Hi Jan,
On Tue, 7 Feb 2023 at 08:39, Jan Lübbe jlu@pengutronix.de wrote:
On Tue, 2023-02-07 at 06:38 -0700, Simon Glass wrote:
Hi Jan,
On Tue, 7 Feb 2023 at 04:56, Jan Lübbe jlu@pengutronix.de wrote:
On Mon, 2023-02-06 at 17:32 -0600, Rob Herring wrote:
+boot-architecture
On Mon, Feb 6, 2023 at 3:25 PM Simon Glass sjg@chromium.org wrote:
Hi Rob,
On Mon, 6 Feb 2023 at 10:15, Rob Herring robh@kernel.org wrote:
On Sat, Feb 4, 2023 at 6:04 AM Simon Glass sjg@chromium.org wrote: > > Hi Peter, > > On Sat, 4 Feb 2023 at 02:36, Peter Robinson pbrobinson@gmail.com > wrote: > > > > Hi Simon, > > > > Does it make sense to devise something that is compatible with the > > kernel's pstore [1] mechanism? > > Possibly...can you please be a little more specific?
Peter is talking about the same thing I suggested on IRC.
pstore == ramoops
Oh, I only looked at the DT binding as I thought that was what you were talking about on irc.
The binding is called ramoops as it's for the RAM backend for pstore.
My suggestion was either using/extending ramoops or following its design as a reserved memory region. All you would need to extend the ramoops binding is a new property to define the size of your data.
For pstore, isn't the point that Linux wants to save stuff to allow debugging or collection on reboot? What does that have to do with console logs from firmware? That seems like a different thing. Or are you suggesting that we add a pstore driver into U-Boot? It is quite a lot of code, including compression, etc. It might be easier for Linux to write the data into pstore when it starts up?
Originally ramoops was just what you described. It has grown to multiple backends and types of records (hence the rename to pstore). If you just add a new subsection within the pstore region, then I think the existing kernel infrastructure will support reading it from userspace. Maybe new types have to be explicitly supported, IDK.
U-boot being able to read pstore wouldn't be a terrible feature to have anyways if your boot crashes before anything else is up to get the output. Note I'd guess the ram backend doesn't do compression as supporting slightly corrupted ram is a feature which wouldn't work.
This is basically how it works in Barebox. It can display the pstore contents after a kernel crash and also (optionally) log to the pstore/ramooms console log. Slight RAM corruption can be handled by using error correcting codes.
It's not perfect, of course, but still very useful.
Thanks for the pointer. I had a look at this. How do you deal with updating a filesystem that might be corrupt? Is that even a good idea, if the purpose of it is to collect data from a kernel crash?
This uses only the ramoops "backend" in pstore, so no filesystems are involved. If I remember correctly, ramoops in the kernel just discards any data that is too corrupted to process. Barebox should behave the same, as the code was ported from the kernel.
Yes...actually I found that U-Boot has pstore too, but it does not support writing the console into it. I suppose it would be easy enough, but it seems that U-Boot's pstore is not as advanced.
We are working on a firmware 'Transfer List' which is a simple data structure to communicate through the different firmware phases. Since U-Boot is the last one, in this case, I suppose it could do the ramoops thing and add files for each of the firmware phases.
For passing logs "forward" to the next step in the boot chain, this should work as well and could be more explicit than the ramoops console. One benefit would be that keeping the logs from each step separate, right?
Yes. But we can't use this to pass it to the kernel.
ramoops has additional mechanisms to deal with the possible corruption caused by the crash or reset cycle, which shouldn't be needed in to "forward" direction.
But if there is corruption there, what does U-Boot do?
1. Clear the ramoops and write its console info (that will be annoying for people trying to debug kernel crashes) 2. Leave it alone and not write the console info (then it is non-functional) 3. Or is it possible to write even when some things are corrupted?
What about logging support? It would be nice to have a format that understands logging level, category, filename/function, etc.
ramoops console is just unstructured text, Linux and Barebox just write characters to it. More structure might be nice some cases, but the necessary coordination between different projects could be a high barrier. ;)
Indeed it is, but that is the point of the binding :-)
Perhaps a simple list of text blocks would be enough, though.
Do you mean a list of nul-terminated strings? What format are you thinking of?
Regards, Jan
I think any new DT binding is premature and pstore/ramoops was just a suggestion to consider. This needs wider consideration of how to handle all the various (boot) firmware logs. I've added the boot-architecture list for a bit more visibility.
If this needs a call, I have not seen one for quite a while. It seems to get cancelled at the last minute. I would be happy to attend one to discuss this topic. But if people have ideas here, please weigh in.
Looking at the proposed schema, I'd prefer to drop the boot-phase and project patterns and use the lists as suggestions only. The order of /chosen/logs/log@N should be enough to make sense of those.
Yes I suppose so, but I would really like to have a clear view of what booted and which project it came from. Do you think it is an undue burden?
Also to keep it simple, perhaps support the memory reference only, and drop the in-DTB string?
Yes, that can work. We can always add it later...copying the text into the DT does add overhead so it would be better to avoid it where possible.
Regards, Simon