Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp93984ybh; Tue, 21 Jul 2020 17:21:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwBXkl/59ClArRb5gIyl24AoNy3hBqJXU4BwnBAIrQkTwwLUD13ZU9HT/YWON2Bw3wS6g4R X-Received: by 2002:a50:9f08:: with SMTP id b8mr25829360edf.388.1595377269412; Tue, 21 Jul 2020 17:21:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595377269; cv=none; d=google.com; s=arc-20160816; b=WjyBKvLH9HQzcDATaJZ3YG6FUj9liIb9TBjKLaF767dBNMAJG/fS4rmrOUVLxkGIjV 8Er1DDWVqy5CXU+wuezTbHGi0j9LBXY3aLNCcQt6KqbYTzu8GDoZ/aStE4OpRn5+s10Z qaa/kMwlzpStfSgnCkcjjFQPHbY9clOmijA2kkifOQ0rC6UDG2BxHLkBJSVDWxFu1/Rs pUfB16CsJT2tVc1cHqE2P81+73jKlS4ZIpQ2JvLx+6ftz4slRE+7yeg0cZQhdKU+1T/p Djyu8/uefjEIsDcv3MgztHSm4EJEZvaJcR5lmWt3dLHDpOi+q3IS/AP+EpSUGqq6jFpL 4/0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-id:mime-version:user-agent :references:message-id:in-reply-to:subject:cc:to:from:date :dkim-signature; bh=9lmsdcN092snzHqE4391VJXH+UD2Q+xjnfKdHAjmQq8=; b=jhd0r5yOgYahOazvMEKTPyoc6c7SSBmio1557I6hKkYw5gWVTnIY5snyW6nY2RbgWX deL6Mmu+ZozENBMSfFtXP+lv8rMJ/+zXTauZKmiPNN+LzUt/y0qX07sQfJF/7tV1ZJef YoQRWTW4L3HvOluQpBJFC4N/FPWXu3UWapDWXAw7i+L9kTrbnVQO2yziWs756VLC32E9 hc2MkPvcbCs0OeKn7LpcBcOJ/HO7xUQyPiT8c48wiEjH5mbMxR6y2QkU9XeiuusAHhmd 6tkbsriSRpk3bmGUCZR3Y1b6X55AaqSB5jKSIoXBnp5jnboxJ1qKSJ5yivHg5JZndNNR Xmsw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="q/rbNlzM"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e9si13111380ejj.498.2020.07.21.17.20.46; Tue, 21 Jul 2020 17:21:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="q/rbNlzM"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728973AbgGVASh (ORCPT + 99 others); Tue, 21 Jul 2020 20:18:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:34926 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726587AbgGVASg (ORCPT ); Tue, 21 Jul 2020 20:18:36 -0400 Received: from localhost (c-67-164-102-47.hsd1.ca.comcast.net [67.164.102.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 04D5F206F2; Wed, 22 Jul 2020 00:18:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1595377116; bh=VJtScx2bVukP/mlcrClwkoR4ksqhOSgVTh+yFH7IWqM=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=q/rbNlzMTu2d7h5yLJQ8MI4vWYi2LX7ozhDoYhAUPEoDZ8904PyP/6DGkZPlaa7h+ o8Fhe9tLoc59rwBt81rS8ZNb2x+kajIYiSDt6wqdK85Qfy3Jg1VyVaAQUbxbsTZyIp xLurlKmXOP87yAI9egGiQP25yNvM/MDfjaezUFq0= Date: Tue, 21 Jul 2020 17:18:34 -0700 (PDT) From: Stefano Stabellini X-X-Sender: sstabellini@sstabellini-ThinkPad-T480s To: Boris Ostrovsky cc: Anchal Agarwal , tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, x86@kernel.org, jgross@suse.com, linux-pm@vger.kernel.org, linux-mm@kvack.org, kamatam@amazon.com, sstabellini@kernel.org, konrad.wilk@oracle.com, roger.pau@citrix.com, axboe@kernel.dk, davem@davemloft.net, rjw@rjwysocki.net, len.brown@intel.com, pavel@ucw.cz, peterz@infradead.org, eduval@amazon.com, sblbir@amazon.com, xen-devel@lists.xenproject.org, vkuznets@redhat.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, dwmw@amazon.co.uk, benh@kernel.crashing.org Subject: Re: [PATCH v2 01/11] xen/manage: keep track of the on-going suspend mode In-Reply-To: <408d3ce9-2510-2950-d28d-fdfe8ee41a54@oracle.com> Message-ID: References: <20200702182136.GA3511@dev-dsk-anchalag-2a-9c2d1d96.us-west-2.amazon.com> <50298859-0d0e-6eb0-029b-30df2a4ecd63@oracle.com> <20200715204943.GB17938@dev-dsk-anchalag-2a-9c2d1d96.us-west-2.amazon.com> <0ca3c501-e69a-d2c9-a24c-f83afd4bdb8c@oracle.com> <20200717191009.GA3387@dev-dsk-anchalag-2a-9c2d1d96.us-west-2.amazon.com> <5464f384-d4b4-73f0-d39e-60ba9800d804@oracle.com> <20200721000348.GA19610@dev-dsk-anchalag-2a-9c2d1d96.us-west-2.amazon.com> <408d3ce9-2510-2950-d28d-fdfe8ee41a54@oracle.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: multipart/mixed; BOUNDARY="8323329-219213542-1595374972=:17562" Content-ID: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --8323329-219213542-1595374972=:17562 Content-Type: text/plain; CHARSET=UTF-8 Content-Transfer-Encoding: 8BIT Content-ID: On Tue, 21 Jul 2020, Boris Ostrovsky wrote: > >>>>>> +static int xen_setup_pm_notifier(void) > >>>>>> +{ > >>>>>> + if (!xen_hvm_domain()) > >>>>>> + return -ENODEV; > >>>>>> > >>>>>> I forgot --- what did we decide about non-x86 (i.e. ARM)? > >>>>> It would be great to support that however, its out of > >>>>> scope for this patch set. > >>>>> I’ll be happy to discuss it separately. > >>>> > >>>> I wasn't implying that this *should* work on ARM but rather whether this > >>>> will break ARM somehow (because xen_hvm_domain() is true there). > >>>> > >>>> > >>> Ok makes sense. TBH, I haven't tested this part of code on ARM and the series > >>> was only support x86 guests hibernation. > >>> Moreover, this notifier is there to distinguish between 2 PM > >>> events PM SUSPEND and PM hibernation. Now since we only care about PM > >>> HIBERNATION I may just remove this code and rely on "SHUTDOWN_SUSPEND" state. > >>> However, I may have to fix other patches in the series where this check may > >>> appear and cater it only for x86 right? > >> > >> > >> I don't know what would happen if ARM guest tries to handle hibernation > >> callbacks. The only ones that you are introducing are in block and net > >> fronts and that's arch-independent. > >> > >> > >> You do add a bunch of x86-specific code though (syscore ops), would > >> something similar be needed for ARM? > >> > >> > > I don't expect this to work out of the box on ARM. To start with something > > similar will be needed for ARM too. > > We may still want to keep the driver code as-is. > > > > I understand the concern here wrt ARM, however, currently the support is only > > proposed for x86 guests here and similar work could be carried out for ARM. > > Also, if regular hibernation works correctly on arm, then all is needed is to > > fix Xen side of things. > > > > I am not sure what could be done to achieve any assurances on arm side as far as > > this series is concerned. Just to clarify: new features don't need to work on ARM or cause any addition efforts to you to make them work on ARM. The patch series only needs not to break existing code paths (on ARM and any other platforms). It should also not make it overly difficult to implement the ARM side of things (if there is one) at some point in the future. FYI drivers/xen/manage.c is compiled and working on ARM today, however Xen suspend/resume is not supported. I don't know for sure if guest-initiated hibernation works because I have not tested it. > If you are not sure what the effects are (or sure that it won't work) on > ARM then I'd add IS_ENABLED(CONFIG_X86) check, i.e. > > > if (!IS_ENABLED(CONFIG_X86) || !xen_hvm_domain()) > return -ENODEV; That is a good principle to have and thanks for suggesting it. However, in this specific case there is nothing in this patch that doesn't work on ARM. From an ARM perspective I think we should enable it and &xen_pm_notifier_block should be registered. Given that all guests are HVM guests on ARM, it should work fine as is. I gave a quick look at the rest of the series and everything looks fine to me from an ARM perspective. I cannot imaging that the new freeze, thaw, and restore callbacks for net and block are going to cause any trouble on ARM. The two main x86-specific functions are xen_syscore_suspend/resume and they look trivial to implement on ARM (in the sense that they are likely going to look exactly the same.) One question for Anchal: what's going to happen if you trigger a hibernation, you have the new callbacks, but you are missing xen_syscore_suspend/resume? Is it any worse than not having the new freeze, thaw and restore callbacks at all and try to do a hibernation? --8323329-219213542-1595374972=:17562--