[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [BUG] Consistent LBR/TSX vmentry failure (0x80000022) calling domain_crash() in vmx.c:3324


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: Elliot Killick <elliotkillick@xxxxxxxxxxx>
  • Date: Mon, 25 May 2020 19:01:31 +0000
  • Arc-authentication-results: i=1; mx.zohomail.eu; dkim=pass header.i=zohomail.eu; spf=pass smtp.mailfrom=elliotkillick@xxxxxxxxxxx; dmarc=pass header.from=<elliotkillick@xxxxxxxxxxx> header.from=<elliotkillick@xxxxxxxxxxx>
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.eu; s=zohoarc; t=1590433346; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; bh=zstc/sqbQ9WVCJVASP9+rIVmqfSTJUm3XzhTxVIi8+Q=; b=SM/gweNYX2J0P3gC3Hi1x/rsQ6zC+J0MdMhX32vPLP5QJCchksx2AwaYTd/2P63h57h8yyDYxmxcuuaT6cSfBYGAFqKkKYbhdJlba/1DkOuuRLfF5CTLCcmyn+pJzn5EyurAFpNZn0AxDVVK9WFeggWS5cAvzu7Ku4X2BtMqlNc=
  • Arc-seal: i=1; a=rsa-sha256; t=1590433346; cv=none; d=zohomail.eu; s=zohoarc; b=d2kW6MvdHWurCUa2wY2E1e9zGwAc9wlYX8l+/XpzWYA45rGZZdnB3w4ZZbKdlYQHrz6NMKjsSQ6St3mRf4u4P/TxTdwM6m3ip1sj3U4TRELnkHoYJpoRvgItAjOO9/JkAaPHCJ593Xzm483O0e2aeuAE8LyJntpsrcW9ICx862o=
  • Cc: xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Mon, 25 May 2020 19:03:01 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 2020-05-20 16:53, Andrew Cooper wrote:
> On 20/05/2020 15:59, Elliot Killick wrote:
>> On 2020-05-20 12:31, Andrew Cooper wrote:
>>> On 20/05/2020 12:46, Elliot Killick wrote:
>>>> processor  : 0
>>>> vendor_id  : GenuineIntel
>>>> cpu family : 6
>>>> model              : 60
>>>> model name : Intel(R) Core(TM) i5-4590 CPU @ 3.30GHz
>>>> stepping   : 3
>>>> microcode  : 0x27
>>>> cpu MHz            : 3299.926
>>>> cache size : 6144 KB
>>>> physical id        : 0
>>> Ok, so the errata is one of HSM182/HSD172.
>>>
>>> Xen has workaround for all of these.  However, I also see:
>>>
>>>> (XEN) ----[ Xen-4.8.5-15.fc25  x86_64  debug=n   Not tainted ]----
>>> which is an obsolete version of Xen these days.  It looks like these
>>> issues were first fixed in Xen 4.9, but you should upgrade to something
>>> rather newer.
>>>
>>> ~Andrew
>>>
>> Ah, so this is originally a CPU bug which Xen has had to patch over.
> 
> Yes.  It was an unintended consequence of Intel being forced to disable
> TSX in most of their Haswell/Broadwell CPUs.
> 
>> As for the Xen version, that's controlled by the "distribution" of Xen I
>> run which is Qubes. To remedy this I could run the testing stream of
>> Qubes which currently provides the latest version of Xen (4.13) but that
>> could bring its own set of problems.
> 
> Ah, in which case Qubes will probably consider backporting the fixes. 
> Open a bug with them, and I can probably point out a minimum set of
> backports to make it work.
> 
> ~Andrew
> 

Hi, Andrew

I've opened up a bug with Qubes here:
https://github.com/QubesOS/qubes-issues/issues/5848

Please highlight the required backports at your earliest convenience,
thank you.




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.