Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756727AbcLPAwB (ORCPT ); Thu, 15 Dec 2016 19:52:01 -0500 Received: from mail-dm3nam03on0139.outbound.protection.outlook.com ([104.47.41.139]:7882 "EHLO NAM03-DM3-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754171AbcLPAvw (ORCPT ); Thu, 15 Dec 2016 19:51:52 -0500 From: KY Srinivasan To: Vitaly Kuznetsov , Olaf Hering CC: "gregkh@linuxfoundation.org" , "linux-kernel@vger.kernel.org" , "devel@linuxdriverproject.org" Subject: RE: move hyperv CHANNELMSG_UNLOAD from crashed kernel to kdump kernel Thread-Topic: move hyperv CHANNELMSG_UNLOAD from crashed kernel to kdump kernel Thread-Index: AQHSUGcX2rMR2fVQK0y/0wJ0y+Ek/aEI2raigAAB/YCAAAWhAYAAINGAgAAKNcOAAAZvAIAAC5FDgACsyVA= Date: Fri, 16 Dec 2016 00:51:51 +0000 Message-ID: References: <20161207085110.GC1618@aepfle.de> <87r3594hef.fsf@vitty.brq.redhat.com> <20161215103402.GA6336@aepfle.de> <87mvfx4g4y.fsf@vitty.brq.redhat.com> <20161215125139.GC6336@aepfle.de> <87bmwd490b.fsf@vitty.brq.redhat.com> <20161215135111.GD6336@aepfle.de> <87vaul2rgi.fsf@vitty.brq.redhat.com> In-Reply-To: <87vaul2rgi.fsf@vitty.brq.redhat.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=kys@microsoft.com; x-originating-ip: [131.107.147.197] x-ms-office365-filtering-correlation-id: f62eaeae-9b4f-4f7d-2738-08d4254db8f8 x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:DM5PR03MB2490; x-microsoft-exchange-diagnostics: 1;DM5PR03MB2490;7:nSF2rzfRdkXYbKCPKqA3aMUSxj0QsIlxHe+Bi+i3SBSXkwDPxUPyl3mR1b1579e7a2U9GKYG5EbiY62jkZo+J0i7qDujZM990KMs6gerOWF2ZXv/aiTt6Qwe+0KVEdwSpcJvJ0iF8WpnwGOg3UBkNKxNKzXWCDH3tM8/dkUBPw6zJ5jfBBr1ilLIbnEe1piBiR7hVoWuAt2QcjgYJ0M0vlyLy9A6dOQjph4f5loRUK9Cd0tCLuyQ5PzyhLuA8dbvJ6K/0WvsiQS2/XmEINxknIVJ1NEqJkaoobaC1R1JrH2ZSFMTTrsJyMbVFKSwoaikMhMtbKcEGAnHUR5BciRf3qOrh+m8R2dI20pBhIIogi8ACRIu0YPUjy5GhC0r/VTVmnlrv9Rl2aFQDgI6nTuWKq4QgtmNr93Ywk88tnnTXGVE7qwXOs5Pqep8669kDbBODwmFV9usyDYgopR+5/ikRcvFQDDv3sN6a7JZ9CBNoJQ= x-o365eop-header: O365_EOP: Allow for Unauthenticated Relay x-o365ent-eop-header: Message processed by - O365_ENT: Allow from ranges (Engineering ONLY) x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(9452136761055); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(61425038)(6040375)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(6055026)(61426038)(61427038)(6041248)(20161123562025)(20161123558021)(20161123564025)(20161123560025)(20161123555025)(6047074)(6072148);SRVR:DM5PR03MB2490;BCL:0;PCL:0;RULEID:;SRVR:DM5PR03MB2490; x-forefront-prvs: 01583E185C x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(6009001)(7916002)(39840400002)(39850400002)(39450400003)(39860400002)(39410400002)(199003)(13464003)(377454003)(189002)(24454002)(76176999)(81166006)(229853002)(8676002)(9686002)(38730400001)(68736007)(92566002)(99286002)(86612001)(76576001)(3280700002)(106356001)(101416001)(2900100001)(2906002)(122556002)(25786008)(6506006)(4326007)(77096006)(106116001)(86362001)(8936002)(3660700001)(7736002)(74316002)(33656002)(189998001)(102836003)(8990500004)(6436002)(66066001)(6116002)(81156014)(10090500001)(105586002)(305945005)(3846002)(7696004)(97736004)(5001770100001)(50986999)(5660300001)(10290500002)(2950100002)(5005710100001)(54356999)(93886004);DIR:OUT;SFP:1102;SCL:1;SRVR:DM5PR03MB2490;H:DM5PR03MB2490.namprd03.prod.outlook.com;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Dec 2016 00:51:51.0511 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB2490 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by mail.home.local id uBG0q4qB014883 Content-Length: 1643 Lines: 46 > -----Original Message----- > From: Vitaly Kuznetsov [mailto:vkuznets@redhat.com] > Sent: Thursday, December 15, 2016 6:32 AM > To: Olaf Hering > Cc: KY Srinivasan ; gregkh@linuxfoundation.org; linux- > kernel@vger.kernel.org; devel@linuxdriverproject.org > Subject: Re: move hyperv CHANNELMSG_UNLOAD from crashed kernel to > kdump kernel > > Olaf Hering writes: > > > On Thu, Dec 15, Vitaly Kuznetsov wrote: > > > >> vmbus_wait_for_unload() may be receiving a message (not necessarily > the > >> CHANNELMSG_UNLOAD_RESPONSE, we may see some other message) > on the same > >> CPU it runs and in this case wrmsrl() makes sense. In other cases it > >> does nothing (neither good nor bad). > > > > If that other cpu has interrupts disabled it may not process a pending > > msg (the response may be stuck in the host queue?), and the loop can not > > kick the other cpus queue if a wrmsrl is just valid for the current cpu. > > If thats true, the response will not arrive in the loop. > > > > In case interrupts get permanently disabled on the CPU which is supposed > to receive the CHANNELMSG_UNLOAD_RESPONSE message *and* there is > some > other message pedning in the slot for that CPU we'll hang. We may try to > overcome this by sending NMIs but this is getting more and more > complicated... > > I'd like to see a simple fix from Hyper-V host team: always deliver > CHANNELMSG_UNLOAD_RESPONSE reply to the cpu which sent > CHANNELMSG_UNLOAD > request. This would allow us to remove all the craziness. Agreed; I will give this feedback to the Hyper-V guys. K. Y > > -- > Vitaly