[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC/WIPv2 0/6] toolstack-based approach to pvhvm guest kexec
Ian Campbell <Ian.Campbell@xxxxxxxxxx> writes: > Hi Vitaly, > > On Wed, 2014-09-24 at 16:20 +0200, Vitaly Kuznetsov wrote: > > I assume this is targeting 4.6? Well, if 'HVM only' solution is good enough for us I think *in theory* it is still possible to make it for 4.5 (the feature is kinda separate). But I anticipate discussions and future work here so ... 4.6 is more realistic. > With the 4.5 freeze happening as we > speak many folks attention is on that, at least that's true for me (with > my toolstack hat on). If you don't hear soon perhaps ping in a couple of > weeks? Sure, thanks! > > Ian. > >> When a PVHVM linux guest performs kexec there are lots of things which >> require taking care of: >> - shared info, vcpu_info >> - grants >> - event channels >> - ... >> Instead of taking care of all these things we can rebuild the domain >> performing kexec from scratch doing so-called soft-reboot. >> >> The idea was suggested by David Vrabel, Jan Beulich, and Konrad Rzeszutek >> Wilk. >> >> Main RFC part: >> I'm not sure my suggested XENMEM_transfer op is the right way to go: >> - If we steal pages from a particular domain it should be dead as it makes no >> sense to it after such the call. >> - we need to copy all L1-L4 pages, rebuild the shared info ... for PV. This >> will result in additional complexity in libxc (rebuilding the p2m). >> - we also need to keep track of all copied L1-L4 pages for PV as we'll be >> re-creating p2m. >> >> I can see three possible ways to go: >> 1) Forbid the call for PV and remove this part from libxc. The easiest way to >> go (and PV kexec/kdump will require additional work on kernel side >> anyway). >> 2) Go ahead and rebuild p2m in libxc (similar to what we have for >> save/restore >> path). >> 3) Instead of XENMEM_transfer introduce special oneshot domain kill op which >> will follow the same domain_kill path but instead of relinquishing >> resources >> it will reassign them. I suppose it will be posible to reassign L1-L4 >> pages >> and pages from xenheap here as well. >> >> What would you say? >> >> WIP part: >> - PV support is broken. >> - Not sure huge pages will work well. >> - Not sure about ARM/PVH. >> - Not tested with qemu-upstream. >> >> P.S. The patch series can be tested with PVHVM Linux guest with the following >> modifications: >> >> diff --git a/arch/x86/xen/enlighten.c b/arch/x86/xen/enlighten.c >> index c0cb11f..33c5cdd 100644 >> --- a/arch/x86/xen/enlighten.c >> +++ b/arch/x86/xen/enlighten.c >> @@ -33,6 +33,10 @@ >> #include <linux/memblock.h> >> #include <linux/edd.h> >> >> +#ifdef CONFIG_KEXEC >> +#include <linux/kexec.h> >> +#endif >> + >> #include <xen/xen.h> >> #include <xen/events.h> >> #include <xen/interface/xen.h> >> @@ -1810,6 +1814,22 @@ static struct notifier_block xen_hvm_cpu_notifier = { >> .notifier_call = xen_hvm_cpu_notify, >> }; >> >> +#ifdef CONFIG_KEXEC >> +static void xen_pvhvm_kexec_shutdown(void) >> +{ >> + native_machine_shutdown(); >> + if (kexec_in_progress) { >> + xen_reboot(SHUTDOWN_soft_reset); >> + } >> +} >> + >> +static void xen_pvhvm_crash_shutdown(struct pt_regs *regs) >> +{ >> + native_machine_crash_shutdown(regs); >> + xen_reboot(SHUTDOWN_soft_reset); >> +} >> +#endif >> + >> static void __init xen_hvm_guest_init(void) >> { >> init_hvm_pv_info(); >> @@ -1826,6 +1846,10 @@ static void __init xen_hvm_guest_init(void) >> x86_init.irqs.intr_init = xen_init_IRQ; >> xen_hvm_init_time_ops(); >> xen_hvm_init_mmu_ops(); >> +#ifdef CONFIG_KEXEC >> + machine_ops.shutdown = xen_pvhvm_kexec_shutdown; >> + machine_ops.crash_shutdown = xen_pvhvm_crash_shutdown; >> +#endif >> } >> >> static bool xen_nopv = false; >> diff --git a/include/xen/interface/sched.h b/include/xen/interface/sched.h >> index 9ce0839..b5942a8 100644 >> --- a/include/xen/interface/sched.h >> +++ b/include/xen/interface/sched.h >> @@ -107,5 +107,6 @@ struct sched_watchdog { >> #define SHUTDOWN_suspend 2 /* Clean up, save suspend info, kill. >> */ >> #define SHUTDOWN_crash 3 /* Tell controller we've crashed. >> */ >> #define SHUTDOWN_watchdog 4 /* Restart because watchdog time expired. >> */ >> +#define SHUTDOWN_soft_reset 5 /* Soft-reset for kexec. >> */ >> >> #endif /* __XEN_PUBLIC_SCHED_H__ */ >> >> Vitaly Kuznetsov (6): >> Introduce XENMEM_transfer operation >> libxc: support XENMEM_transfer operation >> libxc: introduce soft reset >> xen: Introduce SHUTDOWN_soft_reset shutdown reason >> libxl: support SHUTDOWN_soft_reset shutdown reason >> libxl: soft reset support >> >> tools/libxc/Makefile | 1 + >> tools/libxc/xc_domain.c | 19 +++ >> tools/libxc/xc_domain_soft_reset.c | 300 >> +++++++++++++++++++++++++++++++++++++ >> tools/libxc/xenctrl.h | 6 + >> tools/libxc/xenguest.h | 19 +++ >> tools/libxl/libxl.h | 6 + >> tools/libxl/libxl_create.c | 100 +++++++++++-- >> tools/libxl/libxl_internal.h | 5 + >> tools/libxl/libxl_types.idl | 1 + >> tools/libxl/xl_cmdimpl.c | 31 +++- >> tools/python/xen/lowlevel/xl/xl.c | 1 + >> xen/common/memory.c | 178 ++++++++++++++++++++++ >> xen/common/shutdown.c | 7 + >> xen/include/public/memory.h | 32 +++- >> xen/include/public/sched.h | 3 +- >> 15 files changed, 695 insertions(+), 14 deletions(-) >> create mode 100644 tools/libxc/xc_domain_soft_reset.c >> -- Vitaly _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |