From: Ian Campbell <ian.campbell@citrix.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: Olaf Hering <olaf@aepfle.de>, Wei Liu <wei.liu2@citrix.com>,
Stefano Stabellini <stefano.stabellini@eu.citrix.com>,
Andrew Cooper <andrew.cooper3@citrix.com>,
Julien Grall <julien.grall@linaro.org>,
Ian Jackson <ian.jackson@eu.citrix.com>,
Andrew Jones <drjones@redhat.com>, Tim Deegan <tim@xen.org>,
David Vrabel <david.vrabel@citrix.com>,
xen-devel@lists.xenproject.org,
Vitaly Kuznetsov <vkuznets@redhat.com>,
Keir Fraser <keir@xen.org>,
Daniel De Graaf <dgdegra@tycho.nsa.gov>
Subject: Re: [PATCH RFC 1/4] xen: evtchn: make evtchn_reset() ready for soft reset
Date: Fri, 5 Jun 2015 09:58:48 +0100 [thread overview]
Message-ID: <1433494728.7108.141.camel@citrix.com> (raw)
In-Reply-To: <55717F5202000078000812C7@mail.emea.novell.com>
On Fri, 2015-06-05 at 09:52 +0100, Jan Beulich wrote:
> >>> On 04.06.15 at 17:47, <tim@xen.org> wrote:
> > At 16:19 +0100 on 04 Jun (1433434780), David Vrabel wrote:
> >> On 04/06/15 15:05, Tim Deegan wrote:
> >> > At 15:35 +0200 on 03 Jun (1433345719), Vitaly Kuznetsov wrote:
> >> >> We need to close all event channel so the domain performing soft reset
> >> >> will be able to open them back. Interdomain channels are, however,
> >> >> special. We need to keep track of who opened it as in (the most common)
> >> >> case it was opened by the control domain we won't be able (and allowed) to
> >> >> re-establish it.
> >> >
> >> >
> >> > I'm not sure I understand -- can you give an example of what this is
> >> > avoiding? I would have thought that the kexec'ing VM needs to tear
> >> > down _all_ its connections and then restart the ones it wantrs in the
> >> > new OS.
> >>
> >> There are some that are in state ECS_UNBOUND (console, xenstore, I
> >> think) at start of day that are allocated on behalf of the domain by the
> >> toolstack. The kexec'd image will expect them in these same state.
> >
> > I see. But does that not come under "tear down all its connections
> > and then restart the ones it wants"? I.e. should the guest not reset
> > all its channels and then allocate fresh console & xenstore ones?
>
> But just like during boot the guest doesn't (and can't) created these,
> it also can't do so after kexec. The remote side needs to be set up
> for it, so it can simply bind to them. I don't think this can work without
> tool stack involvement.
Which IIRC is pretty much the logic which lead to the more toolstack
centric approach in the other series. Are you suggesting something in
the middle?
next prev parent reply other threads:[~2015-06-05 8:59 UTC|newest]
Thread overview: 39+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-06-03 13:35 [PATCH RFC 0/4] 'reset everything' approach to PVHVM guest kexec Vitaly Kuznetsov
2015-06-03 13:35 ` [PATCH RFC 1/4] xen: evtchn: make evtchn_reset() ready for soft reset Vitaly Kuznetsov
2015-06-04 14:05 ` Tim Deegan
2015-06-04 15:19 ` David Vrabel
2015-06-04 15:47 ` Tim Deegan
2015-06-05 8:52 ` Jan Beulich
2015-06-05 8:58 ` Ian Campbell [this message]
2015-06-05 9:07 ` Jan Beulich
2015-06-08 14:10 ` Jan Beulich
2015-06-08 15:05 ` Vitaly Kuznetsov
2015-06-03 13:35 ` [PATCH RFC 2/4] xen: grant_table: implement grant_table_soft_reset() Vitaly Kuznetsov
2015-06-04 14:11 ` Tim Deegan
2015-06-04 15:22 ` David Vrabel
2015-06-04 15:44 ` Tim Deegan
2015-06-08 14:26 ` Jan Beulich
2015-06-08 14:58 ` Vitaly Kuznetsov
2015-06-08 15:35 ` Jan Beulich
2015-06-03 13:35 ` [PATCH RFC 3/4] xen: implement SCHEDOP_soft_reset Vitaly Kuznetsov
2015-06-08 14:31 ` Jan Beulich
2015-06-22 16:00 ` Vitaly Kuznetsov
2015-06-22 16:06 ` Jan Beulich
2015-06-22 16:24 ` Vitaly Kuznetsov
2015-06-23 7:13 ` Jan Beulich
2015-06-23 12:10 ` Vitaly Kuznetsov
2015-06-23 12:52 ` Jan Beulich
2015-06-03 13:35 ` [PATCH RFC 4/4] xen: arch-specific hooks for domain_soft_reset() Vitaly Kuznetsov
2015-06-04 14:19 ` Tim Deegan
2015-06-22 9:44 ` Vitaly Kuznetsov
2015-06-25 9:57 ` Tim Deegan
2015-06-08 15:32 ` Jan Beulich
2015-06-08 15:59 ` Vitaly Kuznetsov
2015-06-04 14:22 ` [PATCH RFC 0/4] 'reset everything' approach to PVHVM guest kexec Tim Deegan
2015-06-08 15:38 ` Ian Jackson
2015-06-08 15:53 ` Wei Liu
2015-06-08 17:43 ` Wei Liu
2015-06-09 8:19 ` Dave Scott
2015-06-09 9:29 ` Wei Liu
2015-06-09 9:38 ` Wei Liu
2015-06-09 10:02 ` Dave Scott
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1433494728.7108.141.camel@citrix.com \
--to=ian.campbell@citrix.com \
--cc=JBeulich@suse.com \
--cc=andrew.cooper3@citrix.com \
--cc=david.vrabel@citrix.com \
--cc=dgdegra@tycho.nsa.gov \
--cc=drjones@redhat.com \
--cc=ian.jackson@eu.citrix.com \
--cc=julien.grall@linaro.org \
--cc=keir@xen.org \
--cc=olaf@aepfle.de \
--cc=stefano.stabellini@eu.citrix.com \
--cc=tim@xen.org \
--cc=vkuznets@redhat.com \
--cc=wei.liu2@citrix.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.