On Mon, 2023-12-11 at 17:50 -0600, Eric W. Biederman wrote: > "Gowans, James" <jgowans@xxxxxxxxxx> writes: > > > On Mon, 2023-12-11 at 09:54 +0200, James Gowans wrote: > > > > > > > > What problem are you running into with your rebase that worked with > > > > reboot notifiers that is not working with syscore_shutdown? > > > > > > Prior to this commit [1] which changed KVM from reboot notifiers to > > > syscore_ops, KVM's reboot notifier shutdown callback was invoked on > > > kexec via kernel_restart_prepare. > > > > > > After this commit, KVM is not being shut down because currently the > > > kexec flow does not call syscore_shutdown. > > > > I think I missed what you're asking here; you're asking for a reproducer > > for the specific failure? > > > > 1. Launch a QEMU VM with -enable-kvm flag > > > > 2. Do an immediate (-f flag) kexec: > > kexec -f --reuse-cmdline ./bzImage > > > > Somewhere after doing the RET to new kernel in the relocate_kernel asm > > function the new kernel starts triple faulting; I can't exactly figure > > out where but I think it has to do with the new kernel trying to modify > > CR3 while the VMXE bit is still set in CR4 causing the triple fault. > > > > If KVM has been shut down via the shutdown callback, or alternatively if > > the QEMU process has actually been killed first (by not doing a -f exec) > > then the VMXE bit is clear and the kexec goes smoothly. > > > > So, TL;DR: kexec -f use to work with a KVM VM active, now it goes into a > > triple fault crash. > > You mentioned I rebase so I thought your were backporting kernel patches. > By rebase do you mean you porting your userspace to a newer kernel? I've been working on some patches and when I rebased my work-in-progress patches to latest master then kexec stopped working when KVM VMs exist. Originally the WIP patches were based on an older stable version. > > In any event I believe the bug with respect to kexec was introduced in > commit 6f389a8f1dd2 ("PM / reboot: call syscore_shutdown() after > disable_nonboot_cpus()"). That is where syscore_shutdown was removed > from kernel_restart_prepare(). > > At this point it looks like someone just needs to add the missing > syscore_shutdown call into kernel_kexec() right after > migrate_to_reboot_cpu() is called. Seems good and I'm happy to do that; one thing we need to check first: are all CPUs online at that point? The commit message for 6f389a8f1dd2 ("PM / reboot: call syscore_shutdown() after disable_nonboot_cpus()") speaks about: "one CPU on-line and interrupts disabled" when syscore_shutdown is called. KVM's syscore shutdown hook does: on_each_cpu(hardware_disable_nolock, NULL, 1); ... so that smells to me like it wants all the CPUs to be online at kvm_shutdown point. It's not clear to me: 1. Does hardware_disable_nolock actually need to be done on *every* CPU or would the offlined ones be fine to ignore because they will be reset and the VMXE bit will be cleared that way? With cooperative CPU handover we probably do indeed want to do this on every CPU and not depend on resetting. 2. Are CPUs actually offline at this point? When that commit was authored there used to be a call to hardware_disable_nolock() but that's not there anymore. > > That said I am not seeing the reboot notifiers being called on the kexec > path either so your issue with kvm might be deeper. Previously it was called via: kernel_kexec kernel_restart_prepare blocking_notifier_call_chain(&reboot_notifier_list, SYS_RESTART, cmd); kvm_shutdown JG _______________________________________________ kexec mailing list kexec@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/kexec