From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andrew Cooper Subject: Re: kexec: Clear notes during setup Date: Fri, 4 May 2012 16:39:28 +0100 Message-ID: <4FA3F830.1050304@citrix.com> References: <4FA3C0A5.7030309@citrix.com> <4FA3ECF90200007800081A71@nat28.tlf.novell.com> <4FA3F364.5050105@citrix.com> <4FA410F00200007800081B86@nat28.tlf.novell.com> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="------------080707010503030902060200" Return-path: In-Reply-To: <4FA410F00200007800081B86@nat28.tlf.novell.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Jan Beulich Cc: "Keir (Xen.org)" , "xen-devel@lists.xen.org" List-Id: xen-devel@lists.xenproject.org --------------080707010503030902060200 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit On 04/05/12 16:25, Jan Beulich wrote: >>>> On 04.05.12 at 17:19, Andrew Cooper wrote: >> On 04/05/12 13:51, Jan Beulich wrote: >>>>>> On 04.05.12 at 13:42, Andrew Cooper wrote: >>>> I know that xen-unstable is on a feature freeze, and this is not >>>> strictly a bugfix (yet; see below), but as it is safe and designed to >>>> help clarity in the case of a crash, so I request that it be considered >>>> for inclusion. >>>> >>>> I have constructed an artificial case where the information reported in >>>> 1 per-cpu crash note was stale by using low_crashinfo mode, crashing >>>> Xen, allowing it to reboot, offlining a CPU then re-crashing Xen. This >>>> leaves stale register state written into the offlined CPU crash >>>> information. In this case, the information was stale but correct, due >>>> to the predictable nature of the Xen crash path from the 'C' debug key, >>>> but there is no guarantee that in the case of a real crash, the same >>>> will still be true. >>> Apart from the missing blanks in the for() statement (which could as >>> well be a simple memset() afaict), >>> Acked-by: Jan Beulich >>> >>> I personally would think that this can go in as a bug fix. >>> >>> Jan >> How would you format the for loop differently? (Not that I mind - just >> so I know for next time) > for ( i = 0; i < (crash_heap_size >> PAGE_SHIFT); ++i ) Ok - refreshed the patch as such > >> As for clear_page vs memset - clear_page is faster, and liable to be >> conditionally tuned more in the future. > Certainly, but does this matter here? > > Jan > crash_heap_size scales linearly with the number of PCPUs on the system, so very large boxes might start noticing a difference in boot speed. (Probably not in the grand scheme of things, but as we are explicitly allocating pages, it makes sense to clear them as pages) -- Andrew Cooper - Dom0 Kernel Engineer, Citrix XenServer T: +44 (0)1223 225 900, http://www.citrix.com --------------080707010503030902060200 Content-Type: text/x-patch; name="kexec-clear-notes.patch" Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="kexec-clear-notes.patch" # HG changeset patch # Parent 98fe3b2a572d4ffe704124e75c7aa8d94dbb51bc kexec: clear notes during setup Explicity zero the memory backing the crash notes during setup. This allows the crash environment to be rather more certain whether the crash notes were actually written, rather than trusting that the memory was clear beforehand. Signed-off-by: Andrew Cooper diff -r 98fe3b2a572d xen/common/kexec.c --- a/xen/common/kexec.c +++ b/xen/common/kexec.c @@ -401,7 +401,7 @@ static int kexec_init_cpu_notes(const un /* If we dont care about the position of allocation, malloc. */ if ( low_crashinfo_mode == LOW_CRASHINFO_NONE ) - note = xmalloc_bytes(nr_bytes); + note = xzalloc_bytes(nr_bytes); /* Protect the write into crash_notes[] with a spinlock, as this function * is on a hotplug path and a hypercall path. */ @@ -505,7 +505,7 @@ static int __init kexec_init(void) if ( low_crashinfo_mode > LOW_CRASHINFO_NONE ) { - size_t crash_heap_size; + size_t crash_heap_size, i; /* This calculation is safe even if the machine is booted in * uniprocessor mode. */ @@ -520,6 +520,9 @@ static int __init kexec_init(void) if ( ! crash_heap_current ) return -ENOMEM; + for ( i = 0; i < (crash_heap_size >> PAGE_SHIFT); ++i ) + clear_page(crash_heap_current + (i << PAGE_SHIFT)); + crash_heap_end = crash_heap_current + crash_heap_size; } --------------080707010503030902060200 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel --------------080707010503030902060200--