[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [Patch V4 14/16] xen: move p2m list if conflicting with e820 map



On 08/06/15 13:06, Juergen Gross wrote:
> Check whether the hypervisor supplied p2m list is placed at a location
> which is conflicting with the target E820 map. If this is the case
> relocate it to a new area unused up to now and compliant to the E820
> map.
> 
> As the p2m list might by huge (up to several GB) and is required to be
> mapped virtually, set up a temporary mapping for the copied list.
> 
> For pvh domains just delete the p2m related information from start
> info instead of reserving the p2m memory, as we don't need it at all.
> 
> For 32 bit kernels adjust the memblock_reserve() parameters in order
> to cover the page tables only. This requires to memblock_reserve() the
> start_info page on it's own.

This commit breaks 32-bit PV domUs.

I've dropped this whole series for now because:

a) you've clearly not tested this series enough with domUs.
b) patch #12 (mm: provide early_memremap_ro to establish read-only
mapping) is lacking an ack from an MM maintainer (sorry for not noticing
this earlier).

Please try again for 4.3.

David

[    0.050840] Unpacking initramfs...
[    0.050979] BUG: unable to handle kernel paging request at c22c2008
[    0.050986] IP: [<c128373d>] memcpy+0x1d/0x40
[    0.050992] *pdpt = 0000000001e97027 *pde = 00000000022c3067 *pte =
80000000022c2061
[    0.051002] Oops: 0003 [#1] SMP
[    0.051008] CPU: 0 PID: 1 Comm: swapper/0 Not tainted
4.1.0-rc5.davidvr #11
[    0.051013] task: df498000 ti: df492000 task.ti: df492000
[    0.051018] EIP: e019:[<c128373d>] EFLAGS: 00010206 CPU: 0
[    0.051023] EIP is at memcpy+0x1d/0x40
[    0.051027] EAX: c22c2000 EBX: 00001000 ECX: 000003fe EDX: c20ca160
[    0.051032] ESI: c20ca168 EDI: c22c2008 EBP: df493ce0 ESP: df493cd4
[    0.051037]  DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: e021
[    0.051042] CR0: 80050033 CR2: c22c2008 CR3: 016d2000 CR4: 00042660
[    0.051049] Stack:
[    0.051052]  00001000 00001000 00000000 df493d04 c1288df8 c111f6c5
df493de8 c22c2000
[    0.051062]  c22c3000 00001000 00001000 00000000 df493d58 c110a5e5
00001000 00000000
[    0.052004]  00001000 00000001 df493d44 df493d48 df498000 00000001
c146fbe0 df5a7000
[    0.052004] Call Trace:
[    0.052004]  [<c1288df8>] iov_iter_copy_from_user_atomic+0xd8/0x190
[    0.052004]  [<c111f6c5>] ? shmem_write_begin+0x55/0x90
[    0.052004]  [<c110a5e5>] generic_perform_write+0xc5/0x1a0
[    0.052004]  [<c110a852>] __generic_file_write_iter+0x192/0x1d0
[    0.052004]  [<c110a99c>] generic_file_write_iter+0x10c/0x300
[    0.052004]  [<c145e2f7>] ? __mutex_unlock_slowpath+0xb7/0x1f0
[    0.052004]  [<c10a3ae1>] ? lock_acquire+0xc1/0x240
[    0.052004]  [<c114a8f9>] __vfs_write+0xa9/0xe0
[    0.052004]  [<c114aaa0>] vfs_write+0x80/0x150
[    0.052004]  [<c11674f2>] ? __fdget+0x12/0x20
[    0.052004]  [<c114ac88>] SyS_write+0x58/0xc0
[    0.052004]  [<c162db20>] xwrite+0x27/0x53
[    0.052004]  [<c162db70>] do_copy+0x24/0xde
[    0.052004]  [<c162d6a3>] write_buffer+0x1e/0x2d
[    0.052004]  [<c162d931>] unpack_to_rootfs+0xe6/0x2ae
[    0.052004]  [<c10ad997>] ? vprintk_default+0x37/0x40
[    0.052004]  [<c162e049>] populate_rootfs+0x51/0x9b
[    0.052004]  [<c162cda4>] do_one_initcall+0x110/0x1bb
[    0.052004]  [<c162dff8>] ? maybe_link.part.1+0xe9/0xe9
[    0.052004]  [<c107c068>] ? parameq+0x18/0x70
[    0.052004]  [<c162c5ac>] ? repair_env_string+0x12/0x51
[    0.052004]  [<c162dff8>] ? maybe_link.part.1+0xe9/0xe9
[    0.052004]  [<c107c349>] ? parse_args+0x289/0x4b0
[    0.052004]  [<c14601de>] ? _raw_spin_unlock_irqrestore+0x3e/0x60
[    0.052004]  [<c1072ce3>] ? __usermodehelper_set_disable_depth+0x43/0x50


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.