On Tue, Apr 16, 2013 at 06:13:02PM +0100, David Vrabel wrote: > The series improves the kexec hypercall by making Xen responsible for > loading and relocating the image. This allows kexec to be usable by > pv-ops kernels and should allow kexec to be usable from a HVM or PVH > privileged domain. > > This has now missed the code freeze deadline but could it be > considered for 4.3 anyway? kexec isn't a core piece of functionality > and I see minimal risk of introducing regressions to Xen as a whole > with this series. > > The first patch is a simple clean-up. > > The second patch allows hypercall structures to be ABI compatible > between 32- and 64-bit guests (by reusing stuff present for domctls > and sysctls). This seems better than having to keep adding compat > handling for new hypercalls etc. > > Patch 3 introduces the new ABI. > > Patch 4 and 5 nearly completely reimplement the kexec load, unload and > exec sub-ops. The old load_v1 sub-op is then implemented on top of > the new code. > > Patch 6 calls the kexec image when dom0 crashes. This avoids having > to alter dom0 kernels to do a exec sub-op call on crash -- a > SHUTDOWN_crash by dom0 will trigger the kexec. > > Patches 7 and 8 add the libxc API for the kexec calls. These have > been acked-by Ian Campbell already. > > The required patch series for kexec-tools have previously been posted > and this series has been rebased on the latest kexec-tools and is > available from the xen-v3 branch of: > > http://xenbits.xen.org/gitweb/?p=people/dvrabel/kexec-tools.git;a=summary kexec -e still does not work. I see in my console: I'm in purgatory sha256 digests do not match :( ... Daniel