root@cknowsvr01:/home/diederik# xl info host : cknowsvr01 release : 4.8.0-2-amd64 version : #1 SMP Debian 4.8.15-2 (2017-01-04) machine : x86_64 nr_cpus : 32 max_cpu_id : 31 nr_nodes : 2 cores_per_socket : 8 threads_per_core : 2 cpu_mhz : 2095 hw_caps : b7ebfbff:77fef3ff:2c100800:00000121:00000001:001cbfbb:00000000:00000100 virt_caps : hvm hvm_directio total_memory : 130972 free_memory : 65 sharing_freed_memory : 0 sharing_used_memory : 0 outstanding_claims : 0 free_cpus : 0 xen_major : 4 xen_minor : 8 xen_extra : .0 xen_version : 4.8.0 xen_caps : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64 xen_scheduler : credit xen_pagesize : 4096 platform_params : virt_start=0xffff800000000000 xen_changeset : xen_commandline : placeholder cc_compiler : gcc (Debian 6.2.1-7) 6.2.1 20161215 cc_compile_by : ian.jackson cc_compile_domain : eu.citrix.com cc_compile_date : Thu Dec 22 18:03:41 UTC 2016 build_id : c8b753ce66a22831cdf39f5624a3365352d37a44 xend_config_format : 4 root@cknowsvr01:/home/diederik# xl dmesg (XEN) Xen version 4.8.0 (Debian 4.8.0-1) (ian.jackson@xxxxxxxxxxxxx) (gcc (Debian 6.2.1-7) 6.2.1 20161215) debug=n Thu Dec 22 18:03:41 UTC 2016 (XEN) Bootloader: GRUB 2.02~beta3-3 (XEN) Command line: placeholder (XEN) Video information: (XEN) VGA is text mode 80x25, font 8x16 (XEN) VBE/DDC methods: none; EDID transfer time: 0 seconds (XEN) EDID info not retrieved because no DDC retrieval method detected (XEN) Disc information: (XEN) Found 5 MBR signatures (XEN) Found 5 EDD information structures (XEN) Xen-e820 RAM map: (XEN) 0000000000000000 - 000000000009e800 (usable) (XEN) 000000000009e800 - 00000000000a0000 (reserved) (XEN) 00000000000e0000 - 0000000000100000 (reserved) (XEN) 0000000000100000 - 0000000079d24000 (usable) (XEN) 0000000079d24000 - 000000007b8ea000 (reserved) (XEN) 000000007b8ea000 - 000000007b95d000 (ACPI data) (XEN) 000000007b95d000 - 000000007bee0000 (ACPI NVS) (XEN) 000000007bee0000 - 0000000090000000 (reserved) (XEN) 00000000fed1c000 - 00000000fed45000 (reserved) (XEN) 00000000ff000000 - 0000000100000000 (reserved) (XEN) 0000000100000000 - 0000002080000000 (usable) (XEN) ACPI: RSDP 000F0580, 0024 (r2 ALASKA) (XEN) ACPI: XSDT 7B9120B0, 00D4 (r1 ALASKA A M I 1072009 AMI 10013) (XEN) ACPI: FACP 7B941410, 010C (r5 ALASKA A M I 1072009 AMI 10013) (XEN) ACPI: DSDT 7B912218, 2F1F7 (r2 ALASKA A M I 1072009 INTL 20091013) (XEN) ACPI: FACS 7BEDEF80, 0040 (XEN) ACPI: APIC 7B941520, 0224 (r3 ALASKA A M I 1072009 AMI 10013) (XEN) ACPI: FPDT 7B941748, 0044 (r1 ALASKA A M I 1072009 AMI 10013) (XEN) ACPI: FIDT 7B941790, 009C (r1 ALASKA A M I 1072009 AMI 10013) (XEN) ACPI: MCFG 7B941830, 003C (r1 ALASKA A M I 1072009 MSFT 97) (XEN) ACPI: EINJ 7B95C7D0, 0130 (r1 ALASKA A M I 1 INTL 1) (XEN) ACPI: UEFI 7B9418C8, 0042 (r1 ALASKA A M I 1072009 0) (XEN) ACPI: HPET 7B941910, 0038 (r1 ALASKA A M I 1 INTL 20091013) (XEN) ACPI: MSCT 7B941948, 0090 (r1 ALASKA A M I 1 INTL 20091013) (XEN) ACPI: SLIT 7B9419D8, 0030 (r1 ALASKA A M I 1 INTL 20091013) (XEN) ACPI: SRAT 7B941A08, 1158 (r3 ALASKA A M I 1 INTL 20091013) (XEN) ACPI: WDDT 7B942B60, 0040 (r1 ALASKA A M I 0 INTL 20091013) (XEN) ACPI: SSDT 7B942BA0, 16FB3 (r2 ALASKA PmMgt 1 INTL 20120913) (XEN) ACPI: NITR 7B959B58, 0071 (r2 ALASKA A M I 1 INTL 20091013) (XEN) ACPI: SPMI 7B959BD0, 0041 (r5 ALASKA A M I 0 AMI. 0) (XEN) ACPI: SSDT 7B959C18, 2652 (r2 ALASKA SpsNm 2 INTL 20120913) (XEN) ACPI: SSDT 7B95C270, 0064 (r2 ALASKA SpsNvs 2 INTL 20120913) (XEN) ACPI: PRAD 7B95C2D8, 0102 (r2 ALASKA A M I 2 INTL 20120913) (XEN) ACPI: DMAR 7B95C3E0, 00E8 (r1 ALASKA A M I 1 INTL 20091013) (XEN) ACPI: HEST 7B95C4C8, 00A8 (r1 ALASKA A M I 1 INTL 1) (XEN) ACPI: BERT 7B95C570, 0030 (r1 ALASKA A M I 1 INTL 1) (XEN) ACPI: ERST 7B95C5A0, 0230 (r1 ALASKA A M I 1 INTL 1) (XEN) System RAM: 130972MB (134116104kB) (XEN) Domain heap initialised DMA width 32 bits (XEN) ACPI: 32/64X FACS address mismatch in FADT - 7bedef80/0000000000000000, using 32 (XEN) IOAPIC[0]: apic_id 1, version 32, address 0xfec00000, GSI 0-23 (XEN) IOAPIC[1]: apic_id 2, version 32, address 0xfec01000, GSI 24-47 (XEN) IOAPIC[2]: apic_id 3, version 32, address 0xfec40000, GSI 48-71 (XEN) Enabling APIC mode: Phys. Using 3 I/O APICs (XEN) Not enabling x2APIC (upon firmware request) (XEN) xstate: size: 0x340 and states: 0x7 (XEN) CMCI: threshold 0x2 too large for CPU0 bank 17, using 0x1 (XEN) CMCI: threshold 0x2 too large for CPU0 bank 18, using 0x1 (XEN) CMCI: threshold 0x2 too large for CPU0 bank 19, using 0x1 (XEN) Using scheduler: SMP Credit Scheduler (credit) (XEN) Platform timer is 14.318MHz HPET (XEN) Detected 2095.152 MHz processor. (XEN) Initing memory sharing. (XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB. (XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB. (XEN) Intel VT-d Snoop Control enabled. (XEN) Intel VT-d Dom0 DMA Passthrough not enabled. (XEN) Intel VT-d Queued Invalidation enabled. (XEN) Intel VT-d Interrupt Remapping enabled. (XEN) Intel VT-d Posted Interrupt not enabled. (XEN) Intel VT-d Shared EPT tables enabled. (XEN) I/O virtualisation enabled (XEN) - Dom0 mode: Relaxed (XEN) Interrupt remapping enabled (XEN) Enabled directed EOI with ioapic_ack_old on! (XEN) ENABLING IO-APIC IRQs (XEN) -> Using old ACK method (XEN) Allocated console ring of 64 KiB. (XEN) VMX: Supported advanced features: (XEN) - APIC MMIO access virtualisation (XEN) - APIC TPR shadow (XEN) - Extended Page Tables (EPT) (XEN) - Virtual-Processor Identifiers (VPID) (XEN) - Virtual NMI (XEN) - MSR direct-access bitmap (XEN) - Unrestricted Guest (XEN) - APIC Register Virtualization (XEN) - Virtual Interrupt Delivery (XEN) - Posted Interrupt Processing (XEN) - VMCS shadowing (XEN) - VM Functions (XEN) - Virtualisation Exceptions (XEN) - Page Modification Logging (XEN) HVM: ASIDs enabled. (XEN) HVM: VMX enabled (XEN) HVM: Hardware Assisted Paging (HAP) detected (XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB (XEN) CMCI: threshold 0x2 too large for CPU16 bank 17, using 0x1 (XEN) CMCI: threshold 0x2 too large for CPU16 bank 18, using 0x1 (XEN) CMCI: threshold 0x2 too large for CPU16 bank 19, using 0x1 (XEN) Brought up 32 CPUs (XEN) Dom0 has maximum 1224 PIRQs (XEN) *** LOADING DOMAIN 0 *** (XEN) Xen kernel: 64-bit, lsb, compat32 (XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x1d6b000 (XEN) PHYSICAL MEMORY ARRANGEMENT: (XEN) Dom0 alloc.: 000000202e000000->0000002030000000 (33053699 pages to be allocated) (XEN) Init. ramdisk: 000000207ecd0000->000000207ffffbda (XEN) VIRTUAL MEMORY ARRANGEMENT: (XEN) Loaded kernel: ffffffff81000000->ffffffff81d6b000 (XEN) Init. ramdisk: 0000000000000000->0000000000000000 (XEN) Phys-Mach map: 0000008000000000->000000800fc47998 (XEN) Start info: ffffffff81d6b000->ffffffff81d6b4b4 (XEN) Page tables: ffffffff81d6c000->ffffffff81d7f000 (XEN) Boot stack: ffffffff81d7f000->ffffffff81d80000 (XEN) TOTAL: ffffffff80000000->ffffffff82000000 (XEN) ENTRY ADDRESS: ffffffff81b35180 (XEN) Dom0 has maximum 32 VCPUs (XEN) Scrubbing Free RAM on 2 nodes using 16 CPUs (XEN) ..................................................................done. (XEN) Initial low memory virq threshold set at 0x4000 pages. (XEN) Std. Loglevel: Errors and warnings (XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings) (XEN) Xen is relinquishing VGA console. (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen) (XEN) Freed 312kB init memory (XEN) d1v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d1v0 Walking EPT tables for GFN 4861ff: (XEN) d1v0 gfn exceeds max_mapped_pfn 400000 (XEN) d1v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 1 (vcpu#0) crashed on cpu#19: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 19 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d1v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d2v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d2v0 Walking EPT tables for GFN 4861ff: (XEN) d2v0 gfn exceeds max_mapped_pfn 400000 (XEN) d2v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 2 (vcpu#0) crashed on cpu#15: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 15 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d2v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d3v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d3v0 Walking EPT tables for GFN 4861ff: (XEN) d3v0 gfn exceeds max_mapped_pfn 400000 (XEN) d3v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 3 (vcpu#0) crashed on cpu#20: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 20 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d3v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d4v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d4v0 Walking EPT tables for GFN 4861ff: (XEN) d4v0 gfn exceeds max_mapped_pfn 400000 (XEN) d4v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 4 (vcpu#0) crashed on cpu#12: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 12 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d4v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d5v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d5v0 Walking EPT tables for GFN 4861ff: (XEN) d5v0 gfn exceeds max_mapped_pfn 400000 (XEN) d5v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 5 (vcpu#0) crashed on cpu#28: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 28 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d5v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d6v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d6v0 Walking EPT tables for GFN 4861ff: (XEN) d6v0 gfn exceeds max_mapped_pfn 400000 (XEN) d6v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 6 (vcpu#0) crashed on cpu#24: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 24 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d6v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d7v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d7v0 Walking EPT tables for GFN 4861ff: (XEN) d7v0 gfn exceeds max_mapped_pfn 400000 (XEN) d7v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 7 (vcpu#0) crashed on cpu#30: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 30 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d7v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d8v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d8v0 Walking EPT tables for GFN 4861ff: (XEN) d8v0 gfn exceeds max_mapped_pfn 400000 (XEN) d8v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 8 (vcpu#0) crashed on cpu#8: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 8 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d8v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d9v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d9v0 Walking EPT tables for GFN 4861ff: (XEN) d9v0 gfn exceeds max_mapped_pfn 400000 (XEN) d9v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 9 (vcpu#0) crashed on cpu#5: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 5 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d9v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d10v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d10v0 Walking EPT tables for GFN 4861ff: (XEN) d10v0 gfn exceeds max_mapped_pfn 400000 (XEN) d10v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 10 (vcpu#0) crashed on cpu#0: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d10v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d11v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d11v0 Walking EPT tables for GFN 4861ff: (XEN) d11v0 gfn exceeds max_mapped_pfn 400000 (XEN) d11v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 11 (vcpu#0) crashed on cpu#10: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 10 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d11v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d12v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d12v0 Walking EPT tables for GFN 4861ff: (XEN) d12v0 gfn exceeds max_mapped_pfn 400000 (XEN) d12v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 12 (vcpu#0) crashed on cpu#5: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 5 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d12v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d13v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d13v0 Walking EPT tables for GFN 4861ff: (XEN) d13v0 gfn exceeds max_mapped_pfn 400000 (XEN) d13v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 13 (vcpu#0) crashed on cpu#14: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 14 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d13v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d14v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d14v0 Walking EPT tables for GFN 4861ff: (XEN) d14v0 gfn exceeds max_mapped_pfn 400000 (XEN) d14v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 14 (vcpu#0) crashed on cpu#1: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 1 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d14v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d15v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d15v0 Walking EPT tables for GFN 4861ff: (XEN) d15v0 gfn exceeds max_mapped_pfn 400000 (XEN) d15v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 15 (vcpu#0) crashed on cpu#28: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 28 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d15v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d16v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d16v0 Walking EPT tables for GFN 4861ff: (XEN) d16v0 gfn exceeds max_mapped_pfn 400000 (XEN) d16v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 16 (vcpu#0) crashed on cpu#20: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 20 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d16v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d17v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d17v0 Walking EPT tables for GFN 4861ff: (XEN) d17v0 gfn exceeds max_mapped_pfn 400000 (XEN) d17v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 17 (vcpu#0) crashed on cpu#20: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 20 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d17v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d18v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d18v0 Walking EPT tables for GFN 4861ff: (XEN) d18v0 gfn exceeds max_mapped_pfn 400000 (XEN) d18v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 18 (vcpu#0) crashed on cpu#4: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 4 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d18v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d19v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d19v0 Walking EPT tables for GFN 4861ff: (XEN) d19v0 gfn exceeds max_mapped_pfn 400000 (XEN) d19v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 19 (vcpu#0) crashed on cpu#19: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 19 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d19v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d20v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d20v0 Walking EPT tables for GFN 4861ff: (XEN) d20v0 gfn exceeds max_mapped_pfn 400000 (XEN) d20v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 20 (vcpu#0) crashed on cpu#24: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 24 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d20v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. (XEN) d21v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4 (XEN) d21v0 Walking EPT tables for GFN 4861ff: (XEN) d21v0 gfn exceeds max_mapped_pfn 400000 (XEN) d21v0 --- GLA 0xffff8804861ff000 (XEN) domain_crash called from vmx.c:3108 (XEN) Domain 21 (vcpu#0) crashed on cpu#0: (XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: 0010:[] (XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d21v0) (XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f (XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000 (XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040 (XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000 (XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804 (XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620 (XEN) cr3: 0000000001a06000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010 (XEN) Guest stack trace from rsp=ffffffff81a03c20: (XEN) Fault while accessing guest memory. root@cknowsvr01:/home/diederik#