With debug=y, Xen calls map_pages_to_xen() to remap its own page
tables. On pae builds, the pte writes are nonatomic. This causes Xen
to crash under kvm (and presumably under other shadow page table caching
VMMs), because after the first half of the pte update, the code under
eip is no longer accessible. It's also possible under bare metal if an
SMI arrives exactly at the wrong moment, and in addition that SMI
flushes the tlb.
Fix by using atomic pte writes. With this, xen pae debug=y boots under kvm.
Reported by Jeremy Fitzhardinge <jeremy@xxxxxxxx>.
Signed-off-by: Avi Kivity <avi@xxxxxxxxxxxx>
--
error compiling committee.c: too many arguments to function
diff -r 039daabebad5 xen/arch/x86/mm.c
--- a/xen/arch/x86/mm.c Fri Apr 13 16:07:48 2007 +0100
+++ b/xen/arch/x86/mm.c Sun Apr 15 18:36:59 2007 +0300
@@ -3454,14 +3454,14 @@ int map_pages_to_xen(
l1e_write(&pl1e[i],
l1e_from_pfn(l2e_get_pfn(*pl2e) + i,
l2e_get_flags(*pl2e) & ~_PAGE_PSE));
- l2e_write(pl2e, l2e_from_pfn(virt_to_mfn(pl1e),
+ l2e_write_atomic(pl2e, l2e_from_pfn(virt_to_mfn(pl1e),
__PAGE_HYPERVISOR));
local_flush_tlb_pge();
}
pl1e = l2e_to_l1e(*pl2e) + l1_table_offset(virt);
ol1e = *pl1e;
- l1e_write(pl1e, l1e_from_pfn(mfn, flags));
+ l1e_write_atomic(pl1e, l1e_from_pfn(mfn, flags));
if ( (l1e_get_flags(ol1e) & _PAGE_PRESENT) )
local_flush_tlb_one(virt);
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|