------- Comment From [email protected] 2019-02-28 03:07 EDT-------
I have tested with latest version of Ubuntu 1810 kernel and kdump, it is
working as expected,
# uname -a
Linux ubuntu1810 4.18.0-15-generic #16-Ubuntu SMP Thu Feb 7 11:04:25 UTC 2019
ppc64le ppc64le ppc64le GNU/Linux
# dpkg -l | grep crash
ii apport 2.20.10-0ubuntu13.2
all automatically generate crash reports for debugging
ii crash 7.2.3+real-1
ppc64el kernel debugging utility, allowing gdb like syntax
ii kdump-tools 1:1.6.4-2ubuntu1
ppc64el scripts and tools for automating kdump (Linux crash dumps)
ii linux-crashdump 4.18.0.15.16
ppc64el Linux kernel crashdump setup for the latest generic kernel
ii python3-apport 2.20.10-0ubuntu13.2
all Python 3 library for Apport crash report handling
# echo 1 > /proc/sys/kernel/sysrq
# echo c > /proc/sysrq-trigger
[ 437.932187] sysrq: SysRq : Trigger a crash
[ 437.932248] Unable to handle kernel paging request for data at address
0x00000000
[ 437.932321] Faulting instruction address: 0xc0000000008297f8
[ 437.932384] Oops: Kernel access of bad area, sig: 11 [#1]
[ 437.932432] LE SMP NR_CPUS=2048 NUMA pSeries
[ 437.932486] Modules linked in: iscsi_target_mod target_core_mod xt_CHECKSUM
iptable_mangle ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4
nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp
bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables
iptable_filter bpfilter kvm dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua
vmx_crypto crct10dif_vpmsum sch_fq_codel nfsd ib_iser auth_rpcgss nfs_acl
rdma_cm lockd iw_cm grace ib_cm ib_core sunrpc iscsi_tcp libiscsi_tcp libiscsi
scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10
raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq
libcrc32c raid1 raid0 multipath linear virtio_net crc32c_vpmsum virtio_scsi
net_failover failover
[ 437.933248] CPU: 12 PID: 2849 Comm: bash Kdump: loaded Not tainted
4.18.0-15-generic #16-Ubuntu
[ 437.933335] NIP: c0000000008297f8 LR: c00000000082a684 CTR: c0000000008297d0
[ 437.933411] REGS: c000000005fcba00 TRAP: 0300 Not tainted
(4.18.0-15-generic)
[ 437.933487] MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 48422222
XER: 20040000
[ 437.933571] CFAR: c00000000082a680 DAR: 0000000000000000 DSISR: 42000000
IRQMASK: 0
[ 437.933571] GPR00: c00000000082a684 c000000005fcbc80 c00000000178ca00
0000000000000063
[ 437.933571] GPR04: 0000000000000001 0000000000000184 6967676572206120
63726173680d0a72
[ 437.933571] GPR08: 0000000000000007 0000000000000001 0000000000000000
c000000005fcb8af
[ 437.933571] GPR12: c0000000008297d0 c000000007fdea00 00000fa17d1d9760
0000000000000000
[ 437.933571] GPR16: 00000fa18f5559a0 00000fa17d174a48 00000fa17d1d9760
00000fa17d0f8b00
[ 437.933571] GPR20: 0000000000000000 0000000000000001 00000fa17d1870b8
00007fffda44f7a4
[ 437.933571] GPR24: 00007fffda44f7a0 00000fa17d1dafe4 000079583abcbfa8
c0000000016836b0
[ 437.933571] GPR28: 0000000000000004 0000000000000002 0000000000000063
c000000001602e38
[ 437.934310] NIP [c0000000008297f8] sysrq_handle_crash+0x28/0x30
[ 437.934377] LR [c00000000082a684] __handle_sysrq+0xf4/0x230
[ 437.934431] Call Trace:
[ 437.934461] [c000000005fcbc80] [c00000000082a668] __handle_sysrq+0xd8/0x230
(unreliable)
[ 437.934543] [c000000005fcbd10] [c00000000082adf8]
write_sysrq_trigger+0x68/0x90
[ 437.934643] [c000000005fcbd40] [c0000000004ada04] proc_reg_write+0x84/0xc0
[ 437.934719] [c000000005fcbd70] [c0000000003fd6ec] __vfs_write+0x3c/0x70
[ 437.934787] [c000000005fcbd90] [c0000000003fd988] vfs_write+0xd8/0x220
[ 437.934855] [c000000005fcbde0] [c0000000003fdd04] ksys_write+0x64/0x110
[ 437.934925] [c000000005fcbe30] [c00000000000b288] system_call+0x5c/0x70
[ 437.934991] Instruction dump:
[ 437.935033] 4bfff9e1 4bfffe44 3c4c00f6 38423230 7c0802a6 60000000 39200001
3d42001d
[ 437.935118] 394a90f8 912a0000 7c0004ac 39400000 <992a0000> 4e800020 3c4c00f6
38423200
[ 437.935203] ---[ end trace b6e09b709db92e15 ]---
[ 437.937278]
[ 437.937390] Sending IPI to other CPUs
[ 437.965128] IPI complete
[ 437.972492] kexec: Starting switchover sequence.
:::
:::
:::
[ 9.766009] kdump-tools[1029]: Starting kdump-tools: * running makedumpfile
-c -d 31 /proc/vmcore /var/crash/201902280058/dump-incomplete
Copying data : [100.0 %] - eta:
0s
[ 16.536535] kdump-tools[1029]: The kernel version is not supported.
[ 16.536770] kdump-tools[1029]: The makedumpfile operation may be incomplete.
[ 16.536961] kdump-tools[1029]: The dumpfile is saved to
/var/crash/201902280058/dump-incomplete.
[ 16.537166] kdump-tools[1029]: makedumpfile Completed.
[ 16.545276] kdump-tools[1029]: * kdump-tools: saved vmcore in
/var/crash/201902280058
[ 16.716422] kdump-tools[1029]: * running makedumpfile --dump-dmesg
/proc/vmcore /var/crash/201902280058/dmesg.201902280058
[ 16.721113] kdump-tools[1029]: The kernel version is not supported.
[ 16.721346] kdump-tools[1029]: The makedumpfile operation may be incomplete.
[ 16.721559] kdump-tools[1029]: The dmesg log is saved to
/var/crash/201902280058/dmesg.201902280058.
[ 16.721845] kdump-tools[1029]: makedumpfile Completed.
[ 16.722172] kdump-tools[1029]: * kdump-tools: saved dmesg content in
/var/crash/201902280058
[ 16.763372] kdump-tools[1029]: Thu, 28 Feb 2019 00:58:11 -0600
[ 16.797995] kdump-tools[1029]: Rebooting.
[ 16.808745] reboot: Restarting system
logging in after restart,
# ls -l /var/crash/201902280058/
total 113988
-rw------- 1 root root 28767 Feb 28 00:58 dmesg.201902280058
-rw------- 1 root root 116791977 Feb 28 00:58 dump.201902280058
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1808743
Title:
[Ubuntu 1810] Kdump fails to dump vmcore and enters initramfs inside
Power9 KVM guest
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1808743/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs