[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] Domu windows 2012 crash.



On 18/03/2020 15:32, Johnny Ström wrote:
> On 3/14/20 2:54 PM, Hans van Kranenburg wrote:
>> Hi Johnny,
>>
>> On 2/20/20 10:10 AM, johnny Strom wrote:
>>> After the latest updates/security updates for debian 9 and debian 10,
>>> so will windows 2012 crash if more than 4096 memory is available to
>>> domu.
>> I am able to reproduce this with a Windows server essentials 2019 HVM
>> domU.
>>
>> An example from xl dmesg:
>>
>> (XEN) Failed to shatter gfn 105245: -12
>> (XEN) d75v1 EPT violation 0x19c (--x/rw-) gpa 0x00000105245760 mfn
>> 0x285245 type 0
>> (XEN) d75v1 Walking EPT tables for GFN 105245:
>> (XEN) d75v1  epte 9c000004105f9007
>> (XEN) d75v1  epte 9c000002800000f3
>> (XEN) d75v1  --- GLA 0x7ff98b40d760
>> (XEN) domain_crash called from vmx.c:3497
>> (XEN) Domain 75 (vcpu#1) crashed on cpu#4:
>> (XEN) ----[ Xen-4.11.4-pre  x86_64  debug=n   Not tainted ]----
>> (XEN) CPU:    4
>> (XEN) RIP:    0033:[<00007ff98b40d760>]
>> (XEN) RFLAGS: 0000000000010216   CONTEXT: hvm guest (d75v1)
>> (XEN) rax: 0000000000001212   rbx: 000000c714d9da58   rcx:
>> 0000023500001590
>> (XEN) rdx: 000000c700000001   rsi: 000000c714d9da18   rdi:
>> 000000c714d9db20
>> (XEN) rbp: 000000c714d9d950   rsp: 000000c714d9d918   r8: 
>> 0000023500001470
>> (XEN) r9:  00000235000014f0   r10: 00007ff99c5c0923   r11:
>> 000000c714d9d970
>> (XEN) r12: 0000000000000000   r13: 000000c714d9d9d0   r14:
>> 000000c714d9da58
>> (XEN) r15: 0000000000000006   cr0: 0000000080050031   cr4:
>> 0000000000060678
>> (XEN) cr3: 00000001d9458002   cr2: 00007ff98b6fa048
>> (XEN) fsb: 0000000000000000   gsb: 000000c714e9e000   gss:
>> ffffcd015dc40000
>> (XEN) ds: 002b   es: 002b   fs: 0053   gs: 002b   ss: 002b   cs: 0033
>>
>>> So it's in debian 9 update: xen (4.8.5.final+shim4.10.4-1+deb9u12)
>>> and in debian 10 update:  xen (4.11.3+24-g14b62ab3e5-1) that is causing
>>> the crashes.
>> For 4.11, can you please try the workaround to enable "executable EPT
>> superpages" again?
>>
>> It's the ept=exec-sp hypervisor setting, and can also be set without
>> rebooting using:
>>
>>     xl set-parameters ept=exec-sp
>
>
> Hello
>
>
> I have been running test  with "xl set-parameters ept=exec-sp" and
> windows 2012 R2.
>
> And it dose not crash anymore.
>
> I used memory = 5120 that did make it crash within 2 minutes before.
>
> So xl set-parameters ept=exec-sp seems to be an workaround for now.

Right, but what you're doing is turning off the security fix for XSA-304.

Do you have any shadow_memory= option set in your VM's config file?  If
so, please remove it.

~Andrew

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-users

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.