[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Re: [PATCH 1/2] xen/mmu: Add workaround "x86-64, mm: Put early page table high"
On Tue, May 03, 2011 at 02:20:25PM +0100, Stefano Stabellini wrote: > On Mon, 2 May 2011, Konrad Rzeszutek Wilk wrote: > > As a consequence of the commit: > > > > commit 4b239f458c229de044d6905c2b0f9fe16ed9e01e > > Author: Yinghai Lu <yinghai@xxxxxxxxxx> > > Date: Fri Dec 17 16:58:28 2010 -0800 > > > > x86-64, mm: Put early page table high > > > > it causes the Linux kernel to crash under Xen: > > > > mapping kernel into physical memory > > Xen: setup ISA identity maps > > about to get started... > > (XEN) mm.c:2466:d0 Bad type (saw 7400000000000001 != exp 1000000000000000) > > for mfn b1d89 (pfn bacf7) > > (XEN) mm.c:3027:d0 Error while pinning mfn b1d89 > > (XEN) traps.c:481:d0 Unhandled invalid opcode fault/trap [#6] on VCPU 0 > > [ec=0000] > > (XEN) domain_crash_sync called from entry.S > > (XEN) Domain 0 (vcpu#0) crashed on cpu#0: .. snip.. > > > Unless I am missing something there is no guarantee that somebody else > won't use memory in the pgt_buf_end-pgt_buf_top range when the range is > still RO before mark_rw_past_pgt() is called again. If so this code > works by coincidence, that is the reason why I didn't try to reuse the > pagetable_setup_done or the pagetable_setup_start hooks. It looks that during sequence of events after the initial pagetable is created and when we get to the post-allocator nobody is touching those pages. (also one of them - the 0-4GB pagetable has been .. made RW). But if you do find it dying/crashing, please tell so that we can revert it and use the generic work-around or revert Yinghai's patch. > In any case this code looks very ugly and fragile, do we really want to > add a workaround as bad as this one rather than reverting the original > commit? I think it creates a bad precedent. This is the second one. We had the swapper_pg_dir/initial_page_table dance in x86_32 where we mark it RO, then RW (after a cr3 load) then RO and then back to RW. (Details escape me, but it was some form of that) But I wonder how many workarounds the generic code has because of us? I think we need to setup some form of meeting with the x86 maintainers to figure out some better way of handling this. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |