From mboxrd@z Thu Jan 1 00:00:00 1970 From: Vitaly Kuznetsov Subject: Re: [PATCH v4 0/9] toolstack-based approach to pvhvm guest kexec Date: Thu, 04 Dec 2014 15:29:12 +0100 Message-ID: <87a933ij47.fsf@vitty.brq.redhat.com> References: <1417626981-8432-1-git-send-email-vkuznets@redhat.com> <20141204111715.GA15916@aepfle.de> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mail6.bemta14.messagelabs.com ([193.109.254.103]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1XwXPi-0000A2-Bm for xen-devel@lists.xenproject.org; Thu, 04 Dec 2014 14:29:50 +0000 In-Reply-To: <20141204111715.GA15916@aepfle.de> (Olaf Hering's message of "Thu, 4 Dec 2014 12:17:15 +0100") List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Olaf Hering Cc: Wei Liu , Andrew Jones , Keir Fraser , Ian Campbell , Stefano Stabellini , Andrew Cooper , Ian Jackson , Tim Deegan , David Vrabel , Jan Beulich , xen-devel@lists.xenproject.org List-Id: xen-devel@lists.xenproject.org Olaf Hering writes: > On Wed, Dec 03, Vitaly Kuznetsov wrote: > >> Original description: >> >> When a PVHVM linux guest performs kexec there are lots of things which >> require taking care of: >> - shared info, vcpu_info >> - grants >> - event channels >> - ... >> Instead of taking care of all these things we can rebuild the domain >> performing kexec from scratch doing so-called soft-reboot. >> >> The idea was suggested by David Vrabel, Jan Beulich, and Konrad Rzeszutek Wilk. >> >> P.S. The patch series can be tested with PVHVM Linux guest with the following >> modifications: > > Its not clear to me how thew old kernel starts the new kernel. > How and where is that done? It is done by linux kernel itself, I bring nothing new into the picture. It all works like this: 1) Original guest does HYPERVISOR_sched_op(SCHEDOP_shutdown, r = { .reason = SHUTDOWN_soft_reset}) 2) All this rebuild machinery happens including copying HVM context 3) New guest resumes from where old did the hypercall 4) Kernel does kexec and new kernel is being booted. > > Olaf -- Vitaly