From: Akio Takebe <takebe_akio@jp.fujitsu.com>
To: Horms <horms@verge.net.au>, Keir Fraser <Keir.Fraser@cl.cam.ac.uk>
Cc: Ian Pratt <m+Ian.Pratt@cl.cam.ac.uk>,
Kazuo Moriwaka <moriwaka@valinux.co.jp>,
xen-devel@lists.xensource.com, "Zou,
Nanhai" <nanhai.zou@intel.com>,
Isaku Yamahata <yamahata@valinux.co.jp>,
Magnus Damm <magnus@valinux.co.jp>,
xen-ia64-devel@lists.xensource.com
Subject: Re: [PATCH] kexec: framework and i386 (Take XIV)
Date: Thu, 31 Aug 2006 17:55:52 +0900 [thread overview]
Message-ID: <88C6CCDB437DC3takebe_akio@jp.fujitsu.com> (raw)
In-Reply-To: <20060831074259.GB23148@verge.net.au>
Hi, Horms and Magnus
Good work. :-)
I have one commet.
I believe crash_kexec should be directly called
when unknown NMI is occurred.
In your patch, crash_kexec is called as the bellow.
1. unknown NMI is occurred. (e.g. by pushing NMI botton)
2. xen recieved NMI and call do_nmi.
3. xen report to dom0 by using raise_softirq(NMI_SOFTIRQ).
4. dom0 call crash_kexec of dom0.
5. crash_kexec of dom0 call crash_kexec of xen
Am I correct?
The above process is not reliable if I'm correct.
So I belive crash_kexec of xen should be directly called like the
following patch.
diff -r 9611a5c9e1a1 xen/arch/x86/traps.c
--- a/xen/arch/x86/traps.c Thu Aug 31 13:12:26 2006 +0900
+++ b/xen/arch/x86/traps.c Thu Aug 31 17:40:19 2006 +0900
@@ -1612,6 +1612,7 @@ asmlinkage void do_nmi(struct cpu_user_r
else if ( reason & 0x40 )
io_check_error(regs);
else if ( !nmi_watchdog )
+ crash_kexec(NULL);
unknown_nmi_error((unsigned char)(reason&0xff));
}
}
What do you think about it?
Best Regards,
Akio Takebe
>Hi,
>
>here is an update of the kexec/kdump patchset.
>
>Summary:
>
>* Up port to xen-unstable.hg-11296 (45f6ee334fcc)
> - kexec hypercall number fragment is now in xen-unstable
>* Make kexec_page_to_pfn and friends need to be architecture specific
> - this abstraction is needed to support ia64
>* Use kexec_page_to_pfn in machine_kexec_setup_load_arg()
> - this abstraction is needed to support ia64
>* Rename do_kexec to do_kexec_op to make it consistent with other
> hypercalls
>* Add ppc stubs
>* Add ia64 support
>
>Architectures:
>
>x86_32:
>
>Seems to be working fine
>
>x86_64:
>
>Probably working fine, but I can't test this as dom0 refuses to boot for
>me on xen-unstable-11388 (50aea0ec406b). That is, even without the
>kexec patches. I'm not sure what the problem is and I've devicided to
>get these patches out rather and investigate later.
>
>ia64:
>
>This patchset also, for the first time, includes ia64 code.
>Please note that this currently does _not_ work. I am actually
>struggling to work out why, and would really appreaciate it
>if someone could cast an eye over it.
>
>One possible area of concern is that relocate_kernel wipes out TLB
>entries. However many of the entries instated in
>arch/ia64/xen/xenasm.S:ia64_new_rr7() are not wiped. In particular,
>VHPT_ADDR, Shared info, and Map mapped_reg are not handled by
>relocate_kernel(), and the handling of current seems to be different.
>
>There are also problems with constants inside kexec_fake_sal_rendez.
>However this function probably also suffers the same problems as
>relocate_kernel. And it is easy not ro run kexec_fake_sal_rendez
>by booting xen with maxcpus=1, thus avoiding calling
>kexec_fake_sal_rendez, which is used in cpu shutdown.
>
>ppc:
>
>stubs only
>
>Patches
>
> 1. 51.1-kexec-generic-upstream.patch
> * Common code for all architectures,
> the basic plumbing for kexec/kdump
>
> 2. 51.1.1-kexec-trigger_crash_dump.patch
> * xen-console trigger crash_dump
> * Depends on 1
>
> 3. 51.2.1-kexec-x86-upstream.patch
> * Glue between 1, and 3 and 4.
> * Depends on 1
>
> 4. 51.2.1.1-kexec-x86_32-upstream.patch
> * Kexec/kdump for x86_32
> * Depends on 3 (and 1)
>
> 5. 51.2.31.2-kexec-x86_64-upstream.patch
> * Kexec/kdump for x86_64
> * Depends on 3 (and 1)
>
> 6. 51.2.2-kexec-ia64-upstream.patch
> * Kexec/kdump for ia64
> * Depends 1
>
>Discussion:
>
>Email is always good. Also my partner in crime, Magnus Damm,
>will be at Xen Summit.
>
>--
>Horms
> H: http://www.vergenet.net/~horms/
> W: http://www.valinux.co.jp/en/
next prev parent reply other threads:[~2006-08-31 8:55 UTC|newest]
Thread overview: 68+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-04-07 7:42 [PATCH]: kexec: framework and i386 Horms
2006-04-07 15:00 ` Don Zickus
2006-04-10 5:09 ` Hirokazu Takahashi
2006-04-10 15:38 ` Don Zickus
2006-04-11 1:44 ` Horms
2006-04-12 15:56 ` Don Zickus
2006-04-07 15:09 ` Gerd Hoffmann
2006-04-08 4:39 ` Horms
2006-04-12 9:12 ` Horms
2006-04-17 6:06 ` Horms
2006-04-21 1:28 ` [PATCH]: kexec: framework and i386 (Take IV) Horms
2006-04-21 6:10 ` Re: [PATCH]: kexec: framework and i386 Akio Takebe
2006-04-21 6:55 ` horms-home
2006-04-21 7:53 ` Akio Takebe
2006-04-23 14:45 ` Mark Williamson
2006-04-24 1:10 ` Akio Takebe
2006-04-24 1:53 ` Hypercall number assignment convension (was Re: Re: [PATCH]: kexec: framework and i386) Isaku Yamahata
2006-04-24 7:32 ` Keir Fraser
2006-04-24 11:20 ` Muli Ben-Yehuda
2006-04-25 0:11 ` Horms
2006-04-25 9:57 ` Keir Fraser
2006-04-26 6:08 ` [PATCH]: kexec: framework and i386 Take V Horms
2006-05-02 8:17 ` [PATCH]: kexec: framework and i386 (Take VI) Simon Horman [Horms]
2006-05-03 7:16 ` Akio Takebe
2006-05-05 1:03 ` horms
2006-05-06 8:46 ` Akio Takebe
2006-05-07 4:46 ` Horms
2006-05-07 9:45 ` Akio Takebe
2006-05-08 9:02 ` Ian Campbell
2006-05-11 11:35 ` horms
2006-05-15 8:29 ` Akio Takebe
2006-05-06 8:44 ` Akio Takebe
2006-05-07 4:45 ` Horms
2006-05-09 4:16 ` [PATCH]: kexec: framework and i386 (Take VII) Horms
2006-05-09 9:18 ` [PATCH]: kexec: framework and i386 (Take VIII) Horms
2006-05-09 13:28 ` Akio Takebe
2006-05-16 10:43 ` Akio Takebe
2006-05-16 10:44 ` Keir Fraser
2006-05-16 11:03 ` Akio Takebe
2006-05-16 12:39 ` Keir Fraser
2006-05-17 2:44 ` Horms
2006-05-17 4:53 ` Horms
2006-05-17 9:52 ` Re: [PATCH]: kexec: framework and i386 (Take IX) Horms
2006-05-17 10:10 ` Keir Fraser
2006-05-18 3:37 ` Horms
2006-05-25 7:20 ` [PATCH] kexec: framework and i386 (Take X) Horms
2006-06-05 2:53 ` Akio Takebe
2006-06-15 7:29 ` [PATCH] kexec: framework and i386 (Take XI) Horms
2006-07-11 3:39 ` [PATCH] kexec: framework and i386 (Take XII) Horms
2006-08-11 7:48 ` [PATCH] kexec: framework and i386 (Take XIII) Horms
2006-08-31 7:43 ` [PATCH] kexec: framework and i386 (Take XIV) Horms
2006-08-31 8:55 ` Akio Takebe [this message]
2006-09-01 2:56 ` Horms
2006-09-01 8:41 ` Akio Takebe
2006-09-01 8:45 ` Akio Takebe
2006-09-01 10:21 ` Horms
2006-09-04 21:45 ` Akio Takebe
2007-05-28 5:28 ` Horms
2007-05-28 6:25 ` [Xen-devel] " Akio Takebe
2007-05-29 1:05 ` Horms
2007-05-29 9:04 ` Ian Campbell
2007-05-31 10:43 ` [Xen-devel] " Akio Takebe
2007-05-31 10:49 ` Keir Fraser
2007-05-31 11:07 ` [Xen-devel] " Akio Takebe
2007-05-31 11:17 ` Akio Takebe
2006-09-05 11:43 ` [Xen-devel] " Kazuo Moriwaka
2006-09-05 13:06 ` Horms
2006-04-26 2:09 ` Hypercall number assignment convension (was Re: Re: [PATCH]: kexec: framework and i386) Isaku Yamahata
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=88C6CCDB437DC3takebe_akio@jp.fujitsu.com \
--to=takebe_akio@jp.fujitsu.com \
--cc=Keir.Fraser@cl.cam.ac.uk \
--cc=horms@verge.net.au \
--cc=m+Ian.Pratt@cl.cam.ac.uk \
--cc=magnus@valinux.co.jp \
--cc=moriwaka@valinux.co.jp \
--cc=nanhai.zou@intel.com \
--cc=xen-devel@lists.xensource.com \
--cc=xen-ia64-devel@lists.xensource.com \
--cc=yamahata@valinux.co.jp \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.