[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v4 0/9] toolstack-based approach to pvhvm guest kexec
On 11/12/14 14:24, Olaf Hering wrote: > On Wed, Dec 03, Vitaly Kuznetsov wrote: > >> When a PVHVM linux guest performs kexec there are lots of things which >> require taking care of: >> - shared info, vcpu_info >> - grants >> - event channels >> - ... >> Instead of taking care of all these things we can rebuild the domain >> performing kexec from scratch doing so-called soft-reboot. > > How does this approach handle ballooned pages? >>From the guests point of view they are always there, just claimed by the > balloon driver. The new kernel does not have that driver nor does its > driver have the knowledge which pages the old kernel gave back to Xen. > > After a brief look none of the patches seem to deal with that. Nothing special needs to be done with ballooned pages. If frames are not populated in the original domain, they will be unpopulated in the new domain. It's the responsibility of the guest to ensure it either doesn't kexec when it is ballooned or that the kexec kernel can handle this (e.g., by using a crash region that is never ballooned out). David _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |