From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755442Ab2CGKxU (ORCPT ); Wed, 7 Mar 2012 05:53:20 -0500 Received: from serv2.oss.ntt.co.jp ([222.151.198.100]:35631 "EHLO serv2.oss.ntt.co.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753303Ab2CGKxS (ORCPT ); Wed, 7 Mar 2012 05:53:18 -0500 Message-ID: <4F573E1C.2060909@oss.ntt.co.jp> Date: Wed, 07 Mar 2012 19:53:16 +0900 From: =?ISO-8859-1?Q?Fernando_Luis_V=E1zquez_Cao?= User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:10.0.2) Gecko/20120216 Thunderbird/10.0.2 MIME-Version: 1.0 To: "Eric W. Biederman" CC: Don Zickus , linux-tip-commits@vger.kernel.org, Yinghai Lu , mingo@elte.hu, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, mingo@redhat.com, hpa@zytor.com, akpm@linux-foundation.org, torvalds@linux-foundation.org, tglx@linutronix.de, vgoyal@redhat.com Subject: Re: [tip:x86/debug] x86/kdump: No need to disable ioapic/ lapic in crash path References: <20120216172735.GX9751@redhat.com> <20120216215603.GH9751@redhat.com> <20120217195430.GO9751@redhat.com> <20120220151419.GU9751@redhat.com> <20120221135934.GF26998@redhat.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/01/2012 08:19 AM, Eric W. Biederman wrote: > Don Zickus writes: >> It probably is, except I never hacked on idt code before and my assembly >> isn't that good. I have been trying to find examples to copy from to give >> it a try. So far I was using early_idt_handlers with early_printk to see >> if I could capture some printk messages while jumping from the first >> kernel to the second kernel (when the other early_idt_handlers would kick >> in for the second kernel). >> >> Tips? Better examples? > That is a particularly good example. When I took a quick look earlier > that is the first place we reload the idt in the kernel boot so that is > one of two places that needs to be modified. Hi Eric, Don Sorry for chiming in so late. We run into the same NMI problems and wrote some patches that tackle the kernel boot side of things. They have been extensively tested using qemu-kvm and things seem to be working as expected (after receiving an early NMI the kernel continues without problem; after the iret there is no stack corruption or register corruption). I will be replying to this email with the patches. Thanks, Fernando