Red Hat Enterprise Linux-7-Kernel Crash Dump Guide-En-US
Red Hat Enterprise Linux-7-Kernel Crash Dump Guide-En-US
Jaromr Hradlek
Petr Boko
Legal Notice
Co pyright 20 14 Red Hat, Inc.
This do cument is licensed by Red Hat under the Creative Co mmo ns Attributio n-ShareAlike 3.0
Unpo rted License. If yo u distribute this do cument, o r a mo dified versio n o f it, yo u must pro vide
attributio n to Red Hat, Inc. and pro vide a link to the o riginal. If the do cument is mo dified, all Red
Hat trademarks must be remo ved.
Red Hat, as the licenso r o f this do cument, waives the right to enfo rce, and agrees no t to assert,
Sectio n 4 d o f CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shado wman lo go , JBo ss, MetaMatrix, Fedo ra, the Infinity
Lo go , and RHCE are trademarks o f Red Hat, Inc., registered in the United States and o ther
co untries.
Linux is the registered trademark o f Linus To rvalds in the United States and o ther co untries.
Java is a registered trademark o f Oracle and/o r its affiliates.
XFS is a trademark o f Silico n Graphics Internatio nal Co rp. o r its subsidiaries in the United
States and/o r o ther co untries.
MySQL is a registered trademark o f MySQL AB in the United States, the Euro pean Unio n and
o ther co untries.
No de.js is an o fficial trademark o f Jo yent. Red Hat So ftware Co llectio ns is no t fo rmally
related to o r endo rsed by the o fficial Jo yent No de.js o pen so urce o r co mmercial pro ject.
The OpenStack Wo rd Mark and OpenStack Lo go are either registered trademarks/service
marks o r trademarks/service marks o f the OpenStack Fo undatio n, in the United States and o ther
co untries and are used with the OpenStack Fo undatio n's permissio n. We are no t affiliated with,
endo rsed o r spo nso red by the OpenStack Fo undatio n, o r the OpenStack co mmunity.
All o ther trademarks are the pro perty o f their respective o wners.
Abstract
The Kernel Crash Dump Guide do cuments ho w to co nfigure, test, and use the kdump crash
reco very service o n Red Hat Enterprise Linux 7, and pro vides a brief o verview o f ho w to analyze
the resulting co re dump using the crash debugging utility. It is o riented to wards system
administrato rs with a basic understanding o f the Red Hat Enterprise Linux system.
T able of Contents
. .hapt
C
. . . .er
. .1. .. Int
. . .roduct
. . . . . .ion
. . .t.o. kdump
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. . . . . . . . . .
1.1. Ab o ut kd ump and kexec
2
1.2. Memo ry Req uirements
2
. .hapt
C
. . . .er
. .2. .. Inst
. . . .alling
. . . . .and
. . . .Configuring
. . . . . . . . . . .kdump
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4. . . . . . . . . .
2 .1. Ins talling kd ump
4
2 .2. Co nfig uring kd ump at the Firs t Bo o t
4
2 .3. Co nfig uring kd ump o n the Co mmand Line
5
2 .4. Co nfig uring kd ump in the G rap hic al Us er Interfac e
8
2 .5. Tes ting the kd ump Co nfig uratio n
11
2 .6 . Ad d itio nal Res o urc es
12
. .hapt
C
. . . .er
. .3.
. .Analyz
. . . . . .ing
. . . a. .Core
. . . . Dump
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. 3. . . . . . . . . .
3 .1. Ins talling the c ras h Utility
13
3 .2. Running the c ras h Utility
13
3 .3. Dis p laying the Mes s ag e Buffer
14
3 .4. Dis p laying a Bac ktrac e
15
3 .5. Dis p laying a Pro c es s Status
16
16
17
17
. . . . . . . . ly
Frequent
. . Asked
. . . . . .Q
. .uest
. . . .ions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1. 8. . . . . . . . . .
.Support
. . . . . . .ed
. . kdump
. . . . . . .Configurat
. . . . . . . . . ions
. . . . .and
...T
. .arget
....s
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1. 9. . . . . . . . . .
B .1. Memo ry Req uirements fo r kd ump
19
B .2. Minimum Thres ho ld fo r Auto matic Memo ry Res ervatio n
19
B .3. Sup p o rted kd ump Targ ets
B .4. Sup p o rted kd ump Filtering Levels
20
20
21
. . . . . . . . .Hist
Revision
. . . ory
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. 2. . . . . . . . . .
Important
UEFI-based systems are not supported in the current version of kexec. However, kd u mp itself
is still able to collect the crash dump and its reliability is not impacted.
Important
It is highly recommended to test the configuration after setting up the kdump service, even
when using the automatic memory reservation. For instructions on how to test your
configuration, see Section 2.5, Testing the kdump Configuration .
Important
A limitation in the current implementation of the Intel IO MMU driver can occasionally prevent
the kd ump service from capturing the core dump image. To use kdump on Intel architectures
reliably, it is advised that the IOMMU support is disabled.
See Section 2.3, Configuring kdump on the Command Line for more details on configuring kd u mp
using the /etc/kd ump. co nf configuration file.
After entering the desired values and saving the file, update the actual GRUB2 configuration file. This
file's location depends on whether the system uses BIO S or UEFI. On systems using BIOS, use the
following command:
g rub2-mkco nfi g -o /bo o t/g rub2/g rub. cfg
On UEFI-based systems, use the following command instead:
g rub2-mkco nfi g -o /bo o t/efi /EFI/red hat/g rub. cfg
After the next system reboot, the reserved memory will be equal to the amount set in the
/etc/d efaul t/g rub configuration file.
For information on how to configure an SSH server and set up a key-based authentication, see the
Red Hat Enterprise Linux 7 System Administrator's Guide.
For a complete list of currently supported and unsupported targets sorted by type, see Table B.3,
Supported kdump Targets .
10
11
12
13
/usr/lib/debug/lib/modules/2.6.32-69.el6.i686/vmlinux
/var/crash/127.0.0.1-2010-08-25-08:45:02/vmcore [PARTIAL
4
Wed Aug 25 08:44:47 2010
00:09:02
0.00, 0.01, 0.00
140
hp-dl320g5-02.lab.bos.redhat.com
2.6.32-69.el6.i686
#1 SMP Tue Aug 24 10:31:45 EDT 2010
i686 (2394 Mhz)
8 GB
"Oops: 0002 [#1] SMP " (check log for details)
5591
"bash"
f196d560 [THREAD_INFO: ef4da000]
2
TASK_RUNNING (PANIC)
crash>
14
Stack:
c068146b c0960891 c0968653 00000003 00000000 00000002 efade5c0
c06814d0
<0> fffffffb c068150f b7776000 f2600c40 c0569ec4 ef4dbf9c 00000002
b7776000
<0> efade5c0 00000002 b7776000 c0569e60 c051de50 ef4dbf9c f196d560
ef4dbfb4
Call Trace:
[<c068146b>] ? __handle_sysrq+0xfb/0x160
[<c06814d0>] ? write_sysrq_trigger+0x0/0x50
[<c068150f>] ? write_sysrq_trigger+0x3f/0x50
[<c0569ec4>] ? proc_reg_write+0x64/0xa0
[<c0569e60>] ? proc_reg_write+0x0/0xa0
[<c051de50>] ? vfs_write+0xa0/0x190
[<c051e8d1>] ? sys_write+0x41/0x70
[<c0409adc>] ? syscall_call+0x7/0xb
Code: a0 c0 01 0f b6 41 03 19 d2 f7 d2 83 e2 03 83 e0 cf c1 e2 04 09 d0
88 41 03 f3 c3 90 c7 05 c8 1b 9e c0 01 00 00 00 0f ae f8 89 f6 <c6> 05
00 00 00 00 01 c3 89 f6 8d bc 27 00 00 00 00 8d 50 d0 83
EIP: [<c068124f>] sysrq_handle_crash+0xf/0x20 SS:ESP 0068:ef4dbf24
CR2: 0000000000000000
15
EAX:
DS:
SS:
CS:
ffffffda
007b
007b
0073
ST
RU
RU
RU
RU
IN
%MEM
0.0
0.0
0.0
0.0
0.0
IN
IN
IN
RU
0.0
0.0
0.0
0.0
VSZ
0
0
0
0
2828
12876
12876
11064
5084
RSS COMM
0 [swapper]
0 [swapper]
0 [swapper]
0 [swapper]
1424 init
784
784
3184
1648
auditd
auditd
sshd
bash
16
COMMAND: "bash"
FILE
/lib/ld-2.12.so
/lib/ld-2.12.so
/lib/ld-2.12.so
/lib/libc-2.12.so
/lib/libc-2.12.so
/lib/libc-2.12.so
/lib/libc-2.12.so
/lib/libdl-2.12.so
efbc2568
3f9000
3fa000 8100071 /lib/libdl-2.12.so
efbc2f2c
3fa000
3fb000 8100073 /lib/libdl-2.12.so
f26af888
7e6000
7fc000 8000075 /lib/libtinfo.so.5.7
f26aff2c
7fc000
7ff000 8100073 /lib/libtinfo.so.5.7
efbc211c
d83000
d8f000 8000075 /lib/libnss_files-2.12.so
efbc2504
d8f000
d90000 8100071 /lib/libnss_files-2.12.so
efbc2950
d90000
d91000 8100073 /lib/libnss_files-2.12.so
f26afe00
edc000
edd000 4040075
f1bb0a18
8047000
8118000 8001875 /bin/bash
f1bb01e4
8118000
811d000 8101873 /bin/bash
f1bb0c70
811d000
8122000 100073
f26afae0
9fd9000
9ffa000 100073
... several lines omitted ...
COMMAND: "bash"
TYPE PATH
CHR
/pts/0
REG
/proc/sysrq-trigger
CHR
/pts/0
CHR
/pts/0
CHR
/pts/0
17
In some cases, it might be necessary to send a kernel crash dump file to Red Hat Global
Support Services for analysis. However, the dump file can be very large, even after being
filtered. Since files larger than 250 MB cannot be uploaded directly through the Red Hat
Customer Portal when opening a new support case, an FTP server is provided by Red Hat for
uploading large files.
The FTP server's address is d ro pbo x. red hat. co m and the files are to be uploaded in the
/i nco mi ng / directory. Your FTP client needs to be set into passive mode; if your firewall does
not allow this mode, you may use the o ri g i n-d ro pbo x. red hat. co m server using active
mode.
Make sure that the uploaded files are compressed using a program such as g z ip and properly
and descriptively named. Using your support case number in the file name is recommended.
After successfuly uploading all necessary files, provide the engineer in charge of your support
case with the exact file name and its SHA1 or MD 5 checksum.
For more specific instructions and additional information, see
https://access.redhat.com/site/solutions/2112.
18
Availab le
Memo ry
2 GB and more
2 GB to 4 GB
4 GB to 32 GB
32 GB to 64 GB
64 GB to 128 GB
128 GB and more
2 GB and more
R eq u ired Memo ry
2 GB
2 GB
4 GB
19
Su p p o rt ed T arg et s
U n su p p o rt ed T arg et s
Raw device
Remote directory
20
O p t io n
D escrip t io n
1
2
4
8
16
Z ero pages
Cache pages
Cache private
User pages
Free pages
D escrip t io n
d ump_to _ro o tf
s
Attempt to save the core dump to the root file system. This option is especially
useful in combination with a network target: if the network target is
unreachable, this option configures kdump to save the core dump locally. The
system is rebooted afterwards.
Reboot the system, losing the core dump in the process.
Halt the system, losing the core dump in the process.
Power off the system, losing the core dump in the process.
Run a shell session from within the initramfs, allowing the user to record the
core dump manually.
rebo o t
hal t
po wero ff
shel l
21
Revision History
R evisio n 1.0- 2
Fri 05 D ec 2014
Pet r B o ko
Updating to implement new sort_order on the RHEL 7 splash page
R evisio n 1.0- 0
Mo n 02 Ju n 2014
Jaro mr H rad lek
Red Hat Enterprise Linux 7.0 GA release of the Kernel Crash D ump Guide.
R evisio n 0.0- 8
Initial creation of the book.
22
T h u Jan 17 2013