lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BYAPR10MB2663BBE2CEECCC4C6504B190F03D9@BYAPR10MB2663.namprd10.prod.outlook.com>
Date:   Thu, 24 Feb 2022 22:27:40 +0000
From:   Dongli Zhang <dongli.zhang@...cle.com>
To:     "xen-devel@...ts.xenproject.org" <xen-devel@...ts.xenproject.org>
CC:     lkml <linux-kernel@...r.kernel.org>
Subject: [BUG REPORT] soft_reset (kexec/kdump) does not work with mainline xen

Hello,

This is to report that the soft_reset (kexec/kdump) has not been working for me
since long time ago.

I have tested again with the most recent mainline xen and the most recent
mainline kernel.

While it works with my old xen version, it does not work with mainline xen.


This is the log of my HVM guest.

Waiting for domain test-vm (domid 1) to die [pid 1265]
Domain 1 has shut down, reason code 5 0x5
Action for shutdown reason code 5 is soft-reset
Done. Rebooting now
xc: error: Failed to set d1's policy (err leaf 0xffffffff, subleaf 0xffffffff, msr 0xffffffff) (17 = File exists): Internal error
libxl: error: libxl_cpuid.c:490:libxl__cpuid_legacy: Domain 1:Failed to apply CPUID policy: File exists
libxl: error: libxl_create.c:1613:domcreate_rebuild_done: Domain 1:cannot (re-)build domain: -3
libxl: error: libxl_xshelp.c:201:libxl__xs_read_mandatory: xenstore read failed: `/libxl/1/type': No such file or directory
libxl: warning: libxl_dom.c:51:libxl__domain_type: unable to get domain type for domid=1, assuming HVM


Neither of below works.

# kexec -l /boot/vmlinuz-5.17.0-rc4xen-00054-gf71077a4d84b-dirty --initrd=/boot/initrd.img-5.17.0-rc4xen-00054-gf71077a4d84b-dirty --reuse-cmdline
# kexec -e

or

# taskset -c 0 echo c > /proc/sysrq-trigger


Thank you very much!

Dongli Zhang

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ