From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from [222.73.24.84] (helo=song.cn.fujitsu.com) by merlin.infradead.org with esmtp (Exim 4.76 #1 (Red Hat Linux)) id 1TMYwr-0005fE-DN for kexec@lists.infradead.org; Fri, 12 Oct 2012 06:42:19 +0000 Message-ID: <5077BB7B.4030203@cn.fujitsu.com> Date: Fri, 12 Oct 2012 14:40:59 +0800 From: Zhang Yanfei MIME-Version: 1.0 Subject: [PATCH 0/3] x86: clear vmcss on all cpus when doing kdump if necessary List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: kexec-bounces@lists.infradead.org Errors-To: kexec-bounces+dwmw2=infradead.org@lists.infradead.org To: x86@kernel.org, kexec@lists.infradead.org, linux-doc@vger.kernel.org, Avi Kivity , mtosatti@redhat.com Cc: linux-kernel@vger.kernel.org, "kvm@vger.kernel.org" Currently, kdump just makes all the logical processors leave VMX operation by executing VMXOFF instruction, so any VMCSs active on the logical processors may be corrupted. But, sometimes, we need the VMCSs to debug guest images contained in the host vmcore. To prevent the corruption, we should VMCLEAR the VMCSs before executing the VMXOFF instruction. The patch set provides an alternative way to clear VMCSs related to guests on all cpus when host is doing kdump. zhangyanfei (3): x86/kexec: clear vmcss on all cpus if necessary KVM: make crash_clear_loaded_vmcss valid when kvm_intel is loaded sysctl: introduce a new interface to control kdump-vmcs-clear behaviour Documentation/sysctl/kernel.txt | 8 ++++++++ arch/x86/include/asm/kexec.h | 3 +++ arch/x86/kernel/crash.c | 23 +++++++++++++++++++++++ arch/x86/kvm/vmx.c | 9 +++++++++ kernel/sysctl.c | 10 ++++++++++ 5 files changed, 53 insertions(+), 0 deletions(-) _______________________________________________ kexec mailing list kexec@lists.infradead.org http://lists.infradead.org/mailman/listinfo/kexec