[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v4 0/9] toolstack-based approach to pvhvm guest kexec

On Wed, Dec 03, Vitaly Kuznetsov wrote:

> When a PVHVM linux guest performs kexec there are lots of things which
> require taking care of:
> - shared info, vcpu_info
> - grants
> - event channels
> - ...
> Instead of taking care of all these things we can rebuild the domain
> performing kexec from scratch doing so-called soft-reboot.

How does this approach handle ballooned pages?
From the guests point of view they are always there, just claimed by the
balloon driver. The new kernel does not have that driver nor does its
driver have the knowledge which pages the old kernel gave back to Xen.

After a brief look none of the patches seem to deal with that.


Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.