* Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
@ 2020-10-10 17:51 Sander Eikelenboom
2020-10-11 0:06 ` [SUSPECTED SPAM]Xen-unstable " Igor Druzhinin
0 siblings, 1 reply; 6+ messages in thread
From: Sander Eikelenboom @ 2020-10-10 17:51 UTC (permalink / raw)
To: xen-devel, Igor Druzhinin, Jan Beulich
[-- Attachment #1: Type: text/plain, Size: 503 bytes --]
Hi Igor/Jan,
I tried to update my AMD machine to current xen-unstable, but
unfortunately the HVM guests don't boot after that. The guest keeps
using CPU-cycles but I don't get to a command prompt (or any output at
all). PVH guests run fine.
Bisection leads to commit:
8efa46516c5f4cf185c8df179812c185d3c27eb6
hvmloader: indicate ACPI tables with "ACPI data" type in e820
I tried xen-unstable with this commit reverted and with that everything
works fine.
I attached the xl-dmesg output.
--
Sander
[-- Attachment #2: xl-dmesg-extended-20201010.txt --]
[-- Type: text/plain, Size: 54227 bytes --]
__ __ _ _ _ ____ _ _ _
\ \/ /___ _ __ | || | / | ___| _ _ _ __ ___| |_ __ _| |__ | | ___
\ // _ \ '_ \ | || |_ | |___ \ __| | | | '_ \/ __| __/ _` | '_ \| |/ _ \
/ \ __/ | | | |__ _|| |___) |__| |_| | | | \__ \ || (_| | |_) | | __/
/_/\_\___|_| |_| |_|(_)_|____/ \__,_|_| |_|___/\__\__,_|_.__/|_|\___|
(XEN) [0000001a935d33ae] Xen version 4.15-unstable (root@dyndns.org) (gcc (Debian 8.3.0-6) 8.3.0) debug=y Sat Oct 10 17:42:56 CEST 2020
(XEN) [0000001a9a35344a] Latest ChangeSet: Fri Oct 2 12:30:34 2020 +0200 git:8a62dee9ce
(XEN) [0000001a9e9ef6a0] build-id: 517916349a46fdab2faadfefa7051928a1594796
(XEN) [0000001aa2709d53] Bootloader: GRUB 2.02+dfsg1-20+deb10u2
(XEN) [0000001aa5a9cace] Command line: dom0_mem=2048M,max:2048M loglvl=all guest_loglvl=all console_timestamps=datems vga=gfx-1280x1024x32 no-cpuidle com1=38400,8n1 console=vga,com1 ivrs_ioapic[6]=00:14.0 iommu=on,verbose,debug conring_size=128k ucode=scan sched=credit2 gnttab_max_frames=64 reboot=a
(XEN) [0000001ab4a3c9f3] Xen image load base address: 0
(XEN) [0000001ab7775ae3] Video information:
(XEN) [0000001ab9b2a306] VGA is graphics mode 1280x1024, 32 bpp
(XEN) [0000001abcf88912] VBE/DDC methods: none; EDID transfer time: 0 seconds
(XEN) [0000001ac0f0387e] EDID info not retrieved because no DDC retrieval method detected
(XEN) [0000001ac5802e2e] Disc information:
(XEN) [0000001ac7aeb1c3] Found 4 MBR signatures
(XEN) [0000001aca29768e] Found 4 EDD information structures
(XEN) [0000001acd3c9a83] CPU Vendor: AMD, Family 16 (0x10), Model 10 (0xa), Stepping 0 (raw 00100fa0)
(XEN) [0000001ad2584e1b] Xen-e820 RAM map:
(XEN) [0000001ad486cf30] [0000000000000000, 00000000000963ff] (usable)
(XEN) [0000001ad8258d5b] [0000000000096400, 000000000009ffff] (reserved)
(XEN) [0000001adbddb57b] [00000000000e4000, 00000000000fffff] (reserved)
(XEN) [0000001adf95eaba] [0000000000100000, 00000000c7f8ffff] (usable)
(XEN) [0000001ae334a8b2] [00000000c7f90000, 00000000c7f9dfff] (ACPI data)
(XEN) [0000001ae6f9844a] [00000000c7f9e000, 00000000c7fdffff] (ACPI NVS)
(XEN) [0000001aeab1a6f6] [00000000c7fe0000, 00000000c7ffffff] (reserved)
(XEN) [0000001aee69c5ea] [00000000ffe00000, 00000000ffffffff] (reserved)
(XEN) [0000001af221e626] [0000000100000000, 00000006b7ffffff] (usable)
(XEN) [0000001afd7b593b] New Xen image base address: 0xc7800000
(XEN) [0000001b00b46a62] ACPI: RSDP 000FB100, 0014 (r0 ACPIAM)
(XEN) [0000001b03e1003b] ACPI: RSDT C7F90000, 0048 (r1 MSI OEMSLIC 20100913 MSFT 97)
(XEN) [0000001b08a3c463] ACPI: FACP C7F90200, 0084 (r1 7640MS A7640100 20100913 MSFT 97)
(XEN) [0000001b0d6666bb] ACPI: DSDT C7F905E0, 9427 (r1 A7640 A7640100 100 INTL 20051117)
(XEN) [0000001b12293fb6] ACPI: FACS C7F9E000, 0040
(XEN) [0000001b14bd51ea] ACPI: APIC C7F90390, 0088 (r1 7640MS A7640100 20100913 MSFT 97)
(XEN) [0000001b198022fa] ACPI: MCFG C7F90420, 003C (r1 7640MS OEMMCFG 20100913 MSFT 97)
(XEN) [0000001b1e42e08a] ACPI: SLIC C7F90460, 0176 (r1 MSI OEMSLIC 20100913 MSFT 97)
(XEN) [0000001b2305a2d0] ACPI: OEMB C7F9E040, 0072 (r1 7640MS A7640100 20100913 MSFT 97)
(XEN) [0000001b27c851ea] ACPI: SRAT C7F9A5E0, 0108 (r3 AMD FAM_F_10 2 AMD 1)
(XEN) [0000001b2c8b11c0] ACPI: HPET C7F9A6F0, 0038 (r1 7640MS OEMHPET 20100913 MSFT 97)
(XEN) [0000001b314de060] ACPI: IVRS C7F9A730, 0108 (r1 AMD RD890S 202031 AMD 0)
(XEN) [0000001b3610939b] ACPI: SSDT C7F9A840, 0DA4 (r1 A M I POWERNOW 1 AMD 1)
(XEN) [0000001b3ad35668] System RAM: 26623MB (27262104kB)
(XEN) [0000001b48bbc278] SRAT: PXM 0 -> APIC 00 -> Node 0
(XEN) [0000001b4ba8c92a] SRAT: PXM 0 -> APIC 01 -> Node 0
(XEN) [0000001b4e95dc3e] SRAT: PXM 0 -> APIC 02 -> Node 0
(XEN) [0000001b5182ca02] SRAT: PXM 0 -> APIC 03 -> Node 0
(XEN) [0000001b546feeb3] SRAT: PXM 0 -> APIC 04 -> Node 0
(XEN) [0000001b575cf4aa] SRAT: PXM 0 -> APIC 05 -> Node 0
(XEN) [0000001b5a49f5f6] SRAT: Node 0 PXM 0 0-a0000
(XEN) [0000001b5cead2e2] SRAT: Node 0 PXM 0 100000-c8000000
(XEN) [0000001b5ff1399e] SRAT: Node 0 PXM 0 100000000-6b8000000
(XEN) [0000001b632a6bf3] NUMA: Allocated memnodemap from 6a4d2a000 - 6a4d31000
(XEN) [0000001b6721fc52] NUMA: Using 8 for the hash shift.
(XEN) [0000001bc77a7565] Domain heap initialised
(XEN) [0000001bc9f546a3] Allocated console ring of 128 KiB.
(XEN) [0000001be01a5586] vesafb: framebuffer at 0x00000000fb000000, mapped to 0xffff82c000201000, using 6144k, total 14336k
(XEN) [0000001be64d3bd2] vesafb: mode is 1280x1024x32, linelength=5120, font 8x16
(XEN) [0000001bea6afdd8] vesafb: Truecolor: size=8:8:8:8, shift=24:16:8:0
(XEN) [0000001bf4e0f2ea] found SMP MP-table at 000ff780
(XEN) [0000001bf7b47978] DMI present.
(XEN) [0000001bf9a394f2] Using APIC driver default
(XEN) [0000001bfc37a433] ACPI: PM-Timer IO Port: 0x808 (32 bits)
(XEN) [0000001bff7d9712] ACPI: SLEEP INFO: pm1x_cnt[1:804,1:0], pm1x_evt[1:800,1:0]
(XEN) [0000001c03b4c00e] ACPI: wakeup_vec[c7f9e00c], vec_size[20]
(XEN) [0000001c079fa182] ACPI: Local APIC address 0xfee00000
(XEN) [0000001c0ab2bbca] ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled)
(XEN) [0000001c0e84414a] ACPI: LAPIC (acpi_id[0x02] lapic_id[0x01] enabled)
(XEN) [0000001c1255cce3] ACPI: LAPIC (acpi_id[0x03] lapic_id[0x02] enabled)
(XEN) [0000001c162755c3] ACPI: LAPIC (acpi_id[0x04] lapic_id[0x03] enabled)
(XEN) [0000001c19f8e92a] ACPI: LAPIC (acpi_id[0x05] lapic_id[0x04] enabled)
(XEN) [0000001c1dca5e23] ACPI: LAPIC (acpi_id[0x06] lapic_id[0x05] enabled)
(XEN) [0000001c219c0666] ACPI: IOAPIC (id[0x06] address[0xfec00000] gsi_base[0])
(XEN) [0000001c25acffee] IOAPIC[0]: apic_id 6, version 33, address 0xfec00000, GSI 0-23
(XEN) [0000001c2a16d556] ACPI: IOAPIC (id[0x07] address[0xfec20000] gsi_base[24])
(XEN) [0000001c2e34973e] IOAPIC[1]: apic_id 7, version 33, address 0xfec20000, GSI 24-55
(XEN) [0000001c32ab2a06] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
(XEN) [0000001c36c8edc2] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 low level)
(XEN) [0000001c3afff768] ACPI: IRQ0 used by override.
(XEN) [0000001c3dba27ea] ACPI: IRQ2 used by override.
(XEN) [0000001c407483e0] ACPI: IRQ9 used by override.
(XEN) [0000001c432eb0aa] Enabling APIC mode: Flat. Using 2 I/O APICs
(XEN) [0000001c46c0bea6] ACPI: HPET id: 0x8300 base: 0xfed00000
(XEN) [0000001c49f9e718] PCI: MCFG configuration 0: base e0000000 segment 0000 buses 00 - ff
(XEN) [0000001c4ea34ca6] PCI: Not using MCFG for segment 0000 bus 00-ff
(XEN) [0000001c52421282] AMD-Vi: Found MSI capability block at 0x54
(XEN) [0000001c55ae0313] Using ACPI (MADT) for SMP configuration information
(XEN) [0000001c598c510b] SMP: Allowing 6 CPUs (0 hotplug CPUs)
(XEN) [0000001c5cb8ceb8] IRQ limits: 56 GSI, 1192 MSI/MSI-X
(XEN) [0000001c5fbf42ca] microcode: CPU0 updated from revision 0x10000bf to 0x10000dc
(XEN) [0000001c640fb75e] CPU0: 3200 (800 ... 3600) MHz
(XEN) [0000001c66d6ab4a] CPU0: AMD Fam10h machine check reporting enabled
(XEN) [0000001c6a8ebe36] Speculative mitigation facilities:
(XEN) [0000001c6d953e9b] Hardware features:
(XEN) [0000001c6fe9dca6] Compiled-in support: INDIRECT_THUNK SHADOW_PAGING
(XEN) [0000001c73c82c33] Xen settings: BTI-Thunk LFENCE, SPEC_CTRL: No, Other: BRANCH_HARDEN
(XEN) [0000001c788ad506] Support for HVM VMs: RSB
(XEN) [0000001c7b2bb0b6] Support for PV VMs: RSB
(XEN) [0000001c7dbfe7f3] XPTI (64-bit PV only): Dom0 disabled, DomU disabled (without PCID)
(XEN) [0000001c8275f58d] PV L1TF shadowing: Dom0 disabled, DomU disabled
(XEN) [0000001c863abd26] Using scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) [0000001c8a25b69e] Initializing Credit2 scheduler
(XEN) [0000001c8cf94e9a] load_precision_shift: 18
(XEN) [0000001c8f8d85f0] load_window_shift: 30
(XEN) [0000001c91fb8e4d] underload_balance_tolerance: 0
(XEN) [0000001c94dbd833] overload_balance_tolerance: -3
(XEN) [0000001c97bc45d3] runqueues arrangement: socket
(XEN) [0000001c9a8fe3cd] cap enforcement granularity: 10ms
(XEN) [0000001c9d964efa] load tracking window length 1073741824 ns
(XEN) [0000001caa6d1c98] Platform timer is 14.318MHz HPET
(XEN) [ 3.457428] Detected 3200.141 MHz processor.
(XEN) [ 3.473549] alt table ffff82d04048b3f0 -> ffff82d04049940c
(XEN) [ 3.499885] AMD-Vi: IVRS Block: Found type 0x10 flags 0x3e len 0xd8 id 0x2
(XEN) [ 3.521982] AMD-Vi: Using IVHD type 0x10
(XEN) [ 3.535245] AMD-Vi: ACPI Table:
(XEN) [ 3.546162] AMD-Vi: Signature IVRS
(XEN) [ 3.558122] AMD-Vi: Length 0x108
(XEN) [ 3.569562] AMD-Vi: Revision 0x1
(XEN) [ 3.581002] AMD-Vi: CheckSum 0x79
(XEN) [ 3.592702] AMD-Vi: OEM_Id AMD
(XEN) [ 3.604140] AMD-Vi: OEM_Table_Id RD890S
(XEN) [ 3.617399] AMD-Vi: OEM_Revision 0x202031
(XEN) [ 3.631180] AMD-Vi: Creator_Id AMD
(XEN) [ 3.648391] AMD-Vi: Creator_Revision 0
(XEN) [ 3.666369] AMD-Vi: IVRS Block: type 0x10 flags 0x3e len 0xd8 id 0x2
(XEN) [ 3.691965] AMD-Vi: IVHD Device Entry: type 0x3 id 0 flags 0
(XEN) [ 3.715481] AMD-Vi: Dev_Id Range: 0 -> 0x2
(XEN) [ 3.734563] AMD-Vi: IVHD Device Entry: type 0x2 id 0x10 flags 0
(XEN) [ 3.758820] AMD-Vi: IVHD Device Entry: type 0x2 id 0xe00 flags 0
(XEN) [ 3.783336] AMD-Vi: IVHD Device Entry: type 0x2 id 0x18 flags 0
(XEN) [ 3.807621] AMD-Vi: IVHD Device Entry: type 0x2 id 0xd00 flags 0
(XEN) [ 3.832164] AMD-Vi: IVHD Device Entry: type 0x2 id 0x28 flags 0
(XEN) [ 3.856420] AMD-Vi: IVHD Device Entry: type 0x2 id 0xc00 flags 0
(XEN) [ 3.880925] AMD-Vi: IVHD Device Entry: type 0x2 id 0x30 flags 0
(XEN) [ 3.905166] AMD-Vi: IVHD Device Entry: type 0x2 id 0xb00 flags 0
(XEN) [ 3.929671] AMD-Vi: IVHD Device Entry: type 0x2 id 0x48 flags 0
(XEN) [ 3.953903] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa00 flags 0
(XEN) [ 3.978369] AMD-Vi: IVHD Device Entry: type 0x2 id 0x50 flags 0
(XEN) [ 4.002584] AMD-Vi: IVHD Device Entry: type 0x3 id 0x900 flags 0
(XEN) [ 4.027049] AMD-Vi: Dev_Id Range: 0x900 -> 0x907
(XEN) [ 4.047563] AMD-Vi: IVHD Device Entry: type 0x2 id 0x60 flags 0
(XEN) [ 4.071691] AMD-Vi: IVHD Device Entry: type 0x2 id 0x500 flags 0
(XEN) [ 4.096104] AMD-Vi: IVHD Device Entry: type 0x2 id 0x608 flags 0
(XEN) [ 4.120543] AMD-Vi: IVHD Device Entry: type 0x2 id 0x800 flags 0
(XEN) [ 4.145019] AMD-Vi: IVHD Device Entry: type 0x2 id 0x610 flags 0
(XEN) [ 4.169472] AMD-Vi: IVHD Device Entry: type 0x2 id 0x700 flags 0
(XEN) [ 4.193924] AMD-Vi: IVHD Device Entry: type 0x2 id 0x68 flags 0
(XEN) [ 4.218130] AMD-Vi: IVHD Device Entry: type 0x3 id 0x400 flags 0
(XEN) [ 4.242569] AMD-Vi: Dev_Id Range: 0x400 -> 0x407
(XEN) [ 4.263094] AMD-Vi: IVHD Device Entry: type 0x2 id 0x88 flags 0
(XEN) [ 4.287235] AMD-Vi: IVHD Device Entry: type 0x3 id 0x90 flags 0
(XEN) [ 4.311374] AMD-Vi: Dev_Id Range: 0x90 -> 0x92
(XEN) [ 4.331354] AMD-Vi: IVHD Device Entry: type 0x3 id 0x98 flags 0
(XEN) [ 4.355520] AMD-Vi: Dev_Id Range: 0x98 -> 0x9a
(XEN) [ 4.375460] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa0 flags 0xd7
(XEN) [ 4.400369] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa2 flags 0
(XEN) [ 4.424534] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa3 flags 0
(XEN) [ 4.448688] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa4 flags 0
(XEN) [ 4.472827] AMD-Vi: IVHD Device Entry: type 0 id 0 flags 0
(XEN) [ 4.495628] AMD-Vi: IVHD Device Entry: type 0x43 id 0x300 flags 0
(XEN) [ 4.520248] AMD-Vi: Dev_Id Range: 0x300 -> 0x3ff alias 0xa4
(XEN) [ 4.543623] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa5 flags 0
(XEN) [ 4.567722] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa8 flags 0
(XEN) [ 4.591811] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa9 flags 0
(XEN) [ 4.615887] AMD-Vi: IVHD Device Entry: type 0x2 id 0x100 flags 0
(XEN) [ 4.640220] AMD-Vi: IVHD Device Entry: type 0x3 id 0xb0 flags 0
(XEN) [ 4.664321] AMD-Vi: Dev_Id Range: 0xb0 -> 0xb2
(XEN) [ 4.684275] AMD-Vi: IVHD Device Entry: type 0 id 0 flags 0
(XEN) [ 4.707129] AMD-Vi: IVHD Device Entry: type 0x48 id 0 flags 0xd7
(XEN) [ 4.731593] AMD-Vi: IVHD Special: 0000:00:14.0 variety 0x2 handle 0
(XEN) [ 4.756840] AMD-Vi: IVHD Device Entry: type 0x48 id 0 flags 0
(XEN) [ 4.780576] AMD-Vi: IVHD Special: 0000:00:00.1 variety 0x1 handle 0x7
(XEN) [ 4.806537] AMD-Vi: Disabled HAP memory map sharing with IOMMU
(XEN) [ 4.830584] AMD-Vi: IOMMU 0 Enabled.
(XEN) [ 4.847914] I/O virtualisation enabled
(XEN) [ 4.865671] - Dom0 mode: Relaxed
(XEN) [ 4.882062] Interrupt remapping enabled
(XEN) [ 4.899988] nr_sockets: 1
(XEN) [ 4.914534] ENABLING IO-APIC IRQs
(XEN) [ 4.930849] -> Using new ACK method
(XEN) [ 4.948165] ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=-1 pin2=-1
(XEN) [2020-10-10 16:12:36.665] HVM: ASIDs enabled.
(XEN) [2020-10-10 16:12:36.671] SVM: Supported advanced features:
(XEN) [2020-10-10 16:12:36.677] - Nested Page Tables (NPT)
(XEN) [2020-10-10 16:12:36.682] - Last Branch Record (LBR) Virtualisation
(XEN) [2020-10-10 16:12:36.688] - Next-RIP Saved on #VMEXIT
(XEN) [2020-10-10 16:12:36.694] - Pause-Intercept Filter
(XEN) [2020-10-10 16:12:36.700] HVM: SVM enabled
(XEN) [2020-10-10 16:12:36.705] HVM: Hardware Assisted Paging (HAP) detected
(XEN) [2020-10-10 16:12:36.711] HVM: HAP page sizes: 4kB, 2MB, 1GB
(XEN) [2020-10-10 16:12:36.717] alt table ffff82d04048b3f0 -> ffff82d04049940c
(XEN) [2020-10-10 16:12:30.818] microcode: CPU1 updated from revision 0x10000bf to 0x10000dc
(XEN) [2020-10-10 16:12:30.818] microcode: CPU2 updated from revision 0x10000bf to 0x10000dc
(XEN) [2020-10-10 16:12:30.818] microcode: CPU3 updated from revision 0x10000bf to 0x10000dc
(XEN) [2020-10-10 16:12:30.818] microcode: CPU4 updated from revision 0x10000bf to 0x10000dc
(XEN) [2020-10-10 16:12:30.818] microcode: CPU5 updated from revision 0x10000bf to 0x10000dc
(XEN) [2020-10-10 16:12:36.806] Brought up 6 CPUs
(XEN) [2020-10-10 16:12:36.818] Scheduling granularity: cpu, 1 CPU per sched-resource
(XEN) [2020-10-10 16:12:36.824] Adding cpu 0 to runqueue 0
(XEN) [2020-10-10 16:12:36.830] First cpu on runqueue, activating
(XEN) [2020-10-10 16:12:36.836] Adding cpu 1 to runqueue 0
(XEN) [2020-10-10 16:12:36.842] Adding cpu 2 to runqueue 0
(XEN) [2020-10-10 16:12:36.848] Adding cpu 3 to runqueue 0
(XEN) [2020-10-10 16:12:36.854] Adding cpu 4 to runqueue 0
(XEN) [2020-10-10 16:12:36.860] Adding cpu 5 to runqueue 0
(XEN) [2020-10-10 16:12:36.866] MCA: Use hw thresholding to adjust polling frequency
(XEN) [2020-10-10 16:12:36.872] mcheck_poll: Machine check polling timer started.
(XEN) [2020-10-10 16:12:36.878] Xenoprofile: Failed to setup IBS LVT offset, IBSCTL = 0xffffffff
(XEN) [2020-10-10 16:12:36.884] Running stub recovery selftests...
(XEN) [2020-10-10 16:12:36.890] Fixup #UD[0000]: ffff82d07fffe040 [ffff82d07fffe040] -> ffff82d040396a01
(XEN) [2020-10-10 16:12:36.896] Fixup #GP[0000]: ffff82d07fffe041 [ffff82d07fffe041] -> ffff82d040396a01
(XEN) [2020-10-10 16:12:36.902] Fixup #SS[0000]: ffff82d07fffe040 [ffff82d07fffe040] -> ffff82d040396a01
(XEN) [2020-10-10 16:12:36.908] Fixup #BP[0000]: ffff82d07fffe041 [ffff82d07fffe041] -> ffff82d040396a01
(XEN) [2020-10-10 16:12:36.934] NX (Execute Disable) protection active
(XEN) [2020-10-10 16:12:36.941] Multiple initrd candidates, picking module #1
(XEN) [2020-10-10 16:12:36.947] Dom0 has maximum 680 PIRQs
(XEN) [2020-10-10 16:12:36.953] *** Building a PV Dom0 ***
(XEN) [2020-10-10 16:12:37.254] ELF: phdr: paddr=0x1000000 memsz=0x1c1e82c
(XEN) [2020-10-10 16:12:37.260] ELF: phdr: paddr=0x2e00000 memsz=0x7d0000
(XEN) [2020-10-10 16:12:37.267] ELF: phdr: paddr=0x35d0000 memsz=0x2bad8
(XEN) [2020-10-10 16:12:37.273] ELF: phdr: paddr=0x35fc000 memsz=0x42a000
(XEN) [2020-10-10 16:12:37.279] ELF: memory: 0x1000000 -> 0x3a26000
(XEN) [2020-10-10 16:12:37.285] ELF: note: GUEST_OS = "linux"
(XEN) [2020-10-10 16:12:37.291] ELF: note: GUEST_VERSION = "2.6"
(XEN) [2020-10-10 16:12:37.297] ELF: note: XEN_VERSION = "xen-3.0"
(XEN) [2020-10-10 16:12:37.304] ELF: note: VIRT_BASE = 0xffffffff80000000
(XEN) [2020-10-10 16:12:37.310] ELF: note: INIT_P2M = 0x8000000000
(XEN) [2020-10-10 16:12:37.316] ELF: note: ENTRY = 0xffffffff835fc180
(XEN) [2020-10-10 16:12:37.322] ELF: note: HYPERCALL_PAGE = 0xffffffff81002000
(XEN) [2020-10-10 16:12:37.328] ELF: note: FEATURES = "!writable_page_tables|pae_pgdir_above_4gb"
(XEN) [2020-10-10 16:12:37.334] ELF: note: SUPPORTED_FEATURES = 0x8801
(XEN) [2020-10-10 16:12:37.341] ELF: note: PAE_MODE = "yes"
(XEN) [2020-10-10 16:12:37.347] ELF: note: LOADER = "generic"
(XEN) [2020-10-10 16:12:37.353] ELF: note: unknown (0xd)
(XEN) [2020-10-10 16:12:37.359] ELF: note: SUSPEND_CANCEL = 0x1
(XEN) [2020-10-10 16:12:37.365] ELF: note: MOD_START_PFN = 0x1
(XEN) [2020-10-10 16:12:37.371] ELF: note: HV_START_LOW = 0xffff800000000000
(XEN) [2020-10-10 16:12:37.378] ELF: note: PADDR_OFFSET = 0
(XEN) [2020-10-10 16:12:37.384] ELF: note: PHYS32_ENTRY = 0x1000420
(XEN) [2020-10-10 16:12:37.390] ELF: Found PVH image
(XEN) [2020-10-10 16:12:37.396] ELF: addresses:
(XEN) [2020-10-10 16:12:37.402] virt_base = 0xffffffff80000000
(XEN) [2020-10-10 16:12:37.409] elf_paddr_offset = 0x0
(XEN) [2020-10-10 16:12:37.415] virt_offset = 0xffffffff80000000
(XEN) [2020-10-10 16:12:37.421] virt_kstart = 0xffffffff81000000
(XEN) [2020-10-10 16:12:37.427] virt_kend = 0xffffffff83a26000
(XEN) [2020-10-10 16:12:37.434] virt_entry = 0xffffffff835fc180
(XEN) [2020-10-10 16:12:37.440] p2m_base = 0x8000000000
(XEN) [2020-10-10 16:12:37.446] Xen kernel: 64-bit, lsb, compat32
(XEN) [2020-10-10 16:12:37.453] Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x3a26000
(XEN) [2020-10-10 16:12:37.460] PHYSICAL MEMORY ARRANGEMENT:
(XEN) [2020-10-10 16:12:37.467] Dom0 alloc.: 0000000698000000->000000069c000000 (497183 pages to be allocated)
(XEN) [2020-10-10 16:12:37.474] Init. ramdisk: 00000006b561b000->00000006b7ffb846
(XEN) [2020-10-10 16:12:37.480] VIRTUAL MEMORY ARRANGEMENT:
(XEN) [2020-10-10 16:12:37.487] Loaded kernel: ffffffff81000000->ffffffff83a26000
(XEN) [2020-10-10 16:12:37.493] Init. ramdisk: 0000000000000000->0000000000000000
(XEN) [2020-10-10 16:12:37.500] Phys-Mach map: 0000008000000000->0000008000400000
(XEN) [2020-10-10 16:12:37.506] Start info: ffffffff83a26000->ffffffff83a264b8
(XEN) [2020-10-10 16:12:37.513] Xenstore ring: 0000000000000000->0000000000000000
(XEN) [2020-10-10 16:12:37.519] Console ring: 0000000000000000->0000000000000000
(XEN) [2020-10-10 16:12:37.526] Page tables: ffffffff83a27000->ffffffff83a48000
(XEN) [2020-10-10 16:12:37.532] Boot stack: ffffffff83a48000->ffffffff83a49000
(XEN) [2020-10-10 16:12:37.538] TOTAL: ffffffff80000000->ffffffff83c00000
(XEN) [2020-10-10 16:12:37.545] ENTRY ADDRESS: ffffffff835fc180
(XEN) [2020-10-10 16:12:37.552] Dom0 has maximum 6 VCPUs
(XEN) [2020-10-10 16:12:37.559] ELF: phdr 0 at 0xffffffff81000000 -> 0xffffffff82c1e82c
(XEN) [2020-10-10 16:12:37.587] ELF: phdr 1 at 0xffffffff82e00000 -> 0xffffffff835d0000
(XEN) [2020-10-10 16:12:37.600] ELF: phdr 2 at 0xffffffff835d0000 -> 0xffffffff835fbad8
(XEN) [2020-10-10 16:12:37.607] ELF: phdr 3 at 0xffffffff835fc000 -> 0xffffffff8374d000
(XEN) [2020-10-10 16:12:39.208] AMD-Vi: Setup I/O page table: device id = 0, type = 0x6, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.215] AMD-Vi: Setup I/O page table: device id = 0x10, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.222] AMD-Vi: Setup I/O page table: device id = 0x18, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.229] AMD-Vi: Setup I/O page table: device id = 0x28, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.236] AMD-Vi: Setup I/O page table: device id = 0x30, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.243] AMD-Vi: Setup I/O page table: device id = 0x48, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.250] AMD-Vi: Setup I/O page table: device id = 0x50, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.258] AMD-Vi: Setup I/O page table: device id = 0x60, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.265] AMD-Vi: Setup I/O page table: device id = 0x68, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.272] AMD-Vi: Setup I/O page table: device id = 0x88, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.280] AMD-Vi: Setup I/O page table: device id = 0x90, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.288] AMD-Vi: Setup I/O page table: device id = 0x92, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.296] AMD-Vi: Setup I/O page table: device id = 0x98, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.303] AMD-Vi: Setup I/O page table: device id = 0x9a, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.311] AMD-Vi: Setup I/O page table: device id = 0xa0, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.320] AMD-Vi: Setup I/O page table: device id = 0xa2, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.328] AMD-Vi: Setup I/O page table: device id = 0xa3, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.336] AMD-Vi: Setup I/O page table: device id = 0xa4, type = 0x5, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.345] AMD-Vi: Setup I/O page table: device id = 0xa5, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.353] AMD-Vi: Setup I/O page table: device id = 0xa8, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.362] AMD-Vi: Setup I/O page table: device id = 0xb0, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.371] AMD-Vi: Setup I/O page table: device id = 0xb2, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.379] AMD-Vi: Skipping host bridge 0000:00:18.0
(XEN) [2020-10-10 16:12:39.388] AMD-Vi: Skipping host bridge 0000:00:18.1
(XEN) [2020-10-10 16:12:39.397] AMD-Vi: Skipping host bridge 0000:00:18.2
(XEN) [2020-10-10 16:12:39.406] AMD-Vi: Skipping host bridge 0000:00:18.3
(XEN) [2020-10-10 16:12:39.414] AMD-Vi: Skipping host bridge 0000:00:18.4
(XEN) [2020-10-10 16:12:39.423] AMD-Vi: Setup I/O page table: device id = 0x400, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.432] AMD-Vi: Setup I/O page table: device id = 0x401, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.441] AMD-Vi: Setup I/O page table: device id = 0x402, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.451] AMD-Vi: Setup I/O page table: device id = 0x403, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.460] AMD-Vi: Setup I/O page table: device id = 0x404, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.470] AMD-Vi: Setup I/O page table: device id = 0x405, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.479] AMD-Vi: Setup I/O page table: device id = 0x406, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.489] AMD-Vi: Setup I/O page table: device id = 0x407, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.499] AMD-Vi: Setup I/O page table: device id = 0x500, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.509] AMD-Vi: Setup I/O page table: device id = 0x608, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.519] AMD-Vi: Setup I/O page table: device id = 0x610, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.529] AMD-Vi: Setup I/O page table: device id = 0x700, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.540] AMD-Vi: Setup I/O page table: device id = 0x800, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.550] AMD-Vi: Setup I/O page table: device id = 0x900, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.561] AMD-Vi: Setup I/O page table: device id = 0x901, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.571] AMD-Vi: Setup I/O page table: device id = 0x902, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.582] AMD-Vi: Setup I/O page table: device id = 0x903, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.593] AMD-Vi: Setup I/O page table: device id = 0x904, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.604] AMD-Vi: Setup I/O page table: device id = 0x905, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.615] AMD-Vi: Setup I/O page table: device id = 0x906, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.626] AMD-Vi: Setup I/O page table: device id = 0x907, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.637] AMD-Vi: Setup I/O page table: device id = 0xa00, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.648] AMD-Vi: Setup I/O page table: device id = 0xb00, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.660] AMD-Vi: Setup I/O page table: device id = 0xc00, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.671] AMD-Vi: Setup I/O page table: device id = 0xd00, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.683] AMD-Vi: Setup I/O page table: device id = 0xe00, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.700] Initial low memory virq threshold set at 0x4000 pages.
(XEN) [2020-10-10 16:12:39.712] Scrubbing Free RAM in background
(XEN) [2020-10-10 16:12:39.723] Std. Loglevel: All
(XEN) [2020-10-10 16:12:39.735] Guest Loglevel: All
(XEN) [2020-10-10 16:12:39.746] Xen is relinquishing VGA console.
(XEN) [2020-10-10 16:12:39.842] *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
(XEN) [2020-10-10 16:12:39.842] Freed 556kB init memory
(XEN) [2020-10-10 16:12:39.843] emul-priv-op.c:993:d0v0 RDMSR 0xc0010112 unimplemented
(XEN) [2020-10-10 16:12:39.843] emul-priv-op.c:993:d0v0 RDMSR 0xc0010015 unimplemented
(XEN) [2020-10-10 16:12:40.224] emul-priv-op.c:993:d0v0 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.224] emul-priv-op.c:993:d0v0 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.228] emul-priv-op.c:993:d0v0 RDMSR 0xc0010055 unimplemented
(XEN) [2020-10-10 16:12:40.229] emul-priv-op.c:993:d0v1 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.229] emul-priv-op.c:993:d0v1 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.230] emul-priv-op.c:993:d0v2 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.230] emul-priv-op.c:993:d0v2 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.230] emul-priv-op.c:993:d0v3 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.230] emul-priv-op.c:993:d0v3 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.231] emul-priv-op.c:993:d0v4 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.231] emul-priv-op.c:993:d0v4 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.231] emul-priv-op.c:993:d0v5 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.231] emul-priv-op.c:993:d0v5 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.299] emul-priv-op.c:993:d0v1 RDMSR 0xc001001a unimplemented
(XEN) [2020-10-10 16:12:40.299] emul-priv-op.c:993:d0v1 RDMSR 0xc0010010 unimplemented
(XEN) [2020-10-10 16:12:40.371] PCI: Using MCFG for segment 0000 bus 00-ff
(XEN) [2020-10-10 16:12:40.371] PCI add device 0000:00:00.0
(XEN) [2020-10-10 16:12:40.372] PCI add device 0000:00:00.2
(XEN) [2020-10-10 16:12:40.372] PCI add device 0000:00:02.0
(XEN) [2020-10-10 16:12:40.372] PCI add device 0000:00:03.0
(XEN) [2020-10-10 16:12:40.373] PCI add device 0000:00:05.0
(XEN) [2020-10-10 16:12:40.373] PCI add device 0000:00:06.0
(XEN) [2020-10-10 16:12:40.373] PCI add device 0000:00:09.0
(XEN) [2020-10-10 16:12:40.374] PCI add device 0000:00:0a.0
(XEN) [2020-10-10 16:12:40.374] PCI add device 0000:00:0c.0
(XEN) [2020-10-10 16:12:40.374] PCI add device 0000:00:0d.0
(XEN) [2020-10-10 16:12:40.375] PCI add device 0000:00:11.0
(XEN) [2020-10-10 16:12:40.375] PCI add device 0000:00:12.0
(XEN) [2020-10-10 16:12:40.375] PCI add device 0000:00:12.2
(XEN) [2020-10-10 16:12:40.376] PCI add device 0000:00:13.0
(XEN) [2020-10-10 16:12:40.376] PCI add device 0000:00:13.2
(XEN) [2020-10-10 16:12:40.376] PCI add device 0000:00:14.0
(XEN) [2020-10-10 16:12:40.377] PCI add device 0000:00:14.2
(XEN) [2020-10-10 16:12:40.377] PCI add device 0000:00:14.3
(XEN) [2020-10-10 16:12:40.377] PCI add device 0000:00:14.4
(XEN) [2020-10-10 16:12:40.377] PCI add device 0000:00:14.5
(XEN) [2020-10-10 16:12:40.378] PCI add device 0000:00:15.0
(XEN) [2020-10-10 16:12:40.378] PCI add device 0000:00:16.0
(XEN) [2020-10-10 16:12:40.378] PCI add device 0000:00:16.2
(XEN) [2020-10-10 16:12:40.378] PCI add device 0000:00:18.0
(XEN) [2020-10-10 16:12:40.379] PCI add device 0000:00:18.1
(XEN) [2020-10-10 16:12:40.379] PCI add device 0000:00:18.2
(XEN) [2020-10-10 16:12:40.379] PCI add device 0000:00:18.3
(XEN) [2020-10-10 16:12:40.379] PCI add device 0000:00:18.4
(XEN) [2020-10-10 16:12:40.380] PCI add device 0000:0e:00.0
(XEN) [2020-10-10 16:12:40.391] PCI add device 0000:0d:00.0
(XEN) [2020-10-10 16:12:40.391] PCI add device 0000:0c:00.0
(XEN) [2020-10-10 16:12:40.401] PCI add device 0000:0b:00.0
(XEN) [2020-10-10 16:12:40.411] PCI add device 0000:0a:00.0
(XEN) [2020-10-10 16:12:40.411] PCI add device 0000:09:00.0
(XEN) [2020-10-10 16:12:40.412] PCI add device 0000:09:00.1
(XEN) [2020-10-10 16:12:40.412] PCI add device 0000:09:00.2
(XEN) [2020-10-10 16:12:40.413] PCI add device 0000:09:00.3
(XEN) [2020-10-10 16:12:40.413] PCI add device 0000:09:00.4
(XEN) [2020-10-10 16:12:40.413] PCI add device 0000:09:00.5
(XEN) [2020-10-10 16:12:40.414] PCI add device 0000:09:00.6
(XEN) [2020-10-10 16:12:40.414] PCI add device 0000:09:00.7
(XEN) [2020-10-10 16:12:40.415] PCI add device 0000:05:00.0
(XEN) [2020-10-10 16:12:40.415] PCI add device 0000:06:01.0
(XEN) [2020-10-10 16:12:40.416] PCI add device 0000:06:02.0
(XEN) [2020-10-10 16:12:40.416] PCI add device 0000:08:00.0
(XEN) [2020-10-10 16:12:40.417] PCI add device 0000:07:00.0
(XEN) [2020-10-10 16:12:40.418] PCI add device 0000:04:00.0
(XEN) [2020-10-10 16:12:40.418] PCI add device 0000:04:00.1
(XEN) [2020-10-10 16:12:40.418] PCI add device 0000:04:00.2
(XEN) [2020-10-10 16:12:40.419] PCI add device 0000:04:00.3
(XEN) [2020-10-10 16:12:40.419] PCI add device 0000:04:00.4
(XEN) [2020-10-10 16:12:40.420] PCI add device 0000:04:00.5
(XEN) [2020-10-10 16:12:40.420] PCI add device 0000:04:00.6
(XEN) [2020-10-10 16:12:40.420] PCI add device 0000:04:00.7
(XEN) [2020-10-10 16:12:45.301] d0: Forcing read-only access to MFN fed00
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: CPU
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: CPU
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: PIC
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: IOAPIC
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: LAPIC
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: LAPIC
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: LAPIC_REGS
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: LAPIC_REGS
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: PCI_IRQ
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: ISA_IRQ
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: PCI_LINK
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: PIT
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: RTC
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: HPET
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: PMTIMER
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: MTRR
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: MTRR
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: VIRIDIAN_DOMAIN
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: CPU_XSAVE
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: CPU_XSAVE
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: VIRIDIAN_VCPU
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: VIRIDIAN_VCPU
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: VMCE_VCPU
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: VMCE_VCPU
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: TSC_ADJUST
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: TSC_ADJUST
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: CPU_MSR
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: CPU_MSR
(XEN) [2020-10-10 16:21:04.830] HVM1 restore: CPU 0
(d1) [2020-10-10 16:21:06.051] HVM Loader
(d1) [2020-10-10 16:21:06.051] Detected Xen v4.15-unstable
(d1) [2020-10-10 16:21:06.051] Xenbus rings @0xfeffc000, event channel 1
(d1) [2020-10-10 16:21:06.051] System requested SeaBIOS
(d1) [2020-10-10 16:21:06.051] CPU speed is 3200 MHz
(d1) [2020-10-10 16:21:06.051] Relocating guest memory for lowmem MMIO space disabled
(XEN) [2020-10-10 16:21:06.051] irq.c:378: Dom1 PCI link 0 changed 0 -> 5
(d1) [2020-10-10 16:21:06.051] PCI-ISA link 0 routed to IRQ5
(XEN) [2020-10-10 16:21:06.051] irq.c:378: Dom1 PCI link 1 changed 0 -> 10
(d1) [2020-10-10 16:21:06.052] PCI-ISA link 1 routed to IRQ10
(XEN) [2020-10-10 16:21:06.052] irq.c:378: Dom1 PCI link 2 changed 0 -> 11
(d1) [2020-10-10 16:21:06.052] PCI-ISA link 2 routed to IRQ11
(XEN) [2020-10-10 16:21:06.052] irq.c:378: Dom1 PCI link 3 changed 0 -> 5
(d1) [2020-10-10 16:21:06.052] PCI-ISA link 3 routed to IRQ5
(d1) [2020-10-10 16:21:06.063] pci dev 01:3 INTA->IRQ10
(d1) [2020-10-10 16:21:06.065] pci dev 02:0 INTA->IRQ11
(d1) [2020-10-10 16:21:06.071] pci dev 04:0 INTA->IRQ5
(d1) [2020-10-10 16:21:06.093] No RAM in high memory; setting high_mem resource base to 100000000
(d1) [2020-10-10 16:21:06.093] pci dev 03:0 bar 10 size 002000000: 0f0000008
(d1) [2020-10-10 16:21:06.094] pci dev 02:0 bar 14 size 001000000: 0f2000008
(d1) [2020-10-10 16:21:06.094] pci dev 04:0 bar 30 size 000040000: 0f3000000
(d1) [2020-10-10 16:21:06.094] pci dev 03:0 bar 30 size 000010000: 0f3040000
(d1) [2020-10-10 16:21:06.094] pci dev 03:0 bar 14 size 000001000: 0f3050000
(d1) [2020-10-10 16:21:06.094] pci dev 02:0 bar 10 size 000000100: 00000c001
(d1) [2020-10-10 16:21:06.094] pci dev 04:0 bar 10 size 000000100: 00000c101
(d1) [2020-10-10 16:21:06.095] pci dev 04:0 bar 14 size 000000100: 0f3051000
(d1) [2020-10-10 16:21:06.095] pci dev 01:1 bar 20 size 000000010: 00000c201
(d1) [2020-10-10 16:21:06.101] Multiprocessor initialisation:
(d1) [2020-10-10 16:21:06.101] - CPU0 ... 48-bit phys ... fixed MTRRs ... var MTRRs [1/8] ... done.
(d1) [2020-10-10 16:21:06.101] - CPU1 ... 48-bit phys ... fixed MTRRs ... var MTRRs [1/8] ... done.
(d1) [2020-10-10 16:21:06.101] Testing HVM environment:
(d1) [2020-10-10 16:21:06.101] Using scratch memory at 400000
(d1) [2020-10-10 16:21:06.113] - REP INSB across page boundaries ... passed
(d1) [2020-10-10 16:21:06.125] - REP INSW across page boundaries ... passed
(d1) [2020-10-10 16:21:06.136] - GS base MSRs and SWAPGS ... passed
(d1) [2020-10-10 16:21:06.136] Passed 3 of 3 tests
(d1) [2020-10-10 16:21:06.136] Writing SMBIOS tables ...
(d1) [2020-10-10 16:21:06.137] Loading SeaBIOS ...
(d1) [2020-10-10 16:21:06.137] Creating MP tables ...
(d1) [2020-10-10 16:21:06.137] Loading ACPI ...
(d1) [2020-10-10 16:21:06.138] vm86 TSS at fc100280
(d1) [2020-10-10 16:21:06.138] BIOS map:
(d1) [2020-10-10 16:21:06.138] 10000-100e3: Scratch space
(d1) [2020-10-10 16:21:06.138] c0000-fffff: Main BIOS
(d1) [2020-10-10 16:21:06.138] E820 table:
(d1) [2020-10-10 16:21:06.138] [00]: 00000000:00000000 - 00000000:000a0000: RAM
(d1) [2020-10-10 16:21:06.138] HOLE: 00000000:000a0000 - 00000000:000c0000
(d1) [2020-10-10 16:21:06.138] [01]: 00000000:000c0000 - 00000000:00100000: RESERVED
(d1) [2020-10-10 16:21:06.138] [02]: 00000000:00100000 - 00000000:0f800000: RAM
(d1) [2020-10-10 16:21:06.138] HOLE: 00000000:0f800000 - 00000000:fc000000
(d1) [2020-10-10 16:21:06.139] [03]: 00000000:fc000000 - 00000000:fc00b000: ACPI
(d1) [2020-10-10 16:21:06.139] [04]: 00000000:fc00b000 - 00000001:00000000: RESERVED
(d1) [2020-10-10 16:21:06.139] Invoking SeaBIOS ...
(d1) [2020-10-10 16:21:06.139] SeaBIOS (version rel-1.14.0-0-g155821a-Xen)
(d1) [2020-10-10 16:21:06.139] BUILD: gcc: (Debian 8.3.0-6) 8.3.0 binutils: (GNU Binutils for Debian) 2.31.1
(d1) [2020-10-10 16:21:06.139]
(d1) [2020-10-10 16:21:06.139] Found Xen hypervisor signature at 40000000
(d1) [2020-10-10 16:21:06.140] Running on QEMU (i440fx)
(d1) [2020-10-10 16:21:06.140] xen: copy e820...
(d1) [2020-10-10 16:21:06.140] Relocating init from 0x000d62e0 to 0x0f7aa760 (size 88064)
(d1) [2020-10-10 16:21:06.140] Found QEMU fw_cfg
(d1) [2020-10-10 16:21:06.142] RamSizeOver4G: 0x0000000000000000 [cmos]
(d1) [2020-10-10 16:21:06.142] boot order:
(d1) [2020-10-10 16:21:06.142] 1: /rom@genroms/linuxboot.bin
(d1) [2020-10-10 16:21:06.146] Found 7 PCI devices (max PCI bus is 00)
(d1) [2020-10-10 16:21:06.146] Allocated Xen hypercall page at f7ff000
(d1) [2020-10-10 16:21:06.146] Detected Xen v4.15-unstable
(d1) [2020-10-10 16:21:06.146] xen: copy BIOS tables...
(d1) [2020-10-10 16:21:06.146] Copying SMBIOS entry point from 0x00010020 to 0x000f5b80
(d1) [2020-10-10 16:21:06.146] Copying MPTABLE from 0xfc100180/fc100190 to 0x000f5a80
(d1) [2020-10-10 16:21:06.146] Copying PIR from 0x00010040 to 0x000f5a00
(d1) [2020-10-10 16:21:06.146] Copying ACPI RSDP from 0x000100c0 to 0x000f59d0
(d1) [2020-10-10 16:21:06.146] table(50434146)=0xfc00a370 (via xsdt)
(d1) [2020-10-10 16:21:06.146] Using pmtimer, ioport 0xb008
(d1) [2020-10-10 16:21:06.146] table(50434146)=0xfc00a370 (via xsdt)
(d1) [2020-10-10 16:21:06.146] ACPI: parse DSDT at 0xfc001040 (len 37539)
(d1) [2020-10-10 16:21:06.146] parse_termlist: parse error, skip from 16/27641
(d1) [2020-10-10 16:21:06.146] parse_termlist: parse error, skip from 87/6041
(d1) [2020-10-10 16:21:06.146] Scan for VGA option rom
(d1) [2020-10-10 16:21:06.158] Running option rom at c000:0003
(XEN) [2020-10-10 16:21:06.158] stdvga.c:173:d1v0 entering stdvga mode
(d1) [2020-10-10 16:21:06.168] pmm call arg1=0
(d1) [2020-10-10 16:21:06.168] Turning on vga text mode console
(d1) [2020-10-10 16:21:06.231] SeaBIOS (version rel-1.14.0-0-g155821a-Xen)
(d1) [2020-10-10 16:21:06.238] Machine UUID 1f33e35b-24be-4bef-9e46-79ce8abf5c7f
(d1) [2020-10-10 16:21:06.239] ATA controller 1 at 1f0/3f4/c200 (irq 14 dev 9)
(d1) [2020-10-10 16:21:06.240] ATA controller 2 at 170/374/c208 (irq 15 dev 9)
(d1) [2020-10-10 16:21:06.241] Searching bootorder for: HALT
(d1) [2020-10-10 16:21:06.241] Found 0 lpt ports
(d1) [2020-10-10 16:21:06.241] Found 0 serial ports
(d1) [2020-10-10 16:21:06.244] ata0-0: QEMU HARDDISK ATA-7 Hard-Disk (5120 MiBytes)
(d1) [2020-10-10 16:21:06.244] Searching bootorder for: /pci@i0cf8/*@1,1/drive@0/disk@0
(d1) [2020-10-10 16:21:06.244] Searching bios-geometry for: /pci@i0cf8/*@1,1/drive@0/disk@0
(d1) [2020-10-10 16:21:06.245] PS2 keyboard initialized
(d1) [2020-10-10 16:21:06.245] All threads complete.
(d1) [2020-10-10 16:21:06.245] Scan for option roms
(d1) [2020-10-10 16:21:06.266] Running option rom at c980:0003
(d1) [2020-10-10 16:21:06.271] pmm call arg1=1
(d1) [2020-10-10 16:21:06.271] pmm call arg1=0
(d1) [2020-10-10 16:21:06.272] pmm call arg1=1
(d1) [2020-10-10 16:21:06.272] pmm call arg1=0
(d1) [2020-10-10 16:21:06.288] Running option rom at ca80:0003
(d1) [2020-10-10 16:21:06.289] Searching bootorder for: /pci@i0cf8/*@4
(d1) [2020-10-10 16:21:06.289] Searching bootorder for: /rom@genroms/linuxboot.bin
(d1) [2020-10-10 16:21:06.289] Searching bootorder for: HALT
(d1) [2020-10-10 16:21:06.289] drive 0x000f5960: PCHS=10402/16/63 translation=lba LCHS=652/255/63 s=10485760
(d1) [2020-10-10 16:21:06.289] Space available for UMB: cb000-eb000, f53a0-f5960
(d1) [2020-10-10 16:21:06.289] Returned 258048 bytes of ZoneHigh
(d1) [2020-10-10 16:21:06.289] e820 map has 7 items:
(d1) [2020-10-10 16:21:06.289] 0: 0000000000000000 - 000000000009fc00 = 1 RAM
(d1) [2020-10-10 16:21:06.289] 1: 000000000009fc00 - 00000000000a0000 = 2 RESERVED
(d1) [2020-10-10 16:21:06.289] 2: 00000000000f0000 - 0000000000100000 = 2 RESERVED
(d1) [2020-10-10 16:21:06.289] 3: 0000000000100000 - 000000000f7ff000 = 1 RAM
(d1) [2020-10-10 16:21:06.289] 4: 000000000f7ff000 - 000000000f800000 = 2 RESERVED
(d1) [2020-10-10 16:21:06.289] 5: 00000000fc000000 - 00000000fc00b000 = 3 ACPI
(d1) [2020-10-10 16:21:06.289] 6: 00000000fc00b000 - 0000000100000000 = 2 RESERVED
(d1) [2020-10-10 16:21:06.290] enter handle_19:
(d1) [2020-10-10 16:21:06.290] NULL
(d1) [2020-10-10 16:21:06.294] Booting from ROM...
(d1) [2020-10-10 16:21:06.294] Booting from ca80:003c
(XEN) [2020-10-10 16:27:56.721] 'h' pressed -> showing installed handlers
(XEN) [2020-10-10 16:27:56.721] key '%' (ascii '25') => trap to xendbg
(XEN) [2020-10-10 16:27:56.721] key '*' (ascii '2a') => print all diagnostics
(XEN) [2020-10-10 16:27:56.721] key '+' (ascii '2b') => increase log level threshold
(XEN) [2020-10-10 16:27:56.721] key '-' (ascii '2d') => decrease log level threshold
(XEN) [2020-10-10 16:27:56.721] key '0' (ascii '30') => dump Dom0 registers
(XEN) [2020-10-10 16:27:56.721] key 'A' (ascii '41') => toggle alternative key handling
(XEN) [2020-10-10 16:27:56.721] key 'G' (ascii '47') => toggle host/guest log level adjustment
(XEN) [2020-10-10 16:27:56.721] key 'H' (ascii '48') => dump heap info
(XEN) [2020-10-10 16:27:56.721] key 'I' (ascii '49') => dump HVM irq info
(XEN) [2020-10-10 16:27:56.721] key 'M' (ascii '4d') => dump MSI state
(XEN) [2020-10-10 16:27:56.721] key 'N' (ascii '4e') => trigger an NMI
(XEN) [2020-10-10 16:27:56.721] key 'O' (ascii '4f') => toggle shadow audits
(XEN) [2020-10-10 16:27:56.721] key 'Q' (ascii '51') => dump PCI devices
(XEN) [2020-10-10 16:27:56.721] key 'R' (ascii '52') => reboot machine
(XEN) [2020-10-10 16:27:56.721] key 'S' (ascii '53') => reset shadow pagetables
(XEN) [2020-10-10 16:27:56.721] key 'V' (ascii '56') => dump IOMMU intremap tables
(XEN) [2020-10-10 16:27:56.721] key 'a' (ascii '61') => dump timer queues
(XEN) [2020-10-10 16:27:56.721] key 'c' (ascii '63') => dump ACPI Cx structures
(XEN) [2020-10-10 16:27:56.721] key 'd' (ascii '64') => dump registers
(XEN) [2020-10-10 16:27:56.721] key 'e' (ascii '65') => dump evtchn info
(XEN) [2020-10-10 16:27:56.721] key 'g' (ascii '67') => print grant table usage
(XEN) [2020-10-10 16:27:56.721] key 'h' (ascii '68') => show this message
(XEN) [2020-10-10 16:27:56.721] key 'i' (ascii '69') => dump interrupt bindings
(XEN) [2020-10-10 16:27:56.721] key 'm' (ascii '6d') => memory info
(XEN) [2020-10-10 16:27:56.721] key 'n' (ascii '6e') => NMI statistics
(XEN) [2020-10-10 16:27:56.721] key 'o' (ascii '6f') => dump iommu p2m table
(XEN) [2020-10-10 16:27:56.721] key 'q' (ascii '71') => dump domain (and guest debug) info
(XEN) [2020-10-10 16:27:56.721] key 'r' (ascii '72') => dump run queues
(XEN) [2020-10-10 16:27:56.721] key 's' (ascii '73') => dump softtsc stats
(XEN) [2020-10-10 16:27:56.721] key 't' (ascii '74') => display multi-cpu clock info
(XEN) [2020-10-10 16:27:56.721] key 'u' (ascii '75') => dump NUMA info
(XEN) [2020-10-10 16:27:56.721] key 'v' (ascii '76') => dump AMD-V VMCBs
(XEN) [2020-10-10 16:27:56.721] key 'w' (ascii '77') => synchronously dump console ring buffer (dmesg)
(XEN) [2020-10-10 16:27:56.721] key 'x' (ascii '78') => print livepatch info
(XEN) [2020-10-10 16:27:56.721] key 'z' (ascii '7a') => dump IOAPIC info
(XEN) [2020-10-10 16:28:15.913] 'q' pressed -> dumping domain info (now = 945314247960)
(XEN) [2020-10-10 16:28:15.913] General information for domain 0:
(XEN) [2020-10-10 16:28:15.913] refcnt=4 dying=0 pause_count=0
(XEN) [2020-10-10 16:28:15.913] nr_pages=524287 xenheap_pages=2 shared_pages=0 paged_pages=0 dirty_cpus={0-4} max_pages=524288
(XEN) [2020-10-10 16:28:15.913] handle=00000000-0000-0000-0000-000000000000 vm_assist=0000002d
(XEN) [2020-10-10 16:28:15.913] Rangesets belonging to domain 0:
(XEN) [2020-10-10 16:28:15.913] Interrupts { 1-55, 57-79 }
(XEN) [2020-10-10 16:28:15.913] I/O Memory { 0-f5fff, f6004-fedff, fef00-fcfffff, 10000000-fffffffff }
(XEN) [2020-10-10 16:28:15.913] I/O Ports { 0-1f, 22-3f, 44-60, 62-9f, a2-3f7, 400-807, 80c-cfb, d00-ffff }
(XEN) [2020-10-10 16:28:15.913] log-dirty { }
(XEN) [2020-10-10 16:28:15.913] Memory pages belonging to domain 0:
(XEN) [2020-10-10 16:28:15.913] DomPage list too long to display
(XEN) [2020-10-10 16:28:15.913] XenPage 00000000000c7f8c: caf=c000000000000002, taf=e400000000000002
(XEN) [2020-10-10 16:28:15.913] XenPage 000000000069f97f: caf=c000000000000002, taf=e400000000000002
(XEN) [2020-10-10 16:28:15.913] NODE affinity for domain 0: [0]
(XEN) [2020-10-10 16:28:15.913] VCPU information and callbacks for domain 0:
(XEN) [2020-10-10 16:28:15.913] UNIT0 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913] VCPU0: CPU1 [has=F] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=1
(XEN) [2020-10-10 16:28:15.913] pause_count=0 pause_flags=1
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913] UNIT1 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913] VCPU1: CPU0 [has=T] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=0
(XEN) [2020-10-10 16:28:15.913] pause_count=0 pause_flags=0
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913] UNIT2 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913] VCPU2: CPU3 [has=F] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=3
(XEN) [2020-10-10 16:28:15.913] pause_count=0 pause_flags=1
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913] UNIT3 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913] VCPU3: CPU2 [has=F] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=2
(XEN) [2020-10-10 16:28:15.913] pause_count=0 pause_flags=1
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913] UNIT4 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913] VCPU4: CPU4 [has=T] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=4
(XEN) [2020-10-10 16:28:15.913] pause_count=0 pause_flags=0
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913] UNIT5 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913] VCPU5: CPU3 [has=F] poll=0 upcall_pend=00 upcall_mask=00
(XEN) [2020-10-10 16:28:15.913] pause_count=0 pause_flags=1
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913] General information for domain 1:
(XEN) [2020-10-10 16:28:15.913] refcnt=3 dying=0 pause_count=0
(XEN) [2020-10-10 16:28:15.913] nr_pages=65612 xenheap_pages=2 shared_pages=0 paged_pages=0 dirty_cpus={5} max_pages=65792
(XEN) [2020-10-10 16:28:15.913] handle=1f33e35b-24be-4bef-9e46-79ce8abf5c7f vm_assist=00000000
(XEN) [2020-10-10 16:28:15.913] paging assistance: hap refcounts translate external
(XEN) [2020-10-10 16:28:15.913] Rangesets belonging to domain 1:
(XEN) [2020-10-10 16:28:15.913] ioreq_server 0 pci { 0, 8-9, b, 10, 18, 20 }
(XEN) [2020-10-10 16:28:15.913] ioreq_server 0 memory { a0000-bffff, f0000000-f07fffff, f1000000-f13fffff, f2000000-f2ffffff, f3050000-f30510ff, fec00000-fec00fff, fed00000-fed003ff, fee00000-feefffff }
(XEN) [2020-10-10 16:28:15.913] ioreq_server 0 port { 0-1f, 60, 64, 70-71, 80-83, 87, 89-8b, 8f, 92, b2-b3, c0-df, f0, 170-177, 1f0-1f7, 376, 3b0-3df, 3f1-3f7, 510-511, cf8-cff, ae00-ae13, af00-af1f, afe0-afe3, b000-b005, b008-b00b, c000-c20f }
(XEN) [2020-10-10 16:28:15.913] Interrupts { }
(XEN) [2020-10-10 16:28:15.913] I/O Memory { }
(XEN) [2020-10-10 16:28:15.913] I/O Ports { }
(XEN) [2020-10-10 16:28:15.913] log-dirty { }
(XEN) [2020-10-10 16:28:15.913] Memory pages belonging to domain 1:
(XEN) [2020-10-10 16:28:15.913] DomPage list too long to display
(XEN) [2020-10-10 16:28:15.913] PoD entries=0 cachesize=0
(XEN) [2020-10-10 16:28:15.913] XenPage 00000000000c7dfd: caf=c000000000000001, taf=e400000000000001
(XEN) [2020-10-10 16:28:15.913] XenPage 0000000000446cc9: caf=c000000000000001, taf=e400000000000001
(XEN) [2020-10-10 16:28:15.913] ExtraPage 0000000000442ec2: caf=8040000000000003, taf=e400000000000001
(XEN) [2020-10-10 16:28:15.913] ExtraPage 0000000000442ec1: caf=8040000000000003, taf=e400000000000001
(XEN) [2020-10-10 16:28:15.913] NODE affinity for domain 1: [0]
(XEN) [2020-10-10 16:28:15.913] VCPU information and callbacks for domain 1:
(XEN) [2020-10-10 16:28:15.913] UNIT0 affinities: hard={2-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913] VCPU0: CPU5 [has=F] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=5
(XEN) [2020-10-10 16:28:15.913] pause_count=0 pause_flags=4
(XEN) [2020-10-10 16:28:15.913] paging assistance: hap, 1 levels
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913] UNIT1 affinities: hard={2-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913] VCPU1: CPU5 [has=F] poll=0 upcall_pend=00 upcall_mask=00
(XEN) [2020-10-10 16:28:15.913] pause_count=0 pause_flags=2
(XEN) [2020-10-10 16:28:15.913] paging assistance: hap, 1 levels
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:0 (virq 1, port 5)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:1 (virq 1, port 11)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:2 (virq 1, port 18)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:3 (virq 1, port 25)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:4 (virq 1, port 32)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:5 (virq 1, port 39)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 1:0 (virq 1, port 0)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 1:1 (virq 1, port 0)
(XEN) [2020-10-10 16:28:15.913] Shared frames 0 -- Saved frames 0
(XEN) [2020-10-10 16:28:42.384] sched_smt_power_savings: disabled
(XEN) [2020-10-10 16:28:42.384] NOW=971785332421
(XEN) [2020-10-10 16:28:42.384] Online Cpus: 0-5
(XEN) [2020-10-10 16:28:42.384] Cpupool 0:
(XEN) [2020-10-10 16:28:42.384] Cpus: 0-5
(XEN) [2020-10-10 16:28:42.384] Scheduling granularity: cpu, 1 CPU per sched-resource
(XEN) [2020-10-10 16:28:42.384] Scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) [2020-10-10 16:28:42.384] Active queues: 1
(XEN) [2020-10-10 16:28:42.384] default-weight = 256
(XEN) [2020-10-10 16:28:42.384] Runqueue 0:
(XEN) [2020-10-10 16:28:42.384] ncpus = 6
(XEN) [2020-10-10 16:28:42.384] cpus = 0-5
(XEN) [2020-10-10 16:28:42.384] max_weight = 1024
(XEN) [2020-10-10 16:28:42.384] pick_bias = 4
(XEN) [2020-10-10 16:28:42.384] instload = 2
(XEN) [2020-10-10 16:28:42.384] aveload = 394963 (~150%)
(XEN) [2020-10-10 16:28:42.384] idlers: 2b
(XEN) [2020-10-10 16:28:42.384] tickled: 00
(XEN) [2020-10-10 16:28:42.384] fully idle cores: 2b
(XEN) [2020-10-10 16:28:42.384] Domain info:
(XEN) [2020-10-10 16:28:42.384] Domain: 0 w 1024 c 0 v 6
(XEN) [2020-10-10 16:28:42.384] 1: [0.0] flags=2 cpu=4 credit=10500000 [w=1024] load=443 (~0%)
(XEN) [2020-10-10 16:28:42.384] 2: [0.1] flags=0 cpu=0 credit=10340892 [w=1024] load=218 (~0%)
(XEN) [2020-10-10 16:28:42.384] 3: [0.2] flags=0 cpu=5 credit=10276435 [w=1024] load=278 (~0%)
(XEN) [2020-10-10 16:28:42.384] 4: [0.3] flags=0 cpu=4 credit=10500000 [w=1024] load=176 (~0%)
(XEN) [2020-10-10 16:28:42.384] 5: [0.4] flags=2 cpu=2 credit=8445124 [w=1024] load=262144 (~100%)
(XEN) [2020-10-10 16:28:42.384] 6: [0.5] flags=0 cpu=1 credit=9209406 [w=1024] load=501 (~0%)
(XEN) [2020-10-10 16:28:42.384] Domain: 1 w 256 c 0 v 2
(XEN) [2020-10-10 16:28:42.384] 7: [1.0] flags=2 cpu=3 credit=1777916 [w=256] load=131072 (~50%)
(XEN) [2020-10-10 16:28:42.384] 8: [1.1] flags=0 cpu=5 credit=10500000 [w=256] load=51 (~0%)
(XEN) [2020-10-10 16:28:42.384] Runqueue 0:
(XEN) [2020-10-10 16:28:42.384] CPU[00] runq=0, sibling={0}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] CPU[01] runq=0, sibling={1}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] CPU[02] runq=0, sibling={2}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] run: [0.4] flags=2 cpu=2 credit=8445124 [w=1024] load=262144 (~100%)
(XEN) [2020-10-10 16:28:42.384] CPU[03] runq=0, sibling={3}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] CPU[04] runq=0, sibling={4}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] run: [0.0] flags=2 cpu=4 credit=10500000 [w=1024] load=443 (~0%)
(XEN) [2020-10-10 16:28:42.384] CPU[05] runq=0, sibling={5}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] RUNQ:
(XEN) [2020-10-10 16:28:42.384] CPUs info:
(XEN) [2020-10-10 16:28:42.384] CPU[00] current=d[IDLE]v0, curr=d[IDLE]v0, prev=NULL
(XEN) [2020-10-10 16:28:42.384] CPU[01] current=d[IDLE]v1, curr=d[IDLE]v1, prev=NULL
(XEN) [2020-10-10 16:28:42.384] CPU[02] current=d0v4, curr=d0v4, prev=NULL
(XEN) [2020-10-10 16:28:42.384] CPU[03] current=d1v0, curr=d1v0, prev=NULL
(XEN) [2020-10-10 16:28:42.384] CPU[04] current=d0v0, curr=d0v0, prev=NULL
(XEN) [2020-10-10 16:28:42.384] CPU[05] current=d[IDLE]v5, curr=d[IDLE]v5, prev=NULL
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [SUSPECTED SPAM]Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
2020-10-10 17:51 Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820" Sander Eikelenboom
@ 2020-10-11 0:06 ` Igor Druzhinin
2020-10-11 9:43 ` Sander Eikelenboom
0 siblings, 1 reply; 6+ messages in thread
From: Igor Druzhinin @ 2020-10-11 0:06 UTC (permalink / raw)
To: Sander Eikelenboom, xen-devel, Jan Beulich
On 10/10/2020 18:51, Sander Eikelenboom wrote:
> Hi Igor/Jan,
>
> I tried to update my AMD machine to current xen-unstable, but
> unfortunately the HVM guests don't boot after that. The guest keeps
> using CPU-cycles but I don't get to a command prompt (or any output at
> all). PVH guests run fine.
>
> Bisection leads to commit:
>
> 8efa46516c5f4cf185c8df179812c185d3c27eb6
> hvmloader: indicate ACPI tables with "ACPI data" type in e820
>
> I tried xen-unstable with this commit reverted and with that everything
> works fine.
>
> I attached the xl-dmesg output.
What guests are you using? Could you get serial output from the guest?
Is it AMD specific? If it's a Linux guest could you get a stacktrace from
the guest using xenctx?
We have tested the change on all modern guests in our Citrix lab and haven't
found any problem for several months.
Igor
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [SUSPECTED SPAM]Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
2020-10-11 0:06 ` [SUSPECTED SPAM]Xen-unstable " Igor Druzhinin
@ 2020-10-11 9:43 ` Sander Eikelenboom
2020-10-11 10:40 ` Igor Druzhinin
0 siblings, 1 reply; 6+ messages in thread
From: Sander Eikelenboom @ 2020-10-11 9:43 UTC (permalink / raw)
To: Igor Druzhinin, xen-devel, Jan Beulich
On 11/10/2020 02:06, Igor Druzhinin wrote:
> On 10/10/2020 18:51, Sander Eikelenboom wrote:
>> Hi Igor/Jan,
>>
>> I tried to update my AMD machine to current xen-unstable, but
>> unfortunately the HVM guests don't boot after that. The guest keeps
>> using CPU-cycles but I don't get to a command prompt (or any output at
>> all). PVH guests run fine.
>>
>> Bisection leads to commit:
>>
>> 8efa46516c5f4cf185c8df179812c185d3c27eb6
>> hvmloader: indicate ACPI tables with "ACPI data" type in e820
>>
>> I tried xen-unstable with this commit reverted and with that everything
>> works fine.
>>
>> I attached the xl-dmesg output.
>
> What guests are you using?
Not sure I understand what you ask for, but:
dom0 PV
guest HVM (qemu-xen)
> Could you get serial output from the guest?
Not getting any, it seems to be stuck in very early boot.
> Is it AMD specific?
Can't tell, this is the only machine I test xen-unstable on.
It's a AMD phenom X6.
Both dom0 and guest kernel are 5.9-rc8.
Tested with guest config:
kernel = '/boot/vmlinuz-xen-guest'
ramdisk = '/boot/initrd.img-xen-guest'
cmdline = 'root=UUID=7cc4a90d-d6b0-4958-bb7d-50497aa29f18 ro
nomodeset console=tty1 console=ttyS0 console=hvc0 earlyprintk=xen'
type='hvm'
device_model_version = 'qemu-xen'
cpus = "2-5"
vcpus = 2
memory = '512'
disk = [
'phy:/dev/xen_vms_ssd/media,xvda,w'
]
name = 'guest'
vif = [ 'bridge=xen_bridge,ip=192.168.1.10,mac=00:16:3E:DC:0A:F1' ]
on_poweroff = 'destroy'
on_reboot = 'restart'
on_crash = 'preserve'
vnc=0
>If it's a Linux guest could you get a stacktrace from
> the guest using xenctx?
It is, here are few subsequent runs:
~# /usr/local/lib/xen/bin/xenctx -s
/boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
vcpu0:
cs:eip: ca80:00000256
flags: 00000016 nz a p
ss:esp: 0000:00006f38
eax: 029e0012 ebx: 0000fb00 ecx: 028484e3 edx: 00000511
esi: 00000000 edi: f97b7363 ebp: 00006f38
ds: ca80 es: 0010 fs: 0000 gs: 0000
cr0: 00000011
cr2: 00000000
cr3: 00400000
cr4: 00000000
dr0: 00000000
dr1: 00000000
dr2: 00000000
dr3: 00000000
dr6: ffff0ff0
dr7: 00000400
Code (instr addr 00000256)
ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff <00> f0
53 ff 00 f0 53 ff 00 f0 53
vcpu1 offline
~# /usr/local/lib/xen/bin/xenctx -s
/boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
vcpu0:
cs:eip: ca80:00000256
flags: 00000016 nz a p
ss:esp: 0000:00006f38
eax: 029e0012 ebx: 0000fb00 ecx: 028444b7 edx: 00000511
esi: 00000000 edi: f97bb38f ebp: 00006f38
ds: ca80 es: 0010 fs: 0000 gs: 0000
cr0: 00000011
cr2: 00000000
cr3: 00400000
cr4: 00000000
dr0: 00000000
dr1: 00000000
dr2: 00000000
dr3: 00000000
dr6: ffff0ff0
dr7: 00000400
Code (instr addr 00000256)
ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff <00> f0
53 ff 00 f0 53 ff 00 f0 53
vcpu1 offline
~# /usr/local/lib/xen/bin/xenctx -s
/boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
vcpu0:
cs:eip: ca80:00000256
flags: 00000016 nz a p
ss:esp: 0000:00006f38
eax: 029e0012 ebx: 0000fb00 ecx: 02840901 edx: 00000511
esi: 00000000 edi: f97bef45 ebp: 00006f38
ds: ca80 es: 0010 fs: 0000 gs: 0000
cr0: 00000011
cr2: 00000000
cr3: 00400000
cr4: 00000000
dr0: 00000000
dr1: 00000000
dr2: 00000000
dr3: 00000000
dr6: ffff0ff0
dr7: 00000400
Code (instr addr 00000256)
ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff <00> f0
53 ff 00 f0 53 ff 00 f0 53
vcpu1 offline
~# /usr/local/lib/xen/bin/xenctx -s
/boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
vcpu0:
cs:eip: ca80:00000256
flags: 00000016 nz a p
ss:esp: 0000:00006f38
eax: 029e0012 ebx: 0000fb00 ecx: 0283d4bd edx: 00000511
esi: 00000000 edi: f97c2389 ebp: 00006f38
ds: ca80 es: 0010 fs: 0000 gs: 0000
cr0: 00000011
cr2: 00000000
cr3: 00400000
cr4: 00000000
dr0: 00000000
dr1: 00000000
dr2: 00000000
dr3: 00000000
dr6: ffff0ff0
dr7: 00000400
Code (instr addr 00000256)
ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff <00> f0
53 ff 00 f0 53 ff 00 f0 53
vcpu1 offline
~# /usr/local/lib/xen/bin/xenctx -s
/boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
vcpu0:
cs:eip: ca80:00000256
flags: 00000016 nz a p
ss:esp: 0000:00006f38
eax: 029e0012 ebx: 0000fb00 ecx: 02838e90 edx: 00000511
esi: 00000000 edi: f97c69b6 ebp: 00006f38
ds: ca80 es: 0010 fs: 0000 gs: 0000
cr0: 00000011
cr2: 00000000
cr3: 00400000
cr4: 00000000
dr0: 00000000
dr1: 00000000
dr2: 00000000
dr3: 00000000
dr6: ffff0ff0
dr7: 00000400
Code (instr addr 00000256)
ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff <00> f0
53 ff 00 f0 53 ff 00 f0 53
vcpu1 offline
> We have tested the change on all modern guests in our Citrix lab and haven't
> found any problem for several months.
> Igor
>
--
Sander
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [SUSPECTED SPAM]Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
2020-10-11 9:43 ` Sander Eikelenboom
@ 2020-10-11 10:40 ` Igor Druzhinin
2020-10-11 11:20 ` Igor Druzhinin
0 siblings, 1 reply; 6+ messages in thread
From: Igor Druzhinin @ 2020-10-11 10:40 UTC (permalink / raw)
To: Sander Eikelenboom, xen-devel, Jan Beulich
On 11/10/2020 10:43, Sander Eikelenboom wrote:
> On 11/10/2020 02:06, Igor Druzhinin wrote:
>> On 10/10/2020 18:51, Sander Eikelenboom wrote:
>>> Hi Igor/Jan,
>>>
>>> I tried to update my AMD machine to current xen-unstable, but
>>> unfortunately the HVM guests don't boot after that. The guest keeps
>>> using CPU-cycles but I don't get to a command prompt (or any output at
>>> all). PVH guests run fine.
>>>
>>> Bisection leads to commit:
>>>
>>> 8efa46516c5f4cf185c8df179812c185d3c27eb6
>>> hvmloader: indicate ACPI tables with "ACPI data" type in e820
>>>
>>> I tried xen-unstable with this commit reverted and with that everything
>>> works fine.
>>>
>>> I attached the xl-dmesg output.
>>
>> What guests are you using?
> Not sure I understand what you ask for, but:
> dom0 PV
> guest HVM (qemu-xen)
>
>> Could you get serial output from the guest?
> Not getting any, it seems to be stuck in very early boot.
>
>> Is it AMD specific?
> Can't tell, this is the only machine I test xen-unstable on.
> It's a AMD phenom X6.
> Both dom0 and guest kernel are 5.9-rc8.
>
> Tested with guest config:
> kernel = '/boot/vmlinuz-xen-guest'
> ramdisk = '/boot/initrd.img-xen-guest'
>
> cmdline = 'root=UUID=7cc4a90d-d6b0-4958-bb7d-50497aa29f18 ro
> nomodeset console=tty1 console=ttyS0 console=hvc0 earlyprintk=xen'
>
> type='hvm'
>
> device_model_version = 'qemu-xen'
>
> cpus = "2-5"
> vcpus = 2
>
> memory = '512'
>
> disk = [
> 'phy:/dev/xen_vms_ssd/media,xvda,w'
> ]
>
> name = 'guest'
>
> vif = [ 'bridge=xen_bridge,ip=192.168.1.10,mac=00:16:3E:DC:0A:F1' ]
>
> on_poweroff = 'destroy'
> on_reboot = 'restart'
> on_crash = 'preserve'
>
> vnc=0
>
>
>> If it's a Linux guest could you get a stacktrace from
>> the guest using xenctx?
>
> It is, here are few subsequent runs:
>
> ~# /usr/local/lib/xen/bin/xenctx -s
> /boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
> vcpu0:
> cs:eip: ca80:00000256
Ok, it's stuck in linuxboot.bin option ROM. That's not something we test in Citrix -
we don't use fw_cfg. It could be something with caching (given it's moving but slowly) or a
bug uncovered by memory map changes. I'll try to get a repro on Monday.
It could be AMD specific if it's caching related and that's why osstest didn't pick it up.
Igor
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [SUSPECTED SPAM]Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
2020-10-11 10:40 ` Igor Druzhinin
@ 2020-10-11 11:20 ` Igor Druzhinin
2020-10-11 14:35 ` Sander Eikelenboom
0 siblings, 1 reply; 6+ messages in thread
From: Igor Druzhinin @ 2020-10-11 11:20 UTC (permalink / raw)
To: Sander Eikelenboom, xen-devel, Jan Beulich
On 11/10/2020 11:40, Igor Druzhinin wrote:
> On 11/10/2020 10:43, Sander Eikelenboom wrote:
>> On 11/10/2020 02:06, Igor Druzhinin wrote:
>>> On 10/10/2020 18:51, Sander Eikelenboom wrote:
>>>> Hi Igor/Jan,
>>>>
>>>> I tried to update my AMD machine to current xen-unstable, but
>>>> unfortunately the HVM guests don't boot after that. The guest keeps
>>>> using CPU-cycles but I don't get to a command prompt (or any output at
>>>> all). PVH guests run fine.
>>>>
>>>> Bisection leads to commit:
>>>>
>>>> 8efa46516c5f4cf185c8df179812c185d3c27eb6
>>>> hvmloader: indicate ACPI tables with "ACPI data" type in e820
>>>>
>>>> I tried xen-unstable with this commit reverted and with that everything
>>>> works fine.
>>>>
>>>> I attached the xl-dmesg output.
>>>
>>> What guests are you using?
>> Not sure I understand what you ask for, but:
>> dom0 PV
>> guest HVM (qemu-xen)
>>
>>> Could you get serial output from the guest?
>> Not getting any, it seems to be stuck in very early boot.
>>
>>> Is it AMD specific?
>> Can't tell, this is the only machine I test xen-unstable on.
>> It's a AMD phenom X6.
>> Both dom0 and guest kernel are 5.9-rc8.
>>
>> Tested with guest config:
>> kernel = '/boot/vmlinuz-xen-guest'
>> ramdisk = '/boot/initrd.img-xen-guest'
>>
>> cmdline = 'root=UUID=7cc4a90d-d6b0-4958-bb7d-50497aa29f18 ro
>> nomodeset console=tty1 console=ttyS0 console=hvc0 earlyprintk=xen'
>>
>> type='hvm'
>>
>> device_model_version = 'qemu-xen'
>>
>> cpus = "2-5"
>> vcpus = 2
>>
>> memory = '512'
>>
>> disk = [
>> 'phy:/dev/xen_vms_ssd/media,xvda,w'
>> ]
>>
>> name = 'guest'
>>
>> vif = [ 'bridge=xen_bridge,ip=192.168.1.10,mac=00:16:3E:DC:0A:F1' ]
>>
>> on_poweroff = 'destroy'
>> on_reboot = 'restart'
>> on_crash = 'preserve'
>>
>> vnc=0
>>
>>
>>> If it's a Linux guest could you get a stacktrace from
>>> the guest using xenctx?
>>
>> It is, here are few subsequent runs:
>>
>> ~# /usr/local/lib/xen/bin/xenctx -s
>> /boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
>> vcpu0:
>> cs:eip: ca80:00000256
>
> Ok, it's stuck in linuxboot.bin option ROM. That's not something we test in Citrix -
> we don't use fw_cfg. It could be something with caching (given it's moving but slowly) or a
> bug uncovered by memory map changes. I'll try to get a repro on Monday.
Right, I think I know what will fix your problem - could you flip "ACPI data"
type to "ACPI NVS" in my commit.
Jan, this is what we've discussed on the list as an ambiguity in ACPI spec but
couldn't reach a clean resolution after all.
SeaBIOS thinks that "ACPI data" type is essentially RAM that could be reported
as RAM resource to the guest in E801.
https://wiki.osdev.org/Detecting_Memory_(x86)#BIOS_Function:_INT_0x15.2C_AX_.3D_0xE801
// Calculate the maximum ramsize (less than 4gig) from e820 map.
static void
calcRamSize(void)
{
u32 rs = 0;
int i;
for (i=e820_count-1; i>=0; i--) {
struct e820entry *en = &e820_list[i];
u64 end = en->start + en->size;
u32 type = en->type;
if (end <= 0xffffffff && (type == E820_ACPI || type == E820_RAM)) {
rs = end;
break;
}
}
LegacyRamSize = rs >= 1024*1024 ? rs : 1024*1024;
}
what is wrong here I think is that it clearly doesn't handle holes and worked more
by luck. So SeaBIOS needs to be fixed but I think that using ACPI NVS in hvmloader
is still safer.
Igor
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [SUSPECTED SPAM]Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
2020-10-11 11:20 ` Igor Druzhinin
@ 2020-10-11 14:35 ` Sander Eikelenboom
0 siblings, 0 replies; 6+ messages in thread
From: Sander Eikelenboom @ 2020-10-11 14:35 UTC (permalink / raw)
To: Igor Druzhinin, xen-devel, Jan Beulich
On 11/10/2020 13:20, Igor Druzhinin wrote:
> On 11/10/2020 11:40, Igor Druzhinin wrote:
>> On 11/10/2020 10:43, Sander Eikelenboom wrote:
>>> On 11/10/2020 02:06, Igor Druzhinin wrote:
>>>> On 10/10/2020 18:51, Sander Eikelenboom wrote:
>>>>> Hi Igor/Jan,
>>>>>
>>>>> I tried to update my AMD machine to current xen-unstable, but
>>>>> unfortunately the HVM guests don't boot after that. The guest keeps
>>>>> using CPU-cycles but I don't get to a command prompt (or any output at
>>>>> all). PVH guests run fine.
>>>>>
>>>>> Bisection leads to commit:
>>>>>
>>>>> 8efa46516c5f4cf185c8df179812c185d3c27eb6
>>>>> hvmloader: indicate ACPI tables with "ACPI data" type in e820
>>>>>
>>>>> I tried xen-unstable with this commit reverted and with that everything
>>>>> works fine.
>>>>>
>>>>> I attached the xl-dmesg output.
>>>>
>>>> What guests are you using?
>>> Not sure I understand what you ask for, but:
>>> dom0 PV
>>> guest HVM (qemu-xen)
>>>
>>>> Could you get serial output from the guest?
>>> Not getting any, it seems to be stuck in very early boot.
>>>
>>>> Is it AMD specific?
>>> Can't tell, this is the only machine I test xen-unstable on.
>>> It's a AMD phenom X6.
>>> Both dom0 and guest kernel are 5.9-rc8.
>>>
>>> Tested with guest config:
>>> kernel = '/boot/vmlinuz-xen-guest'
>>> ramdisk = '/boot/initrd.img-xen-guest'
>>>
>>> cmdline = 'root=UUID=7cc4a90d-d6b0-4958-bb7d-50497aa29f18 ro
>>> nomodeset console=tty1 console=ttyS0 console=hvc0 earlyprintk=xen'
>>>
>>> type='hvm'
>>>
>>> device_model_version = 'qemu-xen'
>>>
>>> cpus = "2-5"
>>> vcpus = 2
>>>
>>> memory = '512'
>>>
>>> disk = [
>>> 'phy:/dev/xen_vms_ssd/media,xvda,w'
>>> ]
>>>
>>> name = 'guest'
>>>
>>> vif = [ 'bridge=xen_bridge,ip=192.168.1.10,mac=00:16:3E:DC:0A:F1' ]
>>>
>>> on_poweroff = 'destroy'
>>> on_reboot = 'restart'
>>> on_crash = 'preserve'
>>>
>>> vnc=0
>>>
>>>
>>>> If it's a Linux guest could you get a stacktrace from
>>>> the guest using xenctx?
>>>
>>> It is, here are few subsequent runs:
>>>
>>> ~# /usr/local/lib/xen/bin/xenctx -s
>>> /boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
>>> vcpu0:
>>> cs:eip: ca80:00000256
>>
>> Ok, it's stuck in linuxboot.bin option ROM. That's not something we test in Citrix -
>> we don't use fw_cfg. It could be something with caching (given it's moving but slowly) or a
>> bug uncovered by memory map changes. I'll try to get a repro on Monday.
>
> Right, I think I know what will fix your problem - could you flip "ACPI data"
> type to "ACPI NVS" in my commit.
Just did and the guest now boots fine.
--
Sander
> Jan, this is what we've discussed on the list as an ambiguity in ACPI spec but
> couldn't reach a clean resolution after all.
> SeaBIOS thinks that "ACPI data" type is essentially RAM that could be reported
> as RAM resource to the guest in E801.
> https://wiki.osdev.org/Detecting_Memory_(x86)#BIOS_Function:_INT_0x15.2C_AX_.3D_0xE801
>
> // Calculate the maximum ramsize (less than 4gig) from e820 map.
> static void
> calcRamSize(void)
> {
> u32 rs = 0;
> int i;
> for (i=e820_count-1; i>=0; i--) {
> struct e820entry *en = &e820_list[i];
> u64 end = en->start + en->size;
> u32 type = en->type;
> if (end <= 0xffffffff && (type == E820_ACPI || type == E820_RAM)) {
> rs = end;
> break;
> }
> }
> LegacyRamSize = rs >= 1024*1024 ? rs : 1024*1024;
> }
>
> what is wrong here I think is that it clearly doesn't handle holes and worked more
> by luck. So SeaBIOS needs to be fixed but I think that using ACPI NVS in hvmloader
> is still safer.
>
> Igor
>
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2020-10-11 14:36 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-10-10 17:51 Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820" Sander Eikelenboom
2020-10-11 0:06 ` [SUSPECTED SPAM]Xen-unstable " Igor Druzhinin
2020-10-11 9:43 ` Sander Eikelenboom
2020-10-11 10:40 ` Igor Druzhinin
2020-10-11 11:20 ` Igor Druzhinin
2020-10-11 14:35 ` Sander Eikelenboom
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.