From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Vrabel Subject: Re: [PATCH RFC 1/4] xen: evtchn: make evtchn_reset() ready for soft reset Date: Thu, 4 Jun 2015 16:19:40 +0100 Message-ID: <55706C8C.6090607@citrix.com> References: <1433338522-8422-1-git-send-email-vkuznets@redhat.com> <1433338522-8422-2-git-send-email-vkuznets@redhat.com> <20150604140556.GF74656@deinos.phlegethon.org> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mail6.bemta14.messagelabs.com ([193.109.254.103]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1Z0Wxg-0008Bi-U1 for xen-devel@lists.xenproject.org; Thu, 04 Jun 2015 15:21:41 +0000 In-Reply-To: <20150604140556.GF74656@deinos.phlegethon.org> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Tim Deegan , Vitaly Kuznetsov Cc: Andrew Jones , Keir Fraser , Ian Campbell , Stefano Stabellini , Andrew Cooper , Julien Grall , Ian Jackson , Olaf Hering , David Vrabel , Jan Beulich , xen-devel@lists.xenproject.org, Wei Liu , Daniel De Graaf List-Id: xen-devel@lists.xenproject.org On 04/06/15 15:05, Tim Deegan wrote: > At 15:35 +0200 on 03 Jun (1433345719), Vitaly Kuznetsov wrote: >> We need to close all event channel so the domain performing soft reset >> will be able to open them back. Interdomain channels are, however, >> special. We need to keep track of who opened it as in (the most common) >> case it was opened by the control domain we won't be able (and allowed) to >> re-establish it. > > > I'm not sure I understand -- can you give an example of what this is > avoiding? I would have thought that the kexec'ing VM needs to tear > down _all_ its connections and then restart the ones it wantrs in the > new OS. There are some that are in state ECS_UNBOUND (console, xenstore, I think) at start of day that are allocated on behalf of the domain by the toolstack. The kexec'd image will expect them in these same state. David