|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-users] xen domU segfaults with xpti on intel based systems
Hi Juergen, Tomas,
On Fri, Jan 11, 2019 at 09:21:09AM +0100, Juergen Gross wrote:
> On 11/01/2019 07:05, Tomas Mozes wrote:
> > Some of the affected systems are Debian 8/9 (Debian 10 with kernel 4.18
> > seems to work fine) and NetBSD 7. It's harder to reproduce the segfaults
> > on Debian, but on NetBSD it's almost instant.
>
> Hmm, as we haven't received any similar reports, I suspect there is
> something special on your side.
I did report slightly similar problems to xen-devel:
https://lists.xenproject.org/archives/html/xen-devel/2018-11/msg02811.html
I currently work around it by ensuring the guests have updated their
kernels to have the L1TF mitigations (you can tell because
/sys/devices/system/cpu/vulnerabilities/l1tf appears).
The other way was to set the Xen command line options pv-l1tf=false
or pcid=0.
For me this only affected 64-bit PV domains, but I only run Linux. I
didn't try xpti=false because the logs about shadowing made me try
the L1TF-related options first.
For me the above behaviour is experienced on Xeon D-1540 and Xeon
E5-1680v4 systems. I don't have any other types of system so don't
know how widespread it is.
Also please note that within weeks I also started experiencing much
worse problems: host crash, for which the only suggestion so far is
to try pcid=0. As that is hard for me to reproduce, with a time to
re-occurrence currently somewhere between 8 and 14 days, I am not
yet sure if pcid=0 helps. We're 9 days in to a test on that.
https://lists.xenproject.org/archives/html/xen-devel/2018-12/msg00938.html
Cheers,
Andy
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-users
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |