One or more embodiments of the invention relate generally to computer systems, and more particularly, to methods for communicating with USB devices after a computer system crash.
When a computer system encounters an error that causes the operating system, for example, to cease processing (sometimes referred to as a “crash”), it is desired to record information useful in (a) evaluating and analyzing operations of the computer system, and (b) diagnosing a root cause of the crash. The recorded information is referred to as a core dump, and is typically recorded before the system shuts down—the information in the core dump represents the state of the computer system at the time the crash occurred. In particular, the core dump typically includes contents of all memory locations, along with various registers, accumulators, and the like. Since the information ought to survive system shutdown, it is typically written to a permanent storage medium such as a disk.
In another scenario that commonly arises when a computer system crashes, provision may be made for debugging. To do so, typically, an interface is presented on a display monitor, which monitor may also display crash specific information (e.g., type of error and register contents). In particular, a simple user interface may be presented with support limited to keyboard commands only or a more complex graphical user interface may be presented with support for keyboard, mouse and other input devices. In some cases, a debugging interface may support browsing of system logs, viewing a callstack of a faulting processor, and possibly other processors, binary and/or symbolic inspection and modification of system memory, soft reboot of the system, and possibly other features.
One or more embodiments of the present invention are a method, machine-readable medium, and a system for communicating with USB devices after a computer system crash. One embodiment is a method of transferring data from a computer system to a Universal Serial Bus (USB) device after a computer system crash where interrupts are masked, the method comprising: (a) detecting the computer system crash; (b) transferring at least a portion of the data to a USB driver for the USB device; (c) the USB driver transferring the portion of the data to a USB controller driver for a USB controller for the USB device; (d) the USB controller driver causing the USB controller to transfer the portion of the data to the USB device; (e) polling the USB controller to determine whether the data transfer was completed; and (f) if the data transfer was completed, providing a notification to the computer system. Another embodiment is a method of transferring data from a Universal Serial Bus (USB) device to a computer system after a computer system crash where interrupts are masked, the method comprising: (a) detecting the computer system crash; (b) identifying a USB device used to communicate data to the computer system; (c) polling a USB controller for the identified USB device to determine whether new input has been received; (d) if so, obtaining the new input; and (e) transferring the new output to the computer system for further processing.
As further shown in
Each attached USB device is configured to communicate with computer system 10 via one of USB controllers 40 and 42. However, an appropriate driver must also be present for each USB device of classes 14, 16 and 18, as well as for any other USB device that is connected to USB bus 12, to perform work for computer system 10. Devices of class 14 are human interface devices (HID) such as a USB mouse or keyboard; for example, USB device 44 may be a USB keyboard. In order for computer system 10 to receive keystrokes from USB device 44, HID class USB driver 34 must be loaded in memory 22 and executing on processor 20 as shown in
Kernel 60, loaded into memory 22, allocates requests among USB devices of classes 14, 16 and 18 and computer system 10. Specifically, application 62, also loaded into memory 22, may be executing on processor 20, and any data transfer between memory 22 and USB devices of classes 14, 16 and 18, referred to as I/O requests, occurs under control of USB device drivers 34, 36 and 38, respectively. Kernel 60 maintains list 64 of available USB devices, which USB devices are detected by kernel 60 when computer system 10 is activated, i.e., booted, using well known techniques or when USB devices of classes 14, 16 and 18 are subsequently attached thereto. An example of kernel 60 is one that is included in an operating system that supports execution of virtual machines on computer system 10, such as an operating system available with a product sold under the trade name ESX Server from VMware, Inc. of Palo Alto, Calif. I/O requests to/from USB devices of classes 14, 16 and 18 are scheduled by kernel 60 to facilitate management of use of processor 20 and memory 22 by the various processes that may be running on computer system 10.
All I/O requests between processor 20 and USB devices 44, 46 and 48 are proxied through one of USB controllers 40 and 42. Kernel 60 interrupt-based programming is used to notify USB HCD 30 and 32 when a data transmission to/from USB devices 44, 46 and 48 has been completed. An interrupt from USB control system 28 causes kernel 60: (a) to suspend and save the state of execution via a context switch; and (b) to begin execution of corresponding interrupt handler 50 or 52 (ISR 50 or 52) included in USB HCDs 30 and 32, respectively. USB HCD 30 or 32 processes the data, and notifies USB device driver 34, 36 or 38 corresponding to the USB device for which the I/O request is applicable. When it is ready to handle the I/O request, kernel 60 effects a context switch to the appropriate one of USB device drivers 34, 36 or 38 to commence a data transaction in which data is moved between the appropriate USB device 44, 46 or 48 and computer system 10 using a plurality of USB request buffers (URBs), which URBs are a group of addresses in memory 22 allocated by USB control system 28 (shown in
Referring to both
In the presence of a processing error that terminates normal operation of operating system kernel 60 resulting in a system crash (other than crashes that terminate operation of the processor (for example, stack overflow in real mode on an IA-32 processor—the typical response to those is that the processor shuts down)), it is desirable to store a core dump for, among other things, diagnostic purposes to determine the cause of the crash. It is desirable to store core dump 90 on USB mass storage device 46 after the crash while minimizing, if not avoiding, any processing state changes to computer system 10. To do this, there is a need to move data on USB 12 to generate core dump 90 on USB mass storage device 46 without using interrupts because typically interrupts have been masked in response to the system crash. One or more embodiments of the present invention achieve this by providing kernel 60 with a method to poll for USB control system 28 events (and more particularly, to poll USB controllers 40 and 42) that would generate an interrupt following a system crash if the interrupt were not masked.
In one embodiment a relevant USB host controller is associated with the USB device and is polled specifically after a crash. In another embodiment a USB device detects that processing is occurring after the crash and calls a function to poll all registered PCI devices. In yet another embodiment some USB storage device drivers (e.g., Linux) have a thread which must normally be run to process I/O. Since thread scheduling is not available after the crash, this embodiment short-circuits the driver thread by calling directly to a driver URB dispatch function.
At decision step 310 of
At decision step 320 of
At step 330 of
At step 340 of
At step 350 of
At decision step 360 of
At decision step 370 of
At step 380 of
Thus, in accordance with the above-described method, polling of USB controllers to drive a USB storage device after a system crash allows transferring data between kernel 60 and USB mass storage device 46 without using interrupts.
At decision step 410 of
At step 420 of
At decision step 430 of
At step 440 of
At decision step 450, kernel 60 determines whether a reboot is in progress. If so, control is transferred to step 460, otherwise, control is transferred to step 420.
Thus, in accordance with the above-described method, polling for USB keystrokes after a system crash allows transfer of data between kernel 60 and USB keyboard device 44 without using interrupts. This method would be used to determine if USB keyboard device 44 has a keystroke, thereby enabling support for a debugger.
The embodiments of the present invention described above are exemplary. Many changes and modifications may be made to the disclosure recited above, while remaining within the scope of the invention. Additionally, embodiments of the present invention may be implemented in software, firmware or as an abstract of a physical computer system known in the art as a virtual machine or a combination of software, firmware and a virtual machine. With respect to implementing embodiments of the present invention as a virtual machine, an expression of an embodiment the invention may be either as virtual system hardware, guest system software of the virtual machine or a combination thereof. The scope of the invention should, therefore, be limited not to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents.
Number | Name | Date | Kind |
---|---|---|---|
5437047 | Nakamura | Jul 1995 | A |
6012103 | Sartore et al. | Jan 2000 | A |
6202090 | Simone | Mar 2001 | B1 |
6263392 | McCauley | Jul 2001 | B1 |
6681348 | Vachon | Jan 2004 | B1 |
6769077 | Vachon et al. | Jul 2004 | B2 |
6775698 | Simone | Aug 2004 | B1 |
7240240 | Balakrishnan et al. | Jul 2007 | B2 |
7454606 | Marquiz | Nov 2008 | B2 |
20020078404 | Vachon et al. | Jun 2002 | A1 |
20020194525 | Mathiske et al. | Dec 2002 | A1 |
20050210077 | Balakrishnan et al. | Sep 2005 | A1 |
20060271773 | Marquiz | Nov 2006 | A1 |
20090077420 | Sunavala et al. | Mar 2009 | A1 |
Number | Date | Country | |
---|---|---|---|
20100161863 A1 | Jun 2010 | US |