[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] 100% reliable oops on Xen 4.1.3 (initially reported on 4.0.1)
On 28/01/13 19:17, Peter Moody wrote: > TL;DR, the domU crash I reported over the summer on Xen 4.0.1 can be > reproduced on 4.1.3 and on more processor families and with out the > special memory/cpu configurations I previously reported. > > Longer version: > apropos of this thread [1] from last summer, I've managed to test for > this bug on a more recent version of Xen and I can confirm that it > exists in at least 4.1.3. Also, based on the release notes for 4.0.1 > [2] (the original version of Xen where I encountered this issue), I > reproduced the bug on an AMD Athlon processor in case the interrupts > issue mentioned had an effect. > > The patch I posted to the audit list didn't actually fix the problem. > > Steps I used to reproduce: > 1) installed Xen from ubuntu packages and boot into Xen enabled system. > 2) installed ubuntu 12.10 domU using 20G flat file as disk (the > previous system used drbd). > 3) installed auditd and inserted any syscall rule (audit on chmod's > for example). > 4) compiled the attached sample program as a 32 bit binary. > 5) ran it (works as a normal user). The BUG is because irqs_disabled(). The call to __audit_syscall_exit is from ia32_sysenter_target in arch/x86/ia32/ia32entry.S which attempts to enable interrupts prior to the call with an sti instruction. I don't think this works as expected with a PV kernel and I'm surprised that this doesn't cause a #GP fault. Jan (Cc'd) is more familar with these low-level bits but does (untested) this patch help? ---8<------------- >From 8a3ebe942a8e6f930ee1636e8fe54a357144b007 Mon Sep 17 00:00:00 2001 From: David Vrabel <david.vrabel@xxxxxxxxxx> Date: Tue, 29 Jan 2013 11:48:14 +0000 Subject: [PATCH] x86/ia32: correctly enable irqs before calling __audit_syscall_exit Before calling __audit_syscall_exit, local interrupt were being enabled with sti (and the disabled with cli). This does not work in paravirtualized guests so use the correct ENABLE_INTERRUPTS() and DISABLE_INTERRUPTS() macros instead. This fixes a BUG when auditing systems calls from a 32-bit userspace process inside a 64-bit Xen PV guest. Signed-off-by: David Vrabel <david.vrabel@xxxxxxxxxx> --- arch/x86/ia32/ia32entry.S | 4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/ia32/ia32entry.S b/arch/x86/ia32/ia32entry.S index 102ff7c..142c4ce 100644 --- a/arch/x86/ia32/ia32entry.S +++ b/arch/x86/ia32/ia32entry.S @@ -207,7 +207,7 @@ sysexit_from_sys_call: testl $(_TIF_ALLWORK_MASK & ~_TIF_SYSCALL_AUDIT),TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET) jnz ia32_ret_from_sys_call TRACE_IRQS_ON - sti + ENABLE_INTERRUPTS(CLBR_NONE) movl %eax,%esi /* second arg, syscall return value */ cmpl $-MAX_ERRNO,%eax /* is it an error ? */ jbe 1f @@ -217,7 +217,7 @@ sysexit_from_sys_call: call __audit_syscall_exit movq RAX-ARGOFFSET(%rsp),%rax /* reload syscall return value */ movl $(_TIF_ALLWORK_MASK & ~_TIF_SYSCALL_AUDIT),%edi - cli + DISABLE_INTERRUPTS(CLBR_NONE) TRACE_IRQS_OFF testl %edi,TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET) jz \exit _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |