[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Re: Oops when loading xen_platform_pci module in HVMdomain on CS 11429
Hi Ke, I also meet this opps in IA32 Non-PAE guest . Since it has no NX bit in IA32, there may be other issue. Hope this info is helpful. Did you use xen-unstable tree before changeset 11418? Changeset 11418 probably fixed your problem. Hiromichi Ito On 2006/09/08, at 10:09, Yu, Ke wrote: Steve Dobbelstein wrote:steved@xxxxxxxxxx wrote on 09/05/2006 07:56:00 PM: Digging into this further I found that the problem is that they hypercall mechanism its trying to execute the instructions for the hypercall which reside in the hypercall stubs page. However, the page table entry for the page has the _PAGE_NX (no execute) bit set. (I'm running a 64-bit OS with PAE in the HVM domain.) The error code in the oops (0x11) indicates that the page fault is because of the _PAGE_NX bit. 0x01 -> access rights violation 0x10 -> The fault was caused by an instruction fetch. I tried hacking some code to turn off the NX bit in the PTE for the hypercall stubs page, but I still get the oops. I'm thinking it's because the NX bit is set in the PMD. I'm quite new to the paging mechanism, so I'm not sure how to fix this at the moment. I'll keep poking around. thought I'd share my findings so far. Steve D.I also meet this opps in IA32 Non-PAE guest . Since it has no NX bit in IA32, there may be other issue. Hope this info is helpful.Best Regards Ke Xen version 3.0. Hypercall area is 1 pages (order 0 allocation) Unable to handle kernel paging request at virtual address 1dd9c27c printing eip: cdd9e00c *pde = 00000000 Oops: 0002 [#1] PREEMPT Modules linked in: xen_platform_pci CPU: 0 EIP: 0060:[<cdd9e00c>] Not tainted VLI EFLAGS: 00010202 (2.6.16 #3) EIP is at 0xcdd9e00c eax: 1dd9c27c ebx: 00000006 ecx: cdcffe04 edx: 00000000 esi: 00000001 edi: cdcffe08 ebp: 00000006 esp: cdcffdf4 ds: 007b es: 007b ss: 0068 Process insmod (pid: 3778, threadinfo=cdcfe000 task=cfc16530)Stack: <0>0000007b d0809f53 d080a7af cdd9c000 00000000 00000000 00000000 00000007 00000000 f3000000 0000c100 d081100e 566e6558 65584d4d 4d4d566e cfeb0900 cfeb0800 cfeb0800 f3000000 cfeb0800 d0809667 c0454b00 0000c100 00000100Call Trace: [<d0809f53>] setup_xen_features+0x43/0x90 [xen_platform_pci] [<d081100e>] init_xen_info+0xe/0xa0 [xen_platform_pci] [<d0809667>] platform_pci_init+0xf7/0x250 [xen_platform_pci] [<c012a900>] __call_usermodehelper+0x0/0x70 [<c022caea>] pci_match_device+0x2a/0x120 [<c022cc65>] __pci_device_probe+0x65/0x80 [<c022ccaf>] pci_device_probe+0x2f/0x60 [<c02940e9>] driver_probe_device+0x99/0xf0 [<c02941c0>] __driver_attach+0x0/0x70 [<c0294227>] __driver_attach+0x67/0x70 [<c029347d>] bus_for_each_dev+0x5d/0x80 [<c0294255>] driver_attach+0x25/0x30 [<c02941c0>] __driver_attach+0x0/0x70 [<c0293a84>] bus_add_driver+0x84/0xe0 [<c0294783>] driver_register+0x63/0xa0 [<c0294700>] klist_devices_get+0x0/0x10 [<c0294710>] klist_devices_put+0x0/0x10 [<c022cf65>] __pci_register_driver+0x55/0x90 [<d08110b9>] platform_pci_module_init+0x19/0x50 [xen_platform_pci] [<c0136cc2>] sys_init_module+0x132/0x200 [<c0103115>] syscall_call+0x7/0xbCode: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 04 14 46 05 00 00 00 50 06 14 46 <00> 00 00 00 50 06 14 46 00 00 00 00 00 00 00 00 00 00 00 00 00_______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |