On 05/01/16 12:05, Tamas K Lengyel wrote: > > > On Tue, Jan 5, 2016 at 12:56 PM, Andrew Cooper > <andrew.coop...@citrix.com <mailto:andrew.coop...@citrix.com>> wrote: > > On 05/01/16 11:49, Tamas K Lengyel wrote: >> Hi all, >> I've been stress-testing the built-in emulator using the vm_event >> response VM_EVENT_FLAG_EMULATE feature. In the test I've turned >> all pages non-readable by default and all trapped instructions to >> be emulated. My test code can be found at >> https://github.com/tklengyel/xen/compare/read_emul?expand=1. >> >> The following crash is reproducible and has been verified by >> Razvan as well. >> >> (XEN) p2m.c:1726:d1v0 calling mem_access_emulate_one, kind 0 >> (XEN) Failed vm entry (exit reason 0x80000021) caused by invalid >> guest state (0). >> (XEN) ************* VMCS Area ************** >> (XEN) *** Guest State *** >> (XEN) CR0: actual=0x000000008001003b, shadow=0x000000008001003b, >> gh_mask=ffffffffffffffff >> (XEN) CR4: actual=0x00000000000426f9, shadow=0x00000000000406f9, >> gh_mask=ffffffffffffffff >> (XEN) CR3 = 0x0000000000185000 >> (XEN) PDPTE0 = 0x0000000000186001 PDPTE1 = 0x0000000000187001 >> (XEN) PDPTE2 = 0x0000000000188001 PDPTE3 = 0x0000000000189001 >> (XEN) RSP = 0x000000008276dc28 (0x000000008276dc28) RIP = >> 0x00000000826bce1c (0x00000000826bce1c) >> (XEN) RFLAGS=0x00000002 (0x00000002) DR7 = 0x0000000000000400 >> (XEN) Sysenter RSP=000000008078b000 CS:RIP=0008:00000000826830c0 >> (XEN) sel attr limit base >> (XEN) CS: 0008 0c09b ffffffff 0000000000000000 >> (XEN) DS: 0023 0c0f3 ffffffff 0000000000000000 >> (XEN) SS: 0010 0c093 ffffffff 0000000000000000 >> (XEN) ES: 0023 0c0f3 ffffffff 0000000000000000 >> (XEN) FS: 0030 04093 00003748 0000000082770c00 >> (XEN) GS: 0000 1c000 ffffffff 0000000000000000 >> (XEN) GDTR: 000003ff 0000000080b95000 >> (XEN) LDTR: 0000 1c000 ffffffff 0000000000000000 >> (XEN) IDTR: 000007ff 0000000080b95400 >> (XEN) TR: 0028 0008b 000020ab 00000000801da000 >> (XEN) EFER = 0x0000000000000000 PAT = 0x0007010600070106 >> (XEN) PreemptionTimer = 0x00000000 SM Base = 0x00000000 >> (XEN) DebugCtl = 0x0000000000000000 DebugExceptions = >> 0x0000000000000000 >> (XEN) Interruptibility = 00000000 ActivityState = 00000000 >> (XEN) *** Host State *** >> (XEN) RIP = 0xffff82d0802075c0 (vmx_asm_vmexit_handler) RSP = >> 0xffff830430d97f90 >> (XEN) CS=e008 SS=0000 DS=0000 ES=0000 FS=0000 GS=0000 TR=e040 >> (XEN) FSBase=0000000000000000 GSBase=0000000000000000 >> TRBase=ffff830430d9bc00 >> (XEN) GDTBase=ffff830430d8c000 IDTBase=ffff830430d98000 >> (XEN) CR0=000000008005003b CR3=00000004136d0000 CR4=00000000000426e0 >> (XEN) Sysenter RSP=ffff830430d97fc0 CS:RIP=e008:ffff82d08024db30 >> (XEN) EFER = 0x0000000000000000 PAT = 0x0000050100070406 >> (XEN) *** Control State *** >> (XEN) PinBased=0000003f CPUBased=b6a075fa SecondaryExec=000000eb >> (XEN) EntryControls=000051ff ExitControls=000fefff >> (XEN) ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 >> (XEN) VMEntry: intr_info=800000d1 errcode=00000000 ilen=00000000 >> (XEN) VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 >> (XEN) reason=80000021 qualification=0000000000000000 >> (XEN) IDTVectoring: info=800000d1 errcode=00000000 >> (XEN) TSC Offset = 0x0000004ed9c86354 >> (XEN) TPR Threshold = 0x00 PostedIntrVec = 0x00 >> (XEN) EPT pointer = 0x000000041124e01e EPTP index = 0x0000 >> (XEN) Virtual processor ID = 0x0011 VMfunc controls = >> 0000000000000000 >> (XEN) ************************************** >> (XEN) domain_crash called from vmx.c:2761 >> >> Any tips on how to further debug this issue? > > Do you have a log of the instructions emulated? > > > I don't. Is there an easy way to get that beside manually sprinkling > debug messages around in the emulator?
Not trivially, sadly. > > > > Has the emulator by any chance just emulated setting CR4.PAE? > > > Possibly but I don't think so as the guest has already been fully > booted so I would not expect it to touch that. At a guess, I think the fault is an emulated 'mov %reg, %cr3' while in 32bit PAE mode. The PDPTE{0..3} values look wonky. I encountered a similar crash with the xen test framework in HAP mode with a bad %cr3 update. The VMM is expected to emulate updates to PDPTE{0..3} if writes to %cr3 are trapped. See vmx_update_guest_cr() and vmx_load_pdptrs(). ~Andrew
_______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel