[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] ACPI-Tables corrupted?



On 29/07/2010 08:37, "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx> wrote:

> Sorry that I didn't notice it is for crash kernel. In fact, I tried kexec
> before and never succed to bring it up.
> 
> What do you mean of "stab at disabling x2apic"? You mean we need disable
> x2apic before transfer control to crash kernel, right?
> 
> Per my understanding, with kexec, when system crash, it will jump directly to
> new kernel's entry point, no guest destroy (i.e. clean-up), not reset signal
> to cpu/chipset, right?
> If yes, another issue need be considered is VT-d. I didn't find the vt-d
> disable code in xen's kexec_crash code, if the new kernel has no idea of vt-d
> (thus does not reset the vt-d engine), it may have trouble. Or, will the kexec
> kernel not use device assigned to guest?
> 
> Of course it is ok if crash kernel support vt-d too.

A crash kernel needs to be carefully configured anyway. For example it may
not be started up on the boot processor: it gets started on whichever cpu
initiated the crash.

 K.

> Thanks
> --jyh
> 
> 
>> -----Original Message-----
>> From: Keir Fraser [mailto:keir.fraser@xxxxxxxxxxxxx]
>> Sent: Thursday, July 29, 2010 2:48 PM
>> To: Jiang, Yunhong; Juergen Gross
>> Cc: Jeremy Fitzhardinge; xen-devel@xxxxxxxxxxxxxxxxxxx; Han, Weidong
>> Subject: Re: [Xen-devel] ACPI-Tables corrupted?
>> 
>> Strictly speaking we should have a stab at disabling x2apic as well, but
>> that's harder. And not necessary for newer Linux kernels, which is what we
>> will usually be kexec'ing to anyway.
>> 
>> -- Keir
>> 
>> On 29/07/2010 07:40, "Keir Fraser" <keir.fraser@xxxxxxxxxxxxx> wrote:
>> 
>>> It's not a dom0, it's a kexec'ed crash kernel. We should be reinstating DMAR
>>> before jumping into a native kernel. I will sort out a fix.
>>> 
>>>  -- Keir
>>> 
>>> On 29/07/2010 07:31, "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx> wrote:
>>> 
>>>> A bit curios, why enable_IR_x2apic() will be called in dom0? IMO, dom0 will
>>>> not control interrupt controller, either xapic, or x2apic. Shouldn't this
>>>> be
>>>> commented out in pvops dom0?
>>>> 
>>>> What's the panic point in your environment? Is it the following code? If
>>>> yes,
>>>> that means you enable x2apic in BIOS and you can workaround this issue by
>>>> disable x2apic in BIOS.
>>>> 
>>>>         if (x2apic_preenabled)
>>>>                  panic("x2apic: enabled by BIOS but kernel init failed.");
>>>> 
>>>> Thanks
>>>> --jyh
>>>> 
>>>>> -----Original Message-----
>>>>> From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
>>>>> [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Juergen Gross
>>>>> Sent: Wednesday, July 28, 2010 8:14 PM
>>>>> To: Keir Fraser
>>>>> Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
>>>>> Subject: Re: [Xen-devel] ACPI-Tables corrupted?
>>>>> 
>>>>> On 07/28/2010 01:39 PM, Keir Fraser wrote:
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> On 28/07/2010 12:26, "Juergen Gross"<juergen.gross@xxxxxxxxxxxxxx>
>> wrote:
>>>>>> 
>>>>>>> On 07/28/2010 12:03 PM, Keir Fraser wrote:
>>>>>>>> On 28/07/2010 10:38, "Juergen Gross"<juergen.gross@xxxxxxxxxxxxxx>
>>>>> wrote:
>>>>>>>> 
>>>>>>>>> As you can see, the DMAR eye-catcher is replaced by blanks!
>>>>>>>>> This leads to a programmed panic in the crash kernel later in case of
>>>>>>>>> a
>>>>>>>>> panic in dom0...
>>>>>>>>> 
>>>>>>>>> Any ideas?
>>>>>>>>> BTW: seen in unstable AND 4.0
>>>>>>>> 
>>>>>>>> Look at the tail of xen/drivers/passthrough/vtd/dmar.c: Xen *always*
>>>>>>>> *unconditionally* trashes the DMAR so that dom0 will not parse it.
>>>>>>>> Presumably bad stuff would happen if it did.
>>>>>>> 
>>>>>>> As Dom0 is a pv-kernel, it should be able to ignore this entry.
>>>>>>> The crash kernel OTOH should not panic due to the trashed entry!
>>>>>>> What is the correct solution here?
>>>>>> 
>>>>>> Could provide a cmdline option to not nobble the DMAR?
>>>>> 
>>>>> That's a possibility.
>>>>> I wonder whether it wouldn't be better to let dom0 decide not to use it if
>>>>> running under xen. This would remove the requirement for zapping the ACPI
>>>>> table. IMO it's always a bad idea to change data of a deeper layer...
>>>>> 
>>>>>> 
>>>>>>> The crash kernel expects a valid DMAR entry, as following code in
>>>>>>> enable_IR_x2apic() suggests:
>>>>>> 
>>>>>> I don't know what that function does, nor how the error path below
>>>>>> depends
>>>>>> on DMAR. DMAR isn't mentioned in the below code.
>>>>> 
>>>>> Sorry, here a larger fragment (source arch/x86/kernel/apic/apic.c):
>>>>> 
>>>>> void __init enable_IR_x2apic(void)
>>>>> {
>>>>>         unsigned long flags;
>>>>>         struct IO_APIC_route_entry **ioapic_entries = NULL;
>>>>>         int ret, x2apic_enabled = 0;
>>>>>         int dmar_table_init_ret = 0;
>>>>> 
>>>>> #ifdef CONFIG_INTR_REMAP
>>>>>         dmar_table_init_ret = dmar_table_init();
>>>>>         if (dmar_table_init_ret)
>>>>>                 pr_debug("dmar_table_init() failed with %d:\n",
>>>>>                                 dmar_table_init_ret);
>>>>> #endif
>>>>> 
>>>>>         ioapic_entries = alloc_ioapic_entries();
>>>>>         if (!ioapic_entries) {
>>>>>                 pr_err("Allocate ioapic_entries failed\n");
>>>>>                 goto out;
>>>>>         }
>>>>> 
>>>>>         ret = save_IO_APIC_setup(ioapic_entries);
>>>>>         if (ret) {
>>>>>                 pr_info("Saving IO-APIC state failed: %d\n", ret);
>>>>>                 goto out;
>>>>>         }
>>>>> 
>>>>>         local_irq_save(flags);
>>>>>         mask_8259A();
>>>>>         mask_IO_APIC_setup(ioapic_entries);
>>>>> 
>>>>>         if (dmar_table_init_ret)
>>>>>                 ret = 0;
>>>>>         else
>>>>>                 ret = enable_IR();
>>>>> 
>>>>>         if (!ret) {
>>>>>                 /* IR is required if there is APIC ID > 255 even when
>>>>> running
>>>>>                  * under KVM
>>>>>                  */
>>>>>                 if (max_physical_apicid > 255 || !kvm_para_available())
>>>>>                         goto nox2apic;
>>>>>                 /*
>>>>>                  * without IR all CPUs can be addressed by IOAPIC/MSI
>>>>>                  * only in physical mode
>>>>>                  */
>>>>>                 x2apic_force_phys();
>>>>>         }
>>>>> 
>>>>>         x2apic_enabled = 1;
>>>>> 
>>>>>         if (x2apic_supported() && !x2apic_mode) {
>>>>>                 x2apic_mode = 1;
>>>>>                 enable_x2apic();
>>>>>                 pr_info("Enabled x2apic\n");
>>>>>         }
>>>>> 
>>>>> nox2apic:
>>>>>         if (!ret) /* IR enabling failed */
>>>>>                 restore_IO_APIC_setup(ioapic_entries);
>>>>>         unmask_8259A();
>>>>>         local_irq_restore(flags);
>>>>> 
>>>>> out:
>>>>>         if (ioapic_entries)
>>>>>                 free_ioapic_entries(ioapic_entries);
>>>>> 
>>>>>         if (x2apic_enabled)
>>>>>                 return;
>>>>> 
>>>>>         if (x2apic_preenabled)
>>>>>                 panic("x2apic: enabled by BIOS but kernel init failed.");
>>>>>         else if (cpu_has_x2apic)
>>>>>                 pr_info("Not enabling x2apic, Intr-remapping init
>>>>> failed.\n");
>>>>> }
>>>>> 
>>>>> 
>>>>> dmar_table_init() will return -ENODEV if no DMAR record is found.
>>>>> 
>>>>> 
>>>>> Juergen
>>>>> 
>>>>> --
>>>>> Juergen Gross                 Principal Developer Operating Systems
>>>>> TSP ES&S SWE OS6                       Telephone: +49 (0) 89 3222 2967
>>>>> Fujitsu Technology Solutions              e-mail:
>>>>> juergen.gross@xxxxxxxxxxxxxx
>>>>> Domagkstr. 28                           Internet: ts.fujitsu.com
>>>>> D-80807 Muenchen                 Company details:
>>>>> ts.fujitsu.com/imprint.html
>>>>> 
>>>>> _______________________________________________
>>>>> Xen-devel mailing list
>>>>> Xen-devel@xxxxxxxxxxxxxxxxxxx
>>>>> http://lists.xensource.com/xen-devel
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> Xen-devel mailing list
>>> Xen-devel@xxxxxxxxxxxxxxxxxxx
>>> http://lists.xensource.com/xen-devel
>> 
> 



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.