[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] KEXEC: disable hpet legacy broadcasts earlier


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: Keir Fraser <keir.xen@xxxxxxxxx>
  • Date: Thu, 18 Aug 2011 14:47:20 +0100
  • Cc:
  • Delivery-date: Thu, 18 Aug 2011 06:48:06 -0700
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: AcxdrVmMcbqv7VC8MUGiCpCoOLxu3A==
  • Thread-topic: [Xen-devel] [PATCH] KEXEC: disable hpet legacy broadcasts earlier

On 18/08/2011 14:31, "Andrew Cooper" <andrew.cooper3@xxxxxxxxxx> wrote:

> On x2apic machines which booted in xapic mode,
> hpet_disable_legacy_broadcast() sends an event check IPI to all online
> processors.  This leads to a protection fault as the genapic blindly
> pokes x2apic MSRs while the local apic is in xapic mode.
> 
> One option is to change genapic when we shut down the local apic, but
> there are still problems with trying to IPI processors in the online
> processor map which are actually sitting in NMI loops
> 
> Another option is to have each CPU take itself out of the online CPU
> map during the NMI shootdown.
> 
> Realistically however, disabling hpet legacy broadcasts earlier in the
> kexec path is the easiest fix to the problem.

This for 4.1.2 as well I guess?

> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> 
> diff -r fc2be6cb89ad -r dcb3ed7b7dbd xen/arch/x86/crash.c
> --- a/xen/arch/x86/crash.c Tue Aug 16 15:05:55 2011 +0100
> +++ b/xen/arch/x86/crash.c Thu Aug 18 14:30:32 2011 +0100
> @@ -29,6 +29,7 @@
>  #include <asm/io_apic.h>
>  #include <xen/iommu.h>
>  #include <xen/pci.h>
> +#include <asm/hpet.h>
>  
>  static atomic_t waiting_for_crash_ipi;
>  static unsigned int crashing_cpu;
> @@ -61,6 +62,9 @@ static void nmi_shootdown_cpus(void)
>  
>      local_irq_disable();
>  
> +    if ( hpet_broadcast_is_available() )
> +        hpet_disable_legacy_broadcast();
> +
>      crashing_cpu = smp_processor_id();
>      local_irq_count(crashing_cpu) = 0;
>  
> diff -r fc2be6cb89ad -r dcb3ed7b7dbd xen/arch/x86/machine_kexec.c
> --- a/xen/arch/x86/machine_kexec.c Tue Aug 16 15:05:55 2011 +0100
> +++ b/xen/arch/x86/machine_kexec.c Thu Aug 18 14:30:32 2011 +0100
> @@ -85,9 +85,6 @@ void machine_kexec(xen_kexec_image_t *im
>          .limit = LAST_RESERVED_GDT_BYTE
>      };
>  
> -    if ( hpet_broadcast_is_available() )
> -        hpet_disable_legacy_broadcast();
> -
>      /* We are about to permenantly jump out of the Xen context into the kexec
>       * purgatory code.  We really dont want to be still servicing interupts.
>       */
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.