public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Yanfei Zhang <zhangyanfei@cn.fujitsu.com>
To: Avi Kivity <avi@redhat.com>
Cc: mtosatti@redhat.com, ebiederm@xmission.com, luto@mit.edu,
	Joerg Roedel <joerg.roedel@amd.com>,
	dzickus@redhat.com, paul.gortmaker@windriver.com,
	ludwig.nussel@suse.de, linux-kernel@vger.kernel.org,
	kvm@vger.kernel.org, kexec@lists.infradead.org,
	Greg KH <gregkh@linuxfoundation.org>
Subject: Re: [PATCH v2 0/5] Export offsets of VMCS fields as note information for kdump
Date: Tue, 22 May 2012 11:40:58 +0800	[thread overview]
Message-ID: <4FBB0ACA.2040907@cn.fujitsu.com> (raw)
In-Reply-To: <4FBA0C8A.2050003@redhat.com>

于 2012年05月21日 17:36, Avi Kivity 写道:
> On 05/21/2012 12:08 PM, Yanfei Zhang wrote:
>> 于 2012年05月21日 16:34, Avi Kivity 写道:
>>> On 05/21/2012 05:32 AM, Yanfei Zhang wrote:
>>>> 于 2012年05月21日 01:43, Avi Kivity 写道:
>>>>> On 05/16/2012 10:50 AM, zhangyanfei wrote:
>>>>>> This patch set exports offsets of VMCS fields as note information for
>>>>>> kdump. We call it VMCSINFO. The purpose of VMCSINFO is to retrieve
>>>>>> runtime state of guest machine image, such as registers, in host
>>>>>> machine's crash dump as VMCS format. The problem is that VMCS internal
>>>>>> is hidden by Intel in its specification. So, we slove this problem
>>>>>> by reverse engineering implemented in this patch set. The VMCSINFO
>>>>>> is exported via sysfs to kexec-tools just like VMCOREINFO.
>>>>>>
>>>>>> Here are two usercases for two features that we want.
>>>>>>
>>>>>> 1) Create guest machine's crash dumpfile from host machine's crash dumpfile
>>>>>>
>>>>>> In general, we want to use this feature on failure analysis for the system
>>>>>> where the processing depends on the communication between host and guest
>>>>>> machines to look into the system from both machines's viewpoints.
>>>>>>
>>>>>> As a concrete situation, consider where there's heartbeat monitoring
>>>>>> feature on the guest machine's side, where we need to determine in
>>>>>> which machine side the cause of heartbeat stop lies. In our actual
>>>>>> experiments, we encountered such situation and we found the cause of
>>>>>> the bug was in host's process schedular so guest machine's vcpu stopped
>>>>>> for a long time and then led to heartbeat stop.
>>>>>>
>>>>>> The module that judges heartbeat stop is on guest machine, so we need
>>>>>> to debug guest machine's data. But if the cause lies in host machine
>>>>>> side, we need to look into host machine's crash dump.
>>>>>
>>>>> Do you mean, that a heartbeat failure in the guest lead to host panic?
>>>>>
>>>>> My expectation is that a problem in the guest will cause the guest to
>>>>> panic and perhaps produce a dump; the host will remain up.
>>>>>
>>>>
>>>> The point is that before our investigation, we didn't know which side 
>>>> leads to this buggy situation. Maybe a bug in host machine or the guest
>>>> machine itself causes a heartbeat failure.
>>>
>>> How can a guest bug cause a host panic?
>>>
>>>> So we want to get both host machine's crash dump and guest machine's
>>>> crash dump *at the same time*. Then we could use userspace tools to
>>>> get guest machine crash dump from host machine's and analyse them
>>>> separately to find which side causes the problem.
>>>>
>>>
>>> If the guest caused the problem, there would be no panic; therefore
>>> there was a host bug.
>>>
>>
>> Yes, a guest bug cannot cause a host panic. When heartbeat stops in guest
>> machine, we could trigger the host dump mechanism to work. This is because
>> we want to get the status of both host and guest machine at the same time
>> when heartbeat stops in guest machine. Then we can look for bug reasons
>> from both host machine's and guest machine's views.
> 
> That sounds like a bad idea. Can you explain in what situation it makes
> sense for a guest to stop the host (and all other guests running on it)
> rather than just restarting the failed services (on the host or other
> guests)?
> 

We never do this on customer's environment which maybe a host with many guests
running on it. We do this on another environment to reproduce the buggy
situation; or we do this in testing phase on development environment towards
production one on the customer's site.

>>>>>> Without this feature, we first create guest machine's dump and then
>>>>>> create host mahine's, but there's only a short time between two
>>>>>> processings, during which it's unlikely that buggy situation remains.
>>>>>>
>>>>>> So, we think the feature is useful to debug both guest machine's and
>>>>>> host machine's sides at the same time, and expect we can make failure
>>>>>> analysis efficiently.
>>>>>>
>>>>>> Of course, we believe this feature is commonly useful on the situation
>>>>>> where guest machine doesn't work well due to something of host machine's.
>>>>>>
>>>>>> 2) Get offsets of VMCS information on the CPU running on the host machine
>>>>>>
>>>>>> If kdump doesn't work well, then it means we cannot use kvm API to get
>>>>>> register values of guest machine and they are still left on its vmcs
>>>>>> region. In the case, we use crash dump mechanism running outside of
>>>>>> linux kernel, such as sadump, a firmware-based crash dump. Then VMCS
>>>>>> information is then necessary.
>>>>>
>>>>> Shouldn't sadump then expose the VMCS offsets? Perhaps bundling them
>>>>> into its dump file?
>>>>>
>>>>
>>>> Firmware-based crash dump doesn't concern the os running on the machine.
>>>> So it will not do any os handling when machine crashes.
>>>
>>> Seems to me the VMCS offsets are OS independent.
>>>
>> Hmm, you mean we could get VMCS offsets in sadump itself?
>> But I think if we just export VMCS offsets in kernel, we could use the current
>> existing dump tools with no or just very tiny change. I think this could be
>> a more general mechanism than making changes in all kinds of dump tools.
> 
> The sadump tool generates a core file with the OS image, right? Can it
> not attach the offsets to a note, just like you propose for kdump?
> 

Both are right.

  reply	other threads:[~2012-05-22  4:00 UTC|newest]

Thread overview: 25+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-05-16  7:50 [PATCH v2 0/5] Export offsets of VMCS fields as note information for kdump zhangyanfei
2012-05-16  7:52 ` [PATCH v2 1/5] x86: Add helper variables and functions to hold VMCSINFO zhangyanfei
2012-06-14 13:28   ` Avi Kivity
2012-05-16  7:54 ` [PATCH v2 2/5] KVM: Export symbols for module vmcsinfo-intel zhangyanfei
2012-05-16  7:55 ` [PATCH v2 3/5] KVM-INTEL: Add new module vmcsinfo-intel to fill VMCSINFO zhangyanfei
2012-06-14 13:37   ` Avi Kivity
2012-06-15  3:03     ` HATAYAMA Daisuke
2012-05-16  7:56 ` [PATCH v2 4/5] ksysfs: Export VMCSINFO via sysfs zhangyanfei
2012-05-16  7:57 ` [PATCH v2 5/5] Documentation: Add ABI entry for sysfs file vmcsinfo and vmcsinfo_maxsize zhangyanfei
2012-06-14 13:21   ` Avi Kivity
2012-05-20 17:43 ` [PATCH v2 0/5] Export offsets of VMCS fields as note information for kdump Avi Kivity
2012-05-21  2:32   ` Yanfei Zhang
2012-05-21  8:34     ` Avi Kivity
2012-05-21  9:08       ` Yanfei Zhang
2012-05-21  9:36         ` Avi Kivity
2012-05-22  3:40           ` Yanfei Zhang [this message]
2012-05-28  5:25             ` Yanfei Zhang
2012-05-28 13:28               ` Avi Kivity
2012-05-29  7:06                 ` Yanfei Zhang
2012-06-11  5:35                   ` Yanfei Zhang
2012-06-14 13:15                     ` Avi Kivity
2012-06-18  7:25                       ` YOSHIDA Masanori
2012-05-21 18:58 ` Eric Northup
2012-05-22  3:53   ` Yanfei Zhang
2012-05-22 20:53     ` Eric Northup

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4FBB0ACA.2040907@cn.fujitsu.com \
    --to=zhangyanfei@cn.fujitsu.com \
    --cc=avi@redhat.com \
    --cc=dzickus@redhat.com \
    --cc=ebiederm@xmission.com \
    --cc=gregkh@linuxfoundation.org \
    --cc=joerg.roedel@amd.com \
    --cc=kexec@lists.infradead.org \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=ludwig.nussel@suse.de \
    --cc=luto@mit.edu \
    --cc=mtosatti@redhat.com \
    --cc=paul.gortmaker@windriver.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox