[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-devel] Re: [Xen-users] rebased openSUSE Xen dom0 Patches
> > > > But that code is precisely what guarantees that the pages *can* be > > converted to page table pages (by completely unmapping them from > > the kernel image part of the address space). So your explanation is > > rather confusing than clarifying to me... > > I agree that that is the intent of this code -- what we _seem_ to > observe (and this > is hard to prove) is that the page type ref count is not being > decremented by this > code which would imply that the unmapping is not happening for some > reason. The only > real evidence I have for this is that the failure always occurs on one > of these pages. > We now think we've found the problem which seems to be due to the following two calls in Linux within mark_rodata_ro(): free_init_pages("unused kernel memory", (unsigned long) page_address(virt_to_page(text_end)), (unsigned long) page_address(virt_to_page(rodata_start))); free_init_pages("unused kernel memory", (unsigned long) page_address(virt_to_page(rodata_end)), (unsigned long) page_address(virt_to_page(data_start))); The first of these calls is trying to free the range page_address(virt_to_page(text_end)) through page_address(virt_to_page(rodata_start)). With text_end == 0xffffffff80610000 and rodata_start == 0xffffffff80800000 the actual values received by free_init_pages() are 0xffff880000610000 and 0xffff880000800000 (i.e. within the 64-bit direct mapping region). In free_init_pages() there is a test of addr >= __start_kernel_map (which is 0xffffffff80000000). Because of this test, the two calls to HYPERVISOR_update_va_mapping() are not made. The net effect (we believe) is that this range of pages is freed from Linux's viewpoint but the pages are still marked as PGT_writable_page with a non-zero page type ref count in the hypervisor. When Linux tries to use these pages later on for page table pages, the hypervisor traps. Note, we have traced all uses of the pages in question. Apparently they are never used by Linux prior to the trap. Our traces show them being initialized in the hypervisor by construct_dom0(), marked as readonly in Linux by mark_rodata_ro() and then causing the hypervisor trap when Linux tries to use one them for a page tables. Presumably the correct fix will be to change the address range test in free_init_pages... Simon _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |