[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] Domu windows 2012 crash.


  • To: johnny Strom <johnny.strom@xxxxxxxxxxxxxxxxx>, xen-users@xxxxxxxxxxxxxxxxxxxx
  • From: Hans van Kranenburg <hans@xxxxxxxxxxx>
  • Date: Sat, 14 Mar 2020 13:54:13 +0100
  • Autocrypt: addr=hans@xxxxxxxxxxx; keydata= mQINBFo2pooBEADwTBe/lrCa78zuhVkmpvuN+pXPWHkYs0LuAgJrOsOKhxLkYXn6Pn7e3xm+ ySfxwtFmqLUMPWujQYF0r5C6DteypL7XvkPP+FPVlQnDIifyEoKq8JZRPsAFt1S87QThYPC3 mjfluLUKVBP21H3ZFUGjcf+hnJSN9d9MuSQmAvtJiLbRTo5DTZZvO/SuQlmafaEQteaOswme DKRcIYj7+FokaW9n90P8agvPZJn50MCKy1D2QZwvw0g2ZMR8yUdtsX6fHTe7Ym+tHIYM3Tsg 2KKgt17NTxIqyttcAIaVRs4+dnQ23J98iFmVHyT+X2Jou+KpHuULES8562QltmkchA7YxZpT mLMZ6TPit+sIocvxFE5dGiT1FMpjM5mOVCNOP+KOup/N7jobCG15haKWtu9k0kPz+trT3NOn gZXecYzBmasSJro60O4bwBayG9ILHNn+v/ZLg/jv33X2MV7oYXf+ustwjXnYUqVmjZkdI/pt 30lcNUxCANvTF861OgvZUR4WoMNK4krXtodBoEImjmT385LATGFt9HnXd1rQ4QzqyMPBk84j roX5NpOzNZrNJiUxj+aUQZcINtbpmvskGpJX0RsfhOh2fxfQ39ZP/0a2C59gBQuVCH6C5qsY rc1qTIpGdPYT+J1S2rY88AvPpr2JHZbiVqeB3jIlwVSmkYeB/QARAQABtCZIYW5zIHZhbiBL cmFuZW5idXJnIDxoYW5zQGtub3JyaWUub3JnPokCTgQTAQoAOBYhBOJv1o/B6NS2GUVGTueB VzIYDCpVBQJaNq7KAhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEOeBVzIYDCpVgDMQ ANSQMebh0Rr6RNhfA+g9CKiCDMGWZvHvvq3BNo9TqAo9BC4neAoVciSmeZXIlN8xVALf6rF8 lKy8L1omocMcWw7TlvZHBr2gZHKlFYYC34R2NvxS0xO8Iw5rhEU6paYaKzlrvxuXuHMVXgjj bM3zBiN8W4b9VW1MoynP9nvm1WaGtFI9GIyK9j6mBCU+N5hpvFtt4DBmuWjzdDkd3sWUufYd nQhGimWHEg95GWhQUiFvr4HRvYJpbjRRRQG3O/5Fm0YyTYZkI5CDzQIm5lhqKNqmuf2ENstS 8KcBImlbwlzEpK9Pa3Z5MUeLZ5Ywwv+d11fyhk53aT9bipdEipvcGa6DrA0DquO4WlQR+RKU ywoGTgntwFu8G0+tmD8J1UE6kIzFwE5kiFWjM0rxv1tAgV9ZWqmp3sbI7vzbZXn+KI/wosHV iDeW5rYg+PdmnOlYXQIJO+t0KmF5zJlSe7daylKZKTYtk7w1Fq/Oh1Rps9h1C4sXN8OAUO7h 1SAnEtehHfv52nPxwZiI6eqbvqV0uEEyLFS5pCuuwmPpC8AmOrciY2T8T+4pmkJNO2Nd3jOP cnJgAQrxPvD7ACp/85LParnoz5c9/nPHJB1FgbAa7N5d8ubqJgi+k9Q2lAL9vBxK67aZlFZ0 Kd7u1w1rUlY12KlFWzxpd4TuHZJ8rwi7PUceuQINBFo2sK8BEADSZP5cKnGl2d7CHXdpAzVF 6K4Hxwn5eHyKC1D/YvsY+otq3PnfLJeMf1hzv2OSrGaEAkGJh/9yXPOkQ+J1OxJJs9CY0fqB MvHZ98iTyeFAq+4CwKcnZxLiBchQJQd0dFPujtcoMkWgzp3QdzONdkK4P7+9XfryPECyCSUF ib2aEkuU3Ic4LYfsBqGR5hezbJqOs96ExMnYUCEAS5aeejr3xNb8NqZLPqU38SQCTLrAmPAX glKVnYyEVxFUV8EXXY6AK31lRzpCqmPxLoyhPAPda9BXchRluy+QOyg+Yn4Q2DSwbgCYPrxo HTZKxH+E+JxCMfSW35ZE5ufvAbY3IrfHIhbNnHyxbTRgYMDbTQCDyN9F2Rvx3EButRMApj+v OuaMBJF/fWfxL3pSIosG9Q7uPc+qJvVMHMRNnS0Y1QQ5ZPLG0zI5TeHzMnGmSTbcvn/NOxDe 6EhumcclFS0foHR78l1uOhUItya/48WCJE3FvOS3+KBhYvXCsG84KVsJeen+ieX/8lnSn0d2 ZvUsj+6wo+d8tcOAP+KGwJ+ElOilqW29QfV4qvqmxnWjDYQWzxU9WGagU3z0diN97zMEO4D8 SfUu72S5O0o9ATgid9lEzMKdagXP94x5CRvBydWu1E5CTgKZ3YZv+U3QclOG5p9/4+QNbhqH W4SaIIg90CFMiwARAQABiQRsBBgBCgAgFiEE4m/Wj8Ho1LYZRUZO54FXMhgMKlUFAlo2sK8C GwICQAkQ54FXMhgMKlXBdCAEGQEKAB0WIQRJbJ13A1ob3rfuShiywd9yY2FfbAUCWjawrwAK CRCywd9yY2FfbMKbEACIGLdFrD5j8rz/1fm8xWTJlOb3+o5A6fdJ2eyPwr5njJZSG9i5R28c dMmcwLtVisfedBUYLaMBmCEHnj7ylOgJi60HE74ZySX055hKECNfmA9Q7eidxta5WeXeTPSb PwTQkAgUZ576AO129MKKP4jkEiNENePMuYugCuW7XGR+FCEC2efYlVwDQy24ZfR9Q1dNK2ny 0gH1c+313l0JcNTKjQ0e7M9KsQSKUr6Tk0VGTFZE2dp+dJF1sxtWhJ6Ci7N1yyj3buFFpD9c kj5YQFqBkEwt3OGtYNuLfdwR4d47CEGdQSm52n91n/AKdhRDG5xvvADG0qLGBXdWvbdQFllm v47TlJRDc9LmwpIqgtaUGTVjtkhw0SdiwJX+BjhtWTtrQPbseDe2pN3gWte/dPidJWnj8zzS ggZ5otY2reSvM+79w/odUlmtaFx+IyFITuFnBVcMF0uGmQBBxssew8rePQejYQHz0bZUDNbD VaZiXqP4njzBJu5+nzNxQKzQJ0VDF6ve5K49y0RpT4IjNOupZ+OtlZTQyM7moag+Y6bcJ7KK 8+MRdRjGFFWP6H/RCSFAfoOGIKTlZHubjgetyQhMwKJQ5KnGDm+XUkeIWyevPfCVPNvqF2q3 viQm0taFit8L+x7ATpolZuSCat5PSXtgx1liGjBpPKnERxyNLQ/erRNcEACwEJliFbQm+c2i 6ccpx2cdtyAI1yzWuE0nr9DqpsEbIZzTCIVyry/VZgdJ27YijGJWesj/ie/8PtpDu0Cf1pty QOKSpC9WvRCFGJPGS8MmvzepmX2DYQ5MSKTO5tRJZ8EwCFfd9OxX2g280rdcDyCFkY3BYrf9 ic2PTKQokx+9sLCHAC/+feSx/MA/vYpY1EJwkAr37mP7Q8KA9PCRShJziiljh5tKQeIG4sz1 QjOrS8WryEwI160jKBBNc/M5n2kiIPCrapBGsL58MumrtbL53VimFOAJaPaRWNSdWCJSnVSv kCHMl/1fRgzXEMpEmOlBEY0Kdd1Ut3S2cuwejzI+WbrQLgeps2N70Ztq50PkfWkj0jeethhI FqIJzNlUqVkHl1zCWSFsghxiMyZmqULaGcSDItYQ+3c9fxIO/v0zDg7bLeG9Zbj4y8E47xqJ 6brtAAEJ1RIM42gzF5GW71BqZrbFFoI0C6AzgHjaQP1xfj7nBRSBz4ObqnsuvRr7H6Jme5rl eg7COIbm8R7zsFjF4tC6k5HMc1tZ8xX+WoDsurqeQuBOg7rggmhJEpDK2f+g8DsvKtP14Vs0 Sn7fVJi87b5HZojry1lZB2pXUH90+GWPF7DabimBki4QLzmyJ/ENH8GspFulVR3U7r3YYQ5K ctOSoRq9pGmMi231Q+xx9LkCDQRaOtArARAA50ylThKbq0ACHyomxjQ6nFNxa9ICp6byU9Lh hKOax0GB6l4WebMsQLhVGRQ8H7DT84E7QLRYsidEbneB1ciToZkL5YFFaVxY0Hj1wKxCFcVo CRNtOfoPnHQ5m/eDLaO4o0KKL/kaxZwTn2jnl6BQDGX1Aak0u4KiUlFtoWn/E/NIv5QbTGSw IYuzWqqYBIzFtDbiQRvGw0NuKxAGMhwXy8VP05mmNwRdyh/CC4rWQPBTvTeMwr3nl8/G+16/ cn4RNGhDiGTTXcX03qzZ5jZ5N7GLY5JtE6pTpLG+EXn5pAnQ7MvuO19cCbp6Dj8fXRmI0SVX WKSo0A2C8xH6KLCRfUMzD7nvDRU+bAHQmbi5cZBODBZ5yp5CfIL1KUCSoiGOMpMin3FrarIl cxhNtoE+ya23A+JVtOwtM53ESra9cJL4WPkyk/E3OvNDmh8U6iZXn4ZaKQTHaxN9yvmAUhZQ iQi/sABwxCcQQ2ydRb86Vjcbx+FUr5OoEyQS46gc3KN5yax9D3H9wrptOzkNNMUhFj0oK0fX /MYDWOFeuNBTYk1uFRJDmHAOp01rrMHRogQAkMBuJDMrMHfolivZw8RKfdPzgiI500okLTzH C0wgSSAOyHKGZjYjbEwmxsl3sLJck9IPOKvqQi1DkvpOPFSUeX3LPBIav5UUlXt0wjbzInUA EQEAAYkCNgQYAQoAIBYhBOJv1o/B6NS2GUVGTueBVzIYDCpVBQJaOtArAhsMAAoJEOeBVzIY DCpV4kgP+wUh3BDRhuKaZyianKroStgr+LM8FIUwQs3Fc8qKrcDaa35vdT9cocDZjkaGHprp mlN0OuT2PB+Djt7am2noV6Kv1C8EnCPpyDBCwa7DntGdGcGMjH9w6aR4/ruNRUGS1aSMw8sR QgpTVWEyzHlnIH92D+k+IhdNG+eJ6o1fc7MeC0gUwMt27Im+TxVxc0JRfniNk8PUAg4kvJq7 z7NLBUcJsIh3hM0WHQH9AYe/mZhQq5oyZTsz4jo/dWFRSlpY7zrDS2TZNYt4cCfZj1bIdpbf SpRi9M3W/yBF2WOkwYgbkqGnTUvr+3r0LMCH2H7nzENrYxNY2kFmDX9bBvOWsWpcMdOEo99/ Iayz5/q2d1rVjYVFRm5U9hG+C7BYvtUOnUvSEBeE4tnJBMakbJPYxWe61yANDQubPsINB10i ngzsm553yqEjLTuWOjzdHLpE4lzD416ExCoZy7RLEHNhM1YQSI2RNs8umlDfZM9Lek1+1kgB vT3RH0/CpPJgveWV5xDOKuhD8j5l7FME+t2RWP+gyLid6dE0C7J03ir90PlTEkMEHEzyJMPt OhO05Phy+d51WPTo1VSKxhL4bsWddHLfQoXW8RQ388Q69JG4m+JhNH/XvWe3aQFpYP+GZuzO hkMez0lHCaVOOLBSKHkAHh9i0/pH+/3hfEa4NsoHCpyy
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Delivery-date: Sat, 14 Mar 2020 12:55:24 +0000
  • List-id: Xen user discussion <xen-users.lists.xenproject.org>

Hi Johnny,

On 2/20/20 10:10 AM, johnny Strom wrote:
> 
> After the latest updates/security updates for debian 9 and debian 10,
> so will windows 2012 crash if more than 4096 memory is available to domu.

I am able to reproduce this with a Windows server essentials 2019 HVM domU.

An example from xl dmesg:

(XEN) Failed to shatter gfn 105245: -12
(XEN) d75v1 EPT violation 0x19c (--x/rw-) gpa 0x00000105245760 mfn
0x285245 type 0
(XEN) d75v1 Walking EPT tables for GFN 105245:
(XEN) d75v1  epte 9c000004105f9007
(XEN) d75v1  epte 9c000002800000f3
(XEN) d75v1  --- GLA 0x7ff98b40d760
(XEN) domain_crash called from vmx.c:3497
(XEN) Domain 75 (vcpu#1) crashed on cpu#4:
(XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    4
(XEN) RIP:    0033:[<00007ff98b40d760>]
(XEN) RFLAGS: 0000000000010216   CONTEXT: hvm guest (d75v1)
(XEN) rax: 0000000000001212   rbx: 000000c714d9da58   rcx: 0000023500001590
(XEN) rdx: 000000c700000001   rsi: 000000c714d9da18   rdi: 000000c714d9db20
(XEN) rbp: 000000c714d9d950   rsp: 000000c714d9d918   r8:  0000023500001470
(XEN) r9:  00000235000014f0   r10: 00007ff99c5c0923   r11: 000000c714d9d970
(XEN) r12: 0000000000000000   r13: 000000c714d9d9d0   r14: 000000c714d9da58
(XEN) r15: 0000000000000006   cr0: 0000000080050031   cr4: 0000000000060678
(XEN) cr3: 00000001d9458002   cr2: 00007ff98b6fa048
(XEN) fsb: 0000000000000000   gsb: 000000c714e9e000   gss: ffffcd015dc40000
(XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033

> So it's in debian 9 update: xen (4.8.5.final+shim4.10.4-1+deb9u12)
> and in debian 10 update:  xen (4.11.3+24-g14b62ab3e5-1) that is causing 
> the crashes.

For 4.11, can you please try the workaround to enable "executable EPT
superpages" again?

It's the ept=exec-sp hypervisor setting, and can also be set without
rebooting using:

   xl set-parameters ept=exec-sp

(and no-exec-sp to go back to the default again)

This seems to be related to XSA-304, whose patches were included in the
latest security uploads in Debian.

https://xenbits.xen.org/xsa/advisory-304.html

I do not know if it's Windows or Xen at fault here, but at least this
workaround stops the domU from crashing all the time.

Hans

> memory = 5120 = Domu crashes see below
> 
> memory = 4096 = Domu works ok.
> 
> 
> I am reporting it here since perhaps other distributions might
> carry the same patches and have the same problems.
> 
> 
> 
> 
> 
> Debian 10 Xen hypervisor running windows 2012 as domu.
> 
> 
> (XEN) Failed to shatter gfn e660e: -12
> (XEN) d3v1 EPT violation 0x19c (--x/rw-) gpa 0x000000e660e075 mfn 
> 0xceae0e type 0
> (XEN) d3v1 Walking EPT tables for GFN e660e:
> (XEN) d3v1  epte 9c00000ec17dd007
> (XEN) d3v1  epte 9c0000078a576007
> (XEN) d3v1  epte 9c00000ceae000f3
> (XEN) d3v1  --- GLA 0x7fca357d075
> (XEN) domain_crash called from vmx.c:3497
> (XEN) Domain 3 (vcpu#1) crashed on cpu#14:
> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    14
> (XEN) RIP:    0033:[<000007fca357d075>]
> (XEN) RFLAGS: 0000000000010283   CONTEXT: hvm guest (d3v1)
> (XEN) rax: 000007fca3e7feb0   rbx: 0000000023c34600   rcx: 000000de005e44f0
> (XEN) rdx: 000000de6cd67210   rsi: 000000de005e44f0   rdi: 000000de005e0358
> (XEN) rbp: 000000de005e4028   rsp: 000000de6f68cec8   r8: 0000000000000004
> (XEN) r9:  0000000000000001   r10: 0000000000000002   r11: 000007fca3571ef8
> (XEN) r12: 0000000000000008   r13: 0000000000000058   r14: 000000de6f68d7e0
> (XEN) r15: 0000000000000002   cr0: 0000000080050031   cr4: 00000000000006f8
> (XEN) cr3: 00000000b5640000   cr2: 000000de6f7a049c
> (XEN) fsb: 00000000ff7e6000   gsb: 000007f5ff7e4000   gss: 000007f7bb927000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) Failed to shatter gfn 15f9b: -12
> (XEN) d9v0 EPT violation 0x19c (--x/rw-) gpa 0x00000015f9b000 mfn 
> 0xcb719b type 0
> (XEN) d9v0 Walking EPT tables for GFN 15f9b:
> (XEN) d9v0  epte 9c00000ee8476007
> (XEN) d9v0  epte 9c0000078ccc2007
> (XEN) d9v0  epte 9c00000cb70000f3
> (XEN) d9v0  --- GLA 0x7f63b039000
> (XEN) domain_crash called from vmx.c:3497
> (XEN) Domain 9 (vcpu#0) crashed on cpu#12:
> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    12
> (XEN) RIP:    0033:[<000007f63b038ffd>]
> (XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d9v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx: 000000000000000e
> (XEN) rdx: 000007040ab01ff0   rsi: 000000f5a749a3e0   rdi: 0000000000000000
> (XEN) rbp: 000000f5a808f570   rsp: 000000f5a808f470   r8: 0000000000000010
> (XEN) r9:  0000000000000002   r10: 0000000000000000   r11: 0000000000000000
> (XEN) r12: 0000000000000004   r13: 000007f63b0fe3a8   r14: 0000000000000000
> (XEN) r15: 0000000000000001   cr0: 0000000080050031   cr4: 00000000000006f8
> (XEN) cr3: 0000000052280000   cr2: 000007f63b039000
> (XEN) fsb: 0000000039f8a000   gsb: 000007f639f88000   gss: 000007f705f8a000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) Failed to shatter gfn cd7c9: -12
> (XEN) d15v0 EPT violation 0x19c (--x/rw-) gpa 0x000000cd7c9060 mfn 
> 0xdc37c9 type 0
> (XEN) d15v0 Walking EPT tables for GFN cd7c9:
> (XEN) d15v0  epte 9c00000f1e239007
> (XEN) d15v0  epte 9c0000078cc13007
> (XEN) d15v0  epte 9c00000dc36000f3
> (XEN) d15v0  --- GLA 0x7ff7a5b2060
> (XEN) domain_crash called from vmx.c:3497
> (XEN) Domain 15 (vcpu#0) crashed on cpu#14:
> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    14
> (XEN) RIP:    0033:[<000007ff7a5b2060>]
> (XEN) RFLAGS: 0000000000010206   CONTEXT: hvm guest (d15v0)
> (XEN) rax: 0000000000000002   rbx: 0000000000000002   rcx: 000007ff7a5d3c60
> (XEN) rdx: 000007ff7a5cc0d0   rsi: 0000000080070002   rdi: 00000042424bb320
> (XEN) rbp: 0000004241cff869   rsp: 0000004241cff7c8   r8: 000000000000066a
> (XEN) r9:  000007ff7a5b8e08   r10: 0000000000000000   r11: 0000000000000246
> (XEN) r12: 0000000000000000   r13: 0000004240e5a478   r14: 000000000000000e
> (XEN) r15: 00000042424d3370   cr0: 0000000080050031   cr4: 00000000000006f8
> (XEN) cr3: 0000000112a40000   cr2: 000007ff7a5b2060
> (XEN) fsb: 0000000096c7e000   gsb: 000007f796c7c000   gss: 000007f796c7c000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) Failed to shatter gfn ecddb: -12
> (XEN) d16v0 EPT violation 0x19c (--x/rw-) gpa 0x000000ecddb3b6 mfn 
> 0xc841db type 0
> (XEN) d16v0 Walking EPT tables for GFN ecddb:
> (XEN) d16v0  epte 9c00000ed02af007
> (XEN) d16v0  epte 9c0000078daf2007
> (XEN) d16v0  epte 9c00000c840000f3
> (XEN) d16v0  --- GLA 0x7ff962313b6
> (XEN) domain_crash called from vmx.c:3497
> (XEN) Domain 16 (vcpu#0) crashed on cpu#17:
> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    17
> (XEN) RIP:    0033:[<000007ff962313b6>]
> (XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d16v0)
> (XEN) rax: 0000000000000003   rbx: 0000000004895fd0   rcx: 0000000004895fd0
> (XEN) rdx: 0000000004895fd0   rsi: 0000000007464de0   rdi: 0000000000000000
> (XEN) rbp: 0000000000000000   rsp: 00000000096df660   r8: 0000000004aa7630
> (XEN) r9:  0000000000000000   r10: 000007ff95f7c660   r11: 0000000000000000
> (XEN) r12: 000000007ffe03c0   r13: 0000000000000000   r14: 000000007ffe03b0
> (XEN) r15: 000000007ffe0008   cr0: 0000000080050031   cr4: 00000000000006f8
> (XEN) cr3: 000000007eac0000   cr2: 000000ed1d62a000
> (XEN) fsb: 00000000dc9be000   gsb: 000007f7dc9bc000   gss: fffff802f933d000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> 
> 
> 
> 
> 
> Debian 9 XEN hypervisor running windows 2012 as domu.
> 
> 
> (XEN) Failed to shatter gfn daf71: -12
> (XEN) d19v0 EPT violation 0x39c (--x/rw-) gpa 0x000000daf710d0 mfn 
> 0x38a5971 type 0
> (XEN) d19v0 Walking EPT tables for GFN daf71:
> (XEN) d19v0  epte 9c00004019911107
> (XEN) d19v0  epte 9c0000201a67f107
> (XEN) Failed to shatter gfn ca3dc: -12
> (XEN) d19v0  epte 9c000038a5800bf3
> (XEN) d19v0  --- GLA 0x7f8fc0130d0
> (XEN) domain_crash called from vmx.c:3385
> (XEN) d19v1 EPT violation 0x39c (--x/rw-) gpa 0x000000ca3dc430 mfn 
> 0x38b65dc type 0
> (XEN) Domain 19 (vcpu#0) crashed on cpu#29:
> (XEN) d19v1 Walking EPT tables for GFN ca3dc:
> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    29
> (XEN) RIP:    0033:[<000007f8fc0130d0>]
> (XEN) RFLAGS: 0000000000010246   CONTEXT: hvm guest (d19v0)
> (XEN) rax: 000007f8fc0130d0   rbx: 0000000000000001   rcx: 00000040673d4430
> (XEN) rdx: 0000004002a8e3b0   rsi: 0000000000000001   rdi: 00000040673d42d0
> (XEN) rbp: 0000004002a8e930   rsp: 0000004002a8e348   r8: 0000000000000001
> (XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 000007f8fb5d3020
> (XEN) r12: 0000004002a8f510   r13: 0000004002a8eed0   r14: 00000040676c0e20
> (XEN) r15: 0000004067450768   cr0: 0000000080050031   cr4: 00000000001506f8
> (XEN) cr3: 0000000122000000   cr2: 000007f8fc0130d0
> (XEN) fsb: 00000000ff3d2000   gsb: 000007f5ff3d0000   gss: 000007f7eb928000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) d19v1  epte 9c00004019911107
> (XEN) d19v1  epte 9c0000201a67f107
> (XEN) domain_crash called from vmx.c:3385
> (XEN) Failed to shatter gfn 3e8f3: -12
> (XEN) printk: 2 messages suppressed.
> (XEN) d20v0 EPT violation 0x39c (--x/rw-) gpa 0x0000003e8f3010 mfn 
> 0x3901ef3 type 0
> (XEN) d20v0 Walking EPT tables for GFN 3e8f3:
> (XEN) d20v0  epte 9c000040128ff107
> (XEN) d20v0  epte 9c00002059ee9107
> (XEN) d20v0  epte 9c00003901e00bf3
> (XEN) d20v0  --- GLA 0x7f8780b5010
> (XEN) domain_crash called from vmx.c:3385
> (XEN) Domain 20 (vcpu#0) crashed on cpu#35:
> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    35
> (XEN) RIP:    0033:[<000007f8780b5010>]
> (XEN) RFLAGS: 0000000000010283   CONTEXT: hvm guest (d20v0)
> (XEN) rax: 000007f8780b5010   rbx: 000007f8780b6e00   rcx: 0000000004b50de0
> (XEN) rdx: 000000000992d6f0   rsi: 0000000000000000   rdi: 000007f878097d80
> (XEN) rbp: 0000000004b50de0   rsp: 000000000992d6c8   r8: 0000000000000010
> (XEN) r9:  0000000000000002   r10: 000007f8780b6e00   r11: 0000000000000001
> (XEN) r12: 000007f89bbb3ea8   r13: 000007f89babeb28   r14: 000007f8780b6bb0
> (XEN) r15: 000000000992d930   cr0: 0000000080050031   cr4: 00000000001506f8
> (XEN) cr3: 00000000e8400000   cr2: 0000005730908000
> (XEN) fsb: 000000004a060000   gsb: 000007f64a05e000   gss: 000007f79c1c2000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) Failed to shatter gfn db554: -12
> (XEN) d22v1 EPT violation 0x39c (--x/rw-) gpa 0x000000db554f70 mfn 
> 0x3c65354 type 0
> (XEN) d22v1 Walking EPT tables for GFN db554:
> (XEN) d22v1  epte 9c00004006b1d107
> (XEN) d22v1  epte 9c0000201d16e107
> (XEN) d22v1  epte 9c00003c65200bf3
> (XEN) d22v1  --- GLA 0x7fd2cb99f70
> (XEN) domain_crash called from vmx.c:3385
> (XEN) Domain 22 (vcpu#1) crashed on cpu#31:
> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    31
> (XEN) RIP:    0033:[<000007fd2cb99f70>]
> (XEN) RFLAGS: 0000000000010206   CONTEXT: hvm guest (d22v1)
> (XEN) rax: 000007fd2cb99f70   rbx: 000000473498eec8   rcx: 00000047349935b0
> (XEN) rdx: 000000473498cbe0   rsi: 000000000000000d   rdi: 00000047349935b0
> (XEN) rbp: 00000046338cc040   rsp: 00000046338cbfc8   r8: 00000046338cbd98
> (XEN) r9:  fffffffeff1edb14   r10: 0000000000000000   r11: 0000000000000001
> (XEN) r12: 000007fd376385b8   r13: 0000004633c3d5e0   r14: 000000473498cdb0
> (XEN) r15: 0000004859c65478   cr0: 0000000080050031   cr4: 00000000001506f8
> (XEN) cr3: 00000000cc000000   cr2: 000007fd2cb99f70
> (XEN) fsb: 0000000002065000   gsb: 000007f702063000   gss: 000007f702063000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> (XEN) Failed to shatter gfn c662c: -12
> (XEN) d23v0 EPT violation 0x39c (--x/rw-) gpa 0x000000c662c8b8 mfn 
> 0x3dba02c type 0
> (XEN) d23v0 Walking EPT tables for GFN c662c:
> (XEN) d23v0  epte 9c000040159e4107
> (XEN) d23v0  epte 9c0000201cfc6107
> (XEN) d23v0  epte 9c00003dba000bf3
> (XEN) d23v0  --- GLA 0x7fa57bd58b8
> (XEN) domain_crash called from vmx.c:3385
> (XEN) Domain 23 (vcpu#0) crashed on cpu#34:
> (XEN) ----[ Xen-4.8.5  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    34
> (XEN) RIP:    0033:[<000007fa57bd58b8>]
> (XEN) RFLAGS: 0000000000010202   CONTEXT: hvm guest (d23v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx: 000000a99e82eaa0
> (XEN) rdx: 0000000000000000   rsi: 000000000000000c   rdi: 000000a99e82f1c0
> (XEN) rbp: 000000000002b02a   rsp: 000000a99e82ea58   r8: 0000000000000003
> (XEN) r9:  000007fa57b2e2f0   r10: 0000000000000000   r11: 0000000000000000
> (XEN) r12: 0000000000000000   r13: 000000a99e82f1c0   r14: 000000a99e82eaf0
> (XEN) r15: 000000000000000c   cr0: 0000000080050031   cr4: 00000000001506f8
> (XEN) cr3: 0000000109700000   cr2: 000007fa6c62d8bb
> (XEN) fsb: 00000000e80d2000   gsb: 000007f6e80d0000   gss: 000007f6e80d0000
> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
> 
> 
> _______________________________________________
> Xen-users mailing list
> Xen-users@xxxxxxxxxxxxxxxxxxxx
> https://lists.xenproject.org/mailman/listinfo/xen-users
> 


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-users

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.