2019-05-19 20:07:45 +08:00
|
|
|
# SPDX-License-Identifier: GPL-2.0-only
|
2010-12-29 06:25:21 +08:00
|
|
|
config PSTORE
|
2015-10-20 15:39:03 +08:00
|
|
|
tristate "Persistent store support"
|
2018-03-15 23:34:08 +08:00
|
|
|
select CRYPTO if PSTORE_COMPRESS
|
2010-12-29 06:25:21 +08:00
|
|
|
default n
|
|
|
|
help
|
|
|
|
This option enables generic access to platform level
|
|
|
|
persistent storage via "pstore" filesystem that can
|
|
|
|
be mounted as /dev/pstore. Only useful if you have
|
|
|
|
a platform level driver that registers with pstore to
|
|
|
|
provide the data, so you probably should just go say "Y"
|
|
|
|
(or "M") to a platform specific persistent store driver
|
|
|
|
(e.g. ACPI_APEI on X86) which will select this for you.
|
|
|
|
If you don't have a platform persistent store driver,
|
|
|
|
say N.
|
2012-05-16 20:43:08 +08:00
|
|
|
|
2020-11-04 21:05:32 +08:00
|
|
|
config PSTORE_DEFAULT_KMSG_BYTES
|
|
|
|
int "Default kernel log storage space" if EXPERT
|
|
|
|
depends on PSTORE
|
|
|
|
default "10240"
|
|
|
|
help
|
|
|
|
Defines default size of pstore kernel log storage.
|
|
|
|
Can be enlarged if needed, not recommended to shrink it.
|
|
|
|
|
pstore: Use crypto compress API
In the pstore compression part, we use zlib/lzo/lz4/lz4hc/842
compression algorithm API to implement pstore compression backends. But
there are many repeat codes in these implementations. This patch uses
crypto compress API to simplify these codes.
1) rewrite allocate_buf_for_compression, free_buf_for_compression,
pstore_compress, pstore_decompress functions using crypto compress API.
2) drop compress, decompress, allocate, free functions in pstore_zbackend,
and add zbufsize function to get each different compress buffer size.
3) use late_initcall to call ramoops_init later, to make sure the crypto
subsystem has already initialized.
4) use 'unsigned int' type instead of 'size_t' in pstore_compress,
pstore_decompress functions' length arguments.
5) rename 'zlib' to 'deflate' to follow the crypto API's name convention.
Signed-off-by: Geliang Tang <geliangtang@gmail.com>
[kees: tweaked error messages on allocation failures and Kconfig help]
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-03-09 18:51:07 +08:00
|
|
|
config PSTORE_DEFLATE_COMPRESS
|
2018-03-15 23:34:08 +08:00
|
|
|
tristate "DEFLATE (ZLIB) compression"
|
2018-03-07 07:57:38 +08:00
|
|
|
default y
|
|
|
|
depends on PSTORE
|
pstore: Use crypto compress API
In the pstore compression part, we use zlib/lzo/lz4/lz4hc/842
compression algorithm API to implement pstore compression backends. But
there are many repeat codes in these implementations. This patch uses
crypto compress API to simplify these codes.
1) rewrite allocate_buf_for_compression, free_buf_for_compression,
pstore_compress, pstore_decompress functions using crypto compress API.
2) drop compress, decompress, allocate, free functions in pstore_zbackend,
and add zbufsize function to get each different compress buffer size.
3) use late_initcall to call ramoops_init later, to make sure the crypto
subsystem has already initialized.
4) use 'unsigned int' type instead of 'size_t' in pstore_compress,
pstore_decompress functions' length arguments.
5) rename 'zlib' to 'deflate' to follow the crypto API's name convention.
Signed-off-by: Geliang Tang <geliangtang@gmail.com>
[kees: tweaked error messages on allocation failures and Kconfig help]
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-03-09 18:51:07 +08:00
|
|
|
select CRYPTO_DEFLATE
|
2018-03-07 07:57:38 +08:00
|
|
|
help
|
pstore: Use crypto compress API
In the pstore compression part, we use zlib/lzo/lz4/lz4hc/842
compression algorithm API to implement pstore compression backends. But
there are many repeat codes in these implementations. This patch uses
crypto compress API to simplify these codes.
1) rewrite allocate_buf_for_compression, free_buf_for_compression,
pstore_compress, pstore_decompress functions using crypto compress API.
2) drop compress, decompress, allocate, free functions in pstore_zbackend,
and add zbufsize function to get each different compress buffer size.
3) use late_initcall to call ramoops_init later, to make sure the crypto
subsystem has already initialized.
4) use 'unsigned int' type instead of 'size_t' in pstore_compress,
pstore_decompress functions' length arguments.
5) rename 'zlib' to 'deflate' to follow the crypto API's name convention.
Signed-off-by: Geliang Tang <geliangtang@gmail.com>
[kees: tweaked error messages on allocation failures and Kconfig help]
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-03-09 18:51:07 +08:00
|
|
|
This option enables DEFLATE (also known as ZLIB) compression
|
|
|
|
algorithm support.
|
2016-02-18 22:04:22 +08:00
|
|
|
|
|
|
|
config PSTORE_LZO_COMPRESS
|
2018-03-15 23:34:08 +08:00
|
|
|
tristate "LZO compression"
|
2018-03-07 07:57:38 +08:00
|
|
|
depends on PSTORE
|
pstore: Use crypto compress API
In the pstore compression part, we use zlib/lzo/lz4/lz4hc/842
compression algorithm API to implement pstore compression backends. But
there are many repeat codes in these implementations. This patch uses
crypto compress API to simplify these codes.
1) rewrite allocate_buf_for_compression, free_buf_for_compression,
pstore_compress, pstore_decompress functions using crypto compress API.
2) drop compress, decompress, allocate, free functions in pstore_zbackend,
and add zbufsize function to get each different compress buffer size.
3) use late_initcall to call ramoops_init later, to make sure the crypto
subsystem has already initialized.
4) use 'unsigned int' type instead of 'size_t' in pstore_compress,
pstore_decompress functions' length arguments.
5) rename 'zlib' to 'deflate' to follow the crypto API's name convention.
Signed-off-by: Geliang Tang <geliangtang@gmail.com>
[kees: tweaked error messages on allocation failures and Kconfig help]
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-03-09 18:51:07 +08:00
|
|
|
select CRYPTO_LZO
|
2018-03-07 07:57:38 +08:00
|
|
|
help
|
|
|
|
This option enables LZO compression algorithm support.
|
2016-02-18 22:04:22 +08:00
|
|
|
|
|
|
|
config PSTORE_LZ4_COMPRESS
|
2018-03-15 23:34:08 +08:00
|
|
|
tristate "LZ4 compression"
|
2018-03-07 07:57:38 +08:00
|
|
|
depends on PSTORE
|
pstore: Use crypto compress API
In the pstore compression part, we use zlib/lzo/lz4/lz4hc/842
compression algorithm API to implement pstore compression backends. But
there are many repeat codes in these implementations. This patch uses
crypto compress API to simplify these codes.
1) rewrite allocate_buf_for_compression, free_buf_for_compression,
pstore_compress, pstore_decompress functions using crypto compress API.
2) drop compress, decompress, allocate, free functions in pstore_zbackend,
and add zbufsize function to get each different compress buffer size.
3) use late_initcall to call ramoops_init later, to make sure the crypto
subsystem has already initialized.
4) use 'unsigned int' type instead of 'size_t' in pstore_compress,
pstore_decompress functions' length arguments.
5) rename 'zlib' to 'deflate' to follow the crypto API's name convention.
Signed-off-by: Geliang Tang <geliangtang@gmail.com>
[kees: tweaked error messages on allocation failures and Kconfig help]
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-03-09 18:51:07 +08:00
|
|
|
select CRYPTO_LZ4
|
2018-03-07 07:57:38 +08:00
|
|
|
help
|
|
|
|
This option enables LZ4 compression algorithm support.
|
2018-02-13 14:40:39 +08:00
|
|
|
|
|
|
|
config PSTORE_LZ4HC_COMPRESS
|
2018-03-15 23:34:08 +08:00
|
|
|
tristate "LZ4HC compression"
|
2018-03-07 07:57:38 +08:00
|
|
|
depends on PSTORE
|
pstore: Use crypto compress API
In the pstore compression part, we use zlib/lzo/lz4/lz4hc/842
compression algorithm API to implement pstore compression backends. But
there are many repeat codes in these implementations. This patch uses
crypto compress API to simplify these codes.
1) rewrite allocate_buf_for_compression, free_buf_for_compression,
pstore_compress, pstore_decompress functions using crypto compress API.
2) drop compress, decompress, allocate, free functions in pstore_zbackend,
and add zbufsize function to get each different compress buffer size.
3) use late_initcall to call ramoops_init later, to make sure the crypto
subsystem has already initialized.
4) use 'unsigned int' type instead of 'size_t' in pstore_compress,
pstore_decompress functions' length arguments.
5) rename 'zlib' to 'deflate' to follow the crypto API's name convention.
Signed-off-by: Geliang Tang <geliangtang@gmail.com>
[kees: tweaked error messages on allocation failures and Kconfig help]
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-03-09 18:51:07 +08:00
|
|
|
select CRYPTO_LZ4HC
|
2018-02-13 14:40:39 +08:00
|
|
|
help
|
|
|
|
This option enables LZ4HC (high compression) mode algorithm.
|
|
|
|
|
|
|
|
config PSTORE_842_COMPRESS
|
2018-03-07 07:57:38 +08:00
|
|
|
bool "842 compression"
|
|
|
|
depends on PSTORE
|
pstore: Use crypto compress API
In the pstore compression part, we use zlib/lzo/lz4/lz4hc/842
compression algorithm API to implement pstore compression backends. But
there are many repeat codes in these implementations. This patch uses
crypto compress API to simplify these codes.
1) rewrite allocate_buf_for_compression, free_buf_for_compression,
pstore_compress, pstore_decompress functions using crypto compress API.
2) drop compress, decompress, allocate, free functions in pstore_zbackend,
and add zbufsize function to get each different compress buffer size.
3) use late_initcall to call ramoops_init later, to make sure the crypto
subsystem has already initialized.
4) use 'unsigned int' type instead of 'size_t' in pstore_compress,
pstore_decompress functions' length arguments.
5) rename 'zlib' to 'deflate' to follow the crypto API's name convention.
Signed-off-by: Geliang Tang <geliangtang@gmail.com>
[kees: tweaked error messages on allocation failures and Kconfig help]
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-03-09 18:51:07 +08:00
|
|
|
select CRYPTO_842
|
2018-02-13 14:40:39 +08:00
|
|
|
help
|
|
|
|
This option enables 842 compression algorithm support.
|
|
|
|
|
2018-08-01 19:23:37 +08:00
|
|
|
config PSTORE_ZSTD_COMPRESS
|
|
|
|
bool "zstd compression"
|
|
|
|
depends on PSTORE
|
|
|
|
select CRYPTO_ZSTD
|
|
|
|
help
|
|
|
|
This option enables zstd compression algorithm support.
|
|
|
|
|
2018-03-07 07:57:38 +08:00
|
|
|
config PSTORE_COMPRESS
|
|
|
|
def_bool y
|
|
|
|
depends on PSTORE
|
pstore: Use crypto compress API
In the pstore compression part, we use zlib/lzo/lz4/lz4hc/842
compression algorithm API to implement pstore compression backends. But
there are many repeat codes in these implementations. This patch uses
crypto compress API to simplify these codes.
1) rewrite allocate_buf_for_compression, free_buf_for_compression,
pstore_compress, pstore_decompress functions using crypto compress API.
2) drop compress, decompress, allocate, free functions in pstore_zbackend,
and add zbufsize function to get each different compress buffer size.
3) use late_initcall to call ramoops_init later, to make sure the crypto
subsystem has already initialized.
4) use 'unsigned int' type instead of 'size_t' in pstore_compress,
pstore_decompress functions' length arguments.
5) rename 'zlib' to 'deflate' to follow the crypto API's name convention.
Signed-off-by: Geliang Tang <geliangtang@gmail.com>
[kees: tweaked error messages on allocation failures and Kconfig help]
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-03-09 18:51:07 +08:00
|
|
|
depends on PSTORE_DEFLATE_COMPRESS || PSTORE_LZO_COMPRESS || \
|
2018-03-07 07:57:38 +08:00
|
|
|
PSTORE_LZ4_COMPRESS || PSTORE_LZ4HC_COMPRESS || \
|
2018-08-01 19:23:37 +08:00
|
|
|
PSTORE_842_COMPRESS || PSTORE_ZSTD_COMPRESS
|
2018-03-07 07:57:38 +08:00
|
|
|
|
|
|
|
choice
|
|
|
|
prompt "Default pstore compression algorithm"
|
|
|
|
depends on PSTORE_COMPRESS
|
|
|
|
help
|
|
|
|
This option chooses the default active compression algorithm.
|
|
|
|
This change be changed at boot with "pstore.compress=..." on
|
|
|
|
the kernel command line.
|
|
|
|
|
2018-08-01 19:23:37 +08:00
|
|
|
Currently, pstore has support for 6 compression algorithms:
|
|
|
|
deflate, lzo, lz4, lz4hc, 842 and zstd.
|
2018-03-07 07:57:38 +08:00
|
|
|
|
pstore: Use crypto compress API
In the pstore compression part, we use zlib/lzo/lz4/lz4hc/842
compression algorithm API to implement pstore compression backends. But
there are many repeat codes in these implementations. This patch uses
crypto compress API to simplify these codes.
1) rewrite allocate_buf_for_compression, free_buf_for_compression,
pstore_compress, pstore_decompress functions using crypto compress API.
2) drop compress, decompress, allocate, free functions in pstore_zbackend,
and add zbufsize function to get each different compress buffer size.
3) use late_initcall to call ramoops_init later, to make sure the crypto
subsystem has already initialized.
4) use 'unsigned int' type instead of 'size_t' in pstore_compress,
pstore_decompress functions' length arguments.
5) rename 'zlib' to 'deflate' to follow the crypto API's name convention.
Signed-off-by: Geliang Tang <geliangtang@gmail.com>
[kees: tweaked error messages on allocation failures and Kconfig help]
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-03-09 18:51:07 +08:00
|
|
|
The default compression algorithm is deflate.
|
2018-03-07 07:57:38 +08:00
|
|
|
|
pstore: Use crypto compress API
In the pstore compression part, we use zlib/lzo/lz4/lz4hc/842
compression algorithm API to implement pstore compression backends. But
there are many repeat codes in these implementations. This patch uses
crypto compress API to simplify these codes.
1) rewrite allocate_buf_for_compression, free_buf_for_compression,
pstore_compress, pstore_decompress functions using crypto compress API.
2) drop compress, decompress, allocate, free functions in pstore_zbackend,
and add zbufsize function to get each different compress buffer size.
3) use late_initcall to call ramoops_init later, to make sure the crypto
subsystem has already initialized.
4) use 'unsigned int' type instead of 'size_t' in pstore_compress,
pstore_decompress functions' length arguments.
5) rename 'zlib' to 'deflate' to follow the crypto API's name convention.
Signed-off-by: Geliang Tang <geliangtang@gmail.com>
[kees: tweaked error messages on allocation failures and Kconfig help]
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-03-09 18:51:07 +08:00
|
|
|
config PSTORE_DEFLATE_COMPRESS_DEFAULT
|
2018-03-15 23:34:08 +08:00
|
|
|
bool "deflate" if PSTORE_DEFLATE_COMPRESS
|
2018-03-07 07:57:38 +08:00
|
|
|
|
|
|
|
config PSTORE_LZO_COMPRESS_DEFAULT
|
2018-03-15 23:34:08 +08:00
|
|
|
bool "lzo" if PSTORE_LZO_COMPRESS
|
2018-03-07 07:57:38 +08:00
|
|
|
|
|
|
|
config PSTORE_LZ4_COMPRESS_DEFAULT
|
2018-03-15 23:34:08 +08:00
|
|
|
bool "lz4" if PSTORE_LZ4_COMPRESS
|
2018-03-07 07:57:38 +08:00
|
|
|
|
|
|
|
config PSTORE_LZ4HC_COMPRESS_DEFAULT
|
2018-03-15 23:34:08 +08:00
|
|
|
bool "lz4hc" if PSTORE_LZ4HC_COMPRESS
|
2018-03-07 07:57:38 +08:00
|
|
|
|
|
|
|
config PSTORE_842_COMPRESS_DEFAULT
|
2018-03-15 23:34:08 +08:00
|
|
|
bool "842" if PSTORE_842_COMPRESS
|
2018-03-07 07:57:38 +08:00
|
|
|
|
2018-08-01 19:23:37 +08:00
|
|
|
config PSTORE_ZSTD_COMPRESS_DEFAULT
|
|
|
|
bool "zstd" if PSTORE_ZSTD_COMPRESS
|
|
|
|
|
2016-02-18 22:04:22 +08:00
|
|
|
endchoice
|
|
|
|
|
2018-03-07 07:57:38 +08:00
|
|
|
config PSTORE_COMPRESS_DEFAULT
|
|
|
|
string
|
|
|
|
depends on PSTORE_COMPRESS
|
pstore: Use crypto compress API
In the pstore compression part, we use zlib/lzo/lz4/lz4hc/842
compression algorithm API to implement pstore compression backends. But
there are many repeat codes in these implementations. This patch uses
crypto compress API to simplify these codes.
1) rewrite allocate_buf_for_compression, free_buf_for_compression,
pstore_compress, pstore_decompress functions using crypto compress API.
2) drop compress, decompress, allocate, free functions in pstore_zbackend,
and add zbufsize function to get each different compress buffer size.
3) use late_initcall to call ramoops_init later, to make sure the crypto
subsystem has already initialized.
4) use 'unsigned int' type instead of 'size_t' in pstore_compress,
pstore_decompress functions' length arguments.
5) rename 'zlib' to 'deflate' to follow the crypto API's name convention.
Signed-off-by: Geliang Tang <geliangtang@gmail.com>
[kees: tweaked error messages on allocation failures and Kconfig help]
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-03-09 18:51:07 +08:00
|
|
|
default "deflate" if PSTORE_DEFLATE_COMPRESS_DEFAULT
|
2018-03-07 07:57:38 +08:00
|
|
|
default "lzo" if PSTORE_LZO_COMPRESS_DEFAULT
|
|
|
|
default "lz4" if PSTORE_LZ4_COMPRESS_DEFAULT
|
|
|
|
default "lz4hc" if PSTORE_LZ4HC_COMPRESS_DEFAULT
|
|
|
|
default "842" if PSTORE_842_COMPRESS_DEFAULT
|
2018-08-01 19:23:37 +08:00
|
|
|
default "zstd" if PSTORE_ZSTD_COMPRESS_DEFAULT
|
2018-03-07 07:57:38 +08:00
|
|
|
|
2012-05-26 21:20:19 +08:00
|
|
|
config PSTORE_CONSOLE
|
|
|
|
bool "Log kernel console messages"
|
|
|
|
depends on PSTORE
|
|
|
|
help
|
|
|
|
When the option is enabled, pstore will log all kernel
|
|
|
|
messages, even if no oops or panic happened.
|
|
|
|
|
2015-01-17 08:01:10 +08:00
|
|
|
config PSTORE_PMSG
|
|
|
|
bool "Log user space messages"
|
|
|
|
depends on PSTORE
|
|
|
|
help
|
|
|
|
When the option is enabled, pstore will export a character
|
|
|
|
interface /dev/pmsg0 to log user space messages. On reboot
|
|
|
|
data can be retrieved from /sys/fs/pstore/pmsg-ramoops-[ID].
|
|
|
|
|
|
|
|
If unsure, say N.
|
|
|
|
|
2012-07-10 08:10:41 +08:00
|
|
|
config PSTORE_FTRACE
|
|
|
|
bool "Persistent function tracer"
|
|
|
|
depends on PSTORE
|
|
|
|
depends on FUNCTION_TRACER
|
pstore/ftrace: Convert to its own enable/disable debugfs knob
With this patch we no longer reuse function tracer infrastructure, now
we register our own tracer back-end via a debugfs knob.
It's a bit more code, but that is the only downside. On the bright side we
have:
- Ability to make persistent_ram module removable (when needed, we can
move ftrace_ops struct into a module). Note that persistent_ram is still
not removable for other reasons, but with this patch it's just one
thing less to worry about;
- Pstore part is more isolated from the generic function tracer. We tried
it already by registering our own tracer in available_tracers, but that
way we're loosing ability to see the traces while we record them to
pstore. This solution is somewhere in the middle: we only register
"internal ftracer" back-end, but not the "front-end";
- When there is only pstore tracing enabled, the kernel will only write
to the pstore buffer, omitting function tracer buffer (which, of course,
still can be enabled via 'echo function > current_tracer').
Suggested-by: Steven Rostedt <rostedt@goodmis.org>
Signed-off-by: Anton Vorontsov <anton.vorontsov@linaro.org>
2012-07-18 05:26:15 +08:00
|
|
|
depends on DEBUG_FS
|
2012-07-10 08:10:41 +08:00
|
|
|
help
|
|
|
|
With this option kernel traces function calls into a persistent
|
|
|
|
ram buffer that can be decoded and dumped after reboot through
|
|
|
|
pstore filesystem. It can be used to determine what function
|
|
|
|
was last called before a reset or panic.
|
|
|
|
|
|
|
|
If unsure, say N.
|
|
|
|
|
2012-05-16 20:43:08 +08:00
|
|
|
config PSTORE_RAM
|
|
|
|
tristate "Log panic/oops to a RAM buffer"
|
|
|
|
depends on PSTORE
|
2012-05-17 15:15:08 +08:00
|
|
|
depends on HAS_IOMEM
|
|
|
|
select REED_SOLOMON
|
|
|
|
select REED_SOLOMON_ENC8
|
|
|
|
select REED_SOLOMON_DEC8
|
2012-05-16 20:43:08 +08:00
|
|
|
help
|
|
|
|
This enables panic and oops messages to be logged to a circular
|
|
|
|
buffer in RAM where it can be read back at some later point.
|
|
|
|
|
|
|
|
Note that for historical reasons, the module will be named
|
|
|
|
"ramoops.ko".
|
|
|
|
|
2016-10-18 20:12:27 +08:00
|
|
|
For more information, see Documentation/admin-guide/ramoops.rst.
|
2020-03-25 16:54:56 +08:00
|
|
|
|
|
|
|
config PSTORE_ZONE
|
|
|
|
tristate
|
|
|
|
depends on PSTORE
|
|
|
|
help
|
|
|
|
The common layer for pstore/blk (and pstore/ram in the future)
|
|
|
|
to manage storage in zones.
|
pstore/blk: Introduce backend for block devices
pstore/blk is similar to pstore/ram, but uses a block device as the
storage rather than persistent ram.
The pstore/blk backend solves two common use-cases that used to preclude
using pstore/ram:
- not all devices have a battery that could be used to persist
regular RAM across power failures.
- most embedded intelligent equipment have no persistent ram, which
increases costs, instead preferring cheaper solutions, like block
devices.
pstore/blk provides separate configurations for the end user and for the
block drivers. User configuration determines how pstore/blk operates, such
as record sizes, max kmsg dump reasons, etc. These can be set by Kconfig
and/or module parameters, but module parameter have priority over Kconfig.
Driver configuration covers all the details about the target block device,
such as total size of the device and how to perform read/write operations.
These are provided by block drivers, calling pstore_register_blkdev(),
including an optional panic_write callback used to bypass regular IO
APIs in an effort to avoid potentially destabilized kernel code during
a panic.
Signed-off-by: WeiXiong Liao <liaoweixiong@allwinnertech.com>
Link: https://lore.kernel.org/lkml/20200511233229.27745-3-keescook@chromium.org/
Co-developed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
2020-03-25 16:54:57 +08:00
|
|
|
|
|
|
|
config PSTORE_BLK
|
|
|
|
tristate "Log panic/oops to a block device"
|
|
|
|
depends on PSTORE
|
|
|
|
depends on BLOCK
|
2021-06-09 00:13:27 +08:00
|
|
|
depends on BROKEN
|
pstore/blk: Introduce backend for block devices
pstore/blk is similar to pstore/ram, but uses a block device as the
storage rather than persistent ram.
The pstore/blk backend solves two common use-cases that used to preclude
using pstore/ram:
- not all devices have a battery that could be used to persist
regular RAM across power failures.
- most embedded intelligent equipment have no persistent ram, which
increases costs, instead preferring cheaper solutions, like block
devices.
pstore/blk provides separate configurations for the end user and for the
block drivers. User configuration determines how pstore/blk operates, such
as record sizes, max kmsg dump reasons, etc. These can be set by Kconfig
and/or module parameters, but module parameter have priority over Kconfig.
Driver configuration covers all the details about the target block device,
such as total size of the device and how to perform read/write operations.
These are provided by block drivers, calling pstore_register_blkdev(),
including an optional panic_write callback used to bypass regular IO
APIs in an effort to avoid potentially destabilized kernel code during
a panic.
Signed-off-by: WeiXiong Liao <liaoweixiong@allwinnertech.com>
Link: https://lore.kernel.org/lkml/20200511233229.27745-3-keescook@chromium.org/
Co-developed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
2020-03-25 16:54:57 +08:00
|
|
|
select PSTORE_ZONE
|
|
|
|
default n
|
|
|
|
help
|
|
|
|
This enables panic and oops message to be logged to a block dev
|
|
|
|
where it can be read back at some later point.
|
|
|
|
|
2020-03-25 16:55:02 +08:00
|
|
|
For more information, see Documentation/admin-guide/pstore-blk.rst
|
|
|
|
|
pstore/blk: Introduce backend for block devices
pstore/blk is similar to pstore/ram, but uses a block device as the
storage rather than persistent ram.
The pstore/blk backend solves two common use-cases that used to preclude
using pstore/ram:
- not all devices have a battery that could be used to persist
regular RAM across power failures.
- most embedded intelligent equipment have no persistent ram, which
increases costs, instead preferring cheaper solutions, like block
devices.
pstore/blk provides separate configurations for the end user and for the
block drivers. User configuration determines how pstore/blk operates, such
as record sizes, max kmsg dump reasons, etc. These can be set by Kconfig
and/or module parameters, but module parameter have priority over Kconfig.
Driver configuration covers all the details about the target block device,
such as total size of the device and how to perform read/write operations.
These are provided by block drivers, calling pstore_register_blkdev(),
including an optional panic_write callback used to bypass regular IO
APIs in an effort to avoid potentially destabilized kernel code during
a panic.
Signed-off-by: WeiXiong Liao <liaoweixiong@allwinnertech.com>
Link: https://lore.kernel.org/lkml/20200511233229.27745-3-keescook@chromium.org/
Co-developed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
2020-03-25 16:54:57 +08:00
|
|
|
If unsure, say N.
|
|
|
|
|
|
|
|
config PSTORE_BLK_BLKDEV
|
|
|
|
string "block device identifier"
|
|
|
|
depends on PSTORE_BLK
|
|
|
|
default ""
|
|
|
|
help
|
|
|
|
Which block device should be used for pstore/blk.
|
|
|
|
|
2020-03-25 16:55:00 +08:00
|
|
|
It accepts the following variants:
|
pstore/blk: Introduce backend for block devices
pstore/blk is similar to pstore/ram, but uses a block device as the
storage rather than persistent ram.
The pstore/blk backend solves two common use-cases that used to preclude
using pstore/ram:
- not all devices have a battery that could be used to persist
regular RAM across power failures.
- most embedded intelligent equipment have no persistent ram, which
increases costs, instead preferring cheaper solutions, like block
devices.
pstore/blk provides separate configurations for the end user and for the
block drivers. User configuration determines how pstore/blk operates, such
as record sizes, max kmsg dump reasons, etc. These can be set by Kconfig
and/or module parameters, but module parameter have priority over Kconfig.
Driver configuration covers all the details about the target block device,
such as total size of the device and how to perform read/write operations.
These are provided by block drivers, calling pstore_register_blkdev(),
including an optional panic_write callback used to bypass regular IO
APIs in an effort to avoid potentially destabilized kernel code during
a panic.
Signed-off-by: WeiXiong Liao <liaoweixiong@allwinnertech.com>
Link: https://lore.kernel.org/lkml/20200511233229.27745-3-keescook@chromium.org/
Co-developed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
2020-03-25 16:54:57 +08:00
|
|
|
1) <hex_major><hex_minor> device number in hexadecimal representation,
|
|
|
|
with no leading 0x, for example b302.
|
2020-03-25 16:55:00 +08:00
|
|
|
2) /dev/<disk_name> represents the device name of disk
|
|
|
|
3) /dev/<disk_name><decimal> represents the device name and number
|
pstore/blk: Introduce backend for block devices
pstore/blk is similar to pstore/ram, but uses a block device as the
storage rather than persistent ram.
The pstore/blk backend solves two common use-cases that used to preclude
using pstore/ram:
- not all devices have a battery that could be used to persist
regular RAM across power failures.
- most embedded intelligent equipment have no persistent ram, which
increases costs, instead preferring cheaper solutions, like block
devices.
pstore/blk provides separate configurations for the end user and for the
block drivers. User configuration determines how pstore/blk operates, such
as record sizes, max kmsg dump reasons, etc. These can be set by Kconfig
and/or module parameters, but module parameter have priority over Kconfig.
Driver configuration covers all the details about the target block device,
such as total size of the device and how to perform read/write operations.
These are provided by block drivers, calling pstore_register_blkdev(),
including an optional panic_write callback used to bypass regular IO
APIs in an effort to avoid potentially destabilized kernel code during
a panic.
Signed-off-by: WeiXiong Liao <liaoweixiong@allwinnertech.com>
Link: https://lore.kernel.org/lkml/20200511233229.27745-3-keescook@chromium.org/
Co-developed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
2020-03-25 16:54:57 +08:00
|
|
|
of partition - device number of disk plus the partition number
|
|
|
|
4) /dev/<disk_name>p<decimal> - same as the above, this form is
|
|
|
|
used when disk name of partitioned disk ends with a digit.
|
|
|
|
5) PARTUUID=00112233-4455-6677-8899-AABBCCDDEEFF representing the
|
|
|
|
unique id of a partition if the partition table provides it.
|
|
|
|
The UUID may be either an EFI/GPT UUID, or refer to an MSDOS
|
|
|
|
partition using the format SSSSSSSS-PP, where SSSSSSSS is a zero-
|
|
|
|
filled hex representation of the 32-bit "NT disk signature", and PP
|
|
|
|
is a zero-filled hex representation of the 1-based partition number.
|
|
|
|
6) PARTUUID=<UUID>/PARTNROFF=<int> to select a partition in relation
|
|
|
|
to a partition with a known unique id.
|
|
|
|
7) <major>:<minor> major and minor number of the device separated by
|
|
|
|
a colon.
|
|
|
|
|
|
|
|
NOTE that, both Kconfig and module parameters can configure
|
|
|
|
pstore/blk, but module parameters have priority over Kconfig.
|
|
|
|
|
|
|
|
config PSTORE_BLK_KMSG_SIZE
|
|
|
|
int "Size in Kbytes of kmsg dump log to store"
|
|
|
|
depends on PSTORE_BLK
|
|
|
|
default 64
|
|
|
|
help
|
|
|
|
This just sets size of kmsg dump (oops, panic, etc) log for
|
|
|
|
pstore/blk. The size is in KB and must be a multiple of 4.
|
|
|
|
|
|
|
|
NOTE that, both Kconfig and module parameters can configure
|
|
|
|
pstore/blk, but module parameters have priority over Kconfig.
|
|
|
|
|
|
|
|
config PSTORE_BLK_MAX_REASON
|
|
|
|
int "Maximum kmsg dump reason to store"
|
|
|
|
depends on PSTORE_BLK
|
|
|
|
default 2
|
|
|
|
help
|
|
|
|
The maximum reason for kmsg dumps to store. The default is
|
|
|
|
2 (KMSG_DUMP_OOPS), see include/linux/kmsg_dump.h's
|
|
|
|
enum kmsg_dump_reason for more details.
|
|
|
|
|
|
|
|
NOTE that, both Kconfig and module parameters can configure
|
|
|
|
pstore/blk, but module parameters have priority over Kconfig.
|
2020-03-25 16:54:59 +08:00
|
|
|
|
|
|
|
config PSTORE_BLK_PMSG_SIZE
|
|
|
|
int "Size in Kbytes of pmsg to store"
|
|
|
|
depends on PSTORE_BLK
|
|
|
|
depends on PSTORE_PMSG
|
|
|
|
default 64
|
|
|
|
help
|
|
|
|
This just sets size of pmsg (pmsg_size) for pstore/blk. The size is
|
|
|
|
in KB and must be a multiple of 4.
|
|
|
|
|
|
|
|
NOTE that, both Kconfig and module parameters can configure
|
|
|
|
pstore/blk, but module parameters have priority over Kconfig.
|
2020-03-25 16:55:00 +08:00
|
|
|
|
|
|
|
config PSTORE_BLK_CONSOLE_SIZE
|
|
|
|
int "Size in Kbytes of console log to store"
|
|
|
|
depends on PSTORE_BLK
|
|
|
|
depends on PSTORE_CONSOLE
|
|
|
|
default 64
|
|
|
|
help
|
|
|
|
This just sets size of console log (console_size) to store via
|
|
|
|
pstore/blk. The size is in KB and must be a multiple of 4.
|
|
|
|
|
|
|
|
NOTE that, both Kconfig and module parameters can configure
|
|
|
|
pstore/blk, but module parameters have priority over Kconfig.
|
2020-03-25 16:55:01 +08:00
|
|
|
|
|
|
|
config PSTORE_BLK_FTRACE_SIZE
|
|
|
|
int "Size in Kbytes of ftrace log to store"
|
|
|
|
depends on PSTORE_BLK
|
|
|
|
depends on PSTORE_FTRACE
|
|
|
|
default 64
|
|
|
|
help
|
|
|
|
This just sets size of ftrace log (ftrace_size) for pstore/blk. The
|
|
|
|
size is in KB and must be a multiple of 4.
|
|
|
|
|
|
|
|
NOTE that, both Kconfig and module parameters can configure
|
|
|
|
pstore/blk, but module parameters have priority over Kconfig.
|