From: David Vrabel <david.vrabel@citrix.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>,
Daniel Kiper <daniel.kiper@oracle.com>
Subject: Re: [PATCHv11 3/9] kexec: add infrastructure for handling kexec images
Date: Mon, 18 Nov 2013 11:04:00 +0000 [thread overview]
Message-ID: <5289F420.3080002@citrix.com> (raw)
In-Reply-To: <5289D8C50200007800103E4B@nat28.tlf.novell.com>
On 18/11/13 08:07, Jan Beulich wrote:
>>>> On 15.11.13 at 19:31, David Vrabel <david.vrabel@citrix.com> wrote:
>> On 15/11/13 14:35, Jan Beulich wrote:
>>>>>> On 08.11.13 at 13:50, David Vrabel <david.vrabel@citrix.com> wrote:
>>>> Add the code needed to handle and load kexec images into Xen memory or
>>>> into the crash region. This is needed for the new KEXEC_CMD_load and
>>>> KEXEC_CMD_unload hypercall sub-ops.
>>>
>>> I know it's late in the game, but just now I started getting the
>>> impression that this introduced a new limitation that needs to
>>> be taken into consideration elsewhere: With the old
>>> implementation it was the kernel's responsibility to write to
>>> the reserved space or, where Xen needed to touch the space,
>>> it did so via fixmap entries. Hence there was no need for the
>>> area to have corresponding struct page_info.
>>>
>>> The new code, however, appears to make assumptions that
>>> the memory used here is part of the range covered by the
>>> frame table, and hence setup.c's determination of the base
>>> address would need to be adjusted accordingly. (I realize
>>> that this only matters on systems having more RAM than the
>>> hypervisor can make use of.)
>>
>> The relocation code wrote the image into the crash region, not the
>> kernel, but I take your point.
>>
>> Is this a real problem or just a theoretical one for now?
>
> Not sure what "theoretical" here means - I know of actual systems
> (even if perhaps not commercially available yet) that would be
> affected by this.
The administrator has to configure the location of the crash region. I
was asking if there are systems that configure the crash region such
that it would would end in the wrong place.
It does appear that the simplest crashkernel configuration would get it
wrong. e.g., crashkernel=0-:64M
>> I don't think
>> it's unreasonable to require the crash region to be within the frame table.
>
> Right - as I assume you don't want to change all of your mapping
> code, the only alternative is for the restriction to be enforced when
> allocating the memory block.
The
map_pages_to_xen((unsigned long)__va(kexec_crash_area.start),
kexec_crash_area.start >> PAGE_SHIFT,
PFN_UP(kexec_crash_area.size), PAGE_HYPERVISOR);
call in __start_xen() suggests that this isn't a new problem.
This seems like a minor issue and if no one finds the time to fix it, I
think simply adding a release note would do.
David
next prev parent reply other threads:[~2013-11-18 11:04 UTC|newest]
Thread overview: 99+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-11-06 14:49 [PATCHv10 0/9] Xen: extend kexec hypercall for use with pv-ops kernels David Vrabel
2013-11-06 14:49 ` [PATCH 1/9] x86: give FIX_EFI_MPF its own fixmap entry David Vrabel
2013-11-06 14:49 ` David Vrabel
2013-11-06 18:49 ` Don Slutz
2013-11-06 18:49 ` [Xen-devel] " Don Slutz
2013-11-06 14:49 ` [PATCH 2/9] kexec: add public interface for improved load/unload sub-ops David Vrabel
2013-11-06 14:49 ` David Vrabel
2013-11-07 20:38 ` Don Slutz
2013-11-07 20:38 ` Don Slutz
2013-11-06 14:49 ` [PATCH 3/9] kexec: add infrastructure for handling kexec images David Vrabel
2013-11-07 20:40 ` Don Slutz
2013-11-07 20:40 ` [Xen-devel] " Don Slutz
2013-11-07 23:51 ` Don Slutz
2013-11-07 23:51 ` Don Slutz
2013-11-08 12:50 ` [PATCHv11 " David Vrabel
2013-11-11 14:37 ` Don Slutz
2013-11-15 14:35 ` Jan Beulich
2013-11-15 18:31 ` David Vrabel
2013-11-18 8:07 ` Jan Beulich
2013-11-18 11:04 ` David Vrabel [this message]
2013-11-18 11:34 ` Jan Beulich
2013-11-18 12:25 ` Daniel Kiper
2013-11-18 12:53 ` Jan Beulich
2013-11-18 13:24 ` Daniel Kiper
2013-11-18 13:43 ` Jan Beulich
2013-11-18 14:23 ` Daniel Kiper
2013-11-18 15:24 ` Jan Beulich
2013-11-18 21:50 ` Daniel Kiper
2013-11-19 12:40 ` Jan Beulich
2013-11-20 19:59 ` Daniel Kiper
2013-11-21 16:19 ` Jan Beulich
2013-11-18 11:43 ` Daniel Kiper
2013-11-06 14:49 ` [PATCH " David Vrabel
2013-11-06 14:49 ` [PATCH 4/9] kexec: extend hypercall with improved load/unload ops David Vrabel
2013-11-06 14:49 ` David Vrabel
2013-11-07 20:56 ` [Xen-devel] " Don Slutz
2013-11-07 20:56 ` Don Slutz
2013-11-06 14:49 ` [PATCH 5/9] xen: kexec crash image when dom0 crashes David Vrabel
2013-11-07 20:44 ` Don Slutz
2013-11-07 20:44 ` [Xen-devel] " Don Slutz
2013-11-06 14:49 ` David Vrabel
2013-11-06 14:49 ` [PATCH 6/9] libxc: add hypercall buffer arrays David Vrabel
2013-11-07 20:46 ` Don Slutz
2013-11-07 20:46 ` [Xen-devel] " Don Slutz
2013-11-06 14:49 ` David Vrabel
2013-11-06 14:49 ` [PATCH 7/9] libxc: add API for kexec hypercall David Vrabel
2013-11-06 14:49 ` David Vrabel
2013-11-07 20:48 ` Don Slutz
2013-11-07 20:48 ` Don Slutz
2013-11-06 14:49 ` [PATCH 8/9] x86: check kexec relocation code fits in a page David Vrabel
2013-11-06 18:51 ` [Xen-devel] " Don Slutz
2013-11-06 18:51 ` Don Slutz
2013-11-06 14:49 ` David Vrabel
2013-11-06 14:49 ` [PATCH 9/9] MAINTAINERS: Add KEXEC maintainer David Vrabel
2013-11-06 18:50 ` Don Slutz
2013-11-06 18:50 ` Don Slutz
2013-11-06 14:49 ` David Vrabel
2013-11-07 21:16 ` [PATCHv10 0/9] Xen: extend kexec hypercall for use with pv-ops kernels Daniel Kiper
2013-11-07 21:25 ` Andrew Cooper
2013-11-07 21:25 ` [Xen-devel] " Andrew Cooper
2013-11-07 21:41 ` Daniel Kiper
2013-11-07 21:57 ` Andrew Cooper
2013-11-07 21:57 ` [Xen-devel] " Andrew Cooper
2013-11-08 13:20 ` David Vrabel
2013-11-08 13:20 ` [Xen-devel] " David Vrabel
2013-11-07 21:41 ` Daniel Kiper
2013-11-08 13:13 ` David Vrabel
2013-11-08 13:13 ` David Vrabel
2013-11-08 13:19 ` Jan Beulich
2013-11-08 14:01 ` [Xen-devel] " Andrew Cooper
2013-11-08 14:22 ` Don Slutz
2013-11-08 14:22 ` [Xen-devel] " Don Slutz
2013-11-08 14:36 ` Jan Beulich
2013-11-08 14:36 ` Jan Beulich
2013-11-08 15:15 ` Daniel Kiper
2013-11-08 15:15 ` [Xen-devel] " Daniel Kiper
2013-11-08 15:42 ` Konrad Rzeszutek Wilk
2013-11-08 16:28 ` Daniel Kiper
2013-11-08 16:28 ` [Xen-devel] " Daniel Kiper
2013-11-08 15:42 ` Konrad Rzeszutek Wilk
2013-11-08 15:48 ` [Xen-devel] " Andrew Cooper
2013-11-08 15:48 ` Andrew Cooper
2013-11-08 14:01 ` Andrew Cooper
2013-11-08 13:19 ` Jan Beulich
2013-11-08 13:48 ` Daniel Kiper
2013-11-08 14:01 ` Andrew Cooper
2013-11-08 14:01 ` [Xen-devel] " Andrew Cooper
2013-11-08 13:48 ` Daniel Kiper
2013-11-08 15:04 ` Daniel Kiper
2013-11-08 15:04 ` Daniel Kiper
2013-11-09 19:18 ` Daniel Kiper
2013-11-11 14:34 ` Don Slutz
2013-11-11 14:34 ` Don Slutz
2013-11-11 15:09 ` David Vrabel
2013-11-11 15:09 ` David Vrabel
2013-11-09 19:18 ` Daniel Kiper
2013-11-07 21:16 ` Daniel Kiper
2013-11-11 17:18 ` [Xen-devel] " Keir Fraser
2013-11-11 17:18 ` Keir Fraser
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5289F420.3080002@citrix.com \
--to=david.vrabel@citrix.com \
--cc=JBeulich@suse.com \
--cc=daniel.kiper@oracle.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.