[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Qemu-devel] e1000 memory corruption in guest OS
From: |
Hoyer, David |
Subject: |
Re: [Qemu-devel] e1000 memory corruption in guest OS |
Date: |
Mon, 24 Feb 2014 14:15:29 +0000 |
Yes - we found this late last week and it did fix our issue. Thanks!
-----Original Message-----
From: Paolo Bonzini [mailto:address@hidden On Behalf Of Paolo Bonzini
Sent: Monday, February 24, 2014 8:02 AM
To: Hoyer, David; address@hidden
Cc: Moyer, Keith; Best, Tish
Subject: Re: e1000 memory corruption in guest OS
Il 16/02/2014 05:29, Hoyer, David ha scritto:
> We are using Qemu-1.7.0 with Xen-4.3.0 and Debian jessie. We are
> noticing that when we transfer large files from our network to the
> guestOS via the e1000 virtual network device that we experience memory
> corruption on the guestOS. We have debugged this problem and have
> determined where it appears that the corruption is happening and have
> created a patch file with a fix (at least the corruption is no longer
> happening on our guestOS anymore). Note that our test file is a
> large file consisting of the value 0x61 repeated over the entire file.
I think you are missing this patch:
commit 360e607b88a23d378f6efaa769c76d26f538234d
Author: Stefano Stabellini <address@hidden>
Date: Thu Jan 30 12:46:05 2014 +0000
address_space_translate: do not cross page boundaries
The following commit:
commit 149f54b53b7666a3facd45e86eece60ce7d3b114
Author: Paolo Bonzini <address@hidden>
Date: Fri May 24 12:59:37 2013 +0200
memory: add address_space_translate
breaks Xen support in QEMU, in particular the Xen mapcache. The effect
is that one Windows XP installation out of ten would end up with BSOD.
The reason is that after this commit l in address_space_rw can span a
page boundary, however qemu_get_ram_ptr still calls xen_map_cache asking
to map a single page (if block->offset == 0).
Fix the issue by reverting to the previous behaviour: do not return a
length from address_space_translate_internal that can span a page
boundary.
Also in address_space_translate do not ignore the length returned by
address_space_translate_internal.
This patch should be backported to QEMU 1.6.x.
Signed-off-by: Stefano Stabellini <address@hidden>
Signed-off-by: Anthony Perard <address@hidden>
Tested-by: Paolo Bonzini <address@hidden>
Acked-by: Paolo Bonzini <address@hidden>
Cc: address@hidden
and the subsequent fix:
commit a87f39543a9259f671c5413723311180ee2ad2a8
Author: Paolo Bonzini <address@hidden>
Date: Fri Feb 7 15:47:46 2014 +0100
memory: fix limiting of translation at a page boundary
Commit 360e607 (address_space_translate: do not cross page boundaries,
2014-01-30) broke MMIO accesses in cases where the section is shorter
than the full register width. This can happen for example with the
Bochs DISPI registers, which are 16 bits wide but have only a 1-byte
long MemoryRegion (if you write to the "second byte" of the register
your access is discarded; it doesn't write only to half of the register).
Restrict the action of commit 360e607 to direct RAM accesses. This
is enough for Xen, since MMIO will not go through the mapcache.
Reported-by: Mark Cave-Ayland <address@hidden>
Cc: address@hidden
Signed-off-by: Paolo Bonzini <address@hidden>
Tested-by: Mark Cave-Ayland <address@hidden>
Signed-off-by: Peter Maydell <address@hidden>
Both of them will be included next week in 1.7.1.
Paolo