[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Is: EPT violations. Was:Re: Problems with pci/vga passthrough

  • To: xen-devel@xxxxxxxxxxxxx
  • From: Diederik de Haas <didi.debian@xxxxxxxxx>
  • Date: Tue, 24 Jan 2017 16:59:41 +0100
  • Delivery-date: Tue, 24 Jan 2017 15:59:51 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>

On zondag 22 januari 2017 19:30:17 CET you wrote:
> One particular thing I noticed is that I get (something that looks like) a 
> kernel crash when booting the kernel with Xen, which I don't get when
> choosing  the GRUB option without Xen.
> See `cknowsvr01-dmesg-with-xen.txt` vs `cknowsvr01-dmesg-without-xen.txt`.

Reported it at https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852324 but 
given Ben Hutchings' reaction it seems to be a Xen problem after all.

Relevant part of earlier attached dmesg:

[   13.588386] WARNING: CPU: 18 PID: 1 at 
[   13.588388] x86/mm: Found insecure W+X mapping at address 
[   13.608867] x86/mm: Checked W+X mappings: FAILED, 4602 W+X pages found.

Attachment: signature.asc
Description: This is a digitally signed message part.

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.