WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] Doamin crash when trying to install disk encryption (Po

To: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
Subject: Re: [Xen-devel] Doamin crash when trying to install disk encryption (PointSec) on Windows HVM
From: Tom Rotenberg <tom.rotenberg@xxxxxxxxx>
Date: Thu, 23 Apr 2009 19:10:21 +0300
Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>, Keir Fraser <Keir.Fraser@xxxxxxxxxxxxx>
Delivery-date: Thu, 23 Apr 2009 09:11:16 -0700
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=YGL1mvDOz52jHIUzdxc3B/52s1hm7BSLFhBpK+OyD18=; b=aiMgqRr4l6Sm821jPtGuNFvnzFgciOqLi/k1rvyKHONhtXDOajAvxJ2KxQSUnbYleM ypccIgIe0WuYPWIwdRZA9rKvT4TxfgfPPI1ltqncSoPCufRKzxBnT6XizQLFWMyeimAp OlNuSFoP1be95OwPbG3/fc9OwbiodxggmRUbA=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=pR4Cq0JHrTw3SxRZ4w06/rolnTPR+Q7I84XPx4Z7/Z0ttnp+vKU0YHjb2kmzzjOINK zZsxNNPbpl/gQCkBhbezGjtnzZPop5WjjUOb82H/scggI1/+pQvvKHE1IO1gMJdBGjX4 1H1GEDv+s8IdNnbRgqMfT80JzHQIc0GLDIFhA=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <20090423160152.GJ10010@xxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <8686c3cd0904230708w7e0f41c3he3ed303573d52e38@xxxxxxxxxxxxxx> <C6163988.959C%keir.fraser@xxxxxxxxxxxxx> <8686c3cd0904230857o6fe60098vb4bc0d2280ff9595@xxxxxxxxxxxxxx> <20090423160152.GJ10010@xxxxxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
So, do u have any suggestion, on how can i fix this issue?

2009/4/23 Tim Deegan <Tim.Deegan@xxxxxxxxxx>
At 16:57 +0100 on 23 Apr (1240505849), Tom Rotenberg wrote:
> Keir,
>
> After further testing, it seems like the flow of events were like this: there was a VMEXIT with the reason of task switch, which changed to vm86mode (!), and upon trying to resume from this vmexit, the cpu raised an exception.
>
> And the question is why and how did the task switch caused the vm86
> mode to be turned on? is it even legal?

Yes, task-switching into vm86 mode is legal; ISTR it and IRET are the
only ways mentioned in the SDMs of getting into vm86.

Looks like Xen doesn't support it, though.  It would need special
handling of the segment state to get round the extra restrictions that
Intel imposed on VMENTER (which are stricter than the limits on using
vm86 mode unvirtualized).

Cheers,

Tim.

> Tom
>
> 2009/4/23 Keir Fraser <keir.fraser@xxxxxxxxxxxxx<mailto:keir.fraser@xxxxxxxxxxxxx>>
> All task switches are emulated, so you can add tracing to hvm_task_switch() to check if a switch has occurred. An alternative is that the guest did another LTR while not being emulated?
>
> If you want to remember the last VMEXIT, you?ll have to add code to store state away somewhere to pick up on the next VMENTRY.
>
>  -- Keir
>
>
> On 23/04/2009 15:08, "Tom Rotenberg" <tom.rotenberg@xxxxxxxxx<http://tom.rotenberg@gmail.com>> wrote:
>
> About the TR, i have re-checked it, and it seems like the TR value is still 0x58, althoug the LTR operation put 0x50 into it. Since, i looked at the LTR code you sent me, and it seems ok, i tend to suspect, that there was some kind of (hardware) task switch, which changed the TR value without me knowing, is it possible? because otherwise, i can't really explain why the TR value is different than what was loaded from the LTR operation...
>
> BTW - how can i track what was the previous VMEXIT before this last VMENTRY which caused the exception? i think, that probably the last VMEXIT caused the "change" to vm86 mode, and this is waht causes the problem...
>
> Tom
>
> 2009/4/23 Keir Fraser <keir.fraser@xxxxxxxxxxxxx<http://keir.fraser@eu.citrix.com>>
> On 23/04/2009 12:44, "Tom Rotenberg" <tom.rotenberg@xxxxxxxxx<http://tom.rotenberg@gmail.com>> wrote:
>
> > However, from the VMCS dump, i saw data, which doesn't seem compatible with
> > this, as the LDTR sellector is indeed 0, but has attributes and limit
> > different from zero (although it should have been totaly disabled, by the
> > LLDT, no?).
>
> The 'unused' flag in the attributes word is set (bit 16) so LDTR is okay.
>
> > And more important, the TR selector is 0x58, although from the LTR, it was
> > supposed to be 0x50, no?
>
> If 0x50 was loaded then the selector should certainly be 0x50.
>
>  -- Keir
>
> > (of-course it's possible that there were other instructions who changed it
> > back, however, i am wondering if there is a problem here).
>
>
>

--
Tim Deegan <Tim.Deegan@xxxxxxxxxx>
Principal Software Engineer, Citrix Systems (R&D) Ltd.
[Company #02300071, SL9 0DZ, UK.]
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>