[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH for-4.17] Revert "x86/HVM: also dump stacks from show_execution_state()"


  • To: Roger Pau Monne <roger.pau@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
  • Date: Fri, 4 Nov 2022 14:58:33 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+HzJr+tf6eiD9vL5z/PkLCdmhiIDHTr+hlooizxB8xA=; b=jyoxKHjvaH1HTXLHIJV7FjdyQ2onwyuLIq87UXTUByafXQ4nOxFBCNYc9FgXdvPRJUoZRjz6eq22FuviTXmSskWt57clXQkBNjpHy64EZImTHr+Nny9tsdaZJqpytbmCWZo67F+tjcJEQCrJOpj949RWFiVTqAYHEFLKjJb2NIyzrxXYdPrTVohffxn/mt5d6iGHXZlnZjBmrlI4MyeA06bZCF43h4S9yd3ur6oCb4vVghGGxVhq7MOx4F+C439LaIhQvC+qQFxmJDdZqNXN4tEOHT+CChMPqBAAjP3xgo3jdihfrnEGnhuZIFK0oE9jAB8vARoagLHqZyGd0cK4cA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hYdUosvGNGcmWuCr6xbvWvbDX/47H00L/2QbPhScEGDN4MoUUfUP3X2lHSkwiuoX+PEopz2w3xcwKEmkOn2ptR9AVW1UgHFnet0efApiYlC0+FqmQ8Vb8fGqi579pnuZ64u99hPdoi5RF2mHjfGr3TjCIQb7HROsmJrtJPg2gQWS2+k/b63nvlGhBKS1uUlfsL5Szq5A+P5m0GxoU0FautbOBElp9M7jll/pvdjD9NfeUuyl4wImcnlT2SjVOSH4CiCi/eoFe1Z1gJbH4iBFbGuVd17nbauaoXTY59Cj/GRHGO9Ps7+ZVxPC/Gl+cR8A1o3W7BNgp8LB+yZw8IYx5Q==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: "Henry.Wang@xxxxxxx" <Henry.Wang@xxxxxxx>
  • Delivery-date: Fri, 04 Nov 2022 14:59:00 +0000
  • Ironport-data: A9a23:8ziN+a9x1MIzNUYEQUblDrUDmX+TJUtcMsCJ2f8bNWPcYEJGY0x3z 2RLXG/VbPePZDP3KYhxaN+w8EkCupaAn9M2SAE9+Xo8E34SpcT7XtnIdU2Y0wF+jCHgZBk+s 5hBMImowOQcFCK0SsKFa+C5xZVE/fjUAOG6UKucYHsZqTZMEE8JkQhkl/MynrlmiN24BxLlk d7pqojUNUTNNwRcawr40Ire7kIx1BjOkGlA5AZnPKgX5AW2e0Q9V/rzG4ngdxMUfaEMdgKKb 76r5K20+Grf4yAsBruN+losWhRXKlJ6FVHmZkt+A8BOsDAbzsAB+v9T2M4nQVVWk120c+VZk 72hg3ASpTABZcUgkMxFO/VR/roX0aduoNcrKlDn2SCfItGvn9IBDJyCAWlvVbD09NqbDklQ9 PsyeRFdbSmphvnx2ZeBUuRMlJgseZyD0IM34hmMzBn/JNN/GNXoZPyP4tVVmjAtmspJAPDSI dIDbiZiZwjBZBsJPUoLDJU5n6GjgXyXnz9w8QrJ4/ZopTWNilUuiNABM/KMEjCObexTklyVu STt+GPhDwtBHNee1SCE4jSngeqncSbTCN5LROfnrK4CbFu742pLT0YGTl2Hh+CSjxewAPRfd k8F5X97xUQ13AnxJjXnZDWorXjBshMCVt54F+wh9BrL2qfS+xyeBGUPUnhGctNOnO87QyY7k GCAmdzBDCZq9raSTBqgGqy8qDqzPW0eKjYEbCpdFA8duYC8+Mc0kw7FSctlHOitlNrpFDrsw jeM6i8jm7EUis1N3KK+lbzavw+RSlHyZlZdzm3qsqiNsmuVuKbNi1SU1GXm
  • Ironport-hdrordr: A9a23:E9fOmakuYDn1YheXKOeeOp8tW6DpDfOPimdD5ihNYBxZY6Wkfp +V8cjzhCWftN9OYhodcIi7SdK9qXO1z+8X3WGIVY3SETUOy1HYVr2KirGSjwEIeheOvNK1sJ 0NT0EQMqyWMbEXt6fHCUyDYq4dKbq8ge+VbIXlvhFQpGhRAskOgTuRSDzra3GeLzM2Z6bRYa Dsgvav0ADQHEj/AP7aOlA1G8z44/HbnpPvZhALQzQ97hOVsD+u4LnmVzCFwxY3SVp0sPYf2F mAtza8yrSosvm9xBOZ/XTU9Y5qlNzozcYGLNCQi/ISNi7nhm+TFcRcsvy5zXMISdOUmRMXee r30lMd1gNImjTsl1SO0FnQMs/boXATAjHZuAalaDDY0LHErXoBerZ8bMRiA1XkAgMbza9BOO gg5RPni7NHSRzHhyjz/N7OSlVjkVe1u2MrlaoJg2VYSpZ2Us4ZkWUzxjIjLH47JlON1Kk3VO 11SM3M7vdfdl2XK3jfo2l02dSpGnA+BA2PTEQOstGcl2E+pgEz82IIgMgE2nsQ/pM0TJdJo+ zCL6RzjblLCssbd7h0CusNSda+TmbNXRXPOmSPJkmPLtBOB1vd75rspLkl7uCjf5IFiJM0hZ TaSVtd8XU/fkr/YPf+qKGjMiq9NVlVcQ6duf22vaIJy4EUbICbQRGrWRQpj9aqpekZD4nSR+ uzUagmccPeEQ==
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHY8Fv1+K7IFcVij0qSJnf5kUFrU64u2xiA
  • Thread-topic: [PATCH for-4.17] Revert "x86/HVM: also dump stacks from show_execution_state()"

On 04/11/2022 14:43, Roger Pau Monne wrote:
> This reverts commit adb715db698bc8ec3b88c24eb88b21e9da5b6c07.
>
> The dumping of stacks for HVM guests is problematic, since it requires
> taking the p2m lock in order to walk the guest page tables and the
> p2m.
>
> The suggested solution to the issue is to introduce and use a lockless
> p2m walker, that relies on being executed with interrupts disabled in
> order to prevent any p2m pages from being freed while doing the
> walk.
>
> Note that modifications of p2m entries are already done atomically in
> order to prevent the hardware walker from seeing partially updated
> values.
>
> Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>

Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, as agreed on the
x86 maintainers call.

~Andrew

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.