[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] kexec and kdump on Xen??
Zhang, Yang Z wrote on 2014-04-15: > Daniel Kiper wrote on 2014-04-14: >> Hey, >> >> On Mon, Apr 14, 2014 at 08:15:35AM +0000, Zhang, Yang Z wrote: >>> Daniel Kiper wrote on 2014-04-14: >>>> Hi, >>>> >>>> On Mon, Apr 14, 2014 at 03:38:26AM +0000, Zhang, Yang Z wrote: >>>>> Hi Daniel >>>>> >>>>> Are kexec/kdump supported by latest Xen + upstream Linux? >>>>> I remember it only works with xen+2.6.18 linux. I know you are >>>>> working on enable it. So I wonder to know what the current status is. >> Thanks. >>>> >>>> Xen 4.4 has new kexec implementation written by David Vrabel. >>>> It does not require any specific Linux Kernel version because this >>>> implementation is self contained. However, please do not forget to >>>> use >>> >>> Cool.. >>> >>>> latest stable version of kexec-tools too. >>> >>> Is there any BKM to use it? I saw an old wiki page but not sure >>> whether it is still suitable. >> >> I assume that you are asking about kexec/kdump support in dom0. >> >> Just build kexec-tools with Xen support enabled (you must provide >> relevant Xen header files and libraries). >> Then add crashkernel argument to Xen (e.g. crashkernel=512m@64m) and >> reboot machine. Use kexec-tools like on bare metal machines. > > I am trying to kexec from Xen to Linux. But it fails to work. > ./kexec -l /boot/vmlinuz-2.6.32-358.el6.x86_64 > > kexec_load failed: Invalid argument > entry = 0x7fff6760 flags = 0x3e0000 > nr_segments = 3 > segment[0].buf = 0x138f660 > segment[0].bufsz = 0x3641 > segment[0].mem = 0x3000 > segment[0].memsz = 0x4000 > segment[1].buf = 0x7fc68badf610 > segment[1].bufsz = 0x3d8110 > segment[1].mem = 0x1000000 > segment[1].memsz = 0x3d9000 > segment[2].buf = 0x1387540 > segment[2].bufsz = 0x80e0 > segment[2].mem = 0x7fff6000 > segment[2].memsz = 0xa000 > > > Here is my environment: > Xen version: latest Xen > Xen boot command: > kernel (hd0,0)/boot/xen.gz dom0_mem=4096M loglvl=all guest_loglvl=all > conring_size=4M crashkernel=128M@64M > module (hd0,0)/boot/vmlinuz-xen o > root=UUID=03a5e7c4-b8d0-45b4-a090-c34b06821cea pci=noaer max_loop=64 > 3 debug > module (hd0,0)/boot/initrd-xen.img kexec version with Xen enabled: > kexec-tools 2.0.6 released 18 April 2014 > > Also, it shows error when trying to kexec (Xen -> Xen) ./kexec -l > /boot/xen.gz Segmentation fault (core dumped) > > BTW: kexec from Linux to Linux works well. The reason is that the first segment in my box (Actually I am using nested Xen to try) starts from 0x3000 to 0x7000, but kexec will map 0 - 1MiB unconditionally: /* * Ensure 0 - 1 MiB is mapped and accessible by the image. * * This allows access to the VGA memory and the region * purgatory copies in the crash case. */ set_xen_guest_handle(xen_segs[s].buf.h, HYPERCALL_BUFFER_NULL); xen_segs[s].buf_size = 0; xen_segs[s].dest_maddr = 0; xen_segs[s].dest_size = 1 * 1024 * 1024; Then overlap happens. Any idea? Best regards, Yang _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |