On Thu, Jan 10, 2013 at 02:19:55PM +0000, David Vrabel wrote: > On 04/01/13 17:01, Daniel Kiper wrote: > > On Fri, Jan 04, 2013 at 02:38:44PM +0000, David Vrabel wrote: > >> On 04/01/13 14:22, Daniel Kiper wrote: > >>> On Wed, Jan 02, 2013 at 11:26:43AM +0000, Andrew Cooper wrote: > >>>> On 27/12/12 18:02, Eric W. Biederman wrote: > >>>>> Andrew Cooper<andrew.cooper3 at citrix.com> writes: > >>>>> > >>>>>> On 27/12/2012 07:53, Eric W. Biederman wrote: > >>>>>>> The syscall ABI still has the wrong semantics. > >>>>>>> > >>>>>>> Aka totally unmaintainable and umergeable. > >>>>>>> > >>>>>>> The concept of domU support is also strange. What does domU support even mean, when the dom0 support is loading a kernel to pick up Xen when Xen falls over. > >>>>>> There are two requirements pulling at this patch series, but I agree > >>>>>> that we need to clarify them. > >>>>> It probably make sense to split them apart a little even. > >>>>> > >>>>> > >>>> > >>>> Thinking about this split, there might be a way to simply it even more. > >>>> > >>>> /sbin/kexec can load the "Xen" crash kernel itself by issuing > >>>> hypercalls using /dev/xen/privcmd. This would remove the need for > >>>> the dom0 kernel to distinguish between loading a crash kernel for > >>>> itself and loading a kernel for Xen. > >>>> > >>>> Or is this just a silly idea complicating the matter? > >>> > >>> This is impossible with current Xen kexec/kdump interface. > >>> It should be changed to do that. However, I suppose that > >>> Xen community would not be interested in such changes. > >> > >> I don't see why the hypercall ABI cannot be extended with new sub-ops > >> that do the right thing -- the existing ABI is a bit weird. > >> > >> I plan to start prototyping something shortly (hopefully next week) for > >> the Xen kexec case. > > > > Wow... As I can this time Xen community is interested in... > > That is great. I agree that current kexec interface is not ideal. > > I spent some more time looking at the existing interface and > implementation and it really is broken. > > > David, I am happy to help in that process. However, if you wish I could > > carry it myself. Anyway, it looks that I should hold on with my > > Linux kexec/kdump patches. > > I should be able to post some prototype patches for Xen in a few weeks. > No guarantees though. That is great. If you need any help drop me a line. > > My .5 cents: > > - We should focus on KEXEC_CMD_kexec_load and KEXEC_CMD_kexec_unload; > > probably we should introduce KEXEC_CMD_kexec_load2 and KEXEC_CMD_kexec_unload2; > > load should __LOAD__ kernel image and other things into hypervisor memory; > > Yes, but I don't see how we can easily support both ABIs easily. I'd be > in favour of replacing the existing hypercalls and requiring updated > kexec tools in dom0 (this isn't that different to requiring the correct > libxc in dom0). Why? Just define new strutures for new functions of kexec hypercall. That should suffice. > > I suppose that allmost all things could be copied from linux/kernel/kexec.c, > > linux/arch/x86/kernel/{machine_kexec_$(BITS).c,relocate_kernel_$(BITS).c}; > > I think that KEXEC_CMD_kexec should stay as is, > > I don't think we want all the junk from Linux inside Xen -- we only want > to support the kdump case and do not have to handle returning from the > kexec image. I do not want to implement kexec jump or stuff like. However, I think that it is worth use code which could be used. As I know there are lot of stuff which was taken with smaller or bigger changes from Linux Kernel. Why we would like to reinvent the wheel this time? Additionally, we should not drop kexec support. It is main part of kdump. In case of kdump new kernel (and other stuff) is placed in prealocated space in contrary to kexec. That's all. kexec is useful if you would like to quickly (skipping BIOS) switch from Xen to baremetal Linux. If you drop kexec support from Xen then you need alter kexec-tools package in bunch of distros to take into account new Xen behavior. I think that it is not we want to do. > > - Hmmm... Now I think that we should still use kexec syscall to load image > > into Xen memory (with new KEXEC_CMD_kexec_load2) because it establishes > > all things which are needed to call kdump if dom0 crashes; however, > > I could be wrong... > > I don't think we need the kexec syscall. The kernel can unconditionally > do the crash hypercall, which will return if the kdump kernel isn't > loaded and the kernel can fall back to the regular non-kexec panic. No, please do not do that. When you call HYPERVISOR_kexec_op(KEXEC_CMD_kexec) system is completly shutdown. Return form HYPERVISOR_kexec_op(KEXEC_CMD_kexec) would require to restore some kernel functionalities. It maybe impossible in some cases. Additionally, it means that some changes should be made in generic kexec code path. As I know kexec maintainers are very reluctant to make such things. > This will allow the kexec syscall to be used only for the domU kexec case. > > > - last but not least, we should think about support for PV guests > > too. > > I won't be looking at this. OK. > To avoid confusion about the two largely orthogonal sorts of kexec how > about defining some terms. I suggest: > > Xen kexec: Xen executes the image in response to a Xen crash or a > hypercall from a privileged domain. > > Guest kexec: The guest kernel executes the images within the domain in > response to a guest kernel crash or a system call. OK. Daniel