From nobody Thu Apr 9 10:43:51 2026 Received: from mail-qt1-f226.google.com (mail-qt1-f226.google.com [209.85.160.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 784151DE2D8 for ; Tue, 10 Mar 2026 00:17:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.160.226 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773101835; cv=none; b=M1D31KH+TiaHi8RiSdywaki/pAo+nG4B0qkc18qA730OQ1JiYR0pmXBpdesS3783qWdzlC8TwkM9F63pHsjcZR1D70a0f2ZlRdKc/mtXU7daxhs43TKwcUBQI7ywmzvwOt3D4YaoVuKHwerjM8+5DEBeozRVkF+QKisKg26nVCc= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773101835; c=relaxed/simple; bh=Zj2gWskcTdeCbRgEtbKYU2726zg6QEH0voYcKcQfhMQ=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Yr0ZTzwf6uVZg0g0MYkPaANJt3pmTBpw+G490bMPmkf+LG0JeOZXSla2sAXjTV47hbwcPFvPjOXUtPtu5KbURd7S8cPigX1KXepjcyUtYUKhPgkgWG6ewF9r0QVIpSFgzF54WzT5Jk0QIOdvanG9VeLhcRjii1MbNThbKZ2rvY8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=broadcom.com; spf=fail smtp.mailfrom=broadcom.com; dkim=pass (1024-bit key) header.d=broadcom.com header.i=@broadcom.com header.b=JwWlAIuV; arc=none smtp.client-ip=209.85.160.226 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=broadcom.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=broadcom.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=broadcom.com header.i=@broadcom.com header.b="JwWlAIuV" Received: by mail-qt1-f226.google.com with SMTP id d75a77b69052e-509046c5c7fso29587671cf.1 for ; Mon, 09 Mar 2026 17:17:14 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1773101833; x=1773706633; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:dkim-signature:x-gm-gg :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=OiGZAwROU5TJxpiCLUT0uYKKo5HkD6AnGMRObmR/GVo=; b=UR/MlKzSYSibikehEn8+P8JgJOVjhMMU5nkCZkOtH0xiyPYLoQYfqVVm9B/TrQ0rz5 mkA5+g5lNwlqZv3IdVak+N3H5emnbnUaQ3y0EohXsjZ3uyI6+Yh0cMozbaIGLJsvOLOW OCBOvbgkGyHIeteXUPIgk9zmKy43jduH/uABAf1CpYDhKoXjcm8i07xh1ikdsMYoLABE uupHQlggJfdJ3uhu9p6WaovG4PclsUGaDrlfr5VRp4I0W4lU78Dnxp8Up/SgoZPxczXx oZ0dg53q5BqKbFIbgPVmHieQwGG3fvjZ/wB8DXK91Vl8BLqLxNnRXW8+Z93emzSfENmf LOhg== X-Forwarded-Encrypted: i=1; AJvYcCVeQOtbALEpQ/7a0iietXHJbbGUC6QZqL2682vOOvNKnsPOsy4aAbTjnmBQrcJRBFID+i6BcVUrOv+j11k=@vger.kernel.org X-Gm-Message-State: AOJu0YwDKK8O3fdCeJ7hp03nAJv//H6jLT0zHd+z2pzouzh+Y7FRYf6v YFloxhbYwnhipC6ZalgHWgdKrdqW+1pOFKHX4H/rE/Z0rpSXptAgznoOQHo2ziXytNZfEQIW6vo c7jhS+v8dN5SnE/sSYmqNml1g6niVRyjKkvEl57wbLiDuFB3DvztZH5wNElpGna/QjHoT/o3KWQ VYU5/EvpWuXChrKHWL+L4dY8C98opEMTlcgtMd5N0zw0gbbOSy+4MN0OR2krakBZBW9DZiL8I86 n0nGB1+Psqh44KP6VF59FY= X-Gm-Gg: ATEYQzznt024IKcbqsU2No9kU497UsYMG6dk3KmtqZOR+52Ud+k776X+psWQzx9nGur FvgsPRJ0HL+qUoduel5tVE3inUb76HhBw8AfvGDOJMPaPfkahhOwzlgZQjr1FQoS/A/Tim573VG mR7vxjUIHhMnT6XkW2OuQFEtk9iYlY0kW2H0S1BW1mlAFU8Hzo3AWr9Ug/7kGrE0QzfjbBW1mDP 3JTyJyUihxZuJyg0x/jpNSxs3sLLkeXgi6uYaPv/j/uLoxVcy7OBdDcoi3gGC+FWtNsrxWGCdRX 7HuLbk5rA/2lRXhK/QUOvUZITggfWtPtJmrLsHQCTpfljVarler0p+PRn1/wOeNVg/aeYuQmcxz IJzwjj/YavtT48NaADmzk6n3/uPjdvdSkQxPC9nrMT4MUIT7OAZvAT7MiP+UKTAkRJ9hLIRpBGu pBPjBHe7DRqbwuFcclc381lBTvaUmJB9WGdwFLCVoEnCUiHSD5RE2bs7lybKRZRb0= X-Received: by 2002:a05:622a:1482:b0:509:1887:23d with SMTP id d75a77b69052e-50918870e9dmr76682971cf.67.1773101833459; Mon, 09 Mar 2026 17:17:13 -0700 (PDT) Received: from smtp-us-east1-p01-i01-si01.dlp.protect.broadcom.com (address-144-49-247-102.dlp.protect.broadcom.com. [144.49.247.102]) by smtp-relay.gmail.com with ESMTPS id d75a77b69052e-508f63b43basm10908481cf.0.2026.03.09.17.17.13 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 09 Mar 2026 17:17:13 -0700 (PDT) X-Relaying-Domain: broadcom.com X-CFilter-Loop: Reflected Received: by mail-dy1-f199.google.com with SMTP id 5a478bee46e88-2be21f89332so7716906eec.0 for ; Mon, 09 Mar 2026 17:17:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; t=1773101832; x=1773706632; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=OiGZAwROU5TJxpiCLUT0uYKKo5HkD6AnGMRObmR/GVo=; b=JwWlAIuVVHA4+vZsKm58nkX+ZQNixP+lcQKJIdRP3XVt1s/62RznIpqDJ/o9rcrzPX Vic/tq0A5SENWnmDb9PMIUae5GBid2h0g3dsBxlV2a4iS1e5UQSXRiZEXzQkBP9wOOiQ 4nnjYFSv+zxwQVoxojFPmiqs8sLegl5BQ4HeE= X-Forwarded-Encrypted: i=1; AJvYcCVveFhCj2MvqpdyAHy2eYC47xDzoQL5FXatNVTIVHPYbBtmkl18QYwbueLsgciqTduLNF6HUuM8/dw8yPw=@vger.kernel.org X-Received: by 2002:a05:7300:b90b:b0:2ba:9115:2fab with SMTP id 5a478bee46e88-2be4dfef8fdmr4822976eec.12.1773101832197; Mon, 09 Mar 2026 17:17:12 -0700 (PDT) X-Received: by 2002:a05:7300:b90b:b0:2ba:9115:2fab with SMTP id 5a478bee46e88-2be4dfef8fdmr4822962eec.12.1773101831621; Mon, 09 Mar 2026 17:17:11 -0700 (PDT) Received: from amakhalov-build-vm.. ([192.19.161.250]) by smtp.gmail.com with ESMTPSA id 5a478bee46e88-2be4f948324sm12678991eec.17.2026.03.09.17.17.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 Mar 2026 17:17:11 -0700 (PDT) From: Alexey Makhalov To: x86@kernel.org, virtualization@lists.linux.dev, bp@alien8.de, hpa@zytor.com, dave.hansen@linux.intel.com, mingo@redhat.com, tglx@linutronix.de Cc: ajay.kaher@broadcom.com, brennan.lamoreaux@broadcom.com, bo.gan@broadcom.com, bcm-kernel-feedback-list@broadcom.com, linux-kernel@vger.kernel.org, kas@kernel.org, rick.p.edgecombe@intel.com, linux-coco@lists.linux.dev, Alexey Makhalov Subject: [PATCH v2 3/4] x86/vmware: Report guest crash to the hypervisor Date: Mon, 9 Mar 2026 23:52:49 +0000 Message-ID: <20260309235250.2611115-4-alexey.makhalov@broadcom.com> X-Mailer: git-send-email 2.43.7 In-Reply-To: <20260309235250.2611115-1-alexey.makhalov@broadcom.com> References: <20260307004238.1181299-1-alexey.makhalov@broadcom.com> <20260309235250.2611115-1-alexey.makhalov@broadcom.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-DetectorID-Processed: b00c1d49-9d2e-4205-b15f-d015386d3d5e Content-Type: text/plain; charset="utf-8" Register the guest crash reporter to panic_notifier_list, which will be called at panic time. Guest crash reporter will report the crash to the hypervisor through a hypercall. Co-developed-by: Brennan Lamoreaux Signed-off-by: Brennan Lamoreaux Signed-off-by: Alexey Makhalov --- arch/x86/include/asm/vmware.h | 1 + arch/x86/kernel/cpu/vmware.c | 21 +++++++++++++++++++++ 2 files changed, 22 insertions(+) diff --git a/arch/x86/include/asm/vmware.h b/arch/x86/include/asm/vmware.h index c23164503e54..bf6141353774 100644 --- a/arch/x86/include/asm/vmware.h +++ b/arch/x86/include/asm/vmware.h @@ -97,6 +97,7 @@ #define VMWARE_CMD_GETHZ 45 #define VMWARE_CMD_GETVCPU_INFO 68 #define VMWARE_CMD_STEALCLOCK 91 +#define VMWARE_CMD_REPORTGUESTCRASH 102 /* * Hypercall command mask: * bits [6:0] command, range [0, 127] diff --git a/arch/x86/kernel/cpu/vmware.c b/arch/x86/kernel/cpu/vmware.c index 9955f2ea0c84..c631e577348a 100644 --- a/arch/x86/kernel/cpu/vmware.c +++ b/arch/x86/kernel/cpu/vmware.c @@ -31,6 +31,7 @@ #include #include #include +#include #include #include #include @@ -451,6 +452,24 @@ static void __init vmware_paravirt_ops_setup(void) #define vmware_paravirt_ops_setup() do {} while (0) #endif =20 +static int vmware_report_guest_crash(struct notifier_block *self, + unsigned long action, void *data) +{ + vmware_hypercall1(VMWARE_CMD_REPORTGUESTCRASH, 0); + return 0; +} + +static struct notifier_block guest_crash_reporter =3D { + .notifier_call =3D vmware_report_guest_crash +}; + +static int __init register_guest_crash_reporter(void) +{ + atomic_notifier_chain_register(&panic_notifier_list, + &guest_crash_reporter); + + return 0; +} /* * VMware hypervisor takes care of exporting a reliable TSC to the guest. * Still, due to timing difference when running on virtual cpus, the TSC c= an @@ -545,6 +564,8 @@ static void __init vmware_platform_setup(void) vmware_set_capabilities(); =20 kmsg_dump_register(&kmsg_dumper); + + register_guest_crash_reporter(); } =20 static u8 __init get_hypercall_mode(void) --=20 2.43.7