From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id AD64481CCC for ; Fri, 4 Nov 2016 10:36:35 -0700 (PDT) Received: from int-mx10.intmail.prod.int.phx2.redhat.com (int-mx10.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 62E414E4D2; Fri, 4 Nov 2016 17:36:37 +0000 (UTC) Received: from lacos-laptop-7.usersys.redhat.com (ovpn-116-156.phx2.redhat.com [10.3.116.156]) by int-mx10.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id uA4HaYKI010997; Fri, 4 Nov 2016 13:36:35 -0400 To: Paolo Bonzini , "Yao, Jiewen" References: <1478156028-21572-1-git-send-email-jiewen.yao@intel.com> <74D8A39837DF1E4DA445A8C0B3885C50386BDEF5@shsmsx102.ccr.corp.intel.com> <39fc5ad3-1b27-2414-a327-6ec09cfff551@redhat.com> Cc: "Tian, Feng" , =?UTF-8?B?UmFkaW0gS3I/bcOhPw==?= , "edk2-devel@ml01.01.org" , "Kinney, Michael D" , "Fan, Jeff" , "Zeng, Star" From: Laszlo Ersek Message-ID: <155b0723-78d0-e1a7-8d3b-d41b6bb8970b@redhat.com> Date: Fri, 4 Nov 2016 18:36:34 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: <39fc5ad3-1b27-2414-a327-6ec09cfff551@redhat.com> X-Scanned-By: MIMEDefang 2.68 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.38]); Fri, 04 Nov 2016 17:36:37 +0000 (UTC) Subject: Re: [PATCH 0/6] Enable SMM page level protection. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 04 Nov 2016 17:36:35 -0000 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit On 11/04/16 16:29, Paolo Bonzini wrote: > > > On 04/11/2016 16:22, Laszlo Ersek wrote: >>>> What does this *KVM internal error. Suberror: 1* mean? >> The key message is "emulation failure" -- it means that the processor >> exits to the hypervisor (KVM) because it finds some code that it cannot >> execute in guest mode natively, so the hypervisor needs to emulate it. >> And, this emulation fails. The reasons can be: >> - the code is valid, but KVM lacks the emulation code for it, >> - the code is actually garbage (not code) -- there was some corruption >> in the guest (the location used to contain code but it was corrupted, or >> the guest jumped to non-code data). >> >> Usually the register dump contains a short hexadecimal snippet from the >> instruction stream (near Code=...), pinpointing the byte that caused the >> problem. However, in this case, all we have is question marks, and this >> is the very first time I see those. That's why I CC'd Paolo and Radim :) > > The question marks usually mean that the page tables do not map a page > at that address, but I don't know offhand why KVM would fail emulation > instead of triple-faulting. > > Try "info tlb" to dump the page tables (huge output of course, you may > want to use the GTK+ backend which has scrollable consoles). Thanks, I'll try "info tlb" later. (I generally use virsh qemu-monitor-command --hmp, whose output is easy to redirect to a file.) Thanks Laszlo