lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALCETrUsQtDrkWs2FccKDbEHdB-vZ64ZwkK++9UQd-_VGhSA3A@mail.gmail.com>
Date:   Tue, 21 Nov 2017 19:33:32 -0800
From:   Andy Lutomirski <luto@...nel.org>
To:     "xen-devel@...ts.xenproject.org" <xen-devel@...ts.xenproject.org>,
        Juergen Gross <jgross@...e.com>,
        Boris Ostrovsky <boris.ostrovsky@...cle.com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        X86 ML <x86@...nel.org>
Subject: Xen PV seems to be broken on Linus' tree

I'm doing:

/usr/bin/qemu-system-x86_64 -machine accel=kvm:tcg -cpu host -net none
-nographic -kernel xen-4.8.2 -initrd './arch/x86/boot/bzImage' -m 2G
-smp 2 -append console=com1

With Linus' commit c8a0739b185d11d6e2ca7ad9f5835841d1cfc765 and the
attached config.

It dies with a bunch of sensible log lines and then:

(XEN) d0v0 Unhandled invalid opcode fault/trap [#6, ec=0000]
(XEN) domain_crash_sync called from entry.S: fault at ffff82d08023961a
entry.o#create_bounce_frame+0x137/0x146
(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
(XEN) ----[ Xen-4.8.2  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    0
(XEN) RIP:    e033:[<ffffffff811226eb>]
(XEN) RFLAGS: 0000000000000296   EM: 1   CONTEXT: pv guest (d0v0)
(XEN) rax: 000000000000002f   rbx: ffffffff81e65a48   rcx: ffffffff81e71288
(XEN) rdx: ffffffff81e27500   rsi: 0000000000000001   rdi: ffffffff81133f88
(XEN) rbp: 0000000000000000   rsp: ffffffff81e03e78   r8:  0000000000000000
(XEN) r9:  0000000000000001   r10: 0000000000000000   r11: 0000000000000000
(XEN) r12: 0000000000000000   r13: 0000000000000001   r14: 0000000000000001
(XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000003506e0
(XEN) cr3: 000000007b0b3000   cr2: 0000000000000000
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e02b   cs: e033
(XEN) Guest stack trace from rsp=ffffffff81e03e78:
(XEN)    ffffffff81e71288 0000000000000000 ffffffff811226eb 000000010000e030
(XEN)    0000000000010096 ffffffff81e03eb8 000000000000e02b ffffffff811226eb
(XEN)    ffffffff81122c2e 0000000000000200 0000000000000000 0000000000000000
(XEN)    0000000000000030 ffffffff81c69cf5 ffffffff81080b20 ffffffff81080560
(XEN)    0000000000000000 ffffffff810d3741 ffffffff8107b420 ffffffff81094660

Is this familiar?

I'll feel really dumb if it ends up being my fault.

Download attachment ".config" of type "application/octet-stream" (94937 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ