>>> On 25.06.18 at 14:40, <rcojoc...@bitdefender.com> wrote:
>> Crash:
>> 
>> (XEN) [ 1924.367273] altp2m_vcpu_initialise()
>> (XEN) [ 1924.367277] altp2m_vcpu_reset()
>> (XEN) [ 1924.367278] 1 altp2m_vcpu_update_p2m()
>> (XEN) [ 1924.367279] vmx_vcpu_update_eptp()
>> (XEN) [ 1924.367318] HVMOP_altp2m_vcpu_enable_notify
>> (XEN) [ 1924.367321] vmx_vcpu_update_vmfunc_ve(0),
>> v->arch.hvm_vmx.secondary_exec_control: 0x1054eb
>> (XEN) [ 1924.367326] exit vmx_vcpu_update_vmfunc_ve(0),
>> v->arch.hvm_vmx.secondary_exec_control: 0x1474eb
>> (XEN) [ 1924.367344] Xen BUG at vmx.c:3407
> 
> Actually I think this shows us the problem: 65535 (INVALID_ALTP2M) is a
> stale value from a previous good run. But the EPTP_INDEX value is
> ignored unless SECONDARY_EXEC_ENABLE_VIRT_EXCEPTIONS is set. So at the
> crash point, SECONDARY_EXEC_ENABLE_VIRT_EXCEPTIONS just got set, the
> "live" index is 0, and the stale INVALID_ALTP2M value is being read from
> the previous run (and compared to 0 and MAX_ALTP2M).
So perhaps the writing of EPTP_INDEX should be done earlier?

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to