[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20140331125026.0120eef7@hananiah.suse.cz>
Date: Mon, 31 Mar 2014 12:50:26 +0200
From: Petr Tesarik <ptesarik@...e.cz>
To: "H. Peter Anvin" <hpa@...or.com>
Cc: Andrew Cooper <andrew.cooper3@...rix.com>,
"xen-devel@...ts.xensource.com" <xen-devel@...ts.xensource.com>,
"konrad.wilk@...cle.com" <konrad.wilk@...cle.com>,
Daniel Kiper <daniel.kiper@...cle.com>,
"x86@...nel.org" <x86@...nel.org>,
"kexec@...ts.infradead.org" <kexec@...ts.infradead.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"virtualization@...ts.linux-foundation.org"
<virtualization@...ts.linux-foundation.org>,
"mingo@...hat.com" <mingo@...hat.com>,
"Eric W. Biederman" <ebiederm@...ssion.com>,
"jbeulich@...e.com" <jbeulich@...e.com>,
"tglx@...utronix.de" <tglx@...utronix.de>
Subject: Re: [PATCH v2 01/11] kexec: introduce kexec_ops struct
On Thu, 22 Nov 2012 14:26:10 -0800
"H. Peter Anvin" <hpa@...or.com> wrote:
> Bullshit. This should be a separate domain.
Thanks for top-posting, hpa...
> Andrew Cooper <andrew.cooper3@...rix.com> wrote:
>
> >On 22/11/12 17:47, H. Peter Anvin wrote:
> >> The other thing that should be considered here is how utterly
> >> preposterous the notion of doing in-guest crash dumping is in a
> >system
> >> that contains a hypervisor. The reason for kdump is that on bare
> >metal
> >> there are no other options, but in a hypervisor system the right
> >thing
> >> should be for the hypervisor to do the dump (possibly spawning a
> >clean
> >> I/O domain if the I/O domain is necessary to access the media.)
> >>
> >> There is absolutely no reason to have a crashkernel sitting around in
> >
> >> each guest, consuming memory, and possibly get corrupt.
> >>
> >> -hpa
> >>
> >
> >I agree that regular guests should not be using the kexec/kdump.
> >However, this patch series is required for allowing a pvops kernel to
> >be
> >a crash kernel for Xen, which is very important from dom0/Xen's point
> >of
> >view.
In fact, a normal kernel is used for dumping, so it can handle both,
Dom0 crashes _and_ hypervisor crashes. If you wanted to address
hypervisor crashes, you'd have to allocate some space for that, too, so
you may view this "madness" as a way to conserve resources.
The memory area is reserved by the Xen hypervisor, and only the extents
are passed down to the Dom0 kernel. In other words, there is indeed no
physical mapping for this area.
Having said that, I see no reason why that physical mapping cannot be
created if it is needed.
Petr T
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists