[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Is: EPT violations. Was:Re: Problems with pci/vga passthrough
On Wed, Jan 18, 2017 at 02:37:16AM +0100, Diederik de Haas wrote: > Hi! > > I reported/discussed this earlier on IRC, but was asked to report it here too. > > The goal I tried to accomplish was getting vga passthrough working to get > hardware acceleration and OpenGL 2+ working for a vm containing > KDE Plasma 5 (Debian Stretch). > The graphics card I tried it with was an (old) NVidia GeForce 6200 TurboCache > and even though I already had a suspicion that it would be challenging, > which was confirmed on IRC, I wanted to try/figure out what I should be doing > as I'm (very) new to Xen. > > But as soon as I enabled 'gfx_passthru = 1` and `pci = [ '02:00.0' ]`, the > `xl create <vm-config>` process kept crashing and the only way I was able to > stop it was by doing `kill <xl-create-process>` and the <xl-create-process> > was > "/usr/lib/xen-4.8/bin/xl create -c /etc/xen/tradestation.home.cknow.org.cfg" > (attached as tradestation.xen.cfg) > > Here's some console output illustrating the crashing: > root@cknowsvr01:/home/diederik# xl create -c > /etc/xen/tradestation.home.cknow.org.cfg > Parsing config from /etc/xen/tradestation.home.cknow.org.cfg > libxl: notice: libxl_numa.c:518:libxl__get_numa_candidate: NUMA placement > failed, performance might be affected > libxl: error: libxl_qmp.c:287:qmp_handle_error_response: received an error > message from QMP server: Could not set password > root@cknowsvr01:/home/diederik# xl list > Name ID Mem VCPUs State > Time(s) > Domain-0 0 112773 32 r----- > 80.0 > tradestation.home.cknow.org 5 16383 1 --psc- > 0.0 > root@cknowsvr01:/home/diederik# xl list > Name ID Mem VCPUs State > Time(s) > Domain-0 0 112773 32 r----- > 86.2 > tradestation.home.cknow.org 6 16383 1 ---sc- > 0.0 > root@cknowsvr01:/home/diederik# xl list > Name ID Mem VCPUs State > Time(s) > Domain-0 0 112773 32 r----- > 86.3 > tradestation.home.cknow.org 6 16383 1 ---sc- > 0.0 > root@cknowsvr01:/home/diederik# xl list > Name ID Mem VCPUs State > Time(s) > Domain-0 0 112773 32 r----- > 90.4 > root@cknowsvr01:/home/diederik# xl list > Name ID Mem VCPUs State > Time(s) > Domain-0 0 112773 32 r----- > 92.8 > tradestation.home.cknow.org 7 16383 1 ---sc- > 0.0 > root@cknowsvr01:/home/diederik# xl list > Name ID Mem VCPUs State > Time(s) > Domain-0 0 112773 32 r----- > 132.1 > tradestation.home.cknow.org 13 16383 1 ---sc- > 0.0 > > Trying with `xl destroy <id>` didn't help, `xl pause <id>` paused the > crashing, but as soon as I tried to activate it again, the crash-loop > continued and as said before `kill <xl-create-process>` was the only way out. > > I've also attached the output of `xl info` and `xl dmesg` as that may > provide some info as well. > In the `xl dmesg` you'll notice various crashes as well and that is very > likely > due to hardware-wise failing of the vga card which disappeared when I took > the vga card out of the system. Can you also kindly attach lspci -vvv output? And also repost 'xl dmesg' but make sure you have 'iommu=verbose,debug loglvl=all guest_loglvl=all' on your Xen command line? Cc-ing Intel maintainers, as the issue looks to be: (XEN) d1v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d1v0 Walking EPT tables for GFN 4861ff: (XEN) d1v0 gfn exceeds max_mapped_pfn 400000 (XEN) d1v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 1 (vcpu#0) crashed on cpu#19: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 19 (XEN) RIP: 0010:[<ffffffff8132c462>] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d1v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. > > Furthermore, I have also attached a description of the process I tried to get > it working when trying to use `xl pci-assignable-add` which resulted in a > complete system hang. In retrospect it may have been caused by hardware > failure, but still, getting a complete system hang when executing a `xl` > command isn't nice. > But as I said, I'm a n00b wrt Xen, so I figured I better provide too much > info then too little. > > No matter the hardware failure, I see the continuous loop of the failed vm > creation attempt as a real problem as I could only stop that by using > `kill <pid>` and that was before the hardware (really) died. > > As it looks like the hardware failure of the vga card even prevented booting > of the whole system at some point, I have removed it and have no plans to > put it back in, even for testing purposes. > But otherwise I'll try to answer any questions to the best of my abilities. > I have ordered an XFX Radeon RX 460 - 4GB GDDR5 (passively cooled) and > when that arrives I can try to see whether I can reproduce it with that too, > but it may take a couple of days and it is a completely different card. > > Lastly, I subscribed to this list but due to the huge volume, I unsubscribed > again, so a CC of any response would be preferable. > > Cheers, > Diederik > root@cknowsvr01:/home/diederik# cat /etc/xen/tradestation.home.cknow.org.cfg > # > # Configuration file for the Xen instance tradestation.home.cknow.org, created > # by xen-tools 4.6.2 on Sun Jan 8 12:58:13 2017. > # > > # > # Kernel + memory size > # > kernel = '/boot/vmlinuz-4.8.0-2-amd64' > extra = 'elevator=noop xen-fbfront.video=32,1920,1080' > ramdisk = '/boot/initrd.img-4.8.0-2-amd64' > > vcpus = '8' > memory = '16384' > > # Use PVH mode > pvh = 1 > > > # > # Disk device(s). > # > root = '/dev/xvda2 ro' > disk = [ > 'phy:/dev/vgXen/tradestation.home.cknow.org-disk,xvda2,w', > 'phy:/dev/vgXen/tradestation.home.cknow.org-swap,xvda1,w', > ] > > > # > # Physical volumes > # > > > # > # Hostname > # > name = 'tradestation.home.cknow.org' > > # > # Networking > # > dhcp = 'dhcp' > vif = [ 'mac=00:16:3E:C3:B3:E8' ] > > # > # Behaviour > # > on_poweroff = 'destroy' > on_reboot = 'restart' > on_crash = 'restart' > > > # PCI devices > # pvh = 1 is likely needed for this > gfx_passthru = 1 > pci = [ '02:00.0' ] > > # VNC > vnc=1 > vnclisten="" > vncpasswd="" > vga="stdvga" > videoram=64 > root@cknowsvr01:/home/diederik# xl info > host : cknowsvr01 > release : 4.8.0-2-amd64 > version : #1 SMP Debian 4.8.15-2 (2017-01-04) > machine : x86_64 > nr_cpus : 32 > max_cpu_id : 31 > nr_nodes : 2 > cores_per_socket : 8 > threads_per_core : 2 > cpu_mhz : 2095 > hw_caps : > b7ebfbff:77fef3ff:2c100800:00000121:00000001:001cbfbb:00000000:00000100 > virt_caps : hvm hvm_directio > total_memory : 130972 > free_memory : 65 > sharing_freed_memory : 0 > sharing_used_memory : 0 > outstanding_claims : 0 > free_cpus : 0 > xen_major : 4 > xen_minor : 8 > xen_extra : .0 > xen_version : 4.8.0 > xen_caps : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32 > hvm-3.0-x86_32p hvm-3.0-x86_64 > xen_scheduler : credit > xen_pagesize : 4096 > platform_params : virt_start=0xffff800000000000 > xen_changeset : > xen_commandline : placeholder > cc_compiler : gcc (Debian 6.2.1-7) 6.2.1 20161215 > cc_compile_by : ian.jackson > cc_compile_domain : eu.citrix.com > cc_compile_date : Thu Dec 22 18:03:41 UTC 2016 > build_id : c8b753ce66a22831cdf39f5624a3365352d37a44 > xend_config_format : 4 > root@cknowsvr01:/home/diederik# xl dmesg > (XEN) Xen version 4.8.0 (Debian 4.8.0-1) (ian.jackson@xxxxxxxxxxxxx) (gcc > (Debian 6.2.1-7) 6.2.1 20161215) debug=n Thu Dec 22 18:03:41 UTC 2016 > (XEN) Bootloader: GRUB 2.02~beta3-3 > (XEN) Command line: placeholder > (XEN) Video information: > (XEN) VGA is text mode 80x25, font 8x16 > (XEN) VBE/DDC methods: none; EDID transfer time: 0 seconds > (XEN) EDID info not retrieved because no DDC retrieval method detected > (XEN) Disc information: > (XEN) Found 5 MBR signatures > (XEN) Found 5 EDD information structures > (XEN) Xen-e820 RAM map: > (XEN) 0000000000000000 - 000000000009e800 (usable) > (XEN) 000000000009e800 - 00000000000a0000 (reserved) > (XEN) 00000000000e0000 - 0000000000100000 (reserved) > (XEN) 0000000000100000 - 0000000079d24000 (usable) > (XEN) 0000000079d24000 - 000000007b8ea000 (reserved) > (XEN) 000000007b8ea000 - 000000007b95d000 (ACPI data) > (XEN) 000000007b95d000 - 000000007bee0000 (ACPI NVS) > (XEN) 000000007bee0000 - 0000000090000000 (reserved) > (XEN) 00000000fed1c000 - 00000000fed45000 (reserved) > (XEN) 00000000ff000000 - 0000000100000000 (reserved) > (XEN) 0000000100000000 - 0000002080000000 (usable) > (XEN) ACPI: RSDP 000F0580, 0024 (r2 ALASKA) > (XEN) ACPI: XSDT 7B9120B0, 00D4 (r1 ALASKA A M I 1072009 AMI 10013) > (XEN) ACPI: FACP 7B941410, 010C (r5 ALASKA A M I 1072009 AMI 10013) > (XEN) ACPI: DSDT 7B912218, 2F1F7 (r2 ALASKA A M I 1072009 INTL 20091013) > (XEN) ACPI: FACS 7BEDEF80, 0040 > (XEN) ACPI: APIC 7B941520, 0224 (r3 ALASKA A M I 1072009 AMI 10013) > (XEN) ACPI: FPDT 7B941748, 0044 (r1 ALASKA A M I 1072009 AMI 10013) > (XEN) ACPI: FIDT 7B941790, 009C (r1 ALASKA A M I 1072009 AMI 10013) > (XEN) ACPI: MCFG 7B941830, 003C (r1 ALASKA A M I 1072009 MSFT 97) > (XEN) ACPI: EINJ 7B95C7D0, 0130 (r1 ALASKA A M I 1 INTL 1) > (XEN) ACPI: UEFI 7B9418C8, 0042 (r1 ALASKA A M I 1072009 0) > (XEN) ACPI: HPET 7B941910, 0038 (r1 ALASKA A M I 1 INTL 20091013) > (XEN) ACPI: MSCT 7B941948, 0090 (r1 ALASKA A M I 1 INTL 20091013) > (XEN) ACPI: SLIT 7B9419D8, 0030 (r1 ALASKA A M I 1 INTL 20091013) > (XEN) ACPI: SRAT 7B941A08, 1158 (r3 ALASKA A M I 1 INTL 20091013) > (XEN) ACPI: WDDT 7B942B60, 0040 (r1 ALASKA A M I 0 INTL 20091013) > (XEN) ACPI: SSDT 7B942BA0, 16FB3 (r2 ALASKA PmMgt 1 INTL 20120913) > (XEN) ACPI: NITR 7B959B58, 0071 (r2 ALASKA A M I 1 INTL 20091013) > (XEN) ACPI: SPMI 7B959BD0, 0041 (r5 ALASKA A M I 0 AMI. 0) > (XEN) ACPI: SSDT 7B959C18, 2652 (r2 ALASKA SpsNm 2 INTL 20120913) > (XEN) ACPI: SSDT 7B95C270, 0064 (r2 ALASKA SpsNvs 2 INTL 20120913) > (XEN) ACPI: PRAD 7B95C2D8, 0102 (r2 ALASKA A M I 2 INTL 20120913) > (XEN) ACPI: DMAR 7B95C3E0, 00E8 (r1 ALASKA A M I 1 INTL 20091013) > (XEN) ACPI: HEST 7B95C4C8, 00A8 (r1 ALASKA A M I 1 INTL 1) > (XEN) ACPI: BERT 7B95C570, 0030 (r1 ALASKA A M I 1 INTL 1) > (XEN) ACPI: ERST 7B95C5A0, 0230 (r1 ALASKA A M I 1 INTL 1) > (XEN) System RAM: 130972MB (134116104kB) > (XEN) Domain heap initialised DMA width 32 bits > (XEN) ACPI: 32/64X FACS address mismatch in FADT - 7bedef80/0000000000000000, > using 32 > (XEN) IOAPIC[0]: apic_id 1, version 32, address 0xfec00000, GSI 0-23 > (XEN) IOAPIC[1]: apic_id 2, version 32, address 0xfec01000, GSI 24-47 > (XEN) IOAPIC[2]: apic_id 3, version 32, address 0xfec40000, GSI 48-71 > (XEN) Enabling APIC mode: Phys. Using 3 I/O APICs > (XEN) Not enabling x2APIC (upon firmware request) > (XEN) xstate: size: 0x340 and states: 0x7 > (XEN) CMCI: threshold 0x2 too large for CPU0 bank 17, using 0x1 > (XEN) CMCI: threshold 0x2 too large for CPU0 bank 18, using 0x1 > (XEN) CMCI: threshold 0x2 too large for CPU0 bank 19, using 0x1 > (XEN) Using scheduler: SMP Credit Scheduler (credit) > (XEN) Platform timer is 14.318MHz HPET > (XEN) Detected 2095.152 MHz processor. > (XEN) Initing memory sharing. > (XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB. > (XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB. > (XEN) Intel VT-d Snoop Control enabled. > (XEN) Intel VT-d Dom0 DMA Passthrough not enabled. > (XEN) Intel VT-d Queued Invalidation enabled. > (XEN) Intel VT-d Interrupt Remapping enabled. > (XEN) Intel VT-d Posted Interrupt not enabled. > (XEN) Intel VT-d Shared EPT tables enabled. > (XEN) I/O virtualisation enabled > (XEN) - Dom0 mode: Relaxed > (XEN) Interrupt remapping enabled > (XEN) Enabled directed EOI with ioapic_ack_old on! > (XEN) ENABLING IO-APIC IRQs > (XEN) -> Using old ACK method > (XEN) Allocated console ring of 64 KiB. > (XEN) VMX: Supported advanced features: > (XEN) - APIC MMIO access virtualisation > (XEN) - APIC TPR shadow > (XEN) - Extended Page Tables (EPT) > (XEN) - Virtual-Processor Identifiers (VPID) > (XEN) - Virtual NMI > (XEN) - MSR direct-access bitmap > (XEN) - Unrestricted Guest > (XEN) - APIC Register Virtualization > (XEN) - Virtual Interrupt Delivery > (XEN) - Posted Interrupt Processing > (XEN) - VMCS shadowing > (XEN) - VM Functions > (XEN) - Virtualisation Exceptions > (XEN) - Page Modification Logging > (XEN) HVM: ASIDs enabled. > (XEN) HVM: VMX enabled > (XEN) HVM: Hardware Assisted Paging (HAP) detected > (XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB > (XEN) CMCI: threshold 0x2 too large for CPU16 bank 17, using 0x1 > (XEN) CMCI: threshold 0x2 too large for CPU16 bank 18, using 0x1 > (XEN) CMCI: threshold 0x2 too large for CPU16 bank 19, using 0x1 > (XEN) Brought up 32 CPUs > (XEN) Dom0 has maximum 1224 PIRQs > (XEN) *** LOADING DOMAIN 0 *** > (XEN) Xen kernel: 64-bit, lsb, compat32 > (XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x1d6b000 > (XEN) PHYSICAL MEMORY ARRANGEMENT: > (XEN) Dom0 alloc.: 000000202e000000->0000002030000000 (33053699 pages to > be allocated) > (XEN) Init. ramdisk: 000000207ecd0000->000000207ffffbda > (XEN) VIRTUAL MEMORY ARRANGEMENT: > (XEN) Loaded kernel: ffffffff81000000->ffffffff81d6b000 > (XEN) Init. ramdisk: 0000000000000000->0000000000000000 > (XEN) Phys-Mach map: 0000008000000000->000000800fc47998 > (XEN) Start info: ffffffff81d6b000->ffffffff81d6b4b4 > (XEN) Page tables: ffffffff81d6c000->ffffffff81d7f000 > (XEN) Boot stack: ffffffff81d7f000->ffffffff81d80000 > (XEN) TOTAL: ffffffff80000000->ffffffff82000000 > (XEN) ENTRY ADDRESS: ffffffff81b35180 > (XEN) Dom0 has maximum 32 VCPUs > (XEN) Scrubbing Free RAM on 2 nodes using 16 CPUs > (XEN) ..................................................................done. > (XEN) Initial low memory virq threshold set at 0x4000 pages. > (XEN) Std. Loglevel: Errors and warnings > (XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings) > (XEN) Xen is relinquishing VGA console. > (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to > Xen) > (XEN) Freed 312kB init memory > (XEN) d1v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d1v0 Walking EPT tables for GFN 4861ff: > (XEN) d1v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d1v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 1 (vcpu#0) crashed on cpu#19: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 19 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d1v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d2v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d2v0 Walking EPT tables for GFN 4861ff: > (XEN) d2v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d2v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 2 (vcpu#0) crashed on cpu#15: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 15 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d2v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d3v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d3v0 Walking EPT tables for GFN 4861ff: > (XEN) d3v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d3v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 3 (vcpu#0) crashed on cpu#20: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 20 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d3v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d4v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d4v0 Walking EPT tables for GFN 4861ff: > (XEN) d4v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d4v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 4 (vcpu#0) crashed on cpu#12: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 12 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d4v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d5v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d5v0 Walking EPT tables for GFN 4861ff: > (XEN) d5v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d5v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 5 (vcpu#0) crashed on cpu#28: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 28 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d5v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d6v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d6v0 Walking EPT tables for GFN 4861ff: > (XEN) d6v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d6v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 6 (vcpu#0) crashed on cpu#24: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 24 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d6v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d7v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d7v0 Walking EPT tables for GFN 4861ff: > (XEN) d7v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d7v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 7 (vcpu#0) crashed on cpu#30: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 30 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d7v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d8v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d8v0 Walking EPT tables for GFN 4861ff: > (XEN) d8v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d8v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 8 (vcpu#0) crashed on cpu#8: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 8 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d8v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d9v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d9v0 Walking EPT tables for GFN 4861ff: > (XEN) d9v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d9v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 9 (vcpu#0) crashed on cpu#5: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 5 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d9v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d10v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d10v0 Walking EPT tables for GFN 4861ff: > (XEN) d10v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d10v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 10 (vcpu#0) crashed on cpu#0: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 0 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d10v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d11v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d11v0 Walking EPT tables for GFN 4861ff: > (XEN) d11v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d11v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 11 (vcpu#0) crashed on cpu#10: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 10 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d11v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d12v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d12v0 Walking EPT tables for GFN 4861ff: > (XEN) d12v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d12v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 12 (vcpu#0) crashed on cpu#5: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 5 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d12v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d13v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d13v0 Walking EPT tables for GFN 4861ff: > (XEN) d13v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d13v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 13 (vcpu#0) crashed on cpu#14: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 14 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d13v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d14v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d14v0 Walking EPT tables for GFN 4861ff: > (XEN) d14v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d14v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 14 (vcpu#0) crashed on cpu#1: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 1 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d14v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d15v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d15v0 Walking EPT tables for GFN 4861ff: > (XEN) d15v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d15v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 15 (vcpu#0) crashed on cpu#28: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 28 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d15v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d16v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d16v0 Walking EPT tables for GFN 4861ff: > (XEN) d16v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d16v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 16 (vcpu#0) crashed on cpu#20: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 20 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d16v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d17v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d17v0 Walking EPT tables for GFN 4861ff: > (XEN) d17v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d17v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 17 (vcpu#0) crashed on cpu#20: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 20 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d17v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d18v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d18v0 Walking EPT tables for GFN 4861ff: > (XEN) d18v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d18v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 18 (vcpu#0) crashed on cpu#4: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 4 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d18v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d19v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d19v0 Walking EPT tables for GFN 4861ff: > (XEN) d19v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d19v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 19 (vcpu#0) crashed on cpu#19: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 19 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d19v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d20v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d20v0 Walking EPT tables for GFN 4861ff: > (XEN) d20v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d20v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 20 (vcpu#0) crashed on cpu#24: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 24 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d20v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > (XEN) d21v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn > 0xffffffffffffffff type 4 > (XEN) d21v0 Walking EPT tables for GFN 4861ff: > (XEN) d21v0 gfn exceeds max_mapped_pfn 400000 > (XEN) d21v0 --- GLA 0xffff8804861ff000 > (XEN) domain_crash called from vmx.c:3108 > (XEN) Domain 21 (vcpu#0) crashed on cpu#0: > (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 0 > (XEN) RIP: 0010:[<ffffffff8132c462>] > (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d21v0) > (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f > (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 > (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 > (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 > (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 > (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 > (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 > (XEN) Guest stack trace from rsp=ffffffff81a03c20: > (XEN) Fault while accessing guest memory. > root@cknowsvr01:/home/diederik# > VGA card: > root@cknowsvr01:/home/diederik# lspci | grep -i vga > 02:00.0 VGA compatible controller: NVIDIA Corporation NV44 [GeForce 6200 > TurboCache] (rev a1) > > > Uninstalled the nvidia proprietary driver (Debian package) and installed > nouveau and rebooted my server, which resulted in the following kernel > modules being loaded: > diederik@cknowsvr01:~$ lsmod | grep nou > nouveau 1544192 1 > mxm_wmi 16384 1 nouveau > video 40960 1 nouveau > ttm 98304 1 nouveau > drm_kms_helper 155648 1 nouveau > drm 360448 4 nouveau,ttm,drm_kms_helper > wmi 16384 2 mxm_wmi,nouveau > button 16384 1 nouveau > i2c_algo_bit 16384 2 igb,nouveau > > After reboot I did: > root@cknowsvr01:/home/diederik# xl pci-assignable-list > libxl: error: libxl_pci.c:409:libxl_device_pci_assignable_list: Looks like > pciback driver not loaded > > So forgot to load the xen-pciback driver, so fixed that: > root@cknowsvr01:/home/diederik# modprobe xen-pciback > > root@cknowsvr01:/home/diederik# xl pci-assignable-list > > Then tried to create a vm in which I had enabled pci-passthrough: > root@cknowsvr01:/home/diederik# xl create -c > /etc/xen/tradestation.home.cknow.org.cfg > Parsing config from /etc/xen/tradestation.home.cknow.org.cfg > libxl: notice: libxl_numa.c:518:libxl__get_numa_candidate: NUMA placement > failed, performance might be affected > libxl: error: libxl_qmp.c:287:qmp_handle_error_response: received an error > message from QMP server: Could not set password > libxl: error: libxl_pci.c:1225:libxl__device_pci_add: PCI device 0:2:0.0 is > not assignable > libxl: error: libxl_pci.c:1304:libxl__add_pcidevs: libxl_device_pci_add > failed: -3 > libxl: error: libxl_create.c:1461:domcreate_attach_devices: unable to add pci > devices > libxl: error: libxl.c:1575:libxl__destroy_domid: non-existant domain 1 > libxl: error: libxl.c:1534:domain_destroy_callback: unable to destroy guest > with domid 1 > libxl: error: libxl.c:1463:domain_destroy_cb: destruction of domain 1 failed > root@cknowsvr01:/home/diederik# xl list > Name ID Mem VCPUs State > Time(s) > Domain-0 0 112773 32 r----- > 54.3 > > which failed. > Realizing I forgot to add my vga card, so tried to fix that: > root@cknowsvr01:/home/diederik# xl pci-assignable-add 02:00.0 > at which my system hang and eventually my ssh-session got disconnected and am > unable to connect again. Plugging in a physical keyboard didn't help and a > hard reset seems to be the only way out. > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxx > https://lists.xen.org/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |