[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC 0/1] Introduce VCPUOP_reset_vcpu_info
On Wed, Aug 06, 2014 at 04:00:12PM +0100, Jan Beulich wrote: > >>> On 06.08.14 at 16:51, <konrad.wilk@xxxxxxxxxx> wrote: > > On Wed, Aug 06, 2014 at 03:09:43PM +0100, Jan Beulich wrote: > >> >>> On 06.08.14 at 15:08, <vkuznets@xxxxxxxxxx> wrote: > >> > --- a/arch/x86/xen/enlighten.c > >> > +++ b/arch/x86/xen/enlighten.c > >> > @@ -183,8 +183,6 @@ static void xen_vcpu_setup(int cpu) > >> > * This path is called twice on PVHVM - first during bootup via > >> > * smp_init -> xen_hvm_cpu_notify, and then if the VCPU is being > >> > * hotplugged: cpu_up -> xen_hvm_cpu_notify. > >> > - * As we can only do the VCPUOP_register_vcpu_info once lets > >> > - * not over-write its result. > >> > * > >> > * For PV it is called during restore (xen_vcpu_restore) and > >> > bootup > >> > * (xen_setup_vcpu_info_placement). The hotplug mechanism does > >> > not > >> > @@ -207,14 +205,23 @@ static void xen_vcpu_setup(int cpu) > >> > info.mfn = arbitrary_virt_to_mfn(vcpup); > >> > info.offset = offset_in_page(vcpup); > >> > > >> > + /* > >> > + * Call VCPUOP_reset_vcpu_info before VCPUOP_register_vcpu_info, > > this > >> > + * is required if we boot after kexec. > >> > + */ > >> > + > >> > + if (cpu != 0) { > >> > + err = HYPERVISOR_vcpu_op(VCPUOP_reset_vcpu_info, cpu, > > NULL); > >> > + if (err) > >> > + pr_warn("VCPUOP_reset_vcpu_info for CPU%d > >> > failed: > > %d\n", > >> > + cpu, err); > >> > + } > >> > >> Just for my understanding of why exactly you need the new operation: > >> Why is this being done here, when you already do the reset in the > >> cpu-die/shutdown paths? And why not for CPU 0? > > > > For CPU0 it will always error out (as we can't do the hypercall on > > v != current as we are doing this on an BSP path) in the hypervisor. > > > > This path could also been taken when doing a kdump instead of kexec > > path - hence the reset hadn't happen in the cpu-die shutdown paths. > > But that's unsafe, as the hypervisor would continue to write fields > in that structure if it finds a need to. That is OK. The kdump kernel boots from a reserved region so the area where the hypervisor keeps on writting is in the 'outside-kdump-kernel' boot area. > > Jan > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |