Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp547712ybd; Wed, 26 Jun 2019 02:39:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqz1gB0T4tmxBsRTGfD7PZiSK0qqCjNhzBaUxbo7OwvT5F6ZGo/8fpSOGu8YyHRj5fSXuMLa X-Received: by 2002:a17:90a:b104:: with SMTP id z4mr3600949pjq.102.1561541944547; Wed, 26 Jun 2019 02:39:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561541944; cv=none; d=google.com; s=arc-20160816; b=MOa7vMarFsBAXYYbj9QywSBGzlvixKfxJDTjuVHF7vPepTMEiTjTYCGPp9CSb0qaoI MzsyRXhmQcXI4GLPWwRFO+041apsZBOoQ1wTeeHFhwD9bI2/x5i2JSwBFUiFoRYKIFCf 4UPdiVTkMqoA8+jk/GsCQnU4nh1RprAPtgMpmGjRJM1Zs9QRUBWipxX6JyKALedBuJvB 1JpRiR8wd7tndkVLrzehHhsDe75ESyXJbVphp6AvKmP9C7Z8ydGvAvEglPlBvO4iwiBZ Se6UL3gJvadYCtJ589sEdBnUWazbw4hkKf5T+tn/BA5nVbGzrXp02rxpzTyLNC1/m88a 829Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=jx9o4fyNurNlYW0MQPVF/17swuK39ENX8eVgJIVkGis=; b=Bzbbq+SNS7DlkMmybcgWWCsOzORH0KIm/1bQP/Oe1jiiJyeyOloPlWStlDS321IN46 edR9M5BEj14hftF7bO3kUt+WHT4HyZyr5GLJXIHQt2GvfBP3toI7WnmLLKrFH3PidBby 1jNzq0cLl+Dk0jqpCri8Zy6FEVnub3haWRf1kuxMLElg79WqzChJgXQOKoD87i1QcGIw BAJ3x3Dr6zS32e/vPXgPbbgB7vl+90vJNQY0r5f+LZ9Mk7mnS8oyhEhvQgj4s76Q5+lJ Rqw7yWVL4G5HoeEeKZ9f1OhPYC6fu8eZJr1PZ3YkP7nfGnLxIkqk8dtpNuopVtSLztjL s5cA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l5si1741466pgp.16.2019.06.26.02.38.47; Wed, 26 Jun 2019 02:39:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726347AbfFZJim (ORCPT + 99 others); Wed, 26 Jun 2019 05:38:42 -0400 Received: from mx2.suse.de ([195.135.220.15]:48178 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725379AbfFZJil (ORCPT ); Wed, 26 Jun 2019 05:38:41 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 55AA1AEFD; Wed, 26 Jun 2019 09:38:40 +0000 (UTC) Subject: Re: [PATCH v2 3/7] x86: Add nopv parameter to disable PV extensions To: Zhenzhong Duan , linux-kernel@vger.kernel.org Cc: tglx@linutronix.de, mingo@kernel.org, bp@alien8.de, hpa@zytor.com, boris.ostrovsky@oracle.com, sstabellini@kernel.org, peterz@infradead.org, srinivas.eeda@oracle.com, Ingo Molnar , Jan Kiszka , xen-devel@lists.xenproject.org References: <1561377779-28036-1-git-send-email-zhenzhong.duan@oracle.com> <1561377779-28036-4-git-send-email-zhenzhong.duan@oracle.com> From: Juergen Gross Message-ID: <23b5bdee-f6b8-609b-2a52-d0b8c10a8ff8@suse.com> Date: Wed, 26 Jun 2019 11:38:39 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <1561377779-28036-4-git-send-email-zhenzhong.duan@oracle.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: de-DE Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 24.06.19 14:02, Zhenzhong Duan wrote: > In virtualization environment, PV extensions (drivers, interrupts, > timers, etc) are enabled in the majority of use cases which is the > best option. > > However, in some cases (kexec not fully working, benchmarking) > we want to disable PV extensions. As such introduce the > 'nopv' parameter that will do it. > > There are guest types which just won't work without PV extensions, > like Xen PV, Xen PVH and jailhouse. add a "ignore_nopv" member to > struct hypervisor_x86 set to true for those guest types and call > the detect functions only if nopv is false or ignore_nopv is true. > > There is already 'xen_nopv' parameter for XEN platform but not for > others. 'xen_nopv' can then be removed with this change. > > Suggested-by: Juergen Gross > Signed-off-by: Zhenzhong Duan > Cc: Thomas Gleixner > Cc: Ingo Molnar > Cc: Borislav Petkov > Cc: Jan Kiszka > Cc: Boris Ostrovsky > Cc: Stefano Stabellini > Cc: xen-devel@lists.xenproject.org Reviewed-by: Juergen Gross Juergen