Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp569258ybp; Fri, 4 Oct 2019 01:11:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqww7rxMC2UxAIHJCyAgN8DGHeNOD4Ys9w8RzUN+HYdbd+j1cH3HLjGtXoa9SI5ALmfStlEl X-Received: by 2002:a17:906:9498:: with SMTP id t24mr11008422ejx.88.1570176680823; Fri, 04 Oct 2019 01:11:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570176680; cv=none; d=google.com; s=arc-20160816; b=HEAfKqq87oE1plqIaxPKdUxkOb8ncIHmc+53pkFRD59LjdXrCq1rqhi6WpEhlYkp8U kwPElD1gUiU/GH0cgkj8ehJhGXxzE5jyIUGMw0tfIup5cw8kXDoHQccPnrR3juTnpj2L pg6ljbcEWuh9qA2LPtgQDRxIOwRT8WFFjqjYPQr9qsi/aeU12n4hwmbEcg4Al8KHZL6c GEyMr4fsplAAyiQ5wpVXUFs1x0Rc3D4PhCkaWKaaHZdaO1jwDPfSQ5UELGFkSEanlcrL w7mRnQxguJv8ij3uIlDANK74Ibvdbn450BmBE03nKagdGDGjU7CotLZgS6X3e3FBOO0n ip+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=KDZUQJEICjqOZWlWvYXQ6aMRrAgxBoPmAjBPbpneq0s=; b=KHG20YIRdbb8Vly4UjM/WtFasFkcOGtVR6I9RGgMgWIB1WyXPRR2SoMpjpArVjLOTb zWnluvcB1qOaVBhWq2FRiETc83/Zr7n9Ksei4ryCu28zuqP9AfNyBsP2CdxrDlsuqwP2 AM/jtoxGiX451HBIjHF5v/HZAn5lEtan05+jZDRCcKDqNEc8aVQJ/vfJNT15ysNUET0l DB3YyFzH5r1oELalqs3MvB7wPkCf4fkE0omuCpMaQtsjtqx/d7WmVisgfjAzWMZJvw6D oTpd8aNikYpM2NNiFmE7csv8r9RhmH0lVXZKf5Q9UpS40cppB4TMLAYGMG+Fq1UmFOi6 Z/WA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b42si3095633edb.11.2019.10.04.01.10.57; Fri, 04 Oct 2019 01:11:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730740AbfJDEhv (ORCPT + 99 others); Fri, 4 Oct 2019 00:37:51 -0400 Received: from mx2.suse.de ([195.135.220.15]:57510 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726569AbfJDEhv (ORCPT ); Fri, 4 Oct 2019 00:37:51 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id B41FEADAA; Fri, 4 Oct 2019 04:37:49 +0000 (UTC) Subject: Re: [PATCH v2] x86/xen: Return from panic notifier To: Boris Ostrovsky , xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org Cc: james@dingwall.me.uk, Jan Beulich References: <20191003181203.22405-1-boris.ostrovsky@oracle.com> From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= Message-ID: <9995b9f1-3d58-7caa-9ce6-13475445d4ac@suse.com> Date: Fri, 4 Oct 2019 06:37:48 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20191003181203.22405-1-boris.ostrovsky@oracle.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03.10.19 20:12, Boris Ostrovsky wrote: > Currently execution of panic() continues until Xen's panic notifier > (xen_panic_event()) is called at which point we make a hypercall that > never returns. > > This means that any notifier that is supposed to be called later as > well as significant part of panic() code (such as pstore writes from > kmsg_dump()) is never executed. > > There is no reason for xen_panic_event() to be this last point in > execution since panic()'s emergency_restart() will call into > xen_emergency_restart() from where we can perform our hypercall. > > Nevertheless, we will provide xen_legacy_crash boot option that will > preserve original behavior during crash. This option could be used, > for example, if running kernel dumper (which happens after panic > notifiers) is undesirable. > > Reported-by: James Dingwall > Signed-off-by: Boris Ostrovsky Reviewed-by: Juergen Gross Juergen