[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Fwd: Ping²: [PATCH] x86: enable interrupts around dump_execstate()


  • To: Henry Wang <Henry.Wang@xxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 19 Jul 2022 12:59:44 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8DjIkfJbELGULg0dWJW8CLfI71F+vgNdui0vFWfUSN8=; b=gFjRx8ha52UMi6U8GWIVyvy7rhn63bwda0L/8Vnj65w7PHWkxJol9ecqbCkreSp/LdlydOBj/je609PXoRl2/o15C6K2Jzl17mOUAcgFttTnsgzojUo/5T4eUmVXQlD88QgKqaa5obYE0kYEyusRp8F8Rirep9c3hm9bLx4hjI4mrELl7FYtn8m6DxtNZs1jlxv3bTxuHnODZ72hE+paO2tVNwvQhN/4LnwEUVm2kfld8d7frvHBY10Z8auzj8rgLj+XnkWIVeKdSh/0RDw0vJsRRRUsXJXtOYTrpoRiIFJAqRzOMJF0222R/lpJanDNe2FoFnqlzmMoVnCd7DO2KQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TKvWosZVXhDZPrnF0Obpd3r3hGz0dT98O5cJs9Qa4RB9gQePXWTcuzUlL8q9A0xY02TVgN4vUhNhfRB2WldCy3bBFdQha861yBYjayaFCSCExYtFaOZh+YoVQLVOVNNyfE0aEzJmQqoNu5a6weyxLUaJbzAAOARyc1HezmwPBHm2crlOfLNDQ3uTRnEdRUwXLqOkawkxg2xqEO7P6Ky/3LE5qqqfUI4EsyqTamw2fFbHcQTM22D82auOKNtEKiryijpn/GCe589TkF6Kj8/ylocaz7iqPMl8449WkA6QAjaRoy57B0yb7i9R9JShZKrYpU6GIy0UeEObFAJK07G4aQ==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Tue, 19 Jul 2022 10:59:55 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Henry,

-------- Forwarded Message --------
Subject: Ping²: [PATCH] x86: enable interrupts around dump_execstate()
Date: Tue, 5 Jul 2022 18:19:38 +0200
From: Jan Beulich <jbeulich@xxxxxxxx>
To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné 
<roger.pau@xxxxxxxxxx>
CC: Wei Liu <wl@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx 
<xen-devel@xxxxxxxxxxxxxxxxxxxx>

>On 11.01.2022 11:08, Jan Beulich wrote:
>> On 16.12.2021 14:33, Jan Beulich wrote:
>>> On 16.12.2021 12:54, Andrew Cooper wrote:
>>>> On 13/12/2021 15:12, Jan Beulich wrote:
>>>>> show_hvm_stack() requires interrupts to be enabled to avoids triggering
>>>>> the consistency check in check_lock() for the p2m lock. To do so in
>>>>> spurious_interrupt() requires adding reentrancy protection / handling
>>>>> there.
>>>>>
>>>>> Fixes: adb715db698b ("x86/HVM: also dump stacks from 
>>>>> show_execution_state()")
>>>>> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
>> 
>> There's a bug here which we need to deal with one way or another.
>> May I please ask for a response to the issues pointed out with
>> what you said in your earlier reply?
>
>I sincerely hope we won't ship another major version with this
>issue unfixed. The only option beyond applying this patch that I'm
>aware of is to revert the commit pointed at by Fixes:, which imo
>would be a shame (moving us further away from proper PVH support,
>including Dom0).

perhaps another item for the list of things needing resolution for
the release.

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.