[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v4 0/9] toolstack-based approach to pvhvm guest kexec



On 11/12/14 14:24, Olaf Hering wrote:
> On Wed, Dec 03, Vitaly Kuznetsov wrote:
> 
>> When a PVHVM linux guest performs kexec there are lots of things which
>> require taking care of:
>> - shared info, vcpu_info
>> - grants
>> - event channels
>> - ...
>> Instead of taking care of all these things we can rebuild the domain
>> performing kexec from scratch doing so-called soft-reboot.
> 
> How does this approach handle ballooned pages?
>>From the guests point of view they are always there, just claimed by the
> balloon driver. The new kernel does not have that driver nor does its
> driver have the knowledge which pages the old kernel gave back to Xen.
> 
> After a brief look none of the patches seem to deal with that.

Nothing special needs to be done with ballooned pages.  If frames are
not populated in the original domain, they will be unpopulated in the
new domain.

It's the responsibility of the guest to ensure it either doesn't kexec
when it is ballooned or that the kexec kernel can handle this (e.g., by
using a crash region that is never ballooned out).

David

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.