On 31/05/2019 12:18, YOUNG, MICHAEL A. wrote:
> On Tue, 16 Apr 2019, M A Young wrote:
>
>> On Tue, 16 Apr 2019, Andrew Cooper wrote:
>>
>>> From the log:
>>>
>>> traps: modprobe[48] trap invalid opcode ip:7f797dc7bb95 sp:7ffe3099cdb8 erro
>>> r:0 in ld-2.29.so[7f797dc61000+21000]
>>>
>>>
>>> Can you disassemble ld-2.29.so and find out what that instruction is?  It is
>>> almost certainly a related factor.
>> I get lines like
>> [    1.384356] traps: modprobe[36] trap invalid opcode ip:7f57448af179
>> sp:7fff8fc3a938 error:0 in ld-2.29.so[7f5744895000+20000]
>>
>> I am guessing the right place to look in ld-2.29.so is
>> 0x7f57448af179-0x7f57448950000-20000 = 86873 in which case I get
>> (gdb) x/10i 86873
>>   0x15359 <_dl_close_worker+3593>:   mov    (%rsi,%rcx,8),%r8
>>   0x1535d <_dl_close_worker+3597>:   testb  $0x20,0x31d(%r8)
>>   0x15365 <_dl_close_worker+3605>:   jne    0x15375
>> <_dl_close_worker+3621>
>>   0x15367 <_dl_close_worker+3607>:   cmp    %ecx,%edx
>>   0x15369 <_dl_close_worker+3609>:   je     0x15372
>> <_dl_close_worker+3618>
>>   0x1536b <_dl_close_worker+3611>:   mov    %edx,%r9d
>>   0x1536e <_dl_close_worker+3614>:   mov    %r8,(%rsi,%r9,8)
>>   0x15372 <_dl_close_worker+3618>:   add    $0x1,%edx
>>   0x15375 <_dl_close_worker+3621>:   add    $0x1,%rcx
>>   0x15379 <_dl_close_worker+3625>:   cmp    %ecx,%eax
>>
>> Some more lines like this are
>> [    1.571479] traps: modprobe[41] trap invalid opcode ip:7f3e3628d179
>> sp:7ffc86abbe08 error:0 in ld-2.29.so[7f3e36273000+20000]
>> [    1.630562] traps: modprobe[43] trap invalid opcode ip:7f227b39a179
>> sp:7ffdfd943198 error:0 in ld-2.29.so[7f227b380000+20000]
>> which all seem to get to the same place. Is this useful or am I looking in
>> the wrong place?
> I did a bisect on this issue, and it identified the first bad commit as 
> fd32dcfe4c9a539f8e5d26ff4c5ca50ee54556b2
> x86/vmx: Don't leak EFER.NXE into guest context

Aah - this will be a harpertown core.

You need e28c0ee3356f52f589bbae54e89aaed25c1f599d from staging, which
has been backported to staging-4.12
(8457c15b981ba04c0709e6f25af3b76beb34cafa) two weeks ago.

This but accidentally resulted in the SYSCALL instruction being disabled
behind the back of the guest, which broke all userspace system calls.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to