[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [xen-unstable test] 144091: regressions - FAIL



On 14.11.2019 17:21, Jan Beulich wrote:
> On 14.11.2019 16:52, osstest service owner wrote:
>> flight 144091 xen-unstable real [real]
>> http://logs.test-lab.xenproject.org/osstest/logs/144091/
>>
>> Regressions :-(
>>
>> Tests which did not succeed and are blocking,
>> including tests which could not be run:
>>  test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 12 
>> guest-start/debianhvm.repeat fail REGR. vs. 144042
>>  test-amd64-amd64-qemuu-nested-intel 17 debian-hvm-install/l1/l2 fail REGR. 
>> vs. 144042
> 
> I've taken another look, and I now think the L2 guest doesn't even
> make it to the bootloader. Taking together
> 
> (d1) SeaBIOS (version rel-1.12.1-0-ga5cab58-Xen)
> (d1) BUILD: gcc: (Debian 6.3.0-18+deb9u1) 6.3.0 20170516 binutils: (GNU 
> Binutils for Debian) 2.28
> (d1) 
> (d1) Found Xen hypervisor signature at 40000000
> (d1) Running on QEMU (i440fx)
> (d1) xen: copy e820...
> (d1) Relocating init from 0x000d7c20 to 0x2f7abd80 (size 82400)
> 
> and
> 
> (XEN) *********** VMCS Areas **************
> (XEN) 
> (XEN) >>> Domain 1 <<<
> (XEN)         VCPU 0
> (XEN) *** Guest State ***
> (XEN) CR0: actual=0x0000000000000031, shadow=0x0000000000000011, 
> gh_mask=ffffffffffffffff
> (XEN) CR4: actual=0x0000000000002050, shadow=0x0000000000000000, 
> gh_mask=fffffffffff8f870
> (XEN) CR3 = 0x0000000000400000
> (XEN) RSP = 0x0000000000006fa4 (0x0000000000006fa4)  RIP = 0x000000002f7ba9f4 
> (0x000000002f7ba9f4)
> 
> and similarly in the L0 log
> 
> (XEN) RSP = 0x0000000000006fa4 (0x0000000000006fa4)  RIP = 0x000000002f7ba9f4 
> (0x000000002f7ba9f4)
> 
> I instead think it's still in SeaBIOS code. I'll see if I can
> derive where exactly it's sitting. In any event the most recent
> exit reason to L0 was EPT_VIOLATION with a qualification of 0x19c
> (fetch, eff_read, eff_write, gla_valid, gla_fault), which I don't
> think would allow the guest to continue without an adjustment to
> its EPT permissions.

Isn't the problem here that the XSA-304 fix only updates the host
p2m, but not any entries already propagate to nested or alt p2ms?

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.