[PATCHv4 0/8] kexec: extend kexec hypercall for use with pv-ops kernels

Daniel Kiper daniel.kiper at oracle.com
Wed Apr 17 08:34:37 EDT 2013


On Tue, Apr 16, 2013 at 06:13:02PM +0100, David Vrabel wrote:
> The series improves the kexec hypercall by making Xen responsible for
> loading and relocating the image.  This allows kexec to be usable by
> pv-ops kernels and should allow kexec to be usable from a HVM or PVH
> privileged domain.
>
> This has now missed the code freeze deadline but could it be
> considered for 4.3 anyway?  kexec isn't a core piece of functionality
> and I see minimal risk of introducing regressions to Xen as a whole
> with this series.
>
> The first patch is a simple clean-up.
>
> The second patch allows hypercall structures to be ABI compatible
> between 32- and 64-bit guests (by reusing stuff present for domctls
> and sysctls).  This seems better than having to keep adding compat
> handling for new hypercalls etc.
>
> Patch 3 introduces the new ABI.
>
> Patch 4 and 5 nearly completely reimplement the kexec load, unload and
> exec sub-ops.  The old load_v1 sub-op is then implemented on top of
> the new code.
>
> Patch 6 calls the kexec image when dom0 crashes.  This avoids having
> to alter dom0 kernels to do a exec sub-op call on crash -- a
> SHUTDOWN_crash by dom0 will trigger the kexec.
>
> Patches 7 and 8 add the libxc API for the kexec calls.  These have
> been acked-by Ian Campbell already.
>
> The required patch series for kexec-tools have previously been posted
> and this series has been rebased on the latest kexec-tools and is
> available from the xen-v3 branch of:
>
> http://xenbits.xen.org/gitweb/?p=people/dvrabel/kexec-tools.git;a=summary

kexec -e still does not work. I see in my console:

I'm in purgatory
sha256 digests do not match :(
...

Daniel



More information about the kexec mailing list