capture kernel will not be enabled on non-VHE systems even if it is configured. This is because the CPU will not be reset to EL2 on panic.h]hPlease note that kvm of the dump-capture kernel will not be enabled on non-VHE systems even if it is configured. This is because the CPU will not be reset to EL2 on panic.}(hj4hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj0ubah}(h]h ]h"]h$]h&]uh1jhj-hhhhhNubah}(h]h ]h"]h$]h&]j<j=uh1jhhhKhjhhubeh}(h]7dump-capture-kernel-config-options-arch-dependent-arm64ah ]h"]:dump-capture kernel config options (arch dependent, arm64)ah$]h&]uh1hhj^hhhhhKubeh}(h]setup-and-installationah ]h"]setup and installationah$]h&]uh1hhhhhhhhK=ubh)}(hhh](h)}(hcrashkernel syntaxh]hcrashkernel syntax}(hjahhhNhNubah}(h]h ]h"]h$]h&]uh1hhj^hhhhhKubj)}(hhh](j)}(hXcrashkernel=size@offset Here 'size' specifies how much memory to reserve for the dump-capture kernel and 'offset' specifies the beginning of this reserved memory. For example, "crashkernel=64M@16M" tells the system kernel to reserve 64 MB of memory starting at physical address 0x01000000 (16MB) for the dump-capture kernel. The crashkernel region can be automatically placed by the system kernel at run time. This is done by specifying the base address as 0, or omitting it all together:: crashkernel=256M@0 or:: crashkernel=256M If the start address is specified, note that the start address of the kernel will be aligned to a value (which is Arch dependent), so if the start address is not then any space below the alignment point will be wasted. h](h)}(hcrashkernel=size@offseth]j)}(hjxh]hcrashkernel=size@offset}(hjzhhhNhNubah}(h]h ]h"]h$]h&]refurimailto:crashkernel=size@offsetuh1jhjvubah}(h]h ]h"]h$]h&]uh1hhhhKhjrubh)}(hX,Here 'size' specifies how much memory to reserve for the dump-capture kernel and 'offset' specifies the beginning of this reserved memory. For example, "crashkernel=64M@16M" tells the system kernel to reserve 64 MB of memory starting at physical address 0x01000000 (16MB) for the dump-capture kernel.h](hHere ‘size’ specifies how much memory to reserve for the dump-capture kernel and ‘offset’ specifies the beginning of this reserved memory. For example, “}(hjhhhNhNubj)}(hcrashkernel=64M@16Mh]hcrashkernel=64M@16M}(hjhhhNhNubah}(h]h ]h"]h$]h&]refurimailto:crashkernel=64M@16Muh1jhjubh” tells the system kernel to reserve 64 MB of memory starting at physical address 0x01000000 (16MB) for the dump-capture kernel.}(hjhhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhKhjrubh)}(hThe crashkernel region can be automatically placed by the system kernel at run time. This is done by specifying the base address as 0, or omitting it all together::h]hThe crashkernel region can be automatically placed by the system kernel at run time. This is done by specifying the base address as 0, or omitting it all together:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjrubj)}(hcrashkernel=256M@0h]hcrashkernel=256M@0}hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhMhjrubh)}(hor::h]hor:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjrubj)}(hcrashkernel=256Mh]hcrashkernel=256M}hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhM hjrubh)}(hIf the start address is specified, note that the start address of the kernel will be aligned to a value (which is Arch dependent), so if the start address is not then any space below the alignment point will be wasted.h]hIf the start address is specified, note that the start address of the kernel will be aligned to a value (which is Arch dependent), so if the start address is not then any space below the alignment point will be wasted.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjrubeh}(h]h ]h"]h$]h&]uh1jhjohhhhhNubj)}(hXrange1:size1[,range2:size2,...][@offset] While the "crashkernel=size[@offset]" syntax is sufficient for most configurations, sometimes it's handy to have the reserved memory dependent on the value of System RAM -- that's mostly for distributors that pre-setup the kernel command line to avoid a unbootable system after some memory has been removed from the machine. The syntax is:: crashkernel=:[,:,...][@offset] range=start-[end] For example:: crashkernel=512M-2G:64M,2G-:128M This would mean: 1) if the RAM is smaller than 512M, then don't reserve anything (this is the "rescue" case) 2) if the RAM size is between 512M and 2G (exclusive), then reserve 64M 3) if the RAM size is larger than 2G, then reserve 128M h](h)}(h(range1:size1[,range2:size2,...][@offset]h]h(range1:size1[,range2:size2,...][@offset]}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hXDWhile the "crashkernel=size[@offset]" syntax is sufficient for most configurations, sometimes it's handy to have the reserved memory dependent on the value of System RAM -- that's mostly for distributors that pre-setup the kernel command line to avoid a unbootable system after some memory has been removed from the machine.h]hXLWhile the “crashkernel=size[@offset]” syntax is sufficient for most configurations, sometimes it’s handy to have the reserved memory dependent on the value of System RAM -- that’s mostly for distributors that pre-setup the kernel command line to avoid a unbootable system after some memory has been removed from the machine.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hThe syntax is::h]hThe syntax is:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubj)}(hNcrashkernel=:[,:,...][@offset] range=start-[end]h]hNcrashkernel=:[,:,...][@offset] range=start-[end]}hj+sbah}(h]h ]h"]h$]h&]jjuh1jhhhMhjubh)}(h For example::h]h For example:}(hj9hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubj)}(h crashkernel=512M-2G:64M,2G-:128Mh]h crashkernel=512M-2G:64M,2G-:128M}hjGsbah}(h]h ]h"]h$]h&]jjuh1jhhhMhjubh)}(hThis would mean:h]hThis would mean:}(hjUhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM!hjubj)}(h1) if the RAM is smaller than 512M, then don't reserve anything (this is the "rescue" case) 2) if the RAM size is between 512M and 2G (exclusive), then reserve 64M 3) if the RAM size is larger than 2G, then reserve 128M h]j)}(hhh](j)}(hXif the RAM is smaller than 512M, then don't reserve anything (this is the "rescue" case)h]h)}(hXif the RAM is smaller than 512M, then don't reserve anything (this is the "rescue" case)h]h^if the RAM is smaller than 512M, then don’t reserve anything (this is the “rescue” case)}(hjnhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM#hjjubah}(h]h ]h"]h$]h&]uh1jhjgubj)}(hDif the RAM size is between 512M and 2G (exclusive), then reserve 64Mh]h)}(hjh]hDif the RAM size is between 512M and 2G (exclusive), then reserve 64M}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM%hjubah}(h]h ]h"]h$]h&]uh1jhjgubj)}(h5if the RAM size is larger than 2G, then reserve 128M h]h)}(h4if the RAM size is larger than 2G, then reserve 128Mh]h4if the RAM size is larger than 2G, then reserve 128M}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM&hjubah}(h]h ]h"]h$]h&]uh1jhjgubeh}(h]h ]h"]h$]h&]jjjhjjuh1jhjcubah}(h]h ]h"]h$]h&]uh1jhhhM#hjubeh}(h]h ]h"]h$]h&]uh1jhjohhhhhNubj)}(hXcrashkernel=size,high and crashkernel=size,low If memory above 4G is preferred, crashkernel=size,high can be used to fulfill that. With it, physical memory is allowed to be allocated from top, so could be above 4G if system has more than 4G RAM installed. Otherwise, memory region will be allocated below 4G if available. When crashkernel=X,high is passed, kernel could allocate physical memory region above 4G, low memory under 4G is needed in this case. There are three ways to get low memory: 1) Kernel will allocate at least 256M memory below 4G automatically if crashkernel=Y,low is not specified. 2) Let user specify low memory size instead. 3) Specified value 0 will disable low memory allocation:: crashkernel=0,low h](h)}(h.crashkernel=size,high and crashkernel=size,lowh]h.crashkernel=size,high and crashkernel=size,low}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM(hjubh)}(hXIf memory above 4G is preferred, crashkernel=size,high can be used to fulfill that. With it, physical memory is allowed to be allocated from top, so could be above 4G if system has more than 4G RAM installed. Otherwise, memory region will be allocated below 4G if available.h]hXIf memory above 4G is preferred, crashkernel=size,high can be used to fulfill that. With it, physical memory is allowed to be allocated from top, so could be above 4G if system has more than 4G RAM installed. Otherwise, memory region will be allocated below 4G if available.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM*hjubh)}(hWhen crashkernel=X,high is passed, kernel could allocate physical memory region above 4G, low memory under 4G is needed in this case. There are three ways to get low memory:h]hWhen crashkernel=X,high is passed, kernel could allocate physical memory region above 4G, low memory under 4G is needed in this case. There are three ways to get low memory:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM/hjubj)}(h1) Kernel will allocate at least 256M memory below 4G automatically if crashkernel=Y,low is not specified. 2) Let user specify low memory size instead. 3) Specified value 0 will disable low memory allocation:: crashkernel=0,low h]j)}(hhh](j)}(hgKernel will allocate at least 256M memory below 4G automatically if crashkernel=Y,low is not specified.h]h)}(hgKernel will allocate at least 256M memory below 4G automatically if crashkernel=Y,low is not specified.h]hgKernel will allocate at least 256M memory below 4G automatically if crashkernel=Y,low is not specified.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM3hjubah}(h]h ]h"]h$]h&]uh1jhjubj)}(h)Let user specify low memory size instead.h]h)}(hj h]h)Let user specify low memory size instead.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM5hj ubah}(h]h ]h"]h$]h&]uh1jhjubj)}(hMSpecified value 0 will disable low memory allocation:: crashkernel=0,low h](h)}(h6Specified value 0 will disable low memory allocation::h]h5Specified value 0 will disable low memory allocation:}(hj+ hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM6hj' ubj)}(hcrashkernel=0,lowh]hcrashkernel=0,low}hj9 sbah}(h]h ]h"]h$]h&]jjuh1jhhhM8hj' ubeh}(h]h ]h"]h$]h&]uh1jhjubeh}(h]h ]h"]h$]h&]jjjhjjuh1jhjubah}(h]h ]h"]h$]h&]uh1jhhhM3hjubeh}(h]h ]h"]h$]h&]uh1jhjohhhhhNubeh}(h]h ]h"]h$]h&]jjjhjjuh1jhj^hhhhhKubh)}(hhh](h)}(hBoot into System Kernelh]hBoot into System Kernel}(hjh hhhNhNubah}(h]h ]h"]h$]h&]uh1hhje hhhhhM;ubj)}(hhh](j)}(hYUpdate the boot loader (such as grub, yaboot, or lilo) configuration files as necessary. h]h)}(hXUpdate the boot loader (such as grub, yaboot, or lilo) configuration files as necessary.h]hXUpdate the boot loader (such as grub, yaboot, or lilo) configuration files as necessary.}(hj} hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM<hjy ubah}(h]h ]h"]h$]h&]uh1jhjv hhhhhNubj)}(hX"Boot the system kernel with the boot parameter "crashkernel=Y@X". On x86 and x86_64, use "crashkernel=Y[@X]". Most of the time, the start address 'X' is not necessary, kernel will search a suitable area. Unless an explicit start address is expected. On ppc64, use "crashkernel=128M@32M". On s390x, typically use "crashkernel=xxM". The value of xx is dependent on the memory consumption of the kdump system. In general this is not dependent on the memory size of the production system. On arm, the use of "crashkernel=Y@X" is no longer necessary; the kernel will automatically locate the crash kernel image within the first 512MB of RAM if X is not given. On arm64, use "crashkernel=Y[@X]". Note that the start address of the kernel, X if explicitly specified, must be aligned to 2MiB (0x200000). h](h)}(hABoot the system kernel with the boot parameter "crashkernel=Y@X".h]hEBoot the system kernel with the boot parameter “crashkernel=Y@X”.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM?hj ubh)}(hOn x86 and x86_64, use "crashkernel=Y[@X]". Most of the time, the start address 'X' is not necessary, kernel will search a suitable area. Unless an explicit start address is expected.h]hOn x86 and x86_64, use “crashkernel=Y[@X]”. Most of the time, the start address ‘X’ is not necessary, kernel will search a suitable area. Unless an explicit start address is expected.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMAhj ubh)}(h%On ppc64, use "crashkernel=128M@32M".h](hOn ppc64, use “}(hj hhhNhNubj)}(hcrashkernel=128M@32Mh]hcrashkernel=128M@32M}(hj hhhNhNubah}(h]h ]h"]h$]h&]refurimailto:crashkernel=128M@32Muh1jhj ubh”.}(hj hhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhMEhj ubh)}(hOn s390x, typically use "crashkernel=xxM". The value of xx is dependent on the memory consumption of the kdump system. In general this is not dependent on the memory size of the production system.h]hOn s390x, typically use “crashkernel=xxM”. The value of xx is dependent on the memory consumption of the kdump system. In general this is not dependent on the memory size of the production system.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMGhj ubh)}(hOn arm, the use of "crashkernel=Y@X" is no longer necessary; the kernel will automatically locate the crash kernel image within the first 512MB of RAM if X is not given.h]hOn arm, the use of “crashkernel=Y@X” is no longer necessary; the kernel will automatically locate the crash kernel image within the first 512MB of RAM if X is not given.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMKhj ubh)}(hOn arm64, use "crashkernel=Y[@X]". Note that the start address of the kernel, X if explicitly specified, must be aligned to 2MiB (0x200000).h]hOn arm64, use “crashkernel=Y[@X]”. Note that the start address of the kernel, X if explicitly specified, must be aligned to 2MiB (0x200000).}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMOhj ubeh}(h]h ]h"]h$]h&]uh1jhjv hhhhhNubeh}(h]h ]h"]h$]h&]jjjhjjuh1jhje hhhhhM<ubeh}(h]boot-into-system-kernelah ]h"]boot into system kernelah$]h&]uh1hhj^hhhhhM;ubeh}(h]crashkernel-syntaxah ]h"]crashkernel syntaxah$]h&]uh1hhhhhhhhKubh)}(hhh](h)}(hLoad the Dump-capture Kernelh]hLoad the Dump-capture Kernel}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj hhhhhMSubh)}(hKAfter booting to the system kernel, dump-capture kernel needs to be loaded.h]hKAfter booting to the system kernel, dump-capture kernel needs to be loaded.}(hj* hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMUhj hhubh)}(hBased on the architecture and type of image (relocatable or not), one can choose to load the uncompressed vmlinux or compressed bzImage/vmlinuz of dump-capture kernel. Following is the summary.h]hBased on the architecture and type of image (relocatable or not), one can choose to load the uncompressed vmlinux or compressed bzImage/vmlinuz of dump-capture kernel. Following is the summary.}(hj8 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMXhj hhubh)}(hFor i386 and x86_64:h]hFor i386 and x86_64:}(hjF hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM\hj hhubj)}(h\- Use bzImage/vmlinuz if kernel is relocatable. - Use vmlinux if kernel is not relocatable. h]j)}(hhh](j)}(h-Use bzImage/vmlinuz if kernel is relocatable.h]h)}(hj] h]h-Use bzImage/vmlinuz if kernel is relocatable.}(hj_ hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM^hj[ ubah}(h]h ]h"]h$]h&]uh1jhjX ubj)}(h*Use vmlinux if kernel is not relocatable. h]h)}(h)Use vmlinux if kernel is not relocatable.h]h)Use vmlinux if kernel is not relocatable.}(hjv hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM_hjr ubah}(h]h ]h"]h$]h&]uh1jhjX ubeh}(h]h ]h"]h$]h&]j<j=uh1jhhhM^hjT ubah}(h]h ]h"]h$]h&]uh1jhhhM^hj hhubh)}(h For ppc64:h]h For ppc64:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMahj hhubj)}(h- Use vmlinux h]j)}(hhh]j)}(h Use vmlinux h]h)}(h Use vmlinuxh]h Use vmlinux}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMchj ubah}(h]h ]h"]h$]h&]uh1jhj ubah}(h]h ]h"]h$]h&]j<j=uh1jhhhMchj ubah}(h]h ]h"]h$]h&]uh1jhhhMchj hhubh)}(h For s390x:h]h For s390x:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMehj hhubj)}(h- Use image or bzImage h]j)}(hhh]j)}(hUse image or bzImage h]h)}(hUse image or bzImageh]hUse image or bzImage}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMghj ubah}(h]h ]h"]h$]h&]uh1jhj ubah}(h]h ]h"]h$]h&]j<j=uh1jhhhMghj ubah}(h]h ]h"]h$]h&]uh1jhhhMghj hhubh)}(hFor arm:h]hFor arm:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMihj hhubj)}(h - Use zImage h]j)}(hhh]j)}(h Use zImage h]h)}(h Use zImageh]h Use zImage}(hj! hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMkhj ubah}(h]h ]h"]h$]h&]uh1jhj ubah}(h]h ]h"]h$]h&]j<j=uh1jhhhMkhj ubah}(h]h ]h"]h$]h&]uh1jhhhMkhj hhubh)}(h For arm64:h]h For arm64:}(hjA hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMmhj hhubj)}(h- Use vmlinux or Image h]j)}(hhh]j)}(hUse vmlinux or Image h]h)}(hUse vmlinux or Imageh]hUse vmlinux or Image}(hjZ hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMohjV ubah}(h]h ]h"]h$]h&]uh1jhjS ubah}(h]h ]h"]h$]h&]j<j=uh1jhhhMohjO ubah}(h]h ]h"]h$]h&]uh1jhhhMohj hhubh)}(hgIf you are using an uncompressed vmlinux image then use following command to load dump-capture kernel::h]hfIf you are using an uncompressed vmlinux image then use following command to load dump-capture kernel:}(hjz hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMqhj hhubj)}(hkexec -p \ --initrd= --args-linux \ --append="root= "h]hkexec -p \ --initrd= --args-linux \ --append="root= "}hj sbah}(h]h ]h"]h$]h&]jjuh1jhhhMthj hhubh)}(hgIf you are using a compressed bzImage/vmlinuz, then use following command to load dump-capture kernel::h]hfIf you are using a compressed bzImage/vmlinuz, then use following command to load dump-capture kernel:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMxhj hhubj)}(hkexec -p \ --initrd= \ --append="root= "h]hkexec -p \ --initrd= \ --append="root= "}hj sbah}(h]h ]h"]h$]h&]jjuh1jhhhM{hj hhubh)}(h^If you are using a compressed zImage, then use following command to load dump-capture kernel::h]h]If you are using a compressed zImage, then use following command to load dump-capture kernel:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubj)}(hkexec --type zImage -p \ --initrd= \ --dtb= \ --append="root= "h]hkexec --type zImage -p \ --initrd= \ --dtb= \ --append="root= "}hj sbah}(h]h ]h"]h$]h&]jjuh1jhhhMhj hhubh)}(h`If you are using an uncompressed Image, then use following command to load dump-capture kernel::h]h_If you are using an uncompressed Image, then use following command to load dump-capture kernel:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubj)}(hkexec -p \ --initrd= \ --append="root= "h]hkexec -p \ --initrd= \ --append="root= "}hj sbah}(h]h ]h"]h$]h&]jjuh1jhhhMhj hhubh)}(hbFollowing are the arch specific command line options to be used while loading dump-capture kernel.h]hbFollowing are the arch specific command line options to be used while loading dump-capture kernel.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubh)}(hFor i386 and x86_64:h]hFor i386 and x86_64:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubj)}(h$"1 irqpoll nr_cpus=1 reset_devices" h]h)}(h#"1 irqpoll nr_cpus=1 reset_devices"h]h'“1 irqpoll nr_cpus=1 reset_devices”}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubah}(h]h ]h"]h$]h&]uh1jhhhMhj hhubh)}(h For ppc64:h]h For ppc64:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubj)}(h)"1 maxcpus=1 noirqdistrib reset_devices" h]h)}(h("1 maxcpus=1 noirqdistrib reset_devices"h]h,“1 maxcpus=1 noirqdistrib reset_devices”}(hj0 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj, ubah}(h]h ]h"]h$]h&]uh1jhhhMhj hhubh)}(h For s390x:h]h For s390x:}(hjD hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubj)}(h$"1 nr_cpus=1 cgroup_disable=memory" h]h)}(h#"1 nr_cpus=1 cgroup_disable=memory"h]h'“1 nr_cpus=1 cgroup_disable=memory”}(hjV hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjR ubah}(h]h ]h"]h$]h&]uh1jhhhMhj hhubh)}(hFor arm:h]hFor arm:}(hjj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubj)}(h"1 maxcpus=1 reset_devices" h]h)}(h"1 maxcpus=1 reset_devices"h]h“1 maxcpus=1 reset_devices”}(hj| hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjx ubah}(h]h ]h"]h$]h&]uh1jhhhMhj hhubh)}(h For arm64:h]h For arm64:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubj)}(h"1 nr_cpus=1 reset_devices" h]h)}(h"1 nr_cpus=1 reset_devices"h]h“1 nr_cpus=1 reset_devices”}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubah}(h]h ]h"]h$]h&]uh1jhhhMhj hhubh)}(h)Notes on loading the dump-capture kernel:h]h)Notes on loading the dump-capture kernel:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubj)}(hhh](j)}(hXBy default, the ELF headers are stored in ELF64 format to support systems with more than 4GB memory. On i386, kexec automatically checks if the physical RAM size exceeds the 4 GB limit and if not, uses ELF32. So, on non-PAE systems, ELF32 is always used. The --elf32-core-headers option can be used to force the generation of ELF32 headers. This is necessary because GDB currently cannot open vmcore files with ELF64 headers on 32-bit systems. h](h)}(hBy default, the ELF headers are stored in ELF64 format to support systems with more than 4GB memory. On i386, kexec automatically checks if the physical RAM size exceeds the 4 GB limit and if not, uses ELF32. So, on non-PAE systems, ELF32 is always used.h]hBy default, the ELF headers are stored in ELF64 format to support systems with more than 4GB memory. On i386, kexec automatically checks if the physical RAM size exceeds the 4 GB limit and if not, uses ELF32. So, on non-PAE systems, ELF32 is always used.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubh)}(hThe --elf32-core-headers option can be used to force the generation of ELF32 headers. This is necessary because GDB currently cannot open vmcore files with ELF64 headers on 32-bit systems.h]hThe --elf32-core-headers option can be used to force the generation of ELF32 headers. This is necessary because GDB currently cannot open vmcore files with ELF64 headers on 32-bit systems.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubeh}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj)}(hyThe "irqpoll" boot parameter reduces driver initialization failures due to shared interrupts in the dump-capture kernel. h]h)}(hxThe "irqpoll" boot parameter reduces driver initialization failures due to shared interrupts in the dump-capture kernel.h]h|The “irqpoll” boot parameter reduces driver initialization failures due to shared interrupts in the dump-capture kernel.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj)}(hpYou must specify in the format corresponding to the root device name in the output of mount command. h]h)}(hoYou must specify in the format corresponding to the root device name in the output of mount command.h]hoYou must specify in the format corresponding to the root device name in the output of mount command.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj)}(h|Boot parameter "1" boots the dump-capture kernel into single-user mode without networking. If you want networking, use "3". h]h)}(h{Boot parameter "1" boots the dump-capture kernel into single-user mode without networking. If you want networking, use "3".h]hBoot parameter “1” boots the dump-capture kernel into single-user mode without networking. If you want networking, use “3”.}(hj! hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj)}(hXXWe generally don't have to bring up a SMP kernel just to capture the dump. Hence generally it is useful either to build a UP dump-capture kernel or specify maxcpus=1 option while loading dump-capture kernel. Note, though maxcpus always works, you had better replace it with nr_cpus to save memory if supported by the current ARCH, such as x86. h]h)}(hXWWe generally don't have to bring up a SMP kernel just to capture the dump. Hence generally it is useful either to build a UP dump-capture kernel or specify maxcpus=1 option while loading dump-capture kernel. Note, though maxcpus always works, you had better replace it with nr_cpus to save memory if supported by the current ARCH, such as x86.h]hXYWe generally don’t have to bring up a SMP kernel just to capture the dump. Hence generally it is useful either to build a UP dump-capture kernel or specify maxcpus=1 option while loading dump-capture kernel. Note, though maxcpus always works, you had better replace it with nr_cpus to save memory if supported by the current ARCH, such as x86.}(hj9 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj5 ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj)}(hXnYou should enable multi-cpu support in dump-capture kernel if you intend to use multi-thread programs with it, such as parallel dump feature of makedumpfile. Otherwise, the multi-thread program may have a great performance degradation. To enable multi-cpu support, you should bring up an SMP dump-capture kernel and specify maxcpus/nr_cpus options while loading it. h]h)}(hXmYou should enable multi-cpu support in dump-capture kernel if you intend to use multi-thread programs with it, such as parallel dump feature of makedumpfile. Otherwise, the multi-thread program may have a great performance degradation. To enable multi-cpu support, you should bring up an SMP dump-capture kernel and specify maxcpus/nr_cpus options while loading it.h]hXmYou should enable multi-cpu support in dump-capture kernel if you intend to use multi-thread programs with it, such as parallel dump feature of makedumpfile. Otherwise, the multi-thread program may have a great performance degradation. To enable multi-cpu support, you should bring up an SMP dump-capture kernel and specify maxcpus/nr_cpus options while loading it.}(hjQ hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjM ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj)}(hXFor s390x there are two kdump modes: If a ELF header is specified with the elfcorehdr= kernel parameter, it is used by the kdump kernel as it is done on all other architectures. If no elfcorehdr= kernel parameter is specified, the s390x kdump kernel dynamically creates the header. The second mode has the advantage that for CPU and memory hotplug, kdump has not to be reloaded with kexec_load(). Ah]h)}(hXFor s390x there are two kdump modes: If a ELF header is specified with the elfcorehdr= kernel parameter, it is used by the kdump kernel as it is done on all other architectures. If no elfcorehdr= kernel parameter is specified, the s390x kdump kernel dynamically creates the header. The second mode has the advantage that for CPU and memory hotplug, kdump has not to be reloaded with kexec_load().h]hXFor s390x there are two kdump modes: If a ELF header is specified with the elfcorehdr= kernel parameter, it is used by the kdump kernel as it is done on all other architectures. If no elfcorehdr= kernel parameter is specified, the s390x kdump kernel dynamically creates the header. The second mode has the advantage that for CPU and memory hotplug, kdump has not to be reloaded with kexec_load().}(hji hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhje ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj)}(hXxFor s390x systems with many attached devices the "cio_ignore" kernel parameter should be used for the kdump kernel in order to prevent allocation of kernel memory for devices that are not relevant for kdump. The same applies to systems that use SCSI/FCP devices. In that case the "allow_lun_scan" zfcp module parameter should be set to zero before setting FCP devices online. h]h)}(hXwFor s390x systems with many attached devices the "cio_ignore" kernel parameter should be used for the kdump kernel in order to prevent allocation of kernel memory for devices that are not relevant for kdump. The same applies to systems that use SCSI/FCP devices. In that case the "allow_lun_scan" zfcp module parameter should be set to zero before setting FCP devices online.h]hXFor s390x systems with many attached devices the “cio_ignore” kernel parameter should be used for the kdump kernel in order to prevent allocation of kernel memory for devices that are not relevant for kdump. The same applies to systems that use SCSI/FCP devices. In that case the “allow_lun_scan” zfcp module parameter should be set to zero before setting FCP devices online.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj} ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubeh}(h]h ]h"]h$]h&]j<*uh1jhhhMhj hhubeh}(h]load-the-dump-capture-kernelah ]h"]load the dump-capture kernelah$]h&]uh1hhhhhhhhMSubh)}(hhh](h)}(h Kernel Panich]h Kernel Panic}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj hhhhhMubh)}(hXAfter successfully loading the dump-capture kernel as previously described, the system will reboot into the dump-capture kernel if a system crash is triggered. Trigger points are located in panic(), die(), die_nmi() and in the sysrq handler (ALT-SysRq-c).h]hXAfter successfully loading the dump-capture kernel as previously described, the system will reboot into the dump-capture kernel if a system crash is triggered. Trigger points are located in panic(), die(), die_nmi() and in the sysrq handler (ALT-SysRq-c).}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubh)}(h /proc/sysrq-trigger" or write a module to force the panic.h]hFor testing purposes, you can trigger a crash by using “ALT-SysRq-c”, “echo c > /proc/sysrq-trigger” or write a module to force the panic.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubeh}(h] kernel-panicah ]h"] kernel panicah$]h&]uh1hhhhhhhhMubh)}(hhh](h)}(hWrite Out the Dump Fileh]hWrite Out the Dump File}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubh)}(h]After the dump-capture kernel is booted, write out the dump file with the following command::h]h\After the dump-capture kernel is booted, write out the dump file with the following command:}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(hcp /proc/vmcore h]hcp /proc/vmcore }hj0sbah}(h]h ]h"]h$]h&]jjuh1jhhhMhjhhubh)}(hGor use scp to write out the dump file between hosts on a network, e.g::h]hFor use scp to write out the dump file between hosts on a network, e.g:}(hj>hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(h6scp /proc/vmcore remote_username@remote_ip:h]h6scp /proc/vmcore remote_username@remote_ip:}hjLsbah}(h]h ]h"]h$]h&]jjuh1jhhhMhjhhubh)}(h~You can also use makedumpfile utility to write out the dump file with specified options to filter out unwanted contents, e.g::h]h}You can also use makedumpfile utility to write out the dump file with specified options to filter out unwanted contents, e.g:}(hjZhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(h@makedumpfile -l --message-level 1 -d 31 /proc/vmcore h]h@makedumpfile -l --message-level 1 -d 31 /proc/vmcore }hjhsbah}(h]h ]h"]h$]h&]jjuh1jhhhMhjhhubeh}(h]write-out-the-dump-fileah ]h"]write out the dump fileah$]h&]uh1hhhhhhhhMubh)}(hhh](h)}(hAnalysish]hAnalysis}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhj~hhhhhMubh)}(hHBefore analyzing the dump image, you should reboot into a stable kernel.h]hHBefore analyzing the dump image, you should reboot into a stable kernel.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj~hhubh)}(hYou can do limited analysis using GDB on the dump file copied out of /proc/vmcore. Use the debug vmlinux built with -g and run the following command::h]hYou can do limited analysis using GDB on the dump file copied out of /proc/vmcore. Use the debug vmlinux built with -g and run the following command:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj~hhubj)}(hgdb vmlinux h]hgdb vmlinux }hjsbah}(h]h ]h"]h$]h&]jjuh1jhhhMhj~hhubh)}(hXStack trace for the task on processor 0, register display, and memory display work fine.h]hXStack trace for the task on processor 0, register display, and memory display work fine.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj~hhubh)}(hNote: GDB cannot analyze core files generated in ELF64 format for x86. On systems with a maximum of 4GB of memory, you can generate ELF32-format headers using the --elf32-core-headers kernel option on the dump kernel.h]hNote: GDB cannot analyze core files generated in ELF64 format for x86. On systems with a maximum of 4GB of memory, you can generate ELF32-format headers using the --elf32-core-headers kernel option on the dump kernel.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj~hhubh)}(hrYou can also use the Crash utility to analyze dump files in Kdump format. Crash is available at the following URL:h]hrYou can also use the Crash utility to analyze dump files in Kdump format. Crash is available at the following URL:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj~hhubj)}(h'https://github.com/crash-utility/crash h]h)}(h&https://github.com/crash-utility/crashh]j)}(hjh]h&https://github.com/crash-utility/crash}(hjhhhNhNubah}(h]h ]h"]h$]h&]refurijuh1jhjubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jhhhMhj~hhubj)}(hhh]j)}(hACrash document can be found at: https://crash-utility.github.io/ h](j)}(hCrash document can be found at:h]hCrash document can be found at:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1jhhhMhjubj)}(hhh]h)}(h https://crash-utility.github.io/h]j)}(hjh]h https://crash-utility.github.io/}(hj!hhhNhNubah}(h]h ]h"]h$]h&]refurijuh1jhjubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jhjubeh}(h]h ]h"]h$]h&]uh1jhhhMhjubah}(h]h ]h"]h$]h&]uh1jhj~hhhhhNubeh}(h]analysisah ]h"]analysisah$]h&]uh1hhhhhhhhMubh)}(hhh](h)}(hTrigger Kdump on WARN()h]hTrigger Kdump on WARN()}(hjRhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjOhhhhhMubh)}(hX The kernel parameter, panic_on_warn, calls panic() in all WARN() paths. This will cause a kdump to occur at the panic() call. In cases where a user wants to specify this during runtime, /proc/sys/kernel/panic_on_warn can be set to 1 to achieve the same behaviour.h]hX The kernel parameter, panic_on_warn, calls panic() in all WARN() paths. This will cause a kdump to occur at the panic() call. In cases where a user wants to specify this during runtime, /proc/sys/kernel/panic_on_warn can be set to 1 to achieve the same behaviour.}(hj`hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjOhhubeh}(h]trigger-kdump-on-warnah ]h"]trigger kdump on warn()ah$]h&]uh1hhhhhhhhMubh)}(hhh](h)}(hTrigger Kdump on add_taint()h]hTrigger Kdump on add_taint()}(hjyhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjvhhhhhMubh)}(hXThe kernel parameter panic_on_taint facilitates a conditional call to panic() from within add_taint() whenever the value set in this bitmask matches with the bit flag being set by add_taint(). This will cause a kdump to occur at the add_taint()->panic() call.h]hXThe kernel parameter panic_on_taint facilitates a conditional call to panic() from within add_taint() whenever the value set in this bitmask matches with the bit flag being set by add_taint(). This will cause a kdump to occur at the add_taint()->panic() call.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM!hjvhhubeh}(h]trigger-kdump-on-add-taintah ]h"]trigger kdump on add_taint()ah$]h&]uh1hhhhhhhhMubh)}(hhh](h)}(hContacth]hContact}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhM'ubj)}(hhh]j)}(hkexec@lists.infradead.org h]h)}(hkexec@lists.infradead.orgh]j)}(hjh]hkexec@lists.infradead.org}(hjhhhNhNubah}(h]h ]h"]h$]h&]refuri mailto:kexec@lists.infradead.orguh1jhjubah}(h]h ]h"]h$]h&]uh1hhhhM)hjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubah}(h]h ]h"]h$]h&]j<j=uh1jhhhM)hjhhubeh}(h]contactah ]h"]contactah$]h&]uh1hhhhhhhhM'ubh)}(hhh](h)}(h GDB macrosh]h GDB macros}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhM,ubj)}(hXY"# # This file contains a few gdb macros (user defined commands) to extract # useful information from kernel crashdump (kdump) like stack traces of # all the processes or a particular process and trapinfo. # # These macros can be used by copying this file in .gdbinit (put in home # directory or current directory) or by invoking gdb command with # --command= option # # Credits: # Alexander Nyberg # V Srivatsa # Maneesh Soni # define bttnobp set $tasks_off=((size_t)&((struct task_struct *)0)->tasks) set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next) set $init_t=&init_task set $next_t=(((char *)($init_t->tasks).next) - $tasks_off) set var $stacksize = sizeof(union thread_union) while ($next_t != $init_t) set $next_t=(struct task_struct *)$next_t printf "\npid %d; comm %s:\n", $next_t.pid, $next_t.comm printf "===================\n" set var $stackp = $next_t.thread.sp set var $stack_top = ($stackp & ~($stacksize - 1)) + $stacksize while ($stackp < $stack_top) if (*($stackp) > _stext && *($stackp) < _sinittext) info symbol *($stackp) end set $stackp += 4 end set $next_th=(((char *)$next_t->thread_group.next) - $pid_off) while ($next_th != $next_t) set $next_th=(struct task_struct *)$next_th printf "\npid %d; comm %s:\n", $next_t.pid, $next_t.comm printf "===================\n" set var $stackp = $next_t.thread.sp set var $stack_top = ($stackp & ~($stacksize - 1)) + stacksize while ($stackp < $stack_top) if (*($stackp) > _stext && *($stackp) < _sinittext) info symbol *($stackp) end set $stackp += 4 end set $next_th=(((char *)$next_th->thread_group.next) - $pid_off) end set $next_t=(char *)($next_t->tasks.next) - $tasks_off end end document bttnobp dump all thread stack traces on a kernel compiled with !CONFIG_FRAME_POINTER end define btthreadstack set var $pid_task = $arg0 printf "\npid %d; comm %s:\n", $pid_task.pid, $pid_task.comm printf "task struct: " print $pid_task printf "===================\n" set var $stackp = $pid_task.thread.sp set var $stacksize = sizeof(union thread_union) set var $stack_top = ($stackp & ~($stacksize - 1)) + $stacksize set var $stack_bot = ($stackp & ~($stacksize - 1)) set $stackp = *((unsigned long *) $stackp) while (($stackp < $stack_top) && ($stackp > $stack_bot)) set var $addr = *(((unsigned long *) $stackp) + 1) info symbol $addr set $stackp = *((unsigned long *) $stackp) end end document btthreadstack dump a thread stack using the given task structure pointer end define btt set $tasks_off=((size_t)&((struct task_struct *)0)->tasks) set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next) set $init_t=&init_task set $next_t=(((char *)($init_t->tasks).next) - $tasks_off) while ($next_t != $init_t) set $next_t=(struct task_struct *)$next_t btthreadstack $next_t set $next_th=(((char *)$next_t->thread_group.next) - $pid_off) while ($next_th != $next_t) set $next_th=(struct task_struct *)$next_th btthreadstack $next_th set $next_th=(((char *)$next_th->thread_group.next) - $pid_off) end set $next_t=(char *)($next_t->tasks.next) - $tasks_off end end document btt dump all thread stack traces on a kernel compiled with CONFIG_FRAME_POINTER end define btpid set var $pid = $arg0 set $tasks_off=((size_t)&((struct task_struct *)0)->tasks) set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next) set $init_t=&init_task set $next_t=(((char *)($init_t->tasks).next) - $tasks_off) set var $pid_task = 0 while ($next_t != $init_t) set $next_t=(struct task_struct *)$next_t if ($next_t.pid == $pid) set $pid_task = $next_t end set $next_th=(((char *)$next_t->thread_group.next) - $pid_off) while ($next_th != $next_t) set $next_th=(struct task_struct *)$next_th if ($next_th.pid == $pid) set $pid_task = $next_th end set $next_th=(((char *)$next_th->thread_group.next) - $pid_off) end set $next_t=(char *)($next_t->tasks.next) - $tasks_off end btthreadstack $pid_task end document btpid backtrace of pid end define trapinfo set var $pid = $arg0 set $tasks_off=((size_t)&((struct task_struct *)0)->tasks) set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next) set $init_t=&init_task set $next_t=(((char *)($init_t->tasks).next) - $tasks_off) set var $pid_task = 0 while ($next_t != $init_t) set $next_t=(struct task_struct *)$next_t if ($next_t.pid == $pid) set $pid_task = $next_t end set $next_th=(((char *)$next_t->thread_group.next) - $pid_off) while ($next_th != $next_t) set $next_th=(struct task_struct *)$next_th if ($next_th.pid == $pid) set $pid_task = $next_th end set $next_th=(((char *)$next_th->thread_group.next) - $pid_off) end set $next_t=(char *)($next_t->tasks.next) - $tasks_off end printf "Trapno %ld, cr2 0x%lx, error_code %ld\n", $pid_task.thread.trap_no, \ $pid_task.thread.cr2, $pid_task.thread.error_code end document trapinfo Run info threads and lookup pid of thread #1 'trapinfo ' will tell you by which trap & possibly address the kernel panicked. end define dump_record set var $desc = $arg0 set var $info = $arg1 if ($argc > 2) set var $prev_flags = $arg2 else set var $prev_flags = 0 end set var $prefix = 1 set var $newline = 1 set var $begin = $desc->text_blk_lpos.begin % (1U << prb->text_data_ring.size_bits) set var $next = $desc->text_blk_lpos.next % (1U << prb->text_data_ring.size_bits) # handle data-less record if ($begin & 1) set var $text_len = 0 set var $log = "" else # handle wrapping data block if ($begin > $next) set var $begin = 0 end # skip over descriptor id set var $begin = $begin + sizeof(long) # handle truncated message if ($next - $begin < $info->text_len) set var $text_len = $next - $begin else set var $text_len = $info->text_len end set var $log = &prb->text_data_ring.data[$begin] end # prev & LOG_CONT && !(info->flags & LOG_PREIX) if (($prev_flags & 8) && !($info->flags & 4)) set var $prefix = 0 end # info->flags & LOG_CONT if ($info->flags & 8) # (prev & LOG_CONT && !(prev & LOG_NEWLINE)) if (($prev_flags & 8) && !($prev_flags & 2)) set var $prefix = 0 end # (!(info->flags & LOG_NEWLINE)) if (!($info->flags & 2)) set var $newline = 0 end end if ($prefix) printf "[%5lu.%06lu] ", $info->ts_nsec / 1000000000, $info->ts_nsec % 1000000000 end if ($text_len) eval "printf \"%%%d.%ds\", $log", $text_len, $text_len end if ($newline) printf "\n" end # handle dictionary data set var $dict = &$info->dev_info.subsystem[0] set var $dict_len = sizeof($info->dev_info.subsystem) if ($dict[0] != '\0') printf " SUBSYSTEM=" set var $idx = 0 while ($idx < $dict_len) set var $c = $dict[$idx] if ($c == '\0') loop_break else if ($c < ' ' || $c >= 127 || $c == '\\') printf "\\x%02x", $c else printf "%c", $c end end set var $idx = $idx + 1 end printf "\n" end set var $dict = &$info->dev_info.device[0] set var $dict_len = sizeof($info->dev_info.device) if ($dict[0] != '\0') printf " DEVICE=" set var $idx = 0 while ($idx < $dict_len) set var $c = $dict[$idx] if ($c == '\0') loop_break else if ($c < ' ' || $c >= 127 || $c == '\\') printf "\\x%02x", $c else printf "%c", $c end end set var $idx = $idx + 1 end printf "\n" end end document dump_record Dump a single record. The first parameter is the descriptor, the second parameter is the info, the third parameter is optional and specifies the previous record's flags, used for properly formatting continued lines. end define dmesg # definitions from kernel/printk/printk_ringbuffer.h set var $desc_committed = 1 set var $desc_finalized = 2 set var $desc_sv_bits = sizeof(long) * 8 set var $desc_flags_shift = $desc_sv_bits - 2 set var $desc_flags_mask = 3 << $desc_flags_shift set var $id_mask = ~$desc_flags_mask set var $desc_count = 1U << prb->desc_ring.count_bits set var $prev_flags = 0 set var $id = prb->desc_ring.tail_id.counter set var $end_id = prb->desc_ring.head_id.counter while (1) set var $desc = &prb->desc_ring.descs[$id % $desc_count] set var $info = &prb->desc_ring.infos[$id % $desc_count] # skip non-committed record set var $state = 3 & ($desc->state_var.counter >> $desc_flags_shift) if ($state == $desc_committed || $state == $desc_finalized) dump_record $desc $info $prev_flags set var $prev_flags = $info->flags end if ($id == $end_id) loop_break end set var $id = ($id + 1) & $id_mask end end document dmesg print the kernel ring buffer end h]hX/# # This file contains a few gdb macros (user defined commands) to extract # useful information from kernel crashdump (kdump) like stack traces of # all the processes or a particular process and trapinfo. # # These macros can be used by copying this file in .gdbinit (put in home # directory or current directory) or by invoking gdb command with # --command= option # # Credits: # Alexander Nyberg # V Srivatsa # Maneesh Soni # define bttnobp set $tasks_off=((size_t)&((struct task_struct *)0)->tasks) set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next) set $init_t=&init_task set $next_t=(((char *)($init_t->tasks).next) - $tasks_off) set var $stacksize = sizeof(union thread_union) while ($next_t != $init_t) set $next_t=(struct task_struct *)$next_t printf "\npid %d; comm %s:\n", $next_t.pid, $next_t.comm printf "===================\n" set var $stackp = $next_t.thread.sp set var $stack_top = ($stackp & ~($stacksize - 1)) + $stacksize while ($stackp < $stack_top) if (*($stackp) > _stext && *($stackp) < _sinittext) info symbol *($stackp) end set $stackp += 4 end set $next_th=(((char *)$next_t->thread_group.next) - $pid_off) while ($next_th != $next_t) set $next_th=(struct task_struct *)$next_th printf "\npid %d; comm %s:\n", $next_t.pid, $next_t.comm printf "===================\n" set var $stackp = $next_t.thread.sp set var $stack_top = ($stackp & ~($stacksize - 1)) + stacksize while ($stackp < $stack_top) if (*($stackp) > _stext && *($stackp) < _sinittext) info symbol *($stackp) end set $stackp += 4 end set $next_th=(((char *)$next_th->thread_group.next) - $pid_off) end set $next_t=(char *)($next_t->tasks.next) - $tasks_off end end document bttnobp dump all thread stack traces on a kernel compiled with !CONFIG_FRAME_POINTER end define btthreadstack set var $pid_task = $arg0 printf "\npid %d; comm %s:\n", $pid_task.pid, $pid_task.comm printf "task struct: " print $pid_task printf "===================\n" set var $stackp = $pid_task.thread.sp set var $stacksize = sizeof(union thread_union) set var $stack_top = ($stackp & ~($stacksize - 1)) + $stacksize set var $stack_bot = ($stackp & ~($stacksize - 1)) set $stackp = *((unsigned long *) $stackp) while (($stackp < $stack_top) && ($stackp > $stack_bot)) set var $addr = *(((unsigned long *) $stackp) + 1) info symbol $addr set $stackp = *((unsigned long *) $stackp) end end document btthreadstack dump a thread stack using the given task structure pointer end define btt set $tasks_off=((size_t)&((struct task_struct *)0)->tasks) set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next) set $init_t=&init_task set $next_t=(((char *)($init_t->tasks).next) - $tasks_off) while ($next_t != $init_t) set $next_t=(struct task_struct *)$next_t btthreadstack $next_t set $next_th=(((char *)$next_t->thread_group.next) - $pid_off) while ($next_th != $next_t) set $next_th=(struct task_struct *)$next_th btthreadstack $next_th set $next_th=(((char *)$next_th->thread_group.next) - $pid_off) end set $next_t=(char *)($next_t->tasks.next) - $tasks_off end end document btt dump all thread stack traces on a kernel compiled with CONFIG_FRAME_POINTER end define btpid set var $pid = $arg0 set $tasks_off=((size_t)&((struct task_struct *)0)->tasks) set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next) set $init_t=&init_task set $next_t=(((char *)($init_t->tasks).next) - $tasks_off) set var $pid_task = 0 while ($next_t != $init_t) set $next_t=(struct task_struct *)$next_t if ($next_t.pid == $pid) set $pid_task = $next_t end set $next_th=(((char *)$next_t->thread_group.next) - $pid_off) while ($next_th != $next_t) set $next_th=(struct task_struct *)$next_th if ($next_th.pid == $pid) set $pid_task = $next_th end set $next_th=(((char *)$next_th->thread_group.next) - $pid_off) end set $next_t=(char *)($next_t->tasks.next) - $tasks_off end btthreadstack $pid_task end document btpid backtrace of pid end define trapinfo set var $pid = $arg0 set $tasks_off=((size_t)&((struct task_struct *)0)->tasks) set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next) set $init_t=&init_task set $next_t=(((char *)($init_t->tasks).next) - $tasks_off) set var $pid_task = 0 while ($next_t != $init_t) set $next_t=(struct task_struct *)$next_t if ($next_t.pid == $pid) set $pid_task = $next_t end set $next_th=(((char *)$next_t->thread_group.next) - $pid_off) while ($next_th != $next_t) set $next_th=(struct task_struct *)$next_th if ($next_th.pid == $pid) set $pid_task = $next_th end set $next_th=(((char *)$next_th->thread_group.next) - $pid_off) end set $next_t=(char *)($next_t->tasks.next) - $tasks_off end printf "Trapno %ld, cr2 0x%lx, error_code %ld\n", $pid_task.thread.trap_no, \ $pid_task.thread.cr2, $pid_task.thread.error_code end document trapinfo Run info threads and lookup pid of thread #1 'trapinfo ' will tell you by which trap & possibly address the kernel panicked. end define dump_record set var $desc = $arg0 set var $info = $arg1 if ($argc > 2) set var $prev_flags = $arg2 else set var $prev_flags = 0 end set var $prefix = 1 set var $newline = 1 set var $begin = $desc->text_blk_lpos.begin % (1U << prb->text_data_ring.size_bits) set var $next = $desc->text_blk_lpos.next % (1U << prb->text_data_ring.size_bits) # handle data-less record if ($begin & 1) set var $text_len = 0 set var $log = "" else # handle wrapping data block if ($begin > $next) set var $begin = 0 end # skip over descriptor id set var $begin = $begin + sizeof(long) # handle truncated message if ($next - $begin < $info->text_len) set var $text_len = $next - $begin else set var $text_len = $info->text_len end set var $log = &prb->text_data_ring.data[$begin] end # prev & LOG_CONT && !(info->flags & LOG_PREIX) if (($prev_flags & 8) && !($info->flags & 4)) set var $prefix = 0 end # info->flags & LOG_CONT if ($info->flags & 8) # (prev & LOG_CONT && !(prev & LOG_NEWLINE)) if (($prev_flags & 8) && !($prev_flags & 2)) set var $prefix = 0 end # (!(info->flags & LOG_NEWLINE)) if (!($info->flags & 2)) set var $newline = 0 end end if ($prefix) printf "[%5lu.%06lu] ", $info->ts_nsec / 1000000000, $info->ts_nsec % 1000000000 end if ($text_len) eval "printf \"%%%d.%ds\", $log", $text_len, $text_len end if ($newline) printf "\n" end # handle dictionary data set var $dict = &$info->dev_info.subsystem[0] set var $dict_len = sizeof($info->dev_info.subsystem) if ($dict[0] != '\0') printf " SUBSYSTEM=" set var $idx = 0 while ($idx < $dict_len) set var $c = $dict[$idx] if ($c == '\0') loop_break else if ($c < ' ' || $c >= 127 || $c == '\\') printf "\\x%02x", $c else printf "%c", $c end end set var $idx = $idx + 1 end printf "\n" end set var $dict = &$info->dev_info.device[0] set var $dict_len = sizeof($info->dev_info.device) if ($dict[0] != '\0') printf " DEVICE=" set var $idx = 0 while ($idx < $dict_len) set var $c = $dict[$idx] if ($c == '\0') loop_break else if ($c < ' ' || $c >= 127 || $c == '\\') printf "\\x%02x", $c else printf "%c", $c end end set var $idx = $idx + 1 end printf "\n" end end document dump_record Dump a single record. The first parameter is the descriptor, the second parameter is the info, the third parameter is optional and specifies the previous record's flags, used for properly formatting continued lines. end define dmesg # definitions from kernel/printk/printk_ringbuffer.h set var $desc_committed = 1 set var $desc_finalized = 2 set var $desc_sv_bits = sizeof(long) * 8 set var $desc_flags_shift = $desc_sv_bits - 2 set var $desc_flags_mask = 3 << $desc_flags_shift set var $id_mask = ~$desc_flags_mask set var $desc_count = 1U << prb->desc_ring.count_bits set var $prev_flags = 0 set var $id = prb->desc_ring.tail_id.counter set var $end_id = prb->desc_ring.head_id.counter while (1) set var $desc = &prb->desc_ring.descs[$id % $desc_count] set var $info = &prb->desc_ring.infos[$id % $desc_count] # skip non-committed record set var $state = 3 & ($desc->state_var.counter >> $desc_flags_shift) if ($state == $desc_committed || $state == $desc_finalized) dump_record $desc $info $prev_flags set var $prev_flags = $info->flags end if ($id == $end_id) loop_break end set var $id = ($id + 1) & $id_mask end end document dmesg print the kernel ring buffer end }hjsbah}(h]h ]h"]h$]h&]source-Documentation/admin-guide/kdump/gdbmacros.txtjjuh1jhKhjhhhhubeh}(h] gdb-macrosah ]h"] gdb macrosah$]h&]uh1hhhhhhhhM,ubeh}(h]>documentation-for-kdump-the-kexec-based-crash-dumping-solutionah ]h"]@documentation for kdump - the kexec-based crash dumping solutionah$]h&]uh1hhhhhhhhKubeh}(h]h ]h"]h$]h&]sourcehuh1hcurrent_sourceN current_lineNsettingsdocutils.frontendValues)}(hN generatorN datestampN source_linkN source_urlN toc_backlinksentryfootnote_backlinksK sectnum_xformKstrip_commentsNstrip_elements_with_classesN strip_classesN report_levelK halt_levelKexit_status_levelKdebugNwarning_streamN tracebackinput_encoding utf-8-siginput_encoding_error_handlerstrictoutput_encodingutf-8output_encoding_error_handlerj6error_encodingutf-8error_encoding_error_handlerbackslashreplace language_codeenrecord_dependenciesNconfigN id_prefixhauto_id_prefixid dump_settingsNdump_internalsNdump_transformsNdump_pseudo_xmlNexpose_internalsNstrict_visitorN_disable_configN_sourceh _destinationN _config_files]7/var/lib/git/docbuild/linux/Documentation/docutils.confafile_insertion_enabled raw_enabledKline_length_limitM'pep_referencesN pep_base_urlhttps://peps.python.org/pep_file_url_templatepep-%04drfc_referencesN rfc_base_url&https://datatracker.ietf.org/doc/html/ tab_widthKtrim_footnote_reference_spacesyntax_highlightlong smart_quotessmartquotes_locales]character_level_inline_markupdoctitle_xform docinfo_xformKsectsubtitle_xform image_loadinglinkembed_stylesheetcloak_email_addressessection_self_linkenvNubreporterNindirect_targets]substitution_defs}substitution_names}refnames}refids}nameids}(jj j[jXj[jXjIjFjjjjj[jXjIjFjjjjjSjPj j j j j j jj j{jxjLjIjsjpjjjjjju nametypes}(jj[j[jIjjj[jIjjjSj j j jj{jLjsjjjuh}(j hjXhjXj^jFjojjLjjjXjjFj^jjLjjjPjj j^j je j j j j jxjjIj~jpjOjjvjjjju footnote_refs} citation_refs} autofootnotes]autofootnote_refs]symbol_footnotes]symbol_footnote_refs] footnotes] citations]autofootnote_startKsymbol_footnote_startK id_counter collectionsCounter}Rparse_messages](hsystem_message)}(hhh]h)}(h:Enumerated list start value not ordinal-1: "3" (ordinal 3)h]h>Enumerated list start value not ordinal-1: “3” (ordinal 3)}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjubah}(h]h ]h"]h$]h&]levelKtypeINFOsourcehlineKuh1jhjohhhhhKUubj)}(hhh]h)}(h`Blank line missing before literal block (after the "::")? Interpreted as a definition list item.h]hdBlank line missing before literal block (after the “::”)? Interpreted as a definition list item.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjubah}(h]h ]h"]h$]h&]levelKtypejlineKsourcehuh1jhjubetransform_messages] transformerN include_log] decorationNhhub.