[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4F4E0299.9080800@redhat.com>
Date: Wed, 29 Feb 2012 12:48:57 +0200
From: Avi Kivity <avi@...hat.com>
To: Gleb Natapov <gleb@...hat.com>
CC: Wen Congyang <wency@...fujitsu.com>,
kvm list <kvm@...r.kernel.org>,
KAMEZAWA Hiroyuki <kamezawa.hiroyu@...fujitsu.com>,
"Daniel P. Berrange" <berrange@...hat.com>,
linux-kernel@...r.kernel.org, qemu-devel <qemu-devel@...gnu.org>
Subject: Re: [PATCH] kvm: notify host when guest paniced
On 02/29/2012 12:44 PM, Gleb Natapov wrote:
> > > >
> > > Yes, crash can be so severe that it is not even detected by a kernel
> > > itself, so not OOPS message even printed. But in most cases if kernel is
> > > functional enough to print OOPS it is functional enough to call single
> > > hypercall instruction.
> >
> > Why not print the oops to virtio-serial? Or even just a regular serial
> > port? That's what bare metal does.
> >
> The more interface is complex the more chances it will fail during
> panic. Regular serial is likely more reliable than virtio-serial.
> Hypercall is likely more reliable than uart. On serial user can
> fake panic notification.
The serial device is under control of the kernel, so the user can only
access it if the kernel so allows.
> Can this be problematic?
>From the point of view of the guest, yes, it can generate support calls
in fill up the admin's dump quota. From the point of view of the host,
there's no difference between the guest's admin and a random user.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists