[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Is: EPT violations. Was:Re: Problems with pci/vga passthrough



On Wed, Jan 18, 2017 at 02:37:16AM +0100, Diederik de Haas wrote:
> Hi!
> 
> I reported/discussed this earlier on IRC, but was asked to report it here too.
> 
> The goal I tried to accomplish was getting vga passthrough working to get 
> hardware acceleration and OpenGL 2+ working for a vm containing 
> KDE Plasma 5 (Debian Stretch). 
> The graphics card I tried it with was an (old) NVidia GeForce 6200 TurboCache 
> and even though I already had a suspicion that it would be challenging, 
> which was confirmed on IRC, I wanted to try/figure out what I should be doing 
> as I'm (very) new to Xen. 
> 
> But as soon as I enabled 'gfx_passthru = 1` and `pci = [ '02:00.0' ]`, the 
> `xl create <vm-config>` process kept crashing and the only way I was able to 
> stop it was by doing `kill <xl-create-process>` and the <xl-create-process> 
> was 
> "/usr/lib/xen-4.8/bin/xl create -c /etc/xen/tradestation.home.cknow.org.cfg" 
> (attached as tradestation.xen.cfg)
> 
> Here's some console output illustrating the crashing:
> root@cknowsvr01:/home/diederik# xl create -c 
> /etc/xen/tradestation.home.cknow.org.cfg 
> Parsing config from /etc/xen/tradestation.home.cknow.org.cfg
> libxl: notice: libxl_numa.c:518:libxl__get_numa_candidate: NUMA placement 
> failed, performance might be affected
> libxl: error: libxl_qmp.c:287:qmp_handle_error_response: received an error 
> message from QMP server: Could not set password
> root@cknowsvr01:/home/diederik# xl list
> Name                                        ID   Mem VCPUs      State   
> Time(s)
> Domain-0                                     0 112773    32     r-----      
> 80.0
> tradestation.home.cknow.org                  5 16383     1     --psc-       
> 0.0
> root@cknowsvr01:/home/diederik# xl list
> Name                                        ID   Mem VCPUs      State   
> Time(s)
> Domain-0                                     0 112773    32     r-----      
> 86.2
> tradestation.home.cknow.org                  6 16383     1     ---sc-       
> 0.0
> root@cknowsvr01:/home/diederik# xl list
> Name                                        ID   Mem VCPUs      State   
> Time(s)
> Domain-0                                     0 112773    32     r-----      
> 86.3
> tradestation.home.cknow.org                  6 16383     1     ---sc-       
> 0.0
> root@cknowsvr01:/home/diederik# xl list
> Name                                        ID   Mem VCPUs      State   
> Time(s)
> Domain-0                                     0 112773    32     r-----      
> 90.4
> root@cknowsvr01:/home/diederik# xl list
> Name                                        ID   Mem VCPUs      State   
> Time(s)
> Domain-0                                     0 112773    32     r-----      
> 92.8
> tradestation.home.cknow.org                  7 16383     1     ---sc-       
> 0.0
> root@cknowsvr01:/home/diederik# xl list
> Name                                        ID   Mem VCPUs      State   
> Time(s)
> Domain-0                                     0 112773    32     r-----     
> 132.1
> tradestation.home.cknow.org                 13 16383     1     ---sc-       
> 0.0
> 
> Trying with `xl destroy <id>` didn't help, `xl pause <id>` paused the 
> crashing, but as soon as I tried to activate it again, the crash-loop 
> continued and as said before `kill <xl-create-process>` was the only way out.
> 
> I've also attached the output of `xl info` and `xl dmesg` as that may 
> provide some info as well. 
> In the `xl dmesg` you'll notice various crashes as well and that is very 
> likely 
> due to hardware-wise failing of the vga card which disappeared when I took 
> the vga card out of the system.

Can you also kindly attach lspci -vvv output?

And also repost 'xl dmesg' but make sure you have 'iommu=verbose,debug 
loglvl=all guest_loglvl=all'
on your Xen command line?

Cc-ing Intel maintainers, as the issue looks to be:

(XEN) d1v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
0xffffffffffffffff type 4
(XEN) d1v0 Walking EPT tables for GFN 4861ff:
(XEN) d1v0  gfn exceeds max_mapped_pfn 400000
(XEN) d1v0  --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 1 (vcpu#0) crashed on cpu#19:
(XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    19
(XEN) RIP:    0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d1v0)
(XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
(XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
(XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
(XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
(XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
(XEN) cr3: 0000000001a06000   cr2: 0000000000000000
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN)   Fault while accessing guest memory.


> 
> Furthermore, I have also attached a description of the process I tried to get 
> it working when trying to use `xl pci-assignable-add` which resulted in a 
> complete system hang. In retrospect it may have been caused by hardware 
> failure, but still, getting a complete system hang when executing a `xl` 
> command isn't nice. 
> But as I said, I'm a n00b wrt Xen, so I figured I better provide too much 
> info then too little.
> 
> No matter the hardware failure, I see the continuous loop of the  failed vm 
> creation attempt as a real problem as I could only stop that by using 
> `kill <pid>` and that was before the hardware (really) died.
> 
> As it looks like the hardware failure of the vga card even prevented booting 
> of the whole system at some point, I have removed it and have no plans to 
> put it back in, even for testing purposes. 
> But otherwise I'll try to answer any questions to the best of my abilities.
> I have ordered an XFX Radeon RX 460 - 4GB GDDR5 (passively cooled) and 
> when that arrives I can try to see whether I can reproduce it with that too, 
> but it may take a couple of days and it is a completely different card.
> 
> Lastly, I subscribed to this list but due to the huge volume, I unsubscribed 
> again, so a CC of any response would be preferable.
> 
> Cheers,
>   Diederik

> root@cknowsvr01:/home/diederik# cat /etc/xen/tradestation.home.cknow.org.cfg 
> #
> # Configuration file for the Xen instance tradestation.home.cknow.org, created
> # by xen-tools 4.6.2 on Sun Jan  8 12:58:13 2017.
> #
> 
> #
> #  Kernel + memory size
> #
> kernel      = '/boot/vmlinuz-4.8.0-2-amd64'
> extra       = 'elevator=noop xen-fbfront.video=32,1920,1080'
> ramdisk     = '/boot/initrd.img-4.8.0-2-amd64'
> 
> vcpus       = '8'
> memory      = '16384'
> 
> # Use PVH mode
> pvh         = 1
> 
> 
> #
> #  Disk device(s).
> #
> root        = '/dev/xvda2 ro'
> disk        = [
>                   'phy:/dev/vgXen/tradestation.home.cknow.org-disk,xvda2,w',
>                   'phy:/dev/vgXen/tradestation.home.cknow.org-swap,xvda1,w',
>               ]
> 
> 
> #
> #  Physical volumes
> #
> 
> 
> #
> #  Hostname
> #
> name        = 'tradestation.home.cknow.org'
> 
> #
> #  Networking
> #
> dhcp        = 'dhcp'
> vif         = [ 'mac=00:16:3E:C3:B3:E8' ]
> 
> #
> #  Behaviour
> #
> on_poweroff = 'destroy'
> on_reboot   = 'restart'
> on_crash    = 'restart'
> 
> 
> # PCI devices
> # pvh = 1 is likely needed for this
> gfx_passthru = 1
> pci = [ '02:00.0' ]
> 
> # VNC
> vnc=1
> vnclisten=""
> vncpasswd=""
> vga="stdvga"
> videoram=64

> root@cknowsvr01:/home/diederik# xl info
> host                   : cknowsvr01
> release                : 4.8.0-2-amd64
> version                : #1 SMP Debian 4.8.15-2 (2017-01-04)
> machine                : x86_64
> nr_cpus                : 32
> max_cpu_id             : 31
> nr_nodes               : 2
> cores_per_socket       : 8
> threads_per_core       : 2
> cpu_mhz                : 2095
> hw_caps                : 
> b7ebfbff:77fef3ff:2c100800:00000121:00000001:001cbfbb:00000000:00000100
> virt_caps              : hvm hvm_directio
> total_memory           : 130972
> free_memory            : 65
> sharing_freed_memory   : 0
> sharing_used_memory    : 0
> outstanding_claims     : 0
> free_cpus              : 0
> xen_major              : 4
> xen_minor              : 8
> xen_extra              : .0
> xen_version            : 4.8.0
> xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32 
> hvm-3.0-x86_32p hvm-3.0-x86_64 
> xen_scheduler          : credit
> xen_pagesize           : 4096
> platform_params        : virt_start=0xffff800000000000
> xen_changeset          : 
> xen_commandline        : placeholder
> cc_compiler            : gcc (Debian 6.2.1-7) 6.2.1 20161215
> cc_compile_by          : ian.jackson
> cc_compile_domain      : eu.citrix.com
> cc_compile_date        : Thu Dec 22 18:03:41 UTC 2016
> build_id               : c8b753ce66a22831cdf39f5624a3365352d37a44
> xend_config_format     : 4
> root@cknowsvr01:/home/diederik# xl dmesg
> (XEN) Xen version 4.8.0 (Debian 4.8.0-1) (ian.jackson@xxxxxxxxxxxxx) (gcc 
> (Debian 6.2.1-7) 6.2.1 20161215) debug=n  Thu Dec 22 18:03:41 UTC 2016
> (XEN) Bootloader: GRUB 2.02~beta3-3
> (XEN) Command line: placeholder
> (XEN) Video information:
> (XEN)  VGA is text mode 80x25, font 8x16
> (XEN)  VBE/DDC methods: none; EDID transfer time: 0 seconds
> (XEN)  EDID info not retrieved because no DDC retrieval method detected
> (XEN) Disc information:
> (XEN)  Found 5 MBR signatures
> (XEN)  Found 5 EDD information structures
> (XEN) Xen-e820 RAM map:
> (XEN)  0000000000000000 - 000000000009e800 (usable)
> (XEN)  000000000009e800 - 00000000000a0000 (reserved)
> (XEN)  00000000000e0000 - 0000000000100000 (reserved)
> (XEN)  0000000000100000 - 0000000079d24000 (usable)
> (XEN)  0000000079d24000 - 000000007b8ea000 (reserved)
> (XEN)  000000007b8ea000 - 000000007b95d000 (ACPI data)
> (XEN)  000000007b95d000 - 000000007bee0000 (ACPI NVS)
> (XEN)  000000007bee0000 - 0000000090000000 (reserved)
> (XEN)  00000000fed1c000 - 00000000fed45000 (reserved)
> (XEN)  00000000ff000000 - 0000000100000000 (reserved)
> (XEN)  0000000100000000 - 0000002080000000 (usable)
> (XEN) ACPI: RSDP 000F0580, 0024 (r2 ALASKA)
> (XEN) ACPI: XSDT 7B9120B0, 00D4 (r1 ALASKA   A M I   1072009 AMI     10013)
> (XEN) ACPI: FACP 7B941410, 010C (r5 ALASKA   A M I   1072009 AMI     10013)
> (XEN) ACPI: DSDT 7B912218, 2F1F7 (r2 ALASKA   A M I   1072009 INTL 20091013)
> (XEN) ACPI: FACS 7BEDEF80, 0040
> (XEN) ACPI: APIC 7B941520, 0224 (r3 ALASKA   A M I   1072009 AMI     10013)
> (XEN) ACPI: FPDT 7B941748, 0044 (r1 ALASKA   A M I   1072009 AMI     10013)
> (XEN) ACPI: FIDT 7B941790, 009C (r1 ALASKA   A M I   1072009 AMI     10013)
> (XEN) ACPI: MCFG 7B941830, 003C (r1 ALASKA    A M I  1072009 MSFT       97)
> (XEN) ACPI: EINJ 7B95C7D0, 0130 (r1 ALASKA   A M I         1 INTL        1)
> (XEN) ACPI: UEFI 7B9418C8, 0042 (r1 ALASKA   A M I   1072009             0)
> (XEN) ACPI: HPET 7B941910, 0038 (r1 ALASKA   A M I         1 INTL 20091013)
> (XEN) ACPI: MSCT 7B941948, 0090 (r1 ALASKA   A M I         1 INTL 20091013)
> (XEN) ACPI: SLIT 7B9419D8, 0030 (r1 ALASKA   A M I         1 INTL 20091013)
> (XEN) ACPI: SRAT 7B941A08, 1158 (r3 ALASKA   A M I         1 INTL 20091013)
> (XEN) ACPI: WDDT 7B942B60, 0040 (r1 ALASKA   A M I         0 INTL 20091013)
> (XEN) ACPI: SSDT 7B942BA0, 16FB3 (r2 ALASKA    PmMgt        1 INTL 20120913)
> (XEN) ACPI: NITR 7B959B58, 0071 (r2 ALASKA   A M I         1 INTL 20091013)
> (XEN) ACPI: SPMI 7B959BD0, 0041 (r5 ALASKA   A M I         0 AMI.        0)
> (XEN) ACPI: SSDT 7B959C18, 2652 (r2 ALASKA SpsNm           2 INTL 20120913)
> (XEN) ACPI: SSDT 7B95C270, 0064 (r2 ALASKA SpsNvs          2 INTL 20120913)
> (XEN) ACPI: PRAD 7B95C2D8, 0102 (r2 ALASKA   A M I         2 INTL 20120913)
> (XEN) ACPI: DMAR 7B95C3E0, 00E8 (r1 ALASKA   A M I         1 INTL 20091013)
> (XEN) ACPI: HEST 7B95C4C8, 00A8 (r1 ALASKA   A M I         1 INTL        1)
> (XEN) ACPI: BERT 7B95C570, 0030 (r1 ALASKA   A M I         1 INTL        1)
> (XEN) ACPI: ERST 7B95C5A0, 0230 (r1 ALASKA   A M I         1 INTL        1)
> (XEN) System RAM: 130972MB (134116104kB)
> (XEN) Domain heap initialised DMA width 32 bits
> (XEN) ACPI: 32/64X FACS address mismatch in FADT - 7bedef80/0000000000000000, 
> using 32
> (XEN) IOAPIC[0]: apic_id 1, version 32, address 0xfec00000, GSI 0-23
> (XEN) IOAPIC[1]: apic_id 2, version 32, address 0xfec01000, GSI 24-47
> (XEN) IOAPIC[2]: apic_id 3, version 32, address 0xfec40000, GSI 48-71
> (XEN) Enabling APIC mode:  Phys.  Using 3 I/O APICs
> (XEN) Not enabling x2APIC (upon firmware request)
> (XEN) xstate: size: 0x340 and states: 0x7
> (XEN) CMCI: threshold 0x2 too large for CPU0 bank 17, using 0x1
> (XEN) CMCI: threshold 0x2 too large for CPU0 bank 18, using 0x1
> (XEN) CMCI: threshold 0x2 too large for CPU0 bank 19, using 0x1
> (XEN) Using scheduler: SMP Credit Scheduler (credit)
> (XEN) Platform timer is 14.318MHz HPET
> (XEN) Detected 2095.152 MHz processor.
> (XEN) Initing memory sharing.
> (XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB.
> (XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB.
> (XEN) Intel VT-d Snoop Control enabled.
> (XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
> (XEN) Intel VT-d Queued Invalidation enabled.
> (XEN) Intel VT-d Interrupt Remapping enabled.
> (XEN) Intel VT-d Posted Interrupt not enabled.
> (XEN) Intel VT-d Shared EPT tables enabled.
> (XEN) I/O virtualisation enabled
> (XEN)  - Dom0 mode: Relaxed
> (XEN) Interrupt remapping enabled
> (XEN) Enabled directed EOI with ioapic_ack_old on!
> (XEN) ENABLING IO-APIC IRQs
> (XEN)  -> Using old ACK method
> (XEN) Allocated console ring of 64 KiB.
> (XEN) VMX: Supported advanced features:
> (XEN)  - APIC MMIO access virtualisation
> (XEN)  - APIC TPR shadow
> (XEN)  - Extended Page Tables (EPT)
> (XEN)  - Virtual-Processor Identifiers (VPID)
> (XEN)  - Virtual NMI
> (XEN)  - MSR direct-access bitmap
> (XEN)  - Unrestricted Guest
> (XEN)  - APIC Register Virtualization
> (XEN)  - Virtual Interrupt Delivery
> (XEN)  - Posted Interrupt Processing
> (XEN)  - VMCS shadowing
> (XEN)  - VM Functions
> (XEN)  - Virtualisation Exceptions
> (XEN)  - Page Modification Logging
> (XEN) HVM: ASIDs enabled.
> (XEN) HVM: VMX enabled
> (XEN) HVM: Hardware Assisted Paging (HAP) detected
> (XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB
> (XEN) CMCI: threshold 0x2 too large for CPU16 bank 17, using 0x1
> (XEN) CMCI: threshold 0x2 too large for CPU16 bank 18, using 0x1
> (XEN) CMCI: threshold 0x2 too large for CPU16 bank 19, using 0x1
> (XEN) Brought up 32 CPUs
> (XEN) Dom0 has maximum 1224 PIRQs
> (XEN) *** LOADING DOMAIN 0 ***
> (XEN)  Xen  kernel: 64-bit, lsb, compat32
> (XEN)  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x1d6b000
> (XEN) PHYSICAL MEMORY ARRANGEMENT:
> (XEN)  Dom0 alloc.:   000000202e000000->0000002030000000 (33053699 pages to 
> be allocated)
> (XEN)  Init. ramdisk: 000000207ecd0000->000000207ffffbda
> (XEN) VIRTUAL MEMORY ARRANGEMENT:
> (XEN)  Loaded kernel: ffffffff81000000->ffffffff81d6b000
> (XEN)  Init. ramdisk: 0000000000000000->0000000000000000
> (XEN)  Phys-Mach map: 0000008000000000->000000800fc47998
> (XEN)  Start info:    ffffffff81d6b000->ffffffff81d6b4b4
> (XEN)  Page tables:   ffffffff81d6c000->ffffffff81d7f000
> (XEN)  Boot stack:    ffffffff81d7f000->ffffffff81d80000
> (XEN)  TOTAL:         ffffffff80000000->ffffffff82000000
> (XEN)  ENTRY ADDRESS: ffffffff81b35180
> (XEN) Dom0 has maximum 32 VCPUs
> (XEN) Scrubbing Free RAM on 2 nodes using 16 CPUs
> (XEN) ..................................................................done.
> (XEN) Initial low memory virq threshold set at 0x4000 pages.
> (XEN) Std. Loglevel: Errors and warnings
> (XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
> (XEN) Xen is relinquishing VGA console.
> (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to 
> Xen)
> (XEN) Freed 312kB init memory
> (XEN) d1v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d1v0 Walking EPT tables for GFN 4861ff:
> (XEN) d1v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d1v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 1 (vcpu#0) crashed on cpu#19:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    19
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d1v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d2v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d2v0 Walking EPT tables for GFN 4861ff:
> (XEN) d2v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d2v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 2 (vcpu#0) crashed on cpu#15:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    15
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d2v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d3v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d3v0 Walking EPT tables for GFN 4861ff:
> (XEN) d3v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d3v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 3 (vcpu#0) crashed on cpu#20:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    20
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d3v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d4v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d4v0 Walking EPT tables for GFN 4861ff:
> (XEN) d4v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d4v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 4 (vcpu#0) crashed on cpu#12:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    12
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d4v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d5v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d5v0 Walking EPT tables for GFN 4861ff:
> (XEN) d5v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d5v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 5 (vcpu#0) crashed on cpu#28:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    28
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d5v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d6v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d6v0 Walking EPT tables for GFN 4861ff:
> (XEN) d6v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d6v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 6 (vcpu#0) crashed on cpu#24:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    24
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d6v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d7v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d7v0 Walking EPT tables for GFN 4861ff:
> (XEN) d7v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d7v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 7 (vcpu#0) crashed on cpu#30:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    30
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d7v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d8v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d8v0 Walking EPT tables for GFN 4861ff:
> (XEN) d8v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d8v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 8 (vcpu#0) crashed on cpu#8:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    8
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d8v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d9v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d9v0 Walking EPT tables for GFN 4861ff:
> (XEN) d9v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d9v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 9 (vcpu#0) crashed on cpu#5:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    5
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d9v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d10v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d10v0 Walking EPT tables for GFN 4861ff:
> (XEN) d10v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d10v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 10 (vcpu#0) crashed on cpu#0:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    0
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d10v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d11v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d11v0 Walking EPT tables for GFN 4861ff:
> (XEN) d11v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d11v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 11 (vcpu#0) crashed on cpu#10:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    10
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d11v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d12v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d12v0 Walking EPT tables for GFN 4861ff:
> (XEN) d12v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d12v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 12 (vcpu#0) crashed on cpu#5:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    5
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d12v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d13v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d13v0 Walking EPT tables for GFN 4861ff:
> (XEN) d13v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d13v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 13 (vcpu#0) crashed on cpu#14:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    14
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d13v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d14v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d14v0 Walking EPT tables for GFN 4861ff:
> (XEN) d14v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d14v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 14 (vcpu#0) crashed on cpu#1:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    1
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d14v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d15v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d15v0 Walking EPT tables for GFN 4861ff:
> (XEN) d15v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d15v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 15 (vcpu#0) crashed on cpu#28:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    28
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d15v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d16v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d16v0 Walking EPT tables for GFN 4861ff:
> (XEN) d16v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d16v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 16 (vcpu#0) crashed on cpu#20:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    20
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d16v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d17v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d17v0 Walking EPT tables for GFN 4861ff:
> (XEN) d17v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d17v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 17 (vcpu#0) crashed on cpu#20:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    20
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d17v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d18v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d18v0 Walking EPT tables for GFN 4861ff:
> (XEN) d18v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d18v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 18 (vcpu#0) crashed on cpu#4:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    4
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d18v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d19v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d19v0 Walking EPT tables for GFN 4861ff:
> (XEN) d19v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d19v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 19 (vcpu#0) crashed on cpu#19:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    19
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d19v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d20v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d20v0 Walking EPT tables for GFN 4861ff:
> (XEN) d20v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d20v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 20 (vcpu#0) crashed on cpu#24:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    24
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d20v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> (XEN) d21v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d21v0 Walking EPT tables for GFN 4861ff:
> (XEN) d21v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d21v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 21 (vcpu#0) crashed on cpu#0:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    0
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d21v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.
> root@cknowsvr01:/home/diederik#

> VGA card:
> root@cknowsvr01:/home/diederik# lspci | grep -i vga
> 02:00.0 VGA compatible controller: NVIDIA Corporation NV44 [GeForce 6200 
> TurboCache] (rev a1)
> 
> 
> Uninstalled the nvidia proprietary driver (Debian package) and installed 
> nouveau and rebooted my server, which resulted in the following kernel 
> modules being loaded:
> diederik@cknowsvr01:~$ lsmod | grep nou
> nouveau              1544192  1
> mxm_wmi                16384  1 nouveau
> video                  40960  1 nouveau
> ttm                    98304  1 nouveau
> drm_kms_helper        155648  1 nouveau
> drm                   360448  4 nouveau,ttm,drm_kms_helper
> wmi                    16384  2 mxm_wmi,nouveau
> button                 16384  1 nouveau
> i2c_algo_bit           16384  2 igb,nouveau
> 
> After reboot I did: 
> root@cknowsvr01:/home/diederik# xl pci-assignable-list
> libxl: error: libxl_pci.c:409:libxl_device_pci_assignable_list: Looks like 
> pciback driver not loaded
> 
> So forgot to load the xen-pciback driver, so fixed that:
> root@cknowsvr01:/home/diederik# modprobe xen-pciback
> 
> root@cknowsvr01:/home/diederik# xl pci-assignable-list
> 
> Then tried to create a vm in which I had enabled pci-passthrough:
> root@cknowsvr01:/home/diederik# xl create -c 
> /etc/xen/tradestation.home.cknow.org.cfg 
> Parsing config from /etc/xen/tradestation.home.cknow.org.cfg
> libxl: notice: libxl_numa.c:518:libxl__get_numa_candidate: NUMA placement 
> failed, performance might be affected
> libxl: error: libxl_qmp.c:287:qmp_handle_error_response: received an error 
> message from QMP server: Could not set password
> libxl: error: libxl_pci.c:1225:libxl__device_pci_add: PCI device 0:2:0.0 is 
> not assignable
> libxl: error: libxl_pci.c:1304:libxl__add_pcidevs: libxl_device_pci_add 
> failed: -3
> libxl: error: libxl_create.c:1461:domcreate_attach_devices: unable to add pci 
> devices
> libxl: error: libxl.c:1575:libxl__destroy_domid: non-existant domain 1
> libxl: error: libxl.c:1534:domain_destroy_callback: unable to destroy guest 
> with domid 1
> libxl: error: libxl.c:1463:domain_destroy_cb: destruction of domain 1 failed
> root@cknowsvr01:/home/diederik# xl list
> Name                                        ID   Mem VCPUs      State   
> Time(s)
> Domain-0                                     0 112773    32     r-----      
> 54.3
> 
> which failed.
> Realizing I forgot to add my vga card, so tried to fix that:
> root@cknowsvr01:/home/diederik# xl pci-assignable-add 02:00.0
> at which my system hang and eventually my ssh-session got disconnected and am 
> unable to connect again. Plugging in a physical keyboard didn't help and a 
> hard reset seems to be the only way out.




> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxx
> https://lists.xen.org/xen-devel


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.