From: Diederik de Haas <didi.debian@cknow.org>
To: xen-devel@lists.xen.org
Subject: Problems with pci/vga passthrough
Date: Wed, 18 Jan 2017 02:37:16 +0100 [thread overview]
Message-ID: <3650332.PVtMSBxIKa@bagend> (raw)
[-- Attachment #1.1.1: Type: text/plain, Size: 4694 bytes --]
Hi!
I reported/discussed this earlier on IRC, but was asked to report it here too.
The goal I tried to accomplish was getting vga passthrough working to get
hardware acceleration and OpenGL 2+ working for a vm containing
KDE Plasma 5 (Debian Stretch).
The graphics card I tried it with was an (old) NVidia GeForce 6200 TurboCache
and even though I already had a suspicion that it would be challenging,
which was confirmed on IRC, I wanted to try/figure out what I should be doing
as I'm (very) new to Xen.
But as soon as I enabled 'gfx_passthru = 1` and `pci = [ '02:00.0' ]`, the
`xl create <vm-config>` process kept crashing and the only way I was able to
stop it was by doing `kill <xl-create-process>` and the <xl-create-process> was
"/usr/lib/xen-4.8/bin/xl create -c /etc/xen/tradestation.home.cknow.org.cfg"
(attached as tradestation.xen.cfg)
Here's some console output illustrating the crashing:
root@cknowsvr01:/home/diederik# xl create -c /etc/xen/tradestation.home.cknow.org.cfg
Parsing config from /etc/xen/tradestation.home.cknow.org.cfg
libxl: notice: libxl_numa.c:518:libxl__get_numa_candidate: NUMA placement failed, performance might be affected
libxl: error: libxl_qmp.c:287:qmp_handle_error_response: received an error message from QMP server: Could not set password
root@cknowsvr01:/home/diederik# xl list
Name ID Mem VCPUs State Time(s)
Domain-0 0 112773 32 r----- 80.0
tradestation.home.cknow.org 5 16383 1 --psc- 0.0
root@cknowsvr01:/home/diederik# xl list
Name ID Mem VCPUs State Time(s)
Domain-0 0 112773 32 r----- 86.2
tradestation.home.cknow.org 6 16383 1 ---sc- 0.0
root@cknowsvr01:/home/diederik# xl list
Name ID Mem VCPUs State Time(s)
Domain-0 0 112773 32 r----- 86.3
tradestation.home.cknow.org 6 16383 1 ---sc- 0.0
root@cknowsvr01:/home/diederik# xl list
Name ID Mem VCPUs State Time(s)
Domain-0 0 112773 32 r----- 90.4
root@cknowsvr01:/home/diederik# xl list
Name ID Mem VCPUs State Time(s)
Domain-0 0 112773 32 r----- 92.8
tradestation.home.cknow.org 7 16383 1 ---sc- 0.0
root@cknowsvr01:/home/diederik# xl list
Name ID Mem VCPUs State Time(s)
Domain-0 0 112773 32 r----- 132.1
tradestation.home.cknow.org 13 16383 1 ---sc- 0.0
Trying with `xl destroy <id>` didn't help, `xl pause <id>` paused the
crashing, but as soon as I tried to activate it again, the crash-loop
continued and as said before `kill <xl-create-process>` was the only way out.
I've also attached the output of `xl info` and `xl dmesg` as that may
provide some info as well.
In the `xl dmesg` you'll notice various crashes as well and that is very likely
due to hardware-wise failing of the vga card which disappeared when I took
the vga card out of the system.
Furthermore, I have also attached a description of the process I tried to get
it working when trying to use `xl pci-assignable-add` which resulted in a
complete system hang. In retrospect it may have been caused by hardware
failure, but still, getting a complete system hang when executing a `xl`
command isn't nice.
But as I said, I'm a n00b wrt Xen, so I figured I better provide too much
info then too little.
No matter the hardware failure, I see the continuous loop of the failed vm
creation attempt as a real problem as I could only stop that by using
`kill <pid>` and that was before the hardware (really) died.
As it looks like the hardware failure of the vga card even prevented booting
of the whole system at some point, I have removed it and have no plans to
put it back in, even for testing purposes.
But otherwise I'll try to answer any questions to the best of my abilities.
I have ordered an XFX Radeon RX 460 - 4GB GDDR5 (passively cooled) and
when that arrives I can try to see whether I can reproduce it with that too,
but it may take a couple of days and it is a completely different card.
Lastly, I subscribed to this list but due to the huge volume, I unsubscribed
again, so a CC of any response would be preferable.
Cheers,
Diederik
[-- Attachment #1.1.2: tradestation.xen.cfg --]
[-- Type: text/plain, Size: 1118 bytes --]
root@cknowsvr01:/home/diederik# cat /etc/xen/tradestation.home.cknow.org.cfg
#
# Configuration file for the Xen instance tradestation.home.cknow.org, created
# by xen-tools 4.6.2 on Sun Jan 8 12:58:13 2017.
#
#
# Kernel + memory size
#
kernel = '/boot/vmlinuz-4.8.0-2-amd64'
extra = 'elevator=noop xen-fbfront.video=32,1920,1080'
ramdisk = '/boot/initrd.img-4.8.0-2-amd64'
vcpus = '8'
memory = '16384'
# Use PVH mode
pvh = 1
#
# Disk device(s).
#
root = '/dev/xvda2 ro'
disk = [
'phy:/dev/vgXen/tradestation.home.cknow.org-disk,xvda2,w',
'phy:/dev/vgXen/tradestation.home.cknow.org-swap,xvda1,w',
]
#
# Physical volumes
#
#
# Hostname
#
name = 'tradestation.home.cknow.org'
#
# Networking
#
dhcp = 'dhcp'
vif = [ 'mac=00:16:3E:C3:B3:E8' ]
#
# Behaviour
#
on_poweroff = 'destroy'
on_reboot = 'restart'
on_crash = 'restart'
# PCI devices
# pvh = 1 is likely needed for this
gfx_passthru = 1
pci = [ '02:00.0' ]
# VNC
vnc=1
vnclisten=""
vncpasswd=""
vga="stdvga"
videoram=64
[-- Attachment #1.1.3: xl_info+xl_dmesg-with-nvidia-card.txt --]
[-- Type: text/plain, Size: 32482 bytes --]
root@cknowsvr01:/home/diederik# xl info
host : cknowsvr01
release : 4.8.0-2-amd64
version : #1 SMP Debian 4.8.15-2 (2017-01-04)
machine : x86_64
nr_cpus : 32
max_cpu_id : 31
nr_nodes : 2
cores_per_socket : 8
threads_per_core : 2
cpu_mhz : 2095
hw_caps : b7ebfbff:77fef3ff:2c100800:00000121:00000001:001cbfbb:00000000:00000100
virt_caps : hvm hvm_directio
total_memory : 130972
free_memory : 65
sharing_freed_memory : 0
sharing_used_memory : 0
outstanding_claims : 0
free_cpus : 0
xen_major : 4
xen_minor : 8
xen_extra : .0
xen_version : 4.8.0
xen_caps : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64
xen_scheduler : credit
xen_pagesize : 4096
platform_params : virt_start=0xffff800000000000
xen_changeset :
xen_commandline : placeholder
cc_compiler : gcc (Debian 6.2.1-7) 6.2.1 20161215
cc_compile_by : ian.jackson
cc_compile_domain : eu.citrix.com
cc_compile_date : Thu Dec 22 18:03:41 UTC 2016
build_id : c8b753ce66a22831cdf39f5624a3365352d37a44
xend_config_format : 4
root@cknowsvr01:/home/diederik# xl dmesg
(XEN) Xen version 4.8.0 (Debian 4.8.0-1) (ian.jackson@eu.citrix.com) (gcc (Debian 6.2.1-7) 6.2.1 20161215) debug=n Thu Dec 22 18:03:41 UTC 2016
(XEN) Bootloader: GRUB 2.02~beta3-3
(XEN) Command line: placeholder
(XEN) Video information:
(XEN) VGA is text mode 80x25, font 8x16
(XEN) VBE/DDC methods: none; EDID transfer time: 0 seconds
(XEN) EDID info not retrieved because no DDC retrieval method detected
(XEN) Disc information:
(XEN) Found 5 MBR signatures
(XEN) Found 5 EDD information structures
(XEN) Xen-e820 RAM map:
(XEN) 0000000000000000 - 000000000009e800 (usable)
(XEN) 000000000009e800 - 00000000000a0000 (reserved)
(XEN) 00000000000e0000 - 0000000000100000 (reserved)
(XEN) 0000000000100000 - 0000000079d24000 (usable)
(XEN) 0000000079d24000 - 000000007b8ea000 (reserved)
(XEN) 000000007b8ea000 - 000000007b95d000 (ACPI data)
(XEN) 000000007b95d000 - 000000007bee0000 (ACPI NVS)
(XEN) 000000007bee0000 - 0000000090000000 (reserved)
(XEN) 00000000fed1c000 - 00000000fed45000 (reserved)
(XEN) 00000000ff000000 - 0000000100000000 (reserved)
(XEN) 0000000100000000 - 0000002080000000 (usable)
(XEN) ACPI: RSDP 000F0580, 0024 (r2 ALASKA)
(XEN) ACPI: XSDT 7B9120B0, 00D4 (r1 ALASKA A M I 1072009 AMI 10013)
(XEN) ACPI: FACP 7B941410, 010C (r5 ALASKA A M I 1072009 AMI 10013)
(XEN) ACPI: DSDT 7B912218, 2F1F7 (r2 ALASKA A M I 1072009 INTL 20091013)
(XEN) ACPI: FACS 7BEDEF80, 0040
(XEN) ACPI: APIC 7B941520, 0224 (r3 ALASKA A M I 1072009 AMI 10013)
(XEN) ACPI: FPDT 7B941748, 0044 (r1 ALASKA A M I 1072009 AMI 10013)
(XEN) ACPI: FIDT 7B941790, 009C (r1 ALASKA A M I 1072009 AMI 10013)
(XEN) ACPI: MCFG 7B941830, 003C (r1 ALASKA A M I 1072009 MSFT 97)
(XEN) ACPI: EINJ 7B95C7D0, 0130 (r1 ALASKA A M I 1 INTL 1)
(XEN) ACPI: UEFI 7B9418C8, 0042 (r1 ALASKA A M I 1072009 0)
(XEN) ACPI: HPET 7B941910, 0038 (r1 ALASKA A M I 1 INTL 20091013)
(XEN) ACPI: MSCT 7B941948, 0090 (r1 ALASKA A M I 1 INTL 20091013)
(XEN) ACPI: SLIT 7B9419D8, 0030 (r1 ALASKA A M I 1 INTL 20091013)
(XEN) ACPI: SRAT 7B941A08, 1158 (r3 ALASKA A M I 1 INTL 20091013)
(XEN) ACPI: WDDT 7B942B60, 0040 (r1 ALASKA A M I 0 INTL 20091013)
(XEN) ACPI: SSDT 7B942BA0, 16FB3 (r2 ALASKA PmMgt 1 INTL 20120913)
(XEN) ACPI: NITR 7B959B58, 0071 (r2 ALASKA A M I 1 INTL 20091013)
(XEN) ACPI: SPMI 7B959BD0, 0041 (r5 ALASKA A M I 0 AMI. 0)
(XEN) ACPI: SSDT 7B959C18, 2652 (r2 ALASKA SpsNm 2 INTL 20120913)
(XEN) ACPI: SSDT 7B95C270, 0064 (r2 ALASKA SpsNvs 2 INTL 20120913)
(XEN) ACPI: PRAD 7B95C2D8, 0102 (r2 ALASKA A M I 2 INTL 20120913)
(XEN) ACPI: DMAR 7B95C3E0, 00E8 (r1 ALASKA A M I 1 INTL 20091013)
(XEN) ACPI: HEST 7B95C4C8, 00A8 (r1 ALASKA A M I 1 INTL 1)
(XEN) ACPI: BERT 7B95C570, 0030 (r1 ALASKA A M I 1 INTL 1)
(XEN) ACPI: ERST 7B95C5A0, 0230 (r1 ALASKA A M I 1 INTL 1)
(XEN) System RAM: 130972MB (134116104kB)
(XEN) Domain heap initialised DMA width 32 bits
(XEN) ACPI: 32/64X FACS address mismatch in FADT - 7bedef80/0000000000000000, using 32
(XEN) IOAPIC[0]: apic_id 1, version 32, address 0xfec00000, GSI 0-23
(XEN) IOAPIC[1]: apic_id 2, version 32, address 0xfec01000, GSI 24-47
(XEN) IOAPIC[2]: apic_id 3, version 32, address 0xfec40000, GSI 48-71
(XEN) Enabling APIC mode: Phys. Using 3 I/O APICs
(XEN) Not enabling x2APIC (upon firmware request)
(XEN) xstate: size: 0x340 and states: 0x7
(XEN) CMCI: threshold 0x2 too large for CPU0 bank 17, using 0x1
(XEN) CMCI: threshold 0x2 too large for CPU0 bank 18, using 0x1
(XEN) CMCI: threshold 0x2 too large for CPU0 bank 19, using 0x1
(XEN) Using scheduler: SMP Credit Scheduler (credit)
(XEN) Platform timer is 14.318MHz HPET
(XEN) Detected 2095.152 MHz processor.
(XEN) Initing memory sharing.
(XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d Snoop Control enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) Intel VT-d Posted Interrupt not enabled.
(XEN) Intel VT-d Shared EPT tables enabled.
(XEN) I/O virtualisation enabled
(XEN) - Dom0 mode: Relaxed
(XEN) Interrupt remapping enabled
(XEN) Enabled directed EOI with ioapic_ack_old on!
(XEN) ENABLING IO-APIC IRQs
(XEN) -> Using old ACK method
(XEN) Allocated console ring of 64 KiB.
(XEN) VMX: Supported advanced features:
(XEN) - APIC MMIO access virtualisation
(XEN) - APIC TPR shadow
(XEN) - Extended Page Tables (EPT)
(XEN) - Virtual-Processor Identifiers (VPID)
(XEN) - Virtual NMI
(XEN) - MSR direct-access bitmap
(XEN) - Unrestricted Guest
(XEN) - APIC Register Virtualization
(XEN) - Virtual Interrupt Delivery
(XEN) - Posted Interrupt Processing
(XEN) - VMCS shadowing
(XEN) - VM Functions
(XEN) - Virtualisation Exceptions
(XEN) - Page Modification Logging
(XEN) HVM: ASIDs enabled.
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging (HAP) detected
(XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB
(XEN) CMCI: threshold 0x2 too large for CPU16 bank 17, using 0x1
(XEN) CMCI: threshold 0x2 too large for CPU16 bank 18, using 0x1
(XEN) CMCI: threshold 0x2 too large for CPU16 bank 19, using 0x1
(XEN) Brought up 32 CPUs
(XEN) Dom0 has maximum 1224 PIRQs
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Xen kernel: 64-bit, lsb, compat32
(XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x1d6b000
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN) Dom0 alloc.: 000000202e000000->0000002030000000 (33053699 pages to be allocated)
(XEN) Init. ramdisk: 000000207ecd0000->000000207ffffbda
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN) Loaded kernel: ffffffff81000000->ffffffff81d6b000
(XEN) Init. ramdisk: 0000000000000000->0000000000000000
(XEN) Phys-Mach map: 0000008000000000->000000800fc47998
(XEN) Start info: ffffffff81d6b000->ffffffff81d6b4b4
(XEN) Page tables: ffffffff81d6c000->ffffffff81d7f000
(XEN) Boot stack: ffffffff81d7f000->ffffffff81d80000
(XEN) TOTAL: ffffffff80000000->ffffffff82000000
(XEN) ENTRY ADDRESS: ffffffff81b35180
(XEN) Dom0 has maximum 32 VCPUs
(XEN) Scrubbing Free RAM on 2 nodes using 16 CPUs
(XEN) ..................................................................done.
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) Xen is relinquishing VGA console.
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen)
(XEN) Freed 312kB init memory
(XEN) d1v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d1v0 Walking EPT tables for GFN 4861ff:
(XEN) d1v0 gfn exceeds max_mapped_pfn 400000
(XEN) d1v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 1 (vcpu#0) crashed on cpu#19:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 19
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d1v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d2v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d2v0 Walking EPT tables for GFN 4861ff:
(XEN) d2v0 gfn exceeds max_mapped_pfn 400000
(XEN) d2v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 2 (vcpu#0) crashed on cpu#15:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 15
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d2v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d3v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d3v0 Walking EPT tables for GFN 4861ff:
(XEN) d3v0 gfn exceeds max_mapped_pfn 400000
(XEN) d3v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 3 (vcpu#0) crashed on cpu#20:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 20
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d3v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d4v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d4v0 Walking EPT tables for GFN 4861ff:
(XEN) d4v0 gfn exceeds max_mapped_pfn 400000
(XEN) d4v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 4 (vcpu#0) crashed on cpu#12:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 12
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d4v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d5v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d5v0 Walking EPT tables for GFN 4861ff:
(XEN) d5v0 gfn exceeds max_mapped_pfn 400000
(XEN) d5v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 5 (vcpu#0) crashed on cpu#28:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 28
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d5v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d6v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d6v0 Walking EPT tables for GFN 4861ff:
(XEN) d6v0 gfn exceeds max_mapped_pfn 400000
(XEN) d6v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 6 (vcpu#0) crashed on cpu#24:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 24
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d6v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d7v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d7v0 Walking EPT tables for GFN 4861ff:
(XEN) d7v0 gfn exceeds max_mapped_pfn 400000
(XEN) d7v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 7 (vcpu#0) crashed on cpu#30:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 30
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d7v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d8v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d8v0 Walking EPT tables for GFN 4861ff:
(XEN) d8v0 gfn exceeds max_mapped_pfn 400000
(XEN) d8v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 8 (vcpu#0) crashed on cpu#8:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 8
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d8v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d9v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d9v0 Walking EPT tables for GFN 4861ff:
(XEN) d9v0 gfn exceeds max_mapped_pfn 400000
(XEN) d9v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 9 (vcpu#0) crashed on cpu#5:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 5
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d9v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d10v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d10v0 Walking EPT tables for GFN 4861ff:
(XEN) d10v0 gfn exceeds max_mapped_pfn 400000
(XEN) d10v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 10 (vcpu#0) crashed on cpu#0:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 0
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d10v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d11v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d11v0 Walking EPT tables for GFN 4861ff:
(XEN) d11v0 gfn exceeds max_mapped_pfn 400000
(XEN) d11v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 11 (vcpu#0) crashed on cpu#10:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 10
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d11v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d12v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d12v0 Walking EPT tables for GFN 4861ff:
(XEN) d12v0 gfn exceeds max_mapped_pfn 400000
(XEN) d12v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 12 (vcpu#0) crashed on cpu#5:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 5
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d12v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d13v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d13v0 Walking EPT tables for GFN 4861ff:
(XEN) d13v0 gfn exceeds max_mapped_pfn 400000
(XEN) d13v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 13 (vcpu#0) crashed on cpu#14:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 14
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d13v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d14v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d14v0 Walking EPT tables for GFN 4861ff:
(XEN) d14v0 gfn exceeds max_mapped_pfn 400000
(XEN) d14v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 14 (vcpu#0) crashed on cpu#1:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 1
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d14v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d15v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d15v0 Walking EPT tables for GFN 4861ff:
(XEN) d15v0 gfn exceeds max_mapped_pfn 400000
(XEN) d15v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 15 (vcpu#0) crashed on cpu#28:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 28
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d15v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d16v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d16v0 Walking EPT tables for GFN 4861ff:
(XEN) d16v0 gfn exceeds max_mapped_pfn 400000
(XEN) d16v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 16 (vcpu#0) crashed on cpu#20:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 20
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d16v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d17v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d17v0 Walking EPT tables for GFN 4861ff:
(XEN) d17v0 gfn exceeds max_mapped_pfn 400000
(XEN) d17v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 17 (vcpu#0) crashed on cpu#20:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 20
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d17v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d18v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d18v0 Walking EPT tables for GFN 4861ff:
(XEN) d18v0 gfn exceeds max_mapped_pfn 400000
(XEN) d18v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 18 (vcpu#0) crashed on cpu#4:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 4
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d18v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d19v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d19v0 Walking EPT tables for GFN 4861ff:
(XEN) d19v0 gfn exceeds max_mapped_pfn 400000
(XEN) d19v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 19 (vcpu#0) crashed on cpu#19:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 19
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d19v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d20v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d20v0 Walking EPT tables for GFN 4861ff:
(XEN) d20v0 gfn exceeds max_mapped_pfn 400000
(XEN) d20v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 20 (vcpu#0) crashed on cpu#24:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 24
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d20v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
(XEN) d21v0 EPT violation 0x182 (-w-/---) gpa 0x000004861ff000 mfn 0xffffffffffffffff type 4
(XEN) d21v0 Walking EPT tables for GFN 4861ff:
(XEN) d21v0 gfn exceeds max_mapped_pfn 400000
(XEN) d21v0 --- GLA 0xffff8804861ff000
(XEN) domain_crash called from vmx.c:3108
(XEN) Domain 21 (vcpu#0) crashed on cpu#0:
(XEN) ----[ Xen-4.8.0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 0
(XEN) RIP: 0010:[<ffffffff8132c462>]
(XEN) RFLAGS: 0000000000010016 CONTEXT: hvm guest (d21v0)
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: 000000000000003f
(XEN) rdx: 0000000000000006 rsi: ffffffff81ae5688 rdi: ffff8804861ff000
(XEN) rbp: 00000000004861ff rsp: ffffffff81a03c20 r8: 0000000000000040
(XEN) r9: 0000000000000000 r10: 0000000100000000 r11: 00000004862dc000
(XEN) r12: 0000000000000001 r13: ffff880001d3e050 r14: ffffffff81a66804
(XEN) r15: 0000000481400000 cr0: 0000000080050033 cr4: 0000000000040620
(XEN) cr3: 0000000001a06000 cr2: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0010
(XEN) Guest stack trace from rsp=ffffffff81a03c20:
(XEN) Fault while accessing guest memory.
root@cknowsvr01:/home/diederik#
[-- Attachment #1.1.4: xen-xl-pci-assign-system-hang.txt --]
[-- Type: text/plain, Size: 2571 bytes --]
VGA card:
root@cknowsvr01:/home/diederik# lspci | grep -i vga
02:00.0 VGA compatible controller: NVIDIA Corporation NV44 [GeForce 6200 TurboCache] (rev a1)
Uninstalled the nvidia proprietary driver (Debian package) and installed nouveau and rebooted my server, which resulted in the following kernel modules being loaded:
diederik@cknowsvr01:~$ lsmod | grep nou
nouveau 1544192 1
mxm_wmi 16384 1 nouveau
video 40960 1 nouveau
ttm 98304 1 nouveau
drm_kms_helper 155648 1 nouveau
drm 360448 4 nouveau,ttm,drm_kms_helper
wmi 16384 2 mxm_wmi,nouveau
button 16384 1 nouveau
i2c_algo_bit 16384 2 igb,nouveau
After reboot I did:
root@cknowsvr01:/home/diederik# xl pci-assignable-list
libxl: error: libxl_pci.c:409:libxl_device_pci_assignable_list: Looks like pciback driver not loaded
So forgot to load the xen-pciback driver, so fixed that:
root@cknowsvr01:/home/diederik# modprobe xen-pciback
root@cknowsvr01:/home/diederik# xl pci-assignable-list
Then tried to create a vm in which I had enabled pci-passthrough:
root@cknowsvr01:/home/diederik# xl create -c /etc/xen/tradestation.home.cknow.org.cfg
Parsing config from /etc/xen/tradestation.home.cknow.org.cfg
libxl: notice: libxl_numa.c:518:libxl__get_numa_candidate: NUMA placement failed, performance might be affected
libxl: error: libxl_qmp.c:287:qmp_handle_error_response: received an error message from QMP server: Could not set password
libxl: error: libxl_pci.c:1225:libxl__device_pci_add: PCI device 0:2:0.0 is not assignable
libxl: error: libxl_pci.c:1304:libxl__add_pcidevs: libxl_device_pci_add failed: -3
libxl: error: libxl_create.c:1461:domcreate_attach_devices: unable to add pci devices
libxl: error: libxl.c:1575:libxl__destroy_domid: non-existant domain 1
libxl: error: libxl.c:1534:domain_destroy_callback: unable to destroy guest with domid 1
libxl: error: libxl.c:1463:domain_destroy_cb: destruction of domain 1 failed
root@cknowsvr01:/home/diederik# xl list
Name ID Mem VCPUs State Time(s)
Domain-0 0 112773 32 r----- 54.3
which failed.
Realizing I forgot to add my vga card, so tried to fix that:
root@cknowsvr01:/home/diederik# xl pci-assignable-add 02:00.0
at which my system hang and eventually my ssh-session got disconnected and am unable to connect again. Plugging in a physical keyboard didn't help and a hard reset seems to be the only way out.
[-- Attachment #1.2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
[-- Attachment #2: Type: text/plain, Size: 127 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
next reply other threads:[~2017-01-18 1:37 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-01-18 1:37 Diederik de Haas [this message]
2017-01-18 16:20 ` Is: EPT violations. Was:Re: Problems with pci/vga passthrough Konrad Rzeszutek Wilk
2017-01-18 16:42 ` Jan Beulich
[not found] ` <1890797.J70arCvF62@bagend>
2017-01-19 8:18 ` Jan Beulich
2017-01-18 16:47 ` George Dunlap
2017-01-22 18:30 ` Diederik de Haas
2017-01-24 15:59 ` Diederik de Haas
2017-01-24 16:11 ` Jan Beulich
2017-01-24 17:24 ` Diederik de Haas
2017-01-24 18:28 ` Boris Ostrovsky
2017-01-24 18:44 ` Diederik de Haas
2017-01-24 18:51 ` Boris Ostrovsky
2017-01-24 21:43 ` Boris Ostrovsky
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=3650332.PVtMSBxIKa@bagend \
--to=didi.debian@cknow.org \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).