[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Is: EPT violations. Was:Re: Problems with pci/vga passthrough



>>> On 18.01.17 at 17:20, <konrad.wilk@xxxxxxxxxx> wrote:
> Cc-ing Intel maintainers, as the issue looks to be:
> 
> (XEN) d1v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 
> 0xffffffffffffffff type 4
> (XEN) d1v0 Walking EPT tables for GFN 4861ff:
> (XEN) d1v0  gfn exceeds max_mapped_pfn 400000
> (XEN) d1v0  --- GLA 0xffff8804861ff000
> (XEN) domain_crash called from vmx.c:3108
> (XEN) Domain 1 (vcpu#0) crashed on cpu#19:
> (XEN) ----[ Xen-4.8.0  x86_64  debug=n   Not tainted ]----
> (XEN) CPU:    19
> (XEN) RIP:    0010:[<ffffffff8132c462>]
> (XEN) RFLAGS: 0000000000010016   CONTEXT: hvm guest (d1v0)
> (XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: 000000000000003f
> (XEN) rdx: 0000000000000006   rsi: ffffffff81ae5688   rdi: ffff8804861ff000
> (XEN) rbp: 00000000004861ff   rsp: ffffffff81a03c20   r8:  0000000000000040
> (XEN) r9:  0000000000000000   r10: 0000000100000000   r11: 00000004862dc000
> (XEN) r12: 0000000000000001   r13: ffff880001d3e050   r14: ffffffff81a66804
> (XEN) r15: 0000000481400000   cr0: 0000000080050033   cr4: 0000000000040620
> (XEN) cr3: 0000000001a06000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: 0010
> (XEN) Guest stack trace from rsp=ffffffff81a03c20:
> (XEN)   Fault while accessing guest memory.

Well, the text near the top of this states the reason for the fault,
so I don't think this is (just) an EPT issue. The question really is why
there is an access to something which was never mapped. Without
more information provided we can't even guess what might be at
gpa 0x000004861ff000.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.