[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2.1] hvmloader: indicate dynamically allocated memory as ACPI NVS in e820


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Igor Druzhinin <igor.druzhinin@xxxxxxxxxx>
  • Date: Fri, 4 Sep 2020 12:49:09 +0100
  • Authentication-results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
  • Cc: <xen-devel@xxxxxxxxxxxxxxxxxxxx>, <andrew.cooper3@xxxxxxxxxx>, <roger.pau@xxxxxxxxxx>, <wl@xxxxxxx>, <iwj@xxxxxxxxxxxxxx>
  • Delivery-date: Fri, 04 Sep 2020 11:49:36 +0000
  • Ironport-sdr: 23QSXyPBW+PDd2+Ntza60esVbL7czRC2ZZOFKkPM7KLx20ivB6BDKtmczad+W2UyAEmYt8Zf5K dIPELTp1e2hx4JWvBrM59EwBU6025bKIJZZwM7quXilePOr4PJqHDvzAMhqAaDRBcTk4VZUk0M 9UkCpGo/G+BMJDN4ehrxSNAPjzPnRYC3t03OPxH5RSif2jNmlaO1RDUlM3JxnS91ZpUvWdWZI+ 0qyRjpLNg87DUO7P3O22jtOK2fDA2NM/6p5uB2t+Hu/Ayl6cNSFNRswCWyo/iObt17swtGoxMO w8k=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 04/09/2020 09:33, Jan Beulich wrote:
> On 01.09.2020 04:50, Igor Druzhinin wrote:
>> Guest kernel does need to know in some cases where the tables are located
>> to treat these regions properly. One example is kexec process where
>> the first kernel needs to pass firmware region locations to the second
>> kernel which is now a requirement after 02a3e3cdb7f12 ("x86/boot: Parse SRAT
>> table and count immovable memory regions").
> 
> I'm still struggling with the connection here: Reserved regions
> surely are "immovable" too, aren't they? 

"Immovable" regions here are RAM that doesn't go away by hot-unplug. That change
was necessary in Linux to avoid image randomized placement to these regions.

> Where's the connection to
> the E820 map in the first place - the change cited above is entirely
> about SRAT? And I can't imagine kexec getting away with passing on
> ACPI NVS regions, but not reserved ones.
> 

They got away with it for as long as kexec exists I think. The point was that
those reserved regions were not accessed during early boot as long as kexec 
kernel stays
at transition tables. Now ACPI portion of it is accessed which highlighted our
imprecise reporting of memory layout to the guest - which I think should be 
fixed
either way.

I'm not going to argue if reserved regions should be mapped to transition 
tables or
not - I don't think it's important in context related to this patch. There were
already several kernel releases without that mappings and those also should be 
able
to invoke kdump.

Igor



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.