Re: [Xen-devel] Xen 4.6.1 crash with altp2m enabledbydefault

2016-09-21 Thread Kevin.Mayer
Hi guys I have found the problem (after hours and hours of gruesome debugging with the almighty print) and it seems that this could potentially have quite a bit of impact if altp2m is enabled for a guest domain (even if the functionality is never actively used), since destroying any vcpu of this

Re: [Xen-devel] Xen 4.6.1 crash with altp2m enabledbydefault

2016-09-07 Thread Kevin.Mayer
Hi I took the time to write a small script which restores and destroys domains from provided state files. Just apply the patch to a xen 4.6.1, provide some images + state files and start the script. python VmStarter.py -FILE /path/to/domU-0.state -FILE /path/to/domU-1.state --loggingLevel

Re: [Xen-devel] Xen 4.6.1 crash with altp2m enabledbydefault

2016-08-22 Thread Kevin.Mayer
Hi The reproduction should be pretty simple: Apply the patch to enable altp2m unconditionally: d->arch.hvm_domain.params[HVM_PARAM_HPET_ENABLED] = 1; d->arch.hvm_domain.params[HVM_PARAM_TRIPLE_FAULT_REASON] = SHUTDOWN_reboot; +d->arch.hvm_domain.params[HVM_PARAM_ALTP2M] = 1; +

Re: [Xen-devel] Xen 4.6.1 crash with altp2m enabledbydefault

2016-08-19 Thread Kevin.Mayer
Hi I took another look at Xen and a new crashdump. The last successful __vmwrite should be in static void vmx_vcpu_update_vmfunc_ve(struct vcpu *v) [...] __vmwrite(SECONDARY_VM_EXEC_CONTROL, v->arch.hvm_vmx.secondary_exec_control); [...] After this the altp2m_vcpu_destroy wakes

Re: [Xen-devel] Xen 4.6.1 crash with altp2m enabledbydefault

2016-08-08 Thread Kevin.Mayer
vmx_vmenter_helper is not part of the call stack. The address is simply the location of the ud2 to which the __vmwrite(HOST_CR0, v->arch.hvm_vmx.host_cr0); In static void vmx_fpu_leave(struct vcpu *v) jumps. There are two vmwrites in vmx_vcpu_update_eptp (called by altp2m_vcpu_destroy):

Re: [Xen-devel] Xen 4.6.1 crash with altp2m enabled bydefault

2016-08-05 Thread Kevin.Mayer
According to the xen dmesg (XEN) RIP:e008:[] vmx_vmenter_helper+0x27e/0x30a (XEN) RFLAGS: 00010003 CONTEXT: hypervisor (XEN) rax: 8005003b rbx: 8300e72fc000 rcx: (XEN) rdx: 6c00 rsi: 830617fd7fc0 rdi: 8300e6fc (XEN) rbp:

Re: [Xen-devel] Xen 4.6.1 crash with altp2m enabled by default

2016-08-04 Thread Kevin.Mayer
According to the crash-dump ( output of vcpu ) the v->arch.hvm_vmx.host_cr0 is " 0 ". This cannot be the correct result because of if ( !(v->arch.hvm_vmx.host_cr0 & X86_CR0_TS) ) { v->arch.hvm_vmx.host_cr0 |= X86_CR0_TS; __vmwrite(HOST_CR0, v->arch.hvm_vmx.host_cr0); } It

Re: [Xen-devel] Xen 4.6.1 crash with altp2m enabled by default

2016-08-03 Thread Kevin.Mayer
Hi guys I got around to take a closer look at the crash dump today. tl;dr: You were right, vmx_vmenter_helper is not called at all in the call stack. The real reason behind the [] vmx_vmenter_helper+0x27e/0x30a should be a failed __vmwrite(HOST_CR0, v->arch.hvm_vmx.host_cr0); in static void

Re: [Xen-devel] Xen 4.6.1 crash with altp2m enabled by default

2016-08-02 Thread Kevin.Mayer
Thanks for your reply. I installed the debug hypervisor and got a new crash dump now. I must confess that I have little to no experience debugging crash dumps, but this seems to be a different kind of error, or at least the way the error is reached is different. The pattern with “page number X

[Xen-devel] Xen 4.6.1 crash with altp2m enabled by default

2016-07-29 Thread Kevin.Mayer
Hi guys We are using Xen 4.6.1 to manage our virtual machines on x86-64-servers. We start dozens of VMs and destroy them again after 60 seconds, which works fine as it is, but the next step in our approach requires the use of the altp2m functionality. Since libvirt does not pass the

Re: [Xen-devel] Branch Trace Storage for guests andVPMUinitialization

2015-02-26 Thread Kevin.Mayer
-Ursprüngliche Nachricht- Von: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] Gesendet: Donnerstag, 26. Februar 2015 17:35 An: Dietmar Hahn; xen-devel@lists.xen.org Cc: Mayer, Kevin Betreff: Re: [Xen-devel] Branch Trace Storage for guests and VPMUinitialization On

Re: [Xen-devel] Branch Trace Storage for guests and VPMUinitialization

2015-02-25 Thread Kevin.Mayer
-Ursprüngliche Nachricht- Von: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] Gesendet: Dienstag, 24. Februar 2015 18:13 An: Mayer, Kevin; xen-devel@lists.xen.org Betreff: Re: [Xen-devel] Branch Trace Storage for guests and VPMU initialization On 02/24/2015 10:27 AM,

[Xen-devel] Branch Trace Storage for guests and VPMU initialization

2015-02-24 Thread Kevin.Mayer
Hi guys I`m trying to set up the BTS so that I can log the branches taken in the guest using Xen 4.4.1 with a WinXP SP3 guest on a Core i7 Sandy Bridge. I added the vpmu=bts boot parameter to my grub2 configuration and extended the libxl,libxc,domctl,... with an own command so that I can

[Xen-devel] Tracking guest code execution with EPT violations

2015-01-16 Thread Kevin.Mayer
Hi all I`m trying to track code execution with page granularity by setting the access rights in the EPT to not executable on Xen 4.4.1. The idea is as follows: According to the intel manual A reference using a guest-physical address whose translation encounters an EPT paging-structure that is