[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-users] xen domU segfaults with xpti on intel based systems
Hi Juergen, Tomas, On Fri, Jan 11, 2019 at 09:21:09AM +0100, Juergen Gross wrote: > On 11/01/2019 07:05, Tomas Mozes wrote: > > Some of the affected systems are Debian 8/9 (Debian 10 with kernel 4.18 > > seems to work fine) and NetBSD 7. It's harder to reproduce the segfaults > > on Debian, but on NetBSD it's almost instant. > > Hmm, as we haven't received any similar reports, I suspect there is > something special on your side. I did report slightly similar problems to xen-devel: https://lists.xenproject.org/archives/html/xen-devel/2018-11/msg02811.html I currently work around it by ensuring the guests have updated their kernels to have the L1TF mitigations (you can tell because /sys/devices/system/cpu/vulnerabilities/l1tf appears). The other way was to set the Xen command line options pv-l1tf=false or pcid=0. For me this only affected 64-bit PV domains, but I only run Linux. I didn't try xpti=false because the logs about shadowing made me try the L1TF-related options first. For me the above behaviour is experienced on Xeon D-1540 and Xeon E5-1680v4 systems. I don't have any other types of system so don't know how widespread it is. Also please note that within weeks I also started experiencing much worse problems: host crash, for which the only suggestion so far is to try pcid=0. As that is hard for me to reproduce, with a time to re-occurrence currently somewhere between 8 and 14 days, I am not yet sure if pcid=0 helps. We're 9 days in to a test on that. https://lists.xenproject.org/archives/html/xen-devel/2018-12/msg00938.html Cheers, Andy _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-users
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |