linux-arm-kernel.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: vkuznets@redhat.com (Vitaly Kuznetsov)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v11 5/5] xen/arm: account for stolen ticks
Date: Fri, 06 Nov 2015 14:25:40 +0100	[thread overview]
Message-ID: <87egg3p8dn.fsf@vitty.brq.redhat.com> (raw)
In-Reply-To: <20151106115916.GA23038@leverpostej> (Mark Rutland's message of "Fri, 6 Nov 2015 11:59:16 +0000")

Mark Rutland <mark.rutland@arm.com> writes:

> On Fri, Nov 06, 2015 at 11:41:49AM +0000, David Vrabel wrote:
>> On 06/11/15 11:39, Stefano Stabellini wrote:
>> > On Thu, 5 Nov 2015, Mark Rutland wrote:
>> >>>  static void xen_percpu_init(void)
>> >>>  {
>> >>>  	struct vcpu_register_vcpu_info info;
>> >>> @@ -104,6 +120,8 @@ static void xen_percpu_init(void)
>> >>>  	BUG_ON(err);
>> >>>  	per_cpu(xen_vcpu, cpu) = vcpup;
>> >>>  
>> >>> +	xen_setup_runstate_info(cpu);
>> >>
>> >> Does the runstate memory area get unregsitered when a kernel tears
>> >> things down, or is kexec somehow inhibited for xen guests?
>> >>
>> >> i couldn't spot either happening, but I may have missed it.
>> > 
>> > I don't think that the runstate memory area needs to be unregistered for
>> > kexec, but I am not very knowledgeble on kexec and Xen, CC'ing Vitaly
>> > and David.
>> 
>> There's a whole pile of other state needing to be reset for kexec (event
>> channels and grant tables for example).  The guest needs to soft reset
>> itself (available in Xen 4.6) before kexec'ing another kernel.
>> 
>> This soft reset would also including cleaning up this shared memory region.
>
> Ok. So we don't currently have the code kernel-side, but it looks like
> it would be relatively simple to add (having just spotted [1])

already merged in 4.3 and several stable trees.

> , and everything should be ready on the Xen side.`
>

Yes, but for x86 only. arch_domain_soft_reset() is -ENOSYS for ARM
now. It should be relatively easy to implement, one should unmap
shared_info page and do some GIC cleanup (if it's needed at all). I'd be
happy to help if someone's interested but unfortunately I don't have ARM
hardware to test at this moment...

> Thanks,
> Mark.
>
> [1] https://lkml.org/lkml/2015/9/25/152

-- 
  Vitaly

  reply	other threads:[~2015-11-06 13:25 UTC|newest]

Thread overview: 31+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-11-05 15:33 [PATCH v11 0/5] xen/arm/arm64: CONFIG_PARAVIRT and stolen ticks accounting Stefano Stabellini
2015-11-05 15:34 ` [PATCH v11 1/5] xen: move xen_setup_runstate_info and get_runstate_snapshot to drivers/xen/time.c Stefano Stabellini
2015-11-05 16:48   ` Mark Rutland
2015-11-06 11:11     ` Stefano Stabellini
2015-11-06 12:00       ` Mark Rutland
2015-11-05 15:34 ` [PATCH v11 2/5] missing include asm/paravirt.h in cputime.c Stefano Stabellini
2015-11-05 16:40   ` Peter Zijlstra
2015-11-05 17:30     ` Stefano Stabellini
2015-11-09 17:36       ` Peter Zijlstra
2015-11-10 11:27         ` Stefano Stabellini
2015-11-10 12:19           ` Peter Zijlstra
2015-11-05 15:34 ` [PATCH v11 3/5] arm: introduce CONFIG_PARAVIRT, PARAVIRT_TIME_ACCOUNTING and pv_time_ops Stefano Stabellini
2015-11-10 14:12   ` Stefano Stabellini
2015-11-20 14:31     ` Stefano Stabellini
2015-11-20 14:36       ` Christopher Covington
2015-11-20 14:40         ` Stefano Stabellini
2015-11-20 16:47           ` Russell King - ARM Linux
2015-11-20 17:16             ` Stefano Stabellini
2015-11-05 15:34 ` [PATCH v11 4/5] arm64: " Stefano Stabellini
2015-11-10 14:11   ` Stefano Stabellini
2015-11-17 17:29     ` Will Deacon
2015-11-17 17:34       ` Marc Zyngier
2015-11-17 17:35         ` Will Deacon
2015-11-20 12:19           ` Stefano Stabellini
2015-11-05 15:34 ` [PATCH v11 5/5] xen/arm: account for stolen ticks Stefano Stabellini
2015-11-05 16:57   ` Mark Rutland
2015-11-06 11:39     ` Stefano Stabellini
2015-11-06 11:41       ` David Vrabel
2015-11-06 11:59         ` Mark Rutland
2015-11-06 13:25           ` Vitaly Kuznetsov [this message]
2015-11-06 13:19         ` Vitaly Kuznetsov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87egg3p8dn.fsf@vitty.brq.redhat.com \
    --to=vkuznets@redhat.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).