|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] xen: Support 64-bit PV guest receiving NMIs
On Mon, Jul 22, 2013 at 01:15:17PM +0100, David Vrabel wrote:
> On 19/07/13 16:51, Konrad Rzeszutek Wilk wrote:
> > Zhenzhong Duan sent a patch that adds some of this functionality
> > but this code adds the remaining pieces.
>
> What's this actually referring to? Which specific commits?
There were no commits. Let me rephrase it.
>
> > The kernel has the
> > logic to handle Xen-type-exceptions using the paravirt interface
> > in the assembler code (see PARAVIRT_ADJUST_EXCEPTION_FRAME -
> > pv_irq_ops.adjust_exception_frame and and INTERRUPT_RETURN -
> > pv_cpu_ops.iret).
> >
> > That means the nmi handler (and other exception handlers) use
> > the hypervisor iret.
> >
> > The other changes that would be neccessary for this would
> > be to translate the NMI_VECTOR to one of the entries on the
> > ipi_vector and make xen_send_IPI_mask_allbutself use different
> > events.
> >
> > Fortunately for us commit 1db01b4903639fcfaec213701a494fe3fb2c490b
> > (xen: Clean up apic ipi interface) implemented this and we piggyback
> > on the cleanup such that the apic IPI interface will pass the right
> > vector value for NMI.
> >
> > With this patch we can trigger NMIs within a PV guest (only tested
> > x86_64).
>
> I think you also need to test with 32-bit guests. The VCPUOP_nmi
> hypercall does not appear to be conditional on only 64-bit guest.
Hm, perhaps add a #ifdef CONFIG for that then.
>
> >
> > SysRq : Show backtrace of all active CPUs
> > sending NMI to all CPUs:
> > NMI backtrace for cpu 2
>
> Is this clutter really necessary in a commit message?
I will snip it a bit.
>
> > --- a/arch/x86/include/asm/xen/events.h
> > +++ b/arch/x86/include/asm/xen/events.h
> > @@ -7,6 +7,7 @@ enum ipi_vector {
> > XEN_CALL_FUNCTION_SINGLE_VECTOR,
> > XEN_SPIN_UNLOCK_VECTOR,
> > XEN_IRQ_WORK_VECTOR,
> > + XEN_NMI_VECTOR,
> >
> > XEN_NR_IPIS,
> > };
> > diff --git a/arch/x86/xen/enlighten.c b/arch/x86/xen/enlighten.c
> > index 2fa02bc..231382a 100644
> > --- a/arch/x86/xen/enlighten.c
> > +++ b/arch/x86/xen/enlighten.c
> > @@ -427,8 +427,7 @@ static void __init xen_init_cpuid_mask(void)
> >
> > if (!xen_initial_domain())
> > cpuid_leaf1_edx_mask &=
> > - ~((1 << X86_FEATURE_APIC) | /* disable local APIC */
> > - (1 << X86_FEATURE_ACPI)); /* disable ACPI */
> > + ~((1 << X86_FEATURE_ACPI)); /* disable ACPI */
> >
> > cpuid_leaf1_ecx_mask &= ~(1 << (X86_FEATURE_X2APIC % 32));
>
> What's this hunk for? It doesn't appear to be explained in the commit
> message.
Duh. Let me add a comment saying that for PV domU guests we need the 'local
APIC'
functionality on to be able to send NMIs.
>
> > @@ -735,8 +734,7 @@ static int cvt_gate_to_trap(int vector, const gate_desc
> > *val,
> > addr = (unsigned long)xen_int3;
> > else if (addr == (unsigned long)stack_segment)
> > addr = (unsigned long)xen_stack_segment;
> > - else if (addr == (unsigned long)double_fault ||
> > - addr == (unsigned long)nmi) {
> > + else if (addr == (unsigned long)double_fault) {
> > /* Don't need to handle these */
> > return 0;
> > #ifdef CONFIG_X86_MCE
> > @@ -747,7 +745,12 @@ static int cvt_gate_to_trap(int vector, const
> > gate_desc *val,
> > */
> > ;
> > #endif
> > - } else {
> > + } else if (addr == (unsigned long)nmi)
> > + /*
> > + * Use the native version as well.
> > + */
> > + ;
> > + else {
> > /* Some other trap using IST? */
> > if (WARN_ON(val->ist != 0))
> > return 0;
> > diff --git a/arch/x86/xen/setup.c b/arch/x86/xen/setup.c
> > index 94eac5c..f78877c 100644
> > --- a/arch/x86/xen/setup.c
> > +++ b/arch/x86/xen/setup.c
> > @@ -33,6 +33,9 @@
> > /* These are code, but not functions. Defined in entry.S */
> > extern const char xen_hypervisor_callback[];
> > extern const char xen_failsafe_callback[];
> > +#ifdef CONFIG_X86_64
> > +extern const char nmi[];
> > +#endif
> > extern void xen_sysenter_target(void);
> > extern void xen_syscall_target(void);
> > extern void xen_syscall32_target(void);
> > @@ -525,7 +528,13 @@ void __cpuinit xen_enable_syscall(void)
> > }
> > #endif /* CONFIG_X86_64 */
> > }
> > -
> > +void __cpuinit xen_enable_nmi(void)
> > +{
> > +#ifdef CONFIG_X86_64
> > + if (register_callback(CALLBACKTYPE_nmi, nmi))
> > + BUG();
> > +#endif
> > +}
> > void __init xen_arch_setup(void)
>
> Do we care about hypervisors that don't support this?
What version of them would that be ? Anything prior to 3.4 cannot
boot with the Linux pvops.
>
> Also, missing blank line.
>
> > --- a/arch/x86/xen/smp.c
> > +++ b/arch/x86/xen/smp.c
> > @@ -572,6 +572,10 @@ static inline int xen_map_vector(int vector)
> > case IRQ_WORK_VECTOR:
> > xen_vector = XEN_IRQ_WORK_VECTOR;
> > break;
> > + case NMI_VECTOR:
> > + case APIC_DM_NMI:
>
> Not clear what this APIC_DM_NMI case is for.
It is used in 'kgdb_roundup_cpus' and if you look in __prepare_ICR
the NMI_VECTOR translates that to APIC_DM_NMI.
Hm, it looks like a bug in the kgdb_roundup_cpus to actually use
that - it should use NMI_VECTOR I think.
>
> > + xen_vector = XEN_NMI_VECTOR;
> > + break;
> > default:
> > xen_vector = -1;
> > printk(KERN_ERR "xen: vector 0x%x is not implemented\n",
> > @@ -659,6 +663,7 @@ static irqreturn_t xen_irq_work_interrupt(int irq, void
> > *dev_id)
> > return IRQ_HANDLED;
> > }
> >
> > +
>
> Stray blank line added.
>
> > static const struct smp_ops xen_smp_ops __initconst = {
> > .smp_prepare_boot_cpu = xen_smp_prepare_boot_cpu,
> > .smp_prepare_cpus = xen_smp_prepare_cpus,
> > diff --git a/drivers/xen/events.c b/drivers/xen/events.c
> > index a58ac43..419cc44 100644
>
> > --- a/drivers/xen/events.c
> > +++ b/drivers/xen/events.c
> > @@ -1213,6 +1214,16 @@ EXPORT_SYMBOL_GPL(evtchn_put);
> > void xen_send_IPI_one(unsigned int cpu, enum ipi_vector vector)
> > {
> > int irq = per_cpu(ipi_to_irq, cpu)[vector];
> > +
> > + /*
> > + * In which the IRQ will be -1.
> > + */
> > + if (unlikely(vector == XEN_NMI_VECTOR)) {
> > + int rc = HYPERVISOR_vcpu_op(VCPUOP_send_nmi, cpu, NULL);
> > + if (rc < 0)
> > + printk(KERN_WARNING "Sending nmi to CPU%d failed
> > (rc:%d)\n", cpu, rc);
> > + return;
> > + }
>
> Move the assignment of irq after this block, then you can drop the
> (unhelpful) comment.
I guess? I was thinking it would be helpfull to know if it does not work.
>
> > --- a/include/xen/interface/vcpu.h
> > +++ b/include/xen/interface/vcpu.h
> > @@ -170,4 +170,6 @@ struct vcpu_register_vcpu_info {
> > };
> > DEFINE_GUEST_HANDLE_STRUCT(vcpu_register_vcpu_info);
> >
> > +/* Send an NMI to the specified VCPU. @extra_arg == NULL. */
> > +#define VCPUOP_send_nmi 11
> > #endif /* __XEN_PUBLIC_VCPU_H__ */
>
> Would it be better to get this change with a full sync of the header as
> a separate patch.
Nah, lets keep it change by change. It makes it easier to figure out
what is actually supported.
>
> David
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |