Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp514961ybn; Wed, 2 Oct 2019 01:39:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqyJiX0ZcXXrdin1+v0jBc6iWG6yFYzoC7XaxP2zUCaff0cUGK36052oBym9PXKnvwpVpvWq X-Received: by 2002:aa7:d803:: with SMTP id v3mr2516699edq.146.1570005597591; Wed, 02 Oct 2019 01:39:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570005597; cv=none; d=google.com; s=arc-20160816; b=ch+V33k6QW19rXmYXTedVnXibfDuJ69bnd21c5htzdXhjarsf6p/Qn43oHfOUMr4Od /BxYtfW1k05drrx1CGKbPqypvZ83pBahNp1qLgR7LZ6tGDVwsY7uWKY2KvJtNY4DJTsg 9Q96J/GNIKJ6+0QCKcKmWE8oXGdjxS0/2Pxwo1x1V8o9aNfcdLTpRTNzf/a/mf80RDG8 C30xXDgZ6tymbDz74JFFAS3M29m1Lo5jqFHAiXhOo8rPDsv3XZH49QZWCMiNdMIhQZsI DGlQFo/niC8b6TSqpLNUrZO4NI7+tNlI+7xUGJGCE96AzBrv//uqq+bsFt/I6FVmXm50 f3iQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=o43A5nRKXTQZKFNu2N+TbSl83rTTT5ThjU2zO/hS+gE=; b=v4plD2kIWr4B75Um+1zCgwEhWoR84BvM+pZGDTQC673JOlvvQH6QYVKAEsNiuqmZf4 f6gRLEUXTFd85aGfl/a/LDLSxJYOh6AsBZWK/RdcFgJAxv1AgZqAAr403KVyJ5lahH++ 1ad6ZcvLycHLXqbRa66eYMtcbY4uZqZ9oRGoRyISiI8HRbHJ9U8VFnOOxbKZAD/HbGrF T075+xDsKphSCF3oqvoeUlosaRBVMN4V5AKe5K2yfN5MruMX43H0+UqhFTAiIlxAfhBn HtC+W4CDo4oJrxzlP9KmzpJoc8rhgnnI2l/NX0guAV0Befo5Yo1yLrARAHKZSVx26Gwt iJGQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g22si11278228eda.27.2019.10.02.01.39.32; Wed, 02 Oct 2019 01:39:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726434AbfJBHkG (ORCPT + 99 others); Wed, 2 Oct 2019 03:40:06 -0400 Received: from mx2.suse.de ([195.135.220.15]:60654 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725852AbfJBHkG (ORCPT ); Wed, 2 Oct 2019 03:40:06 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 6A720ACFE; Wed, 2 Oct 2019 07:40:04 +0000 (UTC) Subject: Re: [Xen-devel] [PATCH] x86/xen: Return from panic notifier To: Boris Ostrovsky Cc: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, james@dingwall.me.uk, Juergen Gross References: <20191001151633.1659-1-boris.ostrovsky@oracle.com> From: Jan Beulich Message-ID: <9b3f955c-ad76-601f-2b58-fa9dc4608c72@suse.com> Date: Wed, 2 Oct 2019 09:40:11 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: <20191001151633.1659-1-boris.ostrovsky@oracle.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01.10.2019 17:16, Boris Ostrovsky wrote: > Currently execution of panic() continues until Xen's panic notifier > (xen_panic_event()) is called at which point we make a hypercall that > never returns. > > This means that any notifier that is supposed to be called later as > well as significant part of panic() code (such as pstore writes from > kmsg_dump()) is never executed. Back at the time when this was introduced into the XenoLinux tree, I think this behavior was intentional for at least DomU-s. I wonder whether you wouldn't want your change to further distinguish Dom0 and DomU behavior. > There is no reason for xen_panic_event() to be this last point in > execution since panic()'s emergency_restart() will call into > xen_emergency_restart() from where we can perform our hypercall. Did you consider, as an alternative, to lower the notifier's priority? Jan