Received: by 10.192.165.148 with SMTP id m20csp499971imm; Wed, 25 Apr 2018 03:10:09 -0700 (PDT) X-Google-Smtp-Source: AIpwx49lJxJTqX3YYqn+VUzsmSw0M5LhEeC3S0qlkTlFLEOExiGLwQmTV0MUAH3RKqLik5uTU28t X-Received: by 2002:a17:902:988d:: with SMTP id s13-v6mr27702164plp.30.1524651009493; Wed, 25 Apr 2018 03:10:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524651009; cv=none; d=google.com; s=arc-20160816; b=XFiiPYac+7VBCo5ev6bPHN9i6uqsBoAkfpv069n//XlB04zu5qmVC8ZUvx2pZnka50 CBdiXgTnbYFP/NHeNa+i1SIYI7kX9UKkwkR6NRypa3udzRdiJYiiqlMBhpAhJgpkQ1AZ mQFVv2LO8hAAeVeKpaV8fv7dBjzWuCsud2rtmKpAJMmPiA19bqYoEu3s1mL9JlPeatsv OHBtscldDAnhFxPxBjn7TV0Dp//65D/tbiX2nHMI7NoxGkM4n/kWt3KtM3lVP6iwpN64 i+zPbQ/BzXyHQ+vsO2Kfo5pnDZY4gfPHxIr+rIGxNOgEtVFFJjY5dLj4tx+WLhfeqfr/ GFlw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:message-id:subject:cc:to:from:date :arc-authentication-results; bh=aeZwI6dQWNfjtPhdqeqwaBsQS9WheqcJdj9zLbh8vsg=; b=kX+tF0skTSBIj29f1GBr2aQdMYf/LDAs5J4BlYASxUTDe+PWhEX7bd8w9MhpBsi+Uy Xwp4OrwmksTJwmtEOu0ioOp8J8uMe9WO2n44ORHtcxK1ZQv4ZUatV73iVoMwDvyx0l3H 9+3/n42HyYNLf7nYSRDBGCz05nsRAIgnlUN5OCD4CEGLjX8pFuFpRo5+l4/Jba/XS1nc jB3h9fGgWQP9edA871jjq1SSoLEuKbDsPcGik2JGBChEYhvXbjDsk5ts2MU5ZnbLuSpk tFGQgJD0xJ2BdM9ZZhT+8jbruLgYHZMLdqBw69PIdKgAUwxsynDaQZnMt/uMBi9+gYZ3 BBjg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e1si13060275pgt.423.2018.04.25.03.09.54; Wed, 25 Apr 2018 03:10:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751926AbeDYKIl (ORCPT + 99 others); Wed, 25 Apr 2018 06:08:41 -0400 Received: from mx2.suse.de ([195.135.220.15]:49045 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751451AbeDYKIj (ORCPT ); Wed, 25 Apr 2018 06:08:39 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 50D91ACDC; Wed, 25 Apr 2018 10:08:37 +0000 (UTC) Date: Wed, 25 Apr 2018 12:08:35 +0200 From: Petr Tesarik To: x86@kernel.org, Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Tom Lendacky , Borislav Petkov , Juergen Gross , Andy Lutomirski , Mikulas Patocka , Jean Delvare , Boris Ostrovsky , Dou Liyang Cc: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org Subject: [PATCH] x86: Do not reserve a crash kernel region if booted on Xen PV Message-ID: <20180425120835.23cef60c@ezekiel.suse.cz> Organization: SUSE Linux, s.r.o. X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.31; x86_64-suse-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Xen PV domains cannot shut down and start a crash kernel. Instead, the crashing kernel makes a SCHEDOP_shutdown hypercall with the reason code SHUTDOWN_crash, cf. xen_crash_shutdown() machine op in arch/x86/xen/enlighten_pv.c. A crash kernel reservation is merely a waste of RAM in this case. It may also confuse users of kexec_load(2) and/or kexec_file_load(2). When flags include KEXEC_ON_CRASH or KEXEC_FILE_ON_CRASH, respectively, these syscalls return success, which is technically correct, but the crash kexec image will never be actually used. Signed-off-by: Petr Tesarik --- arch/x86/kernel/setup.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c index 6285697b6e56..5c623dfe39d1 100644 --- a/arch/x86/kernel/setup.c +++ b/arch/x86/kernel/setup.c @@ -50,6 +50,7 @@ #include #include #include +#include #include #include @@ -534,6 +535,11 @@ static void __init reserve_crashkernel(void) high = true; } + if (xen_pv_domain()) { + pr_info("Ignoring crashkernel for a Xen PV domain\n"); + return; + } + /* 0 means: find the address automatically */ if (crash_base <= 0) { /* -- 2.13.6