From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753121AbZF3RA5 (ORCPT ); Tue, 30 Jun 2009 13:00:57 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752484AbZF3RAr (ORCPT ); Tue, 30 Jun 2009 13:00:47 -0400 Received: from out02.mta.xmission.com ([166.70.13.232]:49701 "EHLO out02.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752483AbZF3RAq (ORCPT ); Tue, 30 Jun 2009 13:00:46 -0400 To: Gleb Natapov Cc: Yinghai Lu , linux-kernel@vger.kernel.org, Suresh Siddha , Sheng Yang , "kvm\@vger.kernel.org" , "avi\@redhat.com" References: <20090630064515.GG20289@redhat.com> <86802c440906300018p8c5156dy3e8d84b8c263797e@mail.gmail.com> <20090630155820.GC8122@redhat.com> From: ebiederm@xmission.com (Eric W. Biederman) Date: Tue, 30 Jun 2009 10:00:46 -0700 In-Reply-To: <20090630155820.GC8122@redhat.com> (Gleb Natapov's message of "Tue\, 30 Jun 2009 18\:58\:20 +0300") Message-ID: User-Agent: Gnus/5.11 (Gnus v5.11) Emacs/22.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-XM-SPF: eid=;;;mid=;;;hst=in01.mta.xmission.com;;;ip=76.21.114.89;;;frm=ebiederm@xmission.com;;;spf=neutral X-SA-Exim-Connect-IP: 76.21.114.89 X-SA-Exim-Rcpt-To: gleb@redhat.com, avi@redhat.com, kvm@vger.kernel.org, sheng@linux.intel.com, suresh.b.siddha@intel.com, linux-kernel@vger.kernel.org, yhlu.kernel@gmail.com X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-DCC: XMission; sa01 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: ;Gleb Natapov X-Spam-Relay-Country: X-Spam-Report: * -1.8 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.0 T_TM2_M_HEADER_IN_MSG BODY: T_TM2_M_HEADER_IN_MSG * -2.6 BAYES_00 BODY: Bayesian spam probability is 0 to 1% * [score: 0.0000] * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa01 1397; Body=1 Fuz1=1 Fuz2=1] * 0.0 XM_SPF_Neutral SPF-Neutral * 0.4 UNTRUSTED_Relay Comes from a non-trusted relay Subject: Re: [PATCH v4] enable x2APIC without interrupt remapping under KVM X-SA-Exim-Version: 4.2.1 (built Thu, 25 Oct 2007 00:26:12 +0000) X-SA-Exim-Scanned: Yes (on in01.mta.xmission.com) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Gleb Natapov writes: > On Tue, Jun 30, 2009 at 12:18:19AM -0700, Yinghai Lu wrote: >> how about kexec second kernel in KVM ? >> >> x2apic_preenabled will be set in second kernel. >> > By the way anybody knows why kexec does not use BIOS reset code > (cmos 0xf offset) to jump into new kernel after hard reset? After a hard reset. That simply isn't possible. A hard reset clears everything even memory. You might be able to get a full cpu reset but not a reset of the I/O devices. The premise of kexec is that we are doing things on our own, and don't get a 3rd piece of software involved that has not been heavily tested on the path we want to use. Occassionally it is a pain to do everything ourselves but at least when we do and we test it we know it is going to work. Cpu designers lately seem fond of adding features that require all kind of coordination to turn on and off. We handle the hardware virtualization mode features now, and if x2apic has similar problems being turned on and off I am certain we can handle that case in a similar fashion. When we can my preference is to keep code like that out of the kexec on panic path if we can figure out how to write the software to do something reasonable. Once we figure out how to work without putting the interrupt controllers in legacy mode to handle the timer interrupts I expect all kinds of things will become simpler. Eric