[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1350317146.18058.83.camel@zakaz.uk.xensource.com>
Date: Mon, 15 Oct 2012 17:05:46 +0100
From: Ian Campbell <Ian.Campbell@...rix.com>
To: Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>
CC: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"xen-devel@...ts.xensource.com" <xen-devel@...ts.xensource.com>,
Olaf Hering <olaf@...fle.de>,
"stable@...r.kernel.org" <stable@...r.kernel.org>
Subject: Re: [Xen-devel] [PATCH 1/3] xen/pv-on-hvm kexec: add quirk for Xen
3.4 and shutdown watches.
On Wed, 2012-10-10 at 18:40 +0100, Konrad Rzeszutek Wilk wrote:
> The commit 254d1a3f02ebc10ccc6e4903394d8d3f484f715e, titled
> "xen/pv-on-hvm kexec: shutdown watches from old kernel" assumes that the
> XenBus backend can deal with reading of values from:
> "control/platform-feature-xs_reset_watches":
>
> ... a patch for xenstored is required so that it
> accepts the XS_RESET_WATCHES request from a client (see changeset
> 23839:42a45baf037d in xen-unstable.hg). Without the patch for xenstored
> the registration of watches will fail and some features of a PVonHVM
> guest are not available. The guest is still able to boot, but repeated
> kexec boots will fail."
>
> Sadly this is not true when using a Xen 3.4 hypervisor and booting a PVHVM
> guest. We end up hanging at:
>
> err = xenbus_scanf(XBT_NIL, "control",
> "platform-feature-xs_reset_watches", "%d", &supported);
>
> This can easily be seen with guests hanging at xenbus_init:
>
> NX (Execute Disable) protection: active
> SMBIOS 2.4 present.
> DMI: Xen HVM domU, BIOS 3.4.0 05/13/2011
> Hypervisor detected: Xen HVM
> Xen version 3.4.
> Xen Platform PCI: I/O protocol version 1
> ... snip ..
> calling xenbus_init+0x0/0x27e @ 1
>
> Reverting the commit or using the attached patch fixes the issue. This fix
> checks whether the hypervisor is older than 4.0 and if so does not try to
> perform the read.
>
> Fixes-Oracle-Bug: 14708233
> CC: stable@...r.kernel.org
> CC: Olaf Hering <olaf@...fle.de>
> Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>
> ---
> drivers/xen/xenbus/xenbus_xs.c | 15 +++++++++++++++
> 1 files changed, 15 insertions(+), 0 deletions(-)
>
> diff --git a/drivers/xen/xenbus/xenbus_xs.c b/drivers/xen/xenbus/xenbus_xs.c
> index bce15cf..91f513b 100644
> --- a/drivers/xen/xenbus/xenbus_xs.c
> +++ b/drivers/xen/xenbus/xenbus_xs.c
> @@ -47,6 +47,7 @@
> #include <xen/xenbus.h>
> #include <xen/xen.h>
> #include "xenbus_comms.h"
> +#include <asm/xen/hypervisor.h>
>
> struct xs_stored_msg {
> struct list_head list;
> @@ -617,7 +618,18 @@ static struct xenbus_watch *find_watch(const char *token)
>
> return NULL;
> }
> +static bool xen_strict_xenbus_quirk()
> +{
> + uint32_t eax, ebx, ecx, edx, base;
> +
> + base = xen_cpuid_base();
> + cpuid(base + 1, &eax, &ebx, &ecx, &edx);
This breaks on ARM because this is an x86 specific function. Can we
ifdef it or properly wrap it in an arch interface please.
> +
> + if ((eax >> 16) < 4)
> + return true;
> + return false;
>
> +}
> static void xs_reset_watches(void)
> {
> int err, supported = 0;
> @@ -625,6 +637,9 @@ static void xs_reset_watches(void)
> if (!xen_hvm_domain())
> return;
>
> + if (xen_strict_xenbus_quirk())
> + return;
> +
> err = xenbus_scanf(XBT_NIL, "control",
> "platform-feature-xs_reset_watches", "%d", &supported);
> if (err != 1 || !supported)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists