WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] [PATCH 0/3] [v4] kexec and kdump for Xen PVonHVM guests

To: linux-kernel@xxxxxxxxxxxxxxx, Jeremy Fitzhardinge <jeremy@xxxxxxxx>, Konrad <konrad.wilk@xxxxxxxxxx>
Subject: [Xen-devel] [PATCH 0/3] [v4] kexec and kdump for Xen PVonHVM guests
From: Olaf Hering <olaf@xxxxxxxxx>
Date: Thu, 04 Aug 2011 18:20:53 +0200
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Thu, 04 Aug 2011 09:24:14 -0700
Dkim-signature: v=1; a=rsa-sha1; c=relaxed/relaxed; t=1312474928; l=1373; s=domk; d=aepfle.de; h=Subject:Cc:To:From:Date:X-RZG-CLASS-ID:X-RZG-AUTH; bh=eI0EqbGqnoxSVcWsfZ+H5SxDPVY=; b=mgddZvRBvNrGm8/sMJHQ2fQ9+NA3xFyhSa810tfiTGVVGVPmi+luxfTTqH7dL10CMDp iSP1vGcngrLzNB1JEjxi+x/u9mmaYIW2zypsIHdmFmXfwdXPX35hyTnQIDgoGdJVfKbK6 hxRa83oXIxTGrNHAB8P2EFGYOEGNXF5W6EA=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: quilt/0.48-16.4

The following series implements kexec and kdump in a Xen PVonHVM guest.

It is (should be) available via git:

 git://github.com/olafhering/linux.git xen-kexec-3.0

The kexec or kdump kernel has to take care of already allocated virqs,
PV devices in Closed or Connected state, and of registered watches in
the old kernel. With the three patches these conditions are checked
during boot of the new kernel rather than in the reboot/crash path.

A fixed kexec-tools-2.0.2 package is required:
http://lists.infradead.org/pipermail/kexec/2011-May/005026.html
http://lists.infradead.org/pipermail/kexec/2011-August/005339.html

Another fix is for xenstored, it has to accept the XS_INTRODUCE from a guest:
http://lists.xensource.com/archives/html/xen-devel/2011-08/msg00007.html

One open issue is the balloon driver. It removes pages from the guest
and gives them back to the hypervisor. The kexec kernel is not aware of
the fact that some pages are unavailable, and hangs or crashes.
The workaround for the time being is:

if test -f /sys/devices/system/xen_memory/xen_memory0/target -a \
        -f /sys/devices/system/xen_memory/xen_memory0/target_kb
then
    cat /sys/devices/system/xen_memory/xen_memory0/target > \
        /sys/devices/system/xen_memory/xen_memory0/target_kb
fi
kexec -e

This has to be resolved with another series of changes.

Olaf



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel