Mailing List Archive

Domu windows 2012 crash.
Hello

After the latest updates/security updates for debian 9 and debian 10,
so will windows 2012 crash if more than 4096 memory is available to domu.


So it's in debian 9 update: xen (4.8.5.final+shim4.10.4-1+deb9u12)
and in debian 10 update:  xen (4.11.3+24-g14b62ab3e5-1) that is causing
the crashes.


memory = 5120 = Domu crashes see below

memory = 4096 = Domu works ok.


I am reporting it here since perhaps other distributions might
carry the same patches and have the same problems.





Debian 10 Xen hypervisor running windows 2012 as domu.


(XEN) Failed to shatter gfn e660e: -12
(XEN) d3v1 EPT violation 0x19c (--x/rw-) gpa 0x000000e660e075 mfn
0xceae0e type 0
(XEN) d3v1 Walking EPT tables for GFN e660e:
(XEN) d3v1  epte 9c00000ec17dd007
(XEN) d3v1  epte 9c0000078a576007
(XEN) d3v1  epte 9c00000ceae000f3
(XEN) d3v1  --- GLA 0x7fca357d075
(XEN) domain_crash called from vmx.c:3497
(XEN) Domain 3 (vcpu#1) crashed on cpu#14:
(XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    14
(XEN) RIP:    0033:[<000007fca357d075>]
(XEN) RFLAGS: 0000000000010283   CONTEXT: hvm guest (d3v1)
(XEN) rax: 000007fca3e7feb0   rbx: 0000000023c34600   rcx: 000000de005e44f0
(XEN) rdx: 000000de6cd67210   rsi: 000000de005e44f0   rdi: 000000de005e0358
(XEN) rbp: 000000de005e4028   rsp: 000000de6f68cec8   r8: 0000000000000004
(XEN) r9:  0000000000000001   r10: 0000000000000002   r11: 000007fca3571ef8
(XEN) r12: 0000000000000008   r13: 0000000000000058   r14: 000000de6f68d7e0
(XEN) r15: 0000000000000002   cr0: 0000000080050031   cr4: 00000000000006f8
(XEN) cr3: 00000000b5640000   cr2: 000000de6f7a049c
(XEN) fsb: 00000000ff7e6000   gsb: 000007f5ff7e4000   gss: 000007f7bb927000
(XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
(XEN) Failed to shatter gfn 15f9b: -12
(XEN) d9v0 EPT violation 0x19c (--x/rw-) gpa 0x00000015f9b000 mfn
0xcb719b type 0
(XEN) d9v0 Walking EPT tables for GFN 15f9b:
(XEN) d9v0  epte 9c00000ee8476007
(XEN) d9v0  epte 9c0000078ccc2007
(XEN) d9v0  epte 9c00000cb70000f3
(XEN) d9v0  --- GLA 0x7f63b039000
(XEN) domain_crash called from vmx.c:3497
(XEN) Domain 9 (vcpu#0) crashed on cpu#12:
(XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    12
(XEN) RIP:    0033:[<000007f63b038ffd>]
(XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d9v0)
(XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx: 000000000000000e
(XEN) rdx: 000007040ab01ff0   rsi: 000000f5a749a3e0   rdi: 0000000000000000
(XEN) rbp: 000000f5a808f570   rsp: 000000f5a808f470   r8: 0000000000000010
(XEN) r9:  0000000000000002   r10: 0000000000000000   r11: 0000000000000000
(XEN) r12: 0000000000000004   r13: 000007f63b0fe3a8   r14: 0000000000000000
(XEN) r15: 0000000000000001   cr0: 0000000080050031   cr4: 00000000000006f8
(XEN) cr3: 0000000052280000   cr2: 000007f63b039000
(XEN) fsb: 0000000039f8a000   gsb: 000007f639f88000   gss: 000007f705f8a000
(XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
(XEN) Failed to shatter gfn cd7c9: -12
(XEN) d15v0 EPT violation 0x19c (--x/rw-) gpa 0x000000cd7c9060 mfn
0xdc37c9 type 0
(XEN) d15v0 Walking EPT tables for GFN cd7c9:
(XEN) d15v0  epte 9c00000f1e239007
(XEN) d15v0  epte 9c0000078cc13007
(XEN) d15v0  epte 9c00000dc36000f3
(XEN) d15v0  --- GLA 0x7ff7a5b2060
(XEN) domain_crash called from vmx.c:3497
(XEN) Domain 15 (vcpu#0) crashed on cpu#14:
(XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    14
(XEN) RIP:    0033:[<000007ff7a5b2060>]
(XEN) RFLAGS: 0000000000010206   CONTEXT: hvm guest (d15v0)
(XEN) rax: 0000000000000002   rbx: 0000000000000002   rcx: 000007ff7a5d3c60
(XEN) rdx: 000007ff7a5cc0d0   rsi: 0000000080070002   rdi: 00000042424bb320
(XEN) rbp: 0000004241cff869   rsp: 0000004241cff7c8   r8: 000000000000066a
(XEN) r9:  000007ff7a5b8e08   r10: 0000000000000000   r11: 0000000000000246
(XEN) r12: 0000000000000000   r13: 0000004240e5a478   r14: 000000000000000e
(XEN) r15: 00000042424d3370   cr0: 0000000080050031   cr4: 00000000000006f8
(XEN) cr3: 0000000112a40000   cr2: 000007ff7a5b2060
(XEN) fsb: 0000000096c7e000   gsb: 000007f796c7c000   gss: 000007f796c7c000
(XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
(XEN) Failed to shatter gfn ecddb: -12
(XEN) d16v0 EPT violation 0x19c (--x/rw-) gpa 0x000000ecddb3b6 mfn
0xc841db type 0
(XEN) d16v0 Walking EPT tables for GFN ecddb:
(XEN) d16v0  epte 9c00000ed02af007
(XEN) d16v0  epte 9c0000078daf2007
(XEN) d16v0  epte 9c00000c840000f3
(XEN) d16v0  --- GLA 0x7ff962313b6
(XEN) domain_crash called from vmx.c:3497
(XEN) Domain 16 (vcpu#0) crashed on cpu#17:
(XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    17
(XEN) RIP:    0033:[<000007ff962313b6>]
(XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d16v0)
(XEN) rax: 0000000000000003   rbx: 0000000004895fd0   rcx: 0000000004895fd0
(XEN) rdx: 0000000004895fd0   rsi: 0000000007464de0   rdi: 0000000000000000
(XEN) rbp: 0000000000000000   rsp: 00000000096df660   r8: 0000000004aa7630
(XEN) r9:  0000000000000000   r10: 000007ff95f7c660   r11: 0000000000000000
(XEN) r12: 000000007ffe03c0   r13: 0000000000000000   r14: 000000007ffe03b0
(XEN) r15: 000000007ffe0008   cr0: 0000000080050031   cr4: 00000000000006f8
(XEN) cr3: 000000007eac0000   cr2: 000000ed1d62a000
(XEN) fsb: 00000000dc9be000   gsb: 000007f7dc9bc000   gss: fffff802f933d000
(XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033





Debian 9 XEN hypervisor running windows 2012 as domu.


(XEN) Failed to shatter gfn daf71: -12
(XEN) d19v0 EPT violation 0x39c (--x/rw-) gpa 0x000000daf710d0 mfn
0x38a5971 type 0
(XEN) d19v0 Walking EPT tables for GFN daf71:
(XEN) d19v0  epte 9c00004019911107
(XEN) d19v0  epte 9c0000201a67f107
(XEN) Failed to shatter gfn ca3dc: -12
(XEN) d19v0  epte 9c000038a5800bf3
(XEN) d19v0  --- GLA 0x7f8fc0130d0
(XEN) domain_crash called from vmx.c:3385
(XEN) d19v1 EPT violation 0x39c (--x/rw-) gpa 0x000000ca3dc430 mfn
0x38b65dc type 0
(XEN) Domain 19 (vcpu#0) crashed on cpu#29:
(XEN) d19v1 Walking EPT tables for GFN ca3dc:
(XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    29
(XEN) RIP:    0033:[<000007f8fc0130d0>]
(XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d19v0)
(XEN) rax: 000007f8fc0130d0   rbx: 0000000000000001   rcx: 00000040673d4430
(XEN) rdx: 0000004002a8e3b0   rsi: 0000000000000001   rdi: 00000040673d42d0
(XEN) rbp: 0000004002a8e930   rsp: 0000004002a8e348   r8: 0000000000000001
(XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 000007f8fb5d3020
(XEN) r12: 0000004002a8f510   r13: 0000004002a8eed0   r14: 00000040676c0e20
(XEN) r15: 0000004067450768   cr0: 0000000080050031   cr4: 00000000001506f8
(XEN) cr3: 0000000122000000   cr2: 000007f8fc0130d0
(XEN) fsb: 00000000ff3d2000   gsb: 000007f5ff3d0000   gss: 000007f7eb928000
(XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
(XEN) d19v1  epte 9c00004019911107
(XEN) d19v1  epte 9c0000201a67f107
(XEN) domain_crash called from vmx.c:3385
(XEN) Failed to shatter gfn 3e8f3: -12
(XEN) printk: 2 messages suppressed.
(XEN) d20v0 EPT violation 0x39c (--x/rw-) gpa 0x0000003e8f3010 mfn
0x3901ef3 type 0
(XEN) d20v0 Walking EPT tables for GFN 3e8f3:
(XEN) d20v0  epte 9c000040128ff107
(XEN) d20v0  epte 9c00002059ee9107
(XEN) d20v0  epte 9c00003901e00bf3
(XEN) d20v0  --- GLA 0x7f8780b5010
(XEN) domain_crash called from vmx.c:3385
(XEN) Domain 20 (vcpu#0) crashed on cpu#35:
(XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    35
(XEN) RIP:    0033:[<000007f8780b5010>]
(XEN) RFLAGS: 0000000000010283   CONTEXT: hvm guest (d20v0)
(XEN) rax: 000007f8780b5010   rbx: 000007f8780b6e00   rcx: 0000000004b50de0
(XEN) rdx: 000000000992d6f0   rsi: 0000000000000000   rdi: 000007f878097d80
(XEN) rbp: 0000000004b50de0   rsp: 000000000992d6c8   r8: 0000000000000010
(XEN) r9:  0000000000000002   r10: 000007f8780b6e00   r11: 0000000000000001
(XEN) r12: 000007f89bbb3ea8   r13: 000007f89babeb28   r14: 000007f8780b6bb0
(XEN) r15: 000000000992d930   cr0: 0000000080050031   cr4: 00000000001506f8
(XEN) cr3: 00000000e8400000   cr2: 0000005730908000
(XEN) fsb: 000000004a060000   gsb: 000007f64a05e000   gss: 000007f79c1c2000
(XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
(XEN) Failed to shatter gfn db554: -12
(XEN) d22v1 EPT violation 0x39c (--x/rw-) gpa 0x000000db554f70 mfn
0x3c65354 type 0
(XEN) d22v1 Walking EPT tables for GFN db554:
(XEN) d22v1  epte 9c00004006b1d107
(XEN) d22v1  epte 9c0000201d16e107
(XEN) d22v1  epte 9c00003c65200bf3
(XEN) d22v1  --- GLA 0x7fd2cb99f70
(XEN) domain_crash called from vmx.c:3385
(XEN) Domain 22 (vcpu#1) crashed on cpu#31:
(XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    31
(XEN) RIP:    0033:[<000007fd2cb99f70>]
(XEN) RFLAGS: 0000000000010206   CONTEXT: hvm guest (d22v1)
(XEN) rax: 000007fd2cb99f70   rbx: 000000473498eec8   rcx: 00000047349935b0
(XEN) rdx: 000000473498cbe0   rsi: 000000000000000d   rdi: 00000047349935b0
(XEN) rbp: 00000046338cc040   rsp: 00000046338cbfc8   r8: 00000046338cbd98
(XEN) r9:  fffffffeff1edb14   r10: 0000000000000000   r11: 0000000000000001
(XEN) r12: 000007fd376385b8   r13: 0000004633c3d5e0   r14: 000000473498cdb0
(XEN) r15: 0000004859c65478   cr0: 0000000080050031   cr4: 00000000001506f8
(XEN) cr3: 00000000cc000000   cr2: 000007fd2cb99f70
(XEN) fsb: 0000000002065000   gsb: 000007f702063000   gss: 000007f702063000
(XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
(XEN) Failed to shatter gfn c662c: -12
(XEN) d23v0 EPT violation 0x39c (--x/rw-) gpa 0x000000c662c8b8 mfn
0x3dba02c type 0
(XEN) d23v0 Walking EPT tables for GFN c662c:
(XEN) d23v0  epte 9c000040159e4107
(XEN) d23v0  epte 9c0000201cfc6107
(XEN) d23v0  epte 9c00003dba000bf3
(XEN) d23v0  --- GLA 0x7fa57bd58b8
(XEN) domain_crash called from vmx.c:3385
(XEN) Domain 23 (vcpu#0) crashed on cpu#34:
(XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    34
(XEN) RIP:    0033:[<000007fa57bd58b8>]
(XEN) RFLAGS: 0000000000010202   CONTEXT: hvm guest (d23v0)
(XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx: 000000a99e82eaa0
(XEN) rdx: 0000000000000000   rsi: 000000000000000c   rdi: 000000a99e82f1c0
(XEN) rbp: 000000000002b02a   rsp: 000000a99e82ea58   r8: 0000000000000003
(XEN) r9:  000007fa57b2e2f0   r10: 0000000000000000   r11: 0000000000000000
(XEN) r12: 0000000000000000   r13: 000000a99e82f1c0   r14: 000000a99e82eaf0
(XEN) r15: 000000000000000c   cr0: 0000000080050031   cr4: 00000000001506f8
(XEN) cr3: 0000000109700000   cr2: 000007fa6c62d8bb
(XEN) fsb: 00000000e80d2000   gsb: 000007f6e80d0000   gss: 000007f6e80d0000
(XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033


_______________________________________________
Xen-users mailing list
Xen-users@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-users
Re: Domu windows 2012 crash. [ In reply to ]
Hi Johnny,

On 2/20/20 10:10 AM, johnny Strom wrote:
>
> After the latest updates/security updates for debian 9 and debian 10,
> so will windows 2012 crash if more than 4096 memory is available to domu.

I am able to reproduce this with a Windows server essentials 2019 HVM domU.

An example from xl dmesg:

(XEN) Failed to shatter gfn 105245: -12
(XEN) d75v1 EPT violation 0x19c (--x/rw-) gpa 0x00000105245760 mfn
0x285245 type 0
(XEN) d75v1 Walking EPT tables for GFN 105245:
(XEN) d75v1 epte 9c000004105f9007
(XEN) d75v1 epte 9c000002800000f3
(XEN) d75v1 --- GLA 0x7ff98b40d760
(XEN) domain_crash called from vmx.c:3497
(XEN) Domain 75 (vcpu#1) crashed on cpu#4:
(XEN) ----[ Xen-4.11.4-pre x86_64 debug=n Not tainted ]----
(XEN) CPU: 4
(XEN) RIP: 0033:[<00007ff98b40d760>]
(XEN) RFLAGS: 0000000000010216 CONTEXT: hvm guest (d75v1)
(XEN) rax: 0000000000001212 rbx: 000000c714d9da58 rcx: 0000023500001590
(XEN) rdx: 000000c700000001 rsi: 000000c714d9da18 rdi: 000000c714d9db20
(XEN) rbp: 000000c714d9d950 rsp: 000000c714d9d918 r8: 0000023500001470
(XEN) r9: 00000235000014f0 r10: 00007ff99c5c0923 r11: 000000c714d9d970
(XEN) r12: 0000000000000000 r13: 000000c714d9d9d0 r14: 000000c714d9da58
(XEN) r15: 0000000000000006 cr0: 0000000080050031 cr4: 0000000000060678
(XEN) cr3: 00000001d9458002 cr2: 00007ff98b6fa048
(XEN) fsb: 0000000000000000 gsb: 000000c714e9e000 gss: ffffcd015dc40000
(XEN) ds: 002b es: 002b fs: 0053 gs: 002b ss: 002b cs: 0033

> So it's in debian 9 update: xen (4.8.5.final+shim4.10.4-1+deb9u12)
> and in debian 10 update:  xen (4.11.3+24-g14b62ab3e5-1) that is causing
> the crashes.

For 4.11, can you please try the workaround to enable "executable EPT
superpages" again?

It's the ept=exec-sp hypervisor setting, and can also be set without
rebooting using:

xl set-parameters ept=exec-sp

(and no-exec-sp to go back to the default again)

This seems to be related to XSA-304, whose patches were included in the
latest security uploads in Debian.

https://xenbits.xen.org/xsa/advisory-304.html

I do not know if it's Windows or Xen at fault here, but at least this
workaround stops the domU from crashing all the time.

Hans

> memory = 5120 = Domu crashes see below
>
> memory = 4096 = Domu works ok.
>
>
> I am reporting it here since perhaps other distributions might
> carry the same patches and have the same problems.
>
>
>
>
>
> Debian 10 Xen hypervisor running windows 2012 as domu.
>
>
> (XEN) Failed to shatter gfn e660e: -12
> (XEN) d3v1 EPT violation 0x19c (--x/rw-) gpa 0x000000e660e075 mfn
> 0xceae0e type 0
> (XEN) d3v1 Walking EPT tables for GFN e660e:
> (XEN) d3v1  epte 9c00000ec17dd007
> (XEN) d3v1  epte 9c0000078a576007
> (XEN) d3v1  epte 9c00000ceae000f3
> (XEN) d3v1  --- GLA 0x7fca357d075
> (XEN) domain_crash called from vmx.c:3497
> (XEN) Domain 3 (vcpu#1) crashed on cpu#14:
> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    14
> (XEN) RIP:    0033:[<000007fca357d075>]
> (XEN) RFLAGS: 0000000000010283   CONTEXT: hvm guest (d3v1)
> (XEN) rax: 000007fca3e7feb0   rbx: 0000000023c34600   rcx: 000000de005e44f0
> (XEN) rdx: 000000de6cd67210   rsi: 000000de005e44f0   rdi: 000000de005e0358
> (XEN) rbp: 000000de005e4028   rsp: 000000de6f68cec8   r8: 0000000000000004
> (XEN) r9:  0000000000000001   r10: 0000000000000002   r11: 000007fca3571ef8
> (XEN) r12: 0000000000000008   r13: 0000000000000058   r14: 000000de6f68d7e0
> (XEN) r15: 0000000000000002   cr0: 0000000080050031   cr4: 00000000000006f8
> (XEN) cr3: 00000000b5640000   cr2: 000000de6f7a049c
> (XEN) fsb: 00000000ff7e6000   gsb: 000007f5ff7e4000   gss: 000007f7bb927000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) Failed to shatter gfn 15f9b: -12
> (XEN) d9v0 EPT violation 0x19c (--x/rw-) gpa 0x00000015f9b000 mfn
> 0xcb719b type 0
> (XEN) d9v0 Walking EPT tables for GFN 15f9b:
> (XEN) d9v0  epte 9c00000ee8476007
> (XEN) d9v0  epte 9c0000078ccc2007
> (XEN) d9v0  epte 9c00000cb70000f3
> (XEN) d9v0  --- GLA 0x7f63b039000
> (XEN) domain_crash called from vmx.c:3497
> (XEN) Domain 9 (vcpu#0) crashed on cpu#12:
> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    12
> (XEN) RIP:    0033:[<000007f63b038ffd>]
> (XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d9v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx: 000000000000000e
> (XEN) rdx: 000007040ab01ff0   rsi: 000000f5a749a3e0   rdi: 0000000000000000
> (XEN) rbp: 000000f5a808f570   rsp: 000000f5a808f470   r8: 0000000000000010
> (XEN) r9:  0000000000000002   r10: 0000000000000000   r11: 0000000000000000
> (XEN) r12: 0000000000000004   r13: 000007f63b0fe3a8   r14: 0000000000000000
> (XEN) r15: 0000000000000001   cr0: 0000000080050031   cr4: 00000000000006f8
> (XEN) cr3: 0000000052280000   cr2: 000007f63b039000
> (XEN) fsb: 0000000039f8a000   gsb: 000007f639f88000   gss: 000007f705f8a000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) Failed to shatter gfn cd7c9: -12
> (XEN) d15v0 EPT violation 0x19c (--x/rw-) gpa 0x000000cd7c9060 mfn
> 0xdc37c9 type 0
> (XEN) d15v0 Walking EPT tables for GFN cd7c9:
> (XEN) d15v0  epte 9c00000f1e239007
> (XEN) d15v0  epte 9c0000078cc13007
> (XEN) d15v0  epte 9c00000dc36000f3
> (XEN) d15v0  --- GLA 0x7ff7a5b2060
> (XEN) domain_crash called from vmx.c:3497
> (XEN) Domain 15 (vcpu#0) crashed on cpu#14:
> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    14
> (XEN) RIP:    0033:[<000007ff7a5b2060>]
> (XEN) RFLAGS: 0000000000010206   CONTEXT: hvm guest (d15v0)
> (XEN) rax: 0000000000000002   rbx: 0000000000000002   rcx: 000007ff7a5d3c60
> (XEN) rdx: 000007ff7a5cc0d0   rsi: 0000000080070002   rdi: 00000042424bb320
> (XEN) rbp: 0000004241cff869   rsp: 0000004241cff7c8   r8: 000000000000066a
> (XEN) r9:  000007ff7a5b8e08   r10: 0000000000000000   r11: 0000000000000246
> (XEN) r12: 0000000000000000   r13: 0000004240e5a478   r14: 000000000000000e
> (XEN) r15: 00000042424d3370   cr0: 0000000080050031   cr4: 00000000000006f8
> (XEN) cr3: 0000000112a40000   cr2: 000007ff7a5b2060
> (XEN) fsb: 0000000096c7e000   gsb: 000007f796c7c000   gss: 000007f796c7c000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) Failed to shatter gfn ecddb: -12
> (XEN) d16v0 EPT violation 0x19c (--x/rw-) gpa 0x000000ecddb3b6 mfn
> 0xc841db type 0
> (XEN) d16v0 Walking EPT tables for GFN ecddb:
> (XEN) d16v0  epte 9c00000ed02af007
> (XEN) d16v0  epte 9c0000078daf2007
> (XEN) d16v0  epte 9c00000c840000f3
> (XEN) d16v0  --- GLA 0x7ff962313b6
> (XEN) domain_crash called from vmx.c:3497
> (XEN) Domain 16 (vcpu#0) crashed on cpu#17:
> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    17
> (XEN) RIP:    0033:[<000007ff962313b6>]
> (XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d16v0)
> (XEN) rax: 0000000000000003   rbx: 0000000004895fd0   rcx: 0000000004895fd0
> (XEN) rdx: 0000000004895fd0   rsi: 0000000007464de0   rdi: 0000000000000000
> (XEN) rbp: 0000000000000000   rsp: 00000000096df660   r8: 0000000004aa7630
> (XEN) r9:  0000000000000000   r10: 000007ff95f7c660   r11: 0000000000000000
> (XEN) r12: 000000007ffe03c0   r13: 0000000000000000   r14: 000000007ffe03b0
> (XEN) r15: 000000007ffe0008   cr0: 0000000080050031   cr4: 00000000000006f8
> (XEN) cr3: 000000007eac0000   cr2: 000000ed1d62a000
> (XEN) fsb: 00000000dc9be000   gsb: 000007f7dc9bc000   gss: fffff802f933d000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>
>
>
>
>
> Debian 9 XEN hypervisor running windows 2012 as domu.
>
>
> (XEN) Failed to shatter gfn daf71: -12
> (XEN) d19v0 EPT violation 0x39c (--x/rw-) gpa 0x000000daf710d0 mfn
> 0x38a5971 type 0
> (XEN) d19v0 Walking EPT tables for GFN daf71:
> (XEN) d19v0  epte 9c00004019911107
> (XEN) d19v0  epte 9c0000201a67f107
> (XEN) Failed to shatter gfn ca3dc: -12
> (XEN) d19v0  epte 9c000038a5800bf3
> (XEN) d19v0  --- GLA 0x7f8fc0130d0
> (XEN) domain_crash called from vmx.c:3385
> (XEN) d19v1 EPT violation 0x39c (--x/rw-) gpa 0x000000ca3dc430 mfn
> 0x38b65dc type 0
> (XEN) Domain 19 (vcpu#0) crashed on cpu#29:
> (XEN) d19v1 Walking EPT tables for GFN ca3dc:
> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    29
> (XEN) RIP:    0033:[<000007f8fc0130d0>]
> (XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d19v0)
> (XEN) rax: 000007f8fc0130d0   rbx: 0000000000000001   rcx: 00000040673d4430
> (XEN) rdx: 0000004002a8e3b0   rsi: 0000000000000001   rdi: 00000040673d42d0
> (XEN) rbp: 0000004002a8e930   rsp: 0000004002a8e348   r8: 0000000000000001
> (XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 000007f8fb5d3020
> (XEN) r12: 0000004002a8f510   r13: 0000004002a8eed0   r14: 00000040676c0e20
> (XEN) r15: 0000004067450768   cr0: 0000000080050031   cr4: 00000000001506f8
> (XEN) cr3: 0000000122000000   cr2: 000007f8fc0130d0
> (XEN) fsb: 00000000ff3d2000   gsb: 000007f5ff3d0000   gss: 000007f7eb928000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) d19v1  epte 9c00004019911107
> (XEN) d19v1  epte 9c0000201a67f107
> (XEN) domain_crash called from vmx.c:3385
> (XEN) Failed to shatter gfn 3e8f3: -12
> (XEN) printk: 2 messages suppressed.
> (XEN) d20v0 EPT violation 0x39c (--x/rw-) gpa 0x0000003e8f3010 mfn
> 0x3901ef3 type 0
> (XEN) d20v0 Walking EPT tables for GFN 3e8f3:
> (XEN) d20v0  epte 9c000040128ff107
> (XEN) d20v0  epte 9c00002059ee9107
> (XEN) d20v0  epte 9c00003901e00bf3
> (XEN) d20v0  --- GLA 0x7f8780b5010
> (XEN) domain_crash called from vmx.c:3385
> (XEN) Domain 20 (vcpu#0) crashed on cpu#35:
> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    35
> (XEN) RIP:    0033:[<000007f8780b5010>]
> (XEN) RFLAGS: 0000000000010283   CONTEXT: hvm guest (d20v0)
> (XEN) rax: 000007f8780b5010   rbx: 000007f8780b6e00   rcx: 0000000004b50de0
> (XEN) rdx: 000000000992d6f0   rsi: 0000000000000000   rdi: 000007f878097d80
> (XEN) rbp: 0000000004b50de0   rsp: 000000000992d6c8   r8: 0000000000000010
> (XEN) r9:  0000000000000002   r10: 000007f8780b6e00   r11: 0000000000000001
> (XEN) r12: 000007f89bbb3ea8   r13: 000007f89babeb28   r14: 000007f8780b6bb0
> (XEN) r15: 000000000992d930   cr0: 0000000080050031   cr4: 00000000001506f8
> (XEN) cr3: 00000000e8400000   cr2: 0000005730908000
> (XEN) fsb: 000000004a060000   gsb: 000007f64a05e000   gss: 000007f79c1c2000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) Failed to shatter gfn db554: -12
> (XEN) d22v1 EPT violation 0x39c (--x/rw-) gpa 0x000000db554f70 mfn
> 0x3c65354 type 0
> (XEN) d22v1 Walking EPT tables for GFN db554:
> (XEN) d22v1  epte 9c00004006b1d107
> (XEN) d22v1  epte 9c0000201d16e107
> (XEN) d22v1  epte 9c00003c65200bf3
> (XEN) d22v1  --- GLA 0x7fd2cb99f70
> (XEN) domain_crash called from vmx.c:3385
> (XEN) Domain 22 (vcpu#1) crashed on cpu#31:
> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    31
> (XEN) RIP:    0033:[<000007fd2cb99f70>]
> (XEN) RFLAGS: 0000000000010206   CONTEXT: hvm guest (d22v1)
> (XEN) rax: 000007fd2cb99f70   rbx: 000000473498eec8   rcx: 00000047349935b0
> (XEN) rdx: 000000473498cbe0   rsi: 000000000000000d   rdi: 00000047349935b0
> (XEN) rbp: 00000046338cc040   rsp: 00000046338cbfc8   r8: 00000046338cbd98
> (XEN) r9:  fffffffeff1edb14   r10: 0000000000000000   r11: 0000000000000001
> (XEN) r12: 000007fd376385b8   r13: 0000004633c3d5e0   r14: 000000473498cdb0
> (XEN) r15: 0000004859c65478   cr0: 0000000080050031   cr4: 00000000001506f8
> (XEN) cr3: 00000000cc000000   cr2: 000007fd2cb99f70
> (XEN) fsb: 0000000002065000   gsb: 000007f702063000   gss: 000007f702063000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) Failed to shatter gfn c662c: -12
> (XEN) d23v0 EPT violation 0x39c (--x/rw-) gpa 0x000000c662c8b8 mfn
> 0x3dba02c type 0
> (XEN) d23v0 Walking EPT tables for GFN c662c:
> (XEN) d23v0  epte 9c000040159e4107
> (XEN) d23v0  epte 9c0000201cfc6107
> (XEN) d23v0  epte 9c00003dba000bf3
> (XEN) d23v0  --- GLA 0x7fa57bd58b8
> (XEN) domain_crash called from vmx.c:3385
> (XEN) Domain 23 (vcpu#0) crashed on cpu#34:
> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    34
> (XEN) RIP:    0033:[<000007fa57bd58b8>]
> (XEN) RFLAGS: 0000000000010202   CONTEXT: hvm guest (d23v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx: 000000a99e82eaa0
> (XEN) rdx: 0000000000000000   rsi: 000000000000000c   rdi: 000000a99e82f1c0
> (XEN) rbp: 000000000002b02a   rsp: 000000a99e82ea58   r8: 0000000000000003
> (XEN) r9:  000007fa57b2e2f0   r10: 0000000000000000   r11: 0000000000000000
> (XEN) r12: 0000000000000000   r13: 000000a99e82f1c0   r14: 000000a99e82eaf0
> (XEN) r15: 000000000000000c   cr0: 0000000080050031   cr4: 00000000001506f8
> (XEN) cr3: 0000000109700000   cr2: 000007fa6c62d8bb
> (XEN) fsb: 00000000e80d2000   gsb: 000007f6e80d0000   gss: 000007f6e80d0000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-users
>


_______________________________________________
Xen-users mailing list
Xen-users@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-users
Re: Domu windows 2012 crash. [ In reply to ]
On 3/14/20 2:54 PM, Hans van Kranenburg wrote:
> Hi Johnny,
>
> On 2/20/20 10:10 AM, johnny Strom wrote:
>> After the latest updates/security updates for debian 9 and debian 10,
>> so will windows 2012 crash if more than 4096 memory is available to domu.
> I am able to reproduce this with a Windows server essentials 2019 HVM domU.
>
> An example from xl dmesg:
>
> (XEN) Failed to shatter gfn 105245: -12
> (XEN) d75v1 EPT violation 0x19c (--x/rw-) gpa 0x00000105245760 mfn
> 0x285245 type 0
> (XEN) d75v1 Walking EPT tables for GFN 105245:
> (XEN) d75v1 epte 9c000004105f9007
> (XEN) d75v1 epte 9c000002800000f3
> (XEN) d75v1 --- GLA 0x7ff98b40d760
> (XEN) domain_crash called from vmx.c:3497
> (XEN) Domain 75 (vcpu#1) crashed on cpu#4:
> (XEN) ----[ Xen-4.11.4-pre x86_64 debug=n Not tainted ]----
> (XEN) CPU: 4
> (XEN) RIP: 0033:[<00007ff98b40d760>]
> (XEN) RFLAGS: 0000000000010216 CONTEXT: hvm guest (d75v1)
> (XEN) rax: 0000000000001212 rbx: 000000c714d9da58 rcx: 0000023500001590
> (XEN) rdx: 000000c700000001 rsi: 000000c714d9da18 rdi: 000000c714d9db20
> (XEN) rbp: 000000c714d9d950 rsp: 000000c714d9d918 r8: 0000023500001470
> (XEN) r9: 00000235000014f0 r10: 00007ff99c5c0923 r11: 000000c714d9d970
> (XEN) r12: 0000000000000000 r13: 000000c714d9d9d0 r14: 000000c714d9da58
> (XEN) r15: 0000000000000006 cr0: 0000000080050031 cr4: 0000000000060678
> (XEN) cr3: 00000001d9458002 cr2: 00007ff98b6fa048
> (XEN) fsb: 0000000000000000 gsb: 000000c714e9e000 gss: ffffcd015dc40000
> (XEN) ds: 002b es: 002b fs: 0053 gs: 002b ss: 002b cs: 0033
>
>> So it's in debian 9 update: xen (4.8.5.final+shim4.10.4-1+deb9u12)
>> and in debian 10 update:  xen (4.11.3+24-g14b62ab3e5-1) that is causing
>> the crashes.
> For 4.11, can you please try the workaround to enable "executable EPT
> superpages" again?
>
> It's the ept=exec-sp hypervisor setting, and can also be set without
> rebooting using:
>
> xl set-parameters ept=exec-sp


Hello


I have been running test  with "xl set-parameters ept=exec-sp" and
windows 2012 R2.

And it dose not crash anymore.

I used memory = 5120 that did make it crash within 2 minutes before.

So xl set-parameters ept=exec-sp seems to be an workaround for now.

Best regards Johnny


>
> (and no-exec-sp to go back to the default again)
>
> This seems to be related to XSA-304, whose patches were included in the
> latest security uploads in Debian.
>
> https://xenbits.xen.org/xsa/advisory-304.html
>
> I do not know if it's Windows or Xen at fault here, but at least this
> workaround stops the domU from crashing all the time.
>
> Hans
>
>> memory = 5120 = Domu crashes see below
>>
>> memory = 4096 = Domu works ok.
>>
>>
>> I am reporting it here since perhaps other distributions might
>> carry the same patches and have the same problems.
>>
>>
>>
>>
>>
>> Debian 10 Xen hypervisor running windows 2012 as domu.
>>
>>
>> (XEN) Failed to shatter gfn e660e: -12
>> (XEN) d3v1 EPT violation 0x19c (--x/rw-) gpa 0x000000e660e075 mfn
>> 0xceae0e type 0
>> (XEN) d3v1 Walking EPT tables for GFN e660e:
>> (XEN) d3v1  epte 9c00000ec17dd007
>> (XEN) d3v1  epte 9c0000078a576007
>> (XEN) d3v1  epte 9c00000ceae000f3
>> (XEN) d3v1  --- GLA 0x7fca357d075
>> (XEN) domain_crash called from vmx.c:3497
>> (XEN) Domain 3 (vcpu#1) crashed on cpu#14:
>> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
>> (XEN) CPU:    14
>> (XEN) RIP:    0033:[<000007fca357d075>]
>> (XEN) RFLAGS: 0000000000010283   CONTEXT: hvm guest (d3v1)
>> (XEN) rax: 000007fca3e7feb0   rbx: 0000000023c34600   rcx: 000000de005e44f0
>> (XEN) rdx: 000000de6cd67210   rsi: 000000de005e44f0   rdi: 000000de005e0358
>> (XEN) rbp: 000000de005e4028   rsp: 000000de6f68cec8   r8: 0000000000000004
>> (XEN) r9:  0000000000000001   r10: 0000000000000002   r11: 000007fca3571ef8
>> (XEN) r12: 0000000000000008   r13: 0000000000000058   r14: 000000de6f68d7e0
>> (XEN) r15: 0000000000000002   cr0: 0000000080050031   cr4: 00000000000006f8
>> (XEN) cr3: 00000000b5640000   cr2: 000000de6f7a049c
>> (XEN) fsb: 00000000ff7e6000   gsb: 000007f5ff7e4000   gss: 000007f7bb927000
>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>> (XEN) Failed to shatter gfn 15f9b: -12
>> (XEN) d9v0 EPT violation 0x19c (--x/rw-) gpa 0x00000015f9b000 mfn
>> 0xcb719b type 0
>> (XEN) d9v0 Walking EPT tables for GFN 15f9b:
>> (XEN) d9v0  epte 9c00000ee8476007
>> (XEN) d9v0  epte 9c0000078ccc2007
>> (XEN) d9v0  epte 9c00000cb70000f3
>> (XEN) d9v0  --- GLA 0x7f63b039000
>> (XEN) domain_crash called from vmx.c:3497
>> (XEN) Domain 9 (vcpu#0) crashed on cpu#12:
>> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
>> (XEN) CPU:    12
>> (XEN) RIP:    0033:[<000007f63b038ffd>]
>> (XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d9v0)
>> (XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx: 000000000000000e
>> (XEN) rdx: 000007040ab01ff0   rsi: 000000f5a749a3e0   rdi: 0000000000000000
>> (XEN) rbp: 000000f5a808f570   rsp: 000000f5a808f470   r8: 0000000000000010
>> (XEN) r9:  0000000000000002   r10: 0000000000000000   r11: 0000000000000000
>> (XEN) r12: 0000000000000004   r13: 000007f63b0fe3a8   r14: 0000000000000000
>> (XEN) r15: 0000000000000001   cr0: 0000000080050031   cr4: 00000000000006f8
>> (XEN) cr3: 0000000052280000   cr2: 000007f63b039000
>> (XEN) fsb: 0000000039f8a000   gsb: 000007f639f88000   gss: 000007f705f8a000
>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>> (XEN) Failed to shatter gfn cd7c9: -12
>> (XEN) d15v0 EPT violation 0x19c (--x/rw-) gpa 0x000000cd7c9060 mfn
>> 0xdc37c9 type 0
>> (XEN) d15v0 Walking EPT tables for GFN cd7c9:
>> (XEN) d15v0  epte 9c00000f1e239007
>> (XEN) d15v0  epte 9c0000078cc13007
>> (XEN) d15v0  epte 9c00000dc36000f3
>> (XEN) d15v0  --- GLA 0x7ff7a5b2060
>> (XEN) domain_crash called from vmx.c:3497
>> (XEN) Domain 15 (vcpu#0) crashed on cpu#14:
>> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
>> (XEN) CPU:    14
>> (XEN) RIP:    0033:[<000007ff7a5b2060>]
>> (XEN) RFLAGS: 0000000000010206   CONTEXT: hvm guest (d15v0)
>> (XEN) rax: 0000000000000002   rbx: 0000000000000002   rcx: 000007ff7a5d3c60
>> (XEN) rdx: 000007ff7a5cc0d0   rsi: 0000000080070002   rdi: 00000042424bb320
>> (XEN) rbp: 0000004241cff869   rsp: 0000004241cff7c8   r8: 000000000000066a
>> (XEN) r9:  000007ff7a5b8e08   r10: 0000000000000000   r11: 0000000000000246
>> (XEN) r12: 0000000000000000   r13: 0000004240e5a478   r14: 000000000000000e
>> (XEN) r15: 00000042424d3370   cr0: 0000000080050031   cr4: 00000000000006f8
>> (XEN) cr3: 0000000112a40000   cr2: 000007ff7a5b2060
>> (XEN) fsb: 0000000096c7e000   gsb: 000007f796c7c000   gss: 000007f796c7c000
>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>> (XEN) Failed to shatter gfn ecddb: -12
>> (XEN) d16v0 EPT violation 0x19c (--x/rw-) gpa 0x000000ecddb3b6 mfn
>> 0xc841db type 0
>> (XEN) d16v0 Walking EPT tables for GFN ecddb:
>> (XEN) d16v0  epte 9c00000ed02af007
>> (XEN) d16v0  epte 9c0000078daf2007
>> (XEN) d16v0  epte 9c00000c840000f3
>> (XEN) d16v0  --- GLA 0x7ff962313b6
>> (XEN) domain_crash called from vmx.c:3497
>> (XEN) Domain 16 (vcpu#0) crashed on cpu#17:
>> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
>> (XEN) CPU:    17
>> (XEN) RIP:    0033:[<000007ff962313b6>]
>> (XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d16v0)
>> (XEN) rax: 0000000000000003   rbx: 0000000004895fd0   rcx: 0000000004895fd0
>> (XEN) rdx: 0000000004895fd0   rsi: 0000000007464de0   rdi: 0000000000000000
>> (XEN) rbp: 0000000000000000   rsp: 00000000096df660   r8: 0000000004aa7630
>> (XEN) r9:  0000000000000000   r10: 000007ff95f7c660   r11: 0000000000000000
>> (XEN) r12: 000000007ffe03c0   r13: 0000000000000000   r14: 000000007ffe03b0
>> (XEN) r15: 000000007ffe0008   cr0: 0000000080050031   cr4: 00000000000006f8
>> (XEN) cr3: 000000007eac0000   cr2: 000000ed1d62a000
>> (XEN) fsb: 00000000dc9be000   gsb: 000007f7dc9bc000   gss: fffff802f933d000
>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>>
>>
>>
>>
>>
>> Debian 9 XEN hypervisor running windows 2012 as domu.
>>
>>
>> (XEN) Failed to shatter gfn daf71: -12
>> (XEN) d19v0 EPT violation 0x39c (--x/rw-) gpa 0x000000daf710d0 mfn
>> 0x38a5971 type 0
>> (XEN) d19v0 Walking EPT tables for GFN daf71:
>> (XEN) d19v0  epte 9c00004019911107
>> (XEN) d19v0  epte 9c0000201a67f107
>> (XEN) Failed to shatter gfn ca3dc: -12
>> (XEN) d19v0  epte 9c000038a5800bf3
>> (XEN) d19v0  --- GLA 0x7f8fc0130d0
>> (XEN) domain_crash called from vmx.c:3385
>> (XEN) d19v1 EPT violation 0x39c (--x/rw-) gpa 0x000000ca3dc430 mfn
>> 0x38b65dc type 0
>> (XEN) Domain 19 (vcpu#0) crashed on cpu#29:
>> (XEN) d19v1 Walking EPT tables for GFN ca3dc:
>> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
>> (XEN) CPU:    29
>> (XEN) RIP:    0033:[<000007f8fc0130d0>]
>> (XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d19v0)
>> (XEN) rax: 000007f8fc0130d0   rbx: 0000000000000001   rcx: 00000040673d4430
>> (XEN) rdx: 0000004002a8e3b0   rsi: 0000000000000001   rdi: 00000040673d42d0
>> (XEN) rbp: 0000004002a8e930   rsp: 0000004002a8e348   r8: 0000000000000001
>> (XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 000007f8fb5d3020
>> (XEN) r12: 0000004002a8f510   r13: 0000004002a8eed0   r14: 00000040676c0e20
>> (XEN) r15: 0000004067450768   cr0: 0000000080050031   cr4: 00000000001506f8
>> (XEN) cr3: 0000000122000000   cr2: 000007f8fc0130d0
>> (XEN) fsb: 00000000ff3d2000   gsb: 000007f5ff3d0000   gss: 000007f7eb928000
>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>> (XEN) d19v1  epte 9c00004019911107
>> (XEN) d19v1  epte 9c0000201a67f107
>> (XEN) domain_crash called from vmx.c:3385
>> (XEN) Failed to shatter gfn 3e8f3: -12
>> (XEN) printk: 2 messages suppressed.
>> (XEN) d20v0 EPT violation 0x39c (--x/rw-) gpa 0x0000003e8f3010 mfn
>> 0x3901ef3 type 0
>> (XEN) d20v0 Walking EPT tables for GFN 3e8f3:
>> (XEN) d20v0  epte 9c000040128ff107
>> (XEN) d20v0  epte 9c00002059ee9107
>> (XEN) d20v0  epte 9c00003901e00bf3
>> (XEN) d20v0  --- GLA 0x7f8780b5010
>> (XEN) domain_crash called from vmx.c:3385
>> (XEN) Domain 20 (vcpu#0) crashed on cpu#35:
>> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
>> (XEN) CPU:    35
>> (XEN) RIP:    0033:[<000007f8780b5010>]
>> (XEN) RFLAGS: 0000000000010283   CONTEXT: hvm guest (d20v0)
>> (XEN) rax: 000007f8780b5010   rbx: 000007f8780b6e00   rcx: 0000000004b50de0
>> (XEN) rdx: 000000000992d6f0   rsi: 0000000000000000   rdi: 000007f878097d80
>> (XEN) rbp: 0000000004b50de0   rsp: 000000000992d6c8   r8: 0000000000000010
>> (XEN) r9:  0000000000000002   r10: 000007f8780b6e00   r11: 0000000000000001
>> (XEN) r12: 000007f89bbb3ea8   r13: 000007f89babeb28   r14: 000007f8780b6bb0
>> (XEN) r15: 000000000992d930   cr0: 0000000080050031   cr4: 00000000001506f8
>> (XEN) cr3: 00000000e8400000   cr2: 0000005730908000
>> (XEN) fsb: 000000004a060000   gsb: 000007f64a05e000   gss: 000007f79c1c2000
>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>> (XEN) Failed to shatter gfn db554: -12
>> (XEN) d22v1 EPT violation 0x39c (--x/rw-) gpa 0x000000db554f70 mfn
>> 0x3c65354 type 0
>> (XEN) d22v1 Walking EPT tables for GFN db554:
>> (XEN) d22v1  epte 9c00004006b1d107
>> (XEN) d22v1  epte 9c0000201d16e107
>> (XEN) d22v1  epte 9c00003c65200bf3
>> (XEN) d22v1  --- GLA 0x7fd2cb99f70
>> (XEN) domain_crash called from vmx.c:3385
>> (XEN) Domain 22 (vcpu#1) crashed on cpu#31:
>> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
>> (XEN) CPU:    31
>> (XEN) RIP:    0033:[<000007fd2cb99f70>]
>> (XEN) RFLAGS: 0000000000010206   CONTEXT: hvm guest (d22v1)
>> (XEN) rax: 000007fd2cb99f70   rbx: 000000473498eec8   rcx: 00000047349935b0
>> (XEN) rdx: 000000473498cbe0   rsi: 000000000000000d   rdi: 00000047349935b0
>> (XEN) rbp: 00000046338cc040   rsp: 00000046338cbfc8   r8: 00000046338cbd98
>> (XEN) r9:  fffffffeff1edb14   r10: 0000000000000000   r11: 0000000000000001
>> (XEN) r12: 000007fd376385b8   r13: 0000004633c3d5e0   r14: 000000473498cdb0
>> (XEN) r15: 0000004859c65478   cr0: 0000000080050031   cr4: 00000000001506f8
>> (XEN) cr3: 00000000cc000000   cr2: 000007fd2cb99f70
>> (XEN) fsb: 0000000002065000   gsb: 000007f702063000   gss: 000007f702063000
>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>> (XEN) Failed to shatter gfn c662c: -12
>> (XEN) d23v0 EPT violation 0x39c (--x/rw-) gpa 0x000000c662c8b8 mfn
>> 0x3dba02c type 0
>> (XEN) d23v0 Walking EPT tables for GFN c662c:
>> (XEN) d23v0  epte 9c000040159e4107
>> (XEN) d23v0  epte 9c0000201cfc6107
>> (XEN) d23v0  epte 9c00003dba000bf3
>> (XEN) d23v0  --- GLA 0x7fa57bd58b8
>> (XEN) domain_crash called from vmx.c:3385
>> (XEN) Domain 23 (vcpu#0) crashed on cpu#34:
>> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
>> (XEN) CPU:    34
>> (XEN) RIP:    0033:[<000007fa57bd58b8>]
>> (XEN) RFLAGS: 0000000000010202   CONTEXT: hvm guest (d23v0)
>> (XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx: 000000a99e82eaa0
>> (XEN) rdx: 0000000000000000   rsi: 000000000000000c   rdi: 000000a99e82f1c0
>> (XEN) rbp: 000000000002b02a   rsp: 000000a99e82ea58   r8: 0000000000000003
>> (XEN) r9:  000007fa57b2e2f0   r10: 0000000000000000   r11: 0000000000000000
>> (XEN) r12: 0000000000000000   r13: 000000a99e82f1c0   r14: 000000a99e82eaf0
>> (XEN) r15: 000000000000000c   cr0: 0000000080050031   cr4: 00000000001506f8
>> (XEN) cr3: 0000000109700000   cr2: 000007fa6c62d8bb
>> (XEN) fsb: 00000000e80d2000   gsb: 000007f6e80d0000   gss: 000007f6e80d0000
>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>>
>>
>> _______________________________________________
>> Xen-users mailing list
>> Xen-users@lists.xenproject.org
>> https://lists.xenproject.org/mailman/listinfo/xen-users
>>


_______________________________________________
Xen-users mailing list
Xen-users@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-users
Re: Domu windows 2012 crash. [ In reply to ]
On 18/03/2020 15:32, Johnny Ström wrote:
> On 3/14/20 2:54 PM, Hans van Kranenburg wrote:
>> Hi Johnny,
>>
>> On 2/20/20 10:10 AM, johnny Strom wrote:
>>> After the latest updates/security updates for debian 9 and debian 10,
>>> so will windows 2012 crash if more than 4096 memory is available to
>>> domu.
>> I am able to reproduce this with a Windows server essentials 2019 HVM
>> domU.
>>
>> An example from xl dmesg:
>>
>> (XEN) Failed to shatter gfn 105245: -12
>> (XEN) d75v1 EPT violation 0x19c (--x/rw-) gpa 0x00000105245760 mfn
>> 0x285245 type 0
>> (XEN) d75v1 Walking EPT tables for GFN 105245:
>> (XEN) d75v1  epte 9c000004105f9007
>> (XEN) d75v1  epte 9c000002800000f3
>> (XEN) d75v1  --- GLA 0x7ff98b40d760
>> (XEN) domain_crash called from vmx.c:3497
>> (XEN) Domain 75 (vcpu#1) crashed on cpu#4:
>> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
>> (XEN) CPU:    4
>> (XEN) RIP:    0033:[<00007ff98b40d760>]
>> (XEN) RFLAGS: 0000000000010216   CONTEXT: hvm guest (d75v1)
>> (XEN) rax: 0000000000001212   rbx: 000000c714d9da58   rcx:
>> 0000023500001590
>> (XEN) rdx: 000000c700000001   rsi: 000000c714d9da18   rdi:
>> 000000c714d9db20
>> (XEN) rbp: 000000c714d9d950   rsp: 000000c714d9d918   r8: 
>> 0000023500001470
>> (XEN) r9:  00000235000014f0   r10: 00007ff99c5c0923   r11:
>> 000000c714d9d970
>> (XEN) r12: 0000000000000000   r13: 000000c714d9d9d0   r14:
>> 000000c714d9da58
>> (XEN) r15: 0000000000000006   cr0: 0000000080050031   cr4:
>> 0000000000060678
>> (XEN) cr3: 00000001d9458002   cr2: 00007ff98b6fa048
>> (XEN) fsb: 0000000000000000   gsb: 000000c714e9e000   gss:
>> ffffcd015dc40000
>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>>
>>> So it's in debian 9 update: xen (4.8.5.final+shim4.10.4-1+deb9u12)
>>> and in debian 10 update:  xen (4.11.3+24-g14b62ab3e5-1) that is causing
>>> the crashes.
>> For 4.11, can you please try the workaround to enable "executable EPT
>> superpages" again?
>>
>> It's the ept=exec-sp hypervisor setting, and can also be set without
>> rebooting using:
>>
>>     xl set-parameters ept=exec-sp
>
>
> Hello
>
>
> I have been running test  with "xl set-parameters ept=exec-sp" and
> windows 2012 R2.
>
> And it dose not crash anymore.
>
> I used memory = 5120 that did make it crash within 2 minutes before.
>
> So xl set-parameters ept=exec-sp seems to be an workaround for now.

Right, but what you're doing is turning off the security fix for XSA-304.

Do you have any shadow_memory= option set in your VM's config file?  If
so, please remove it.

~Andrew

_______________________________________________
Xen-users mailing list
Xen-users@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-users
Re: Domu windows 2012 crash. [ In reply to ]
On 3/18/20 5:36 PM, Andrew Cooper wrote:
> On 18/03/2020 15:32, Johnny Ström wrote:
>> On 3/14/20 2:54 PM, Hans van Kranenburg wrote:
>>> Hi Johnny,
>>>
>>> On 2/20/20 10:10 AM, johnny Strom wrote:
>>>> After the latest updates/security updates for debian 9 and debian 10,
>>>> so will windows 2012 crash if more than 4096 memory is available to
>>>> domu.
>>> I am able to reproduce this with a Windows server essentials 2019 HVM
>>> domU.
>>>
>>> An example from xl dmesg:
>>>
>>> (XEN) Failed to shatter gfn 105245: -12
>>> (XEN) d75v1 EPT violation 0x19c (--x/rw-) gpa 0x00000105245760 mfn
>>> 0x285245 type 0
>>> (XEN) d75v1 Walking EPT tables for GFN 105245:
>>> (XEN) d75v1  epte 9c000004105f9007
>>> (XEN) d75v1  epte 9c000002800000f3
>>> (XEN) d75v1  --- GLA 0x7ff98b40d760
>>> (XEN) domain_crash called from vmx.c:3497
>>> (XEN) Domain 75 (vcpu#1) crashed on cpu#4:
>>> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
>>> (XEN) CPU:    4
>>> (XEN) RIP:    0033:[<00007ff98b40d760>]
>>> (XEN) RFLAGS: 0000000000010216   CONTEXT: hvm guest (d75v1)
>>> (XEN) rax: 0000000000001212   rbx: 000000c714d9da58   rcx:
>>> 0000023500001590
>>> (XEN) rdx: 000000c700000001   rsi: 000000c714d9da18   rdi:
>>> 000000c714d9db20
>>> (XEN) rbp: 000000c714d9d950   rsp: 000000c714d9d918   r8:
>>> 0000023500001470
>>> (XEN) r9:  00000235000014f0   r10: 00007ff99c5c0923   r11:
>>> 000000c714d9d970
>>> (XEN) r12: 0000000000000000   r13: 000000c714d9d9d0   r14:
>>> 000000c714d9da58
>>> (XEN) r15: 0000000000000006   cr0: 0000000080050031   cr4:
>>> 0000000000060678
>>> (XEN) cr3: 00000001d9458002   cr2: 00007ff98b6fa048
>>> (XEN) fsb: 0000000000000000   gsb: 000000c714e9e000   gss:
>>> ffffcd015dc40000
>>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>>>
>>>> So it's in debian 9 update: xen (4.8.5.final+shim4.10.4-1+deb9u12)
>>>> and in debian 10 update:  xen (4.11.3+24-g14b62ab3e5-1) that is causing
>>>> the crashes.
>>> For 4.11, can you please try the workaround to enable "executable EPT
>>> superpages" again?
>>>
>>> It's the ept=exec-sp hypervisor setting, and can also be set without
>>> rebooting using:
>>>
>>>     xl set-parameters ept=exec-sp
>>
>> Hello
>>
>>
>> I have been running test  with "xl set-parameters ept=exec-sp" and
>> windows 2012 R2.
>>
>> And it dose not crash anymore.
>>
>> I used memory = 5120 that did make it crash within 2 minutes before.
>>
>> So xl set-parameters ept=exec-sp seems to be an workaround for now.
> Right, but what you're doing is turning off the security fix for XSA-304.
>
> Do you have any shadow_memory= option set in your VM's config file?  If
> so, please remove it.

Hi

We had: shadow_memory = 8

Rebooted the hypervisor and commented: out shadow_memory

And no crash after some hours of running. So it seems to work.

/Johnny


>
> ~Andrew
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-users



_______________________________________________
Xen-users mailing list
Xen-users@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-users
Re: Domu windows 2012 crash. [ In reply to ]
On 19/03/2020 12:34, Johnny Ström wrote:
> On 3/18/20 5:36 PM, Andrew Cooper wrote:
>> On 18/03/2020 15:32, Johnny Ström wrote:
>>> On 3/14/20 2:54 PM, Hans van Kranenburg wrote:
>>>> Hi Johnny,
>>>>
>>>> On 2/20/20 10:10 AM, johnny Strom wrote:
>>>>> After the latest updates/security updates for debian 9 and debian 10,
>>>>> so will windows 2012 crash if more than 4096 memory is available to
>>>>> domu.
>>>> I am able to reproduce this with a Windows server essentials 2019 HVM
>>>> domU.
>>>>
>>>> An example from xl dmesg:
>>>>
>>>> (XEN) Failed to shatter gfn 105245: -12
>>>> (XEN) d75v1 EPT violation 0x19c (--x/rw-) gpa 0x00000105245760 mfn
>>>> 0x285245 type 0
>>>> (XEN) d75v1 Walking EPT tables for GFN 105245:
>>>> (XEN) d75v1  epte 9c000004105f9007
>>>> (XEN) d75v1  epte 9c000002800000f3
>>>> (XEN) d75v1  --- GLA 0x7ff98b40d760
>>>> (XEN) domain_crash called from vmx.c:3497
>>>> (XEN) Domain 75 (vcpu#1) crashed on cpu#4:
>>>> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
>>>> (XEN) CPU:    4
>>>> (XEN) RIP:    0033:[<00007ff98b40d760>]
>>>> (XEN) RFLAGS: 0000000000010216   CONTEXT: hvm guest (d75v1)
>>>> (XEN) rax: 0000000000001212   rbx: 000000c714d9da58   rcx:
>>>> 0000023500001590
>>>> (XEN) rdx: 000000c700000001   rsi: 000000c714d9da18   rdi:
>>>> 000000c714d9db20
>>>> (XEN) rbp: 000000c714d9d950   rsp: 000000c714d9d918   r8:
>>>> 0000023500001470
>>>> (XEN) r9:  00000235000014f0   r10: 00007ff99c5c0923   r11:
>>>> 000000c714d9d970
>>>> (XEN) r12: 0000000000000000   r13: 000000c714d9d9d0   r14:
>>>> 000000c714d9da58
>>>> (XEN) r15: 0000000000000006   cr0: 0000000080050031   cr4:
>>>> 0000000000060678
>>>> (XEN) cr3: 00000001d9458002   cr2: 00007ff98b6fa048
>>>> (XEN) fsb: 0000000000000000   gsb: 000000c714e9e000   gss:
>>>> ffffcd015dc40000
>>>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>>>>
>>>>> So it's in debian 9 update: xen (4.8.5.final+shim4.10.4-1+deb9u12)
>>>>> and in debian 10 update:  xen (4.11.3+24-g14b62ab3e5-1) that is
>>>>> causing
>>>>> the crashes.
>>>> For 4.11, can you please try the workaround to enable "executable EPT
>>>> superpages" again?
>>>>
>>>> It's the ept=exec-sp hypervisor setting, and can also be set without
>>>> rebooting using:
>>>>
>>>>      xl set-parameters ept=exec-sp
>>>
>>> Hello
>>>
>>>
>>> I have been running test  with "xl set-parameters ept=exec-sp" and
>>> windows 2012 R2.
>>>
>>> And it dose not crash anymore.
>>>
>>> I used memory = 5120 that did make it crash within 2 minutes before.
>>>
>>> So xl set-parameters ept=exec-sp seems to be an workaround for now.
>> Right, but what you're doing is turning off the security fix for
>> XSA-304.
>>
>> Do you have any shadow_memory= option set in your VM's config file?  If
>> so, please remove it.
>
> Hi
>
> We had: shadow_memory = 8
>
> Rebooted the hypervisor and commented: out shadow_memory
>
> And no crash after some hours of running. So it seems to work.

Please can someone post this as a proper bug report to xen-devel@

We've clearly got a bug somewhere in the logic for determining and
enforcing the minimum safe shadow memory for a domain to use.

~Andrew

_______________________________________________
Xen-users mailing list
Xen-users@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-users
Re: Domu windows 2012 crash. [ In reply to ]
On 3/19/20 2:12 PM, Andrew Cooper wrote:
> On 19/03/2020 12:34, Johnny Ström wrote:
>> On 3/18/20 5:36 PM, Andrew Cooper wrote:
>>> On 18/03/2020 15:32, Johnny Ström wrote:
>>>>
>>>> I have been running test  with "xl set-parameters ept=exec-sp" and
>>>> windows 2012 R2.
>>>>
>>>> And it dose not crash anymore.
>>>>
>>>> I used memory = 5120 that did make it crash within 2 minutes before.
>>>>
>>>> So xl set-parameters ept=exec-sp seems to be an workaround for now.
>>> Right, but what you're doing is turning off the security fix for
>>> XSA-304.
>>>
>>> Do you have any shadow_memory= option set in your VM's config file?  If
>>> so, please remove it.
>>
>> We had: shadow_memory = 8
>>
>> Rebooted the hypervisor and commented: out shadow_memory
>>
>> And no crash after some hours of running. So it seems to work.
>
> Please can someone post this as a proper bug report to xen-devel@
>
> We've clearly got a bug somewhere in the logic for determining and
> enforcing the minimum safe shadow memory for a domain to use.

Yes, I will do that.

Hans

_______________________________________________
Xen-users mailing list
Xen-users@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-users