All of lore.kernel.org
 help / color / mirror / Atom feed
* Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
@ 2020-10-10 17:51 Sander Eikelenboom
  2020-10-11  0:06 ` [SUSPECTED SPAM]Xen-unstable " Igor Druzhinin
  0 siblings, 1 reply; 6+ messages in thread
From: Sander Eikelenboom @ 2020-10-10 17:51 UTC (permalink / raw)
  To: xen-devel, Igor Druzhinin, Jan Beulich

[-- Attachment #1: Type: text/plain, Size: 503 bytes --]

Hi Igor/Jan,

I tried to update my AMD machine to current xen-unstable, but
unfortunately the HVM guests don't boot after that. The guest keeps
using CPU-cycles but I don't get to a command prompt (or any output at
all). PVH guests run fine.

Bisection leads to commit:

8efa46516c5f4cf185c8df179812c185d3c27eb6
hvmloader: indicate ACPI tables with "ACPI data" type in e820

I tried xen-unstable with this commit reverted and with that everything
works fine.

I attached the xl-dmesg output.

--
Sander

[-- Attachment #2: xl-dmesg-extended-20201010.txt --]
[-- Type: text/plain, Size: 54227 bytes --]

 __  __            _  _    _ ____                     _        _     _
 \ \/ /___ _ __   | || |  / | ___|    _   _ _ __  ___| |_ __ _| |__ | | ___
  \  // _ \ '_ \  | || |_ | |___ \ __| | | | '_ \/ __| __/ _` | '_ \| |/ _ \
  /  \  __/ | | | |__   _|| |___) |__| |_| | | | \__ \ || (_| | |_) | |  __/
 /_/\_\___|_| |_|    |_|(_)_|____/    \__,_|_| |_|___/\__\__,_|_.__/|_|\___|

(XEN) [0000001a935d33ae] Xen version 4.15-unstable (root@dyndns.org) (gcc (Debian 8.3.0-6) 8.3.0) debug=y  Sat Oct 10 17:42:56 CEST 2020
(XEN) [0000001a9a35344a] Latest ChangeSet: Fri Oct 2 12:30:34 2020 +0200 git:8a62dee9ce
(XEN) [0000001a9e9ef6a0] build-id: 517916349a46fdab2faadfefa7051928a1594796
(XEN) [0000001aa2709d53] Bootloader: GRUB 2.02+dfsg1-20+deb10u2
(XEN) [0000001aa5a9cace] Command line: dom0_mem=2048M,max:2048M loglvl=all guest_loglvl=all console_timestamps=datems vga=gfx-1280x1024x32 no-cpuidle com1=38400,8n1 console=vga,com1 ivrs_ioapic[6]=00:14.0 iommu=on,verbose,debug conring_size=128k ucode=scan sched=credit2 gnttab_max_frames=64 reboot=a
(XEN) [0000001ab4a3c9f3] Xen image load base address: 0
(XEN) [0000001ab7775ae3] Video information:
(XEN) [0000001ab9b2a306]  VGA is graphics mode 1280x1024, 32 bpp
(XEN) [0000001abcf88912]  VBE/DDC methods: none; EDID transfer time: 0 seconds
(XEN) [0000001ac0f0387e]  EDID info not retrieved because no DDC retrieval method detected
(XEN) [0000001ac5802e2e] Disc information:
(XEN) [0000001ac7aeb1c3]  Found 4 MBR signatures
(XEN) [0000001aca29768e]  Found 4 EDD information structures
(XEN) [0000001acd3c9a83] CPU Vendor: AMD, Family 16 (0x10), Model 10 (0xa), Stepping 0 (raw 00100fa0)
(XEN) [0000001ad2584e1b] Xen-e820 RAM map:
(XEN) [0000001ad486cf30]  [0000000000000000, 00000000000963ff] (usable)
(XEN) [0000001ad8258d5b]  [0000000000096400, 000000000009ffff] (reserved)
(XEN) [0000001adbddb57b]  [00000000000e4000, 00000000000fffff] (reserved)
(XEN) [0000001adf95eaba]  [0000000000100000, 00000000c7f8ffff] (usable)
(XEN) [0000001ae334a8b2]  [00000000c7f90000, 00000000c7f9dfff] (ACPI data)
(XEN) [0000001ae6f9844a]  [00000000c7f9e000, 00000000c7fdffff] (ACPI NVS)
(XEN) [0000001aeab1a6f6]  [00000000c7fe0000, 00000000c7ffffff] (reserved)
(XEN) [0000001aee69c5ea]  [00000000ffe00000, 00000000ffffffff] (reserved)
(XEN) [0000001af221e626]  [0000000100000000, 00000006b7ffffff] (usable)
(XEN) [0000001afd7b593b] New Xen image base address: 0xc7800000
(XEN) [0000001b00b46a62] ACPI: RSDP 000FB100, 0014 (r0 ACPIAM)
(XEN) [0000001b03e1003b] ACPI: RSDT C7F90000, 0048 (r1 MSI    OEMSLIC  20100913 MSFT       97)
(XEN) [0000001b08a3c463] ACPI: FACP C7F90200, 0084 (r1 7640MS A7640100 20100913 MSFT       97)
(XEN) [0000001b0d6666bb] ACPI: DSDT C7F905E0, 9427 (r1  A7640 A7640100      100 INTL 20051117)
(XEN) [0000001b12293fb6] ACPI: FACS C7F9E000, 0040
(XEN) [0000001b14bd51ea] ACPI: APIC C7F90390, 0088 (r1 7640MS A7640100 20100913 MSFT       97)
(XEN) [0000001b198022fa] ACPI: MCFG C7F90420, 003C (r1 7640MS OEMMCFG  20100913 MSFT       97)
(XEN) [0000001b1e42e08a] ACPI: SLIC C7F90460, 0176 (r1 MSI    OEMSLIC  20100913 MSFT       97)
(XEN) [0000001b2305a2d0] ACPI: OEMB C7F9E040, 0072 (r1 7640MS A7640100 20100913 MSFT       97)
(XEN) [0000001b27c851ea] ACPI: SRAT C7F9A5E0, 0108 (r3 AMD    FAM_F_10        2 AMD         1)
(XEN) [0000001b2c8b11c0] ACPI: HPET C7F9A6F0, 0038 (r1 7640MS OEMHPET  20100913 MSFT       97)
(XEN) [0000001b314de060] ACPI: IVRS C7F9A730, 0108 (r1  AMD     RD890S   202031 AMD         0)
(XEN) [0000001b3610939b] ACPI: SSDT C7F9A840, 0DA4 (r1 A M I  POWERNOW        1 AMD         1)
(XEN) [0000001b3ad35668] System RAM: 26623MB (27262104kB)
(XEN) [0000001b48bbc278] SRAT: PXM 0 -> APIC 00 -> Node 0
(XEN) [0000001b4ba8c92a] SRAT: PXM 0 -> APIC 01 -> Node 0
(XEN) [0000001b4e95dc3e] SRAT: PXM 0 -> APIC 02 -> Node 0
(XEN) [0000001b5182ca02] SRAT: PXM 0 -> APIC 03 -> Node 0
(XEN) [0000001b546feeb3] SRAT: PXM 0 -> APIC 04 -> Node 0
(XEN) [0000001b575cf4aa] SRAT: PXM 0 -> APIC 05 -> Node 0
(XEN) [0000001b5a49f5f6] SRAT: Node 0 PXM 0 0-a0000
(XEN) [0000001b5cead2e2] SRAT: Node 0 PXM 0 100000-c8000000
(XEN) [0000001b5ff1399e] SRAT: Node 0 PXM 0 100000000-6b8000000
(XEN) [0000001b632a6bf3] NUMA: Allocated memnodemap from 6a4d2a000 - 6a4d31000
(XEN) [0000001b6721fc52] NUMA: Using 8 for the hash shift.
(XEN) [0000001bc77a7565] Domain heap initialised
(XEN) [0000001bc9f546a3] Allocated console ring of 128 KiB.
(XEN) [0000001be01a5586] vesafb: framebuffer at 0x00000000fb000000, mapped to 0xffff82c000201000, using 6144k, total 14336k
(XEN) [0000001be64d3bd2] vesafb: mode is 1280x1024x32, linelength=5120, font 8x16
(XEN) [0000001bea6afdd8] vesafb: Truecolor: size=8:8:8:8, shift=24:16:8:0
(XEN) [0000001bf4e0f2ea] found SMP MP-table at 000ff780
(XEN) [0000001bf7b47978] DMI present.
(XEN) [0000001bf9a394f2] Using APIC driver default
(XEN) [0000001bfc37a433] ACPI: PM-Timer IO Port: 0x808 (32 bits)
(XEN) [0000001bff7d9712] ACPI: SLEEP INFO: pm1x_cnt[1:804,1:0], pm1x_evt[1:800,1:0]
(XEN) [0000001c03b4c00e] ACPI:             wakeup_vec[c7f9e00c], vec_size[20]
(XEN) [0000001c079fa182] ACPI: Local APIC address 0xfee00000
(XEN) [0000001c0ab2bbca] ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled)
(XEN) [0000001c0e84414a] ACPI: LAPIC (acpi_id[0x02] lapic_id[0x01] enabled)
(XEN) [0000001c1255cce3] ACPI: LAPIC (acpi_id[0x03] lapic_id[0x02] enabled)
(XEN) [0000001c162755c3] ACPI: LAPIC (acpi_id[0x04] lapic_id[0x03] enabled)
(XEN) [0000001c19f8e92a] ACPI: LAPIC (acpi_id[0x05] lapic_id[0x04] enabled)
(XEN) [0000001c1dca5e23] ACPI: LAPIC (acpi_id[0x06] lapic_id[0x05] enabled)
(XEN) [0000001c219c0666] ACPI: IOAPIC (id[0x06] address[0xfec00000] gsi_base[0])
(XEN) [0000001c25acffee] IOAPIC[0]: apic_id 6, version 33, address 0xfec00000, GSI 0-23
(XEN) [0000001c2a16d556] ACPI: IOAPIC (id[0x07] address[0xfec20000] gsi_base[24])
(XEN) [0000001c2e34973e] IOAPIC[1]: apic_id 7, version 33, address 0xfec20000, GSI 24-55
(XEN) [0000001c32ab2a06] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
(XEN) [0000001c36c8edc2] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 low level)
(XEN) [0000001c3afff768] ACPI: IRQ0 used by override.
(XEN) [0000001c3dba27ea] ACPI: IRQ2 used by override.
(XEN) [0000001c407483e0] ACPI: IRQ9 used by override.
(XEN) [0000001c432eb0aa] Enabling APIC mode:  Flat.  Using 2 I/O APICs
(XEN) [0000001c46c0bea6] ACPI: HPET id: 0x8300 base: 0xfed00000
(XEN) [0000001c49f9e718] PCI: MCFG configuration 0: base e0000000 segment 0000 buses 00 - ff
(XEN) [0000001c4ea34ca6] PCI: Not using MCFG for segment 0000 bus 00-ff
(XEN) [0000001c52421282] AMD-Vi: Found MSI capability block at 0x54
(XEN) [0000001c55ae0313] Using ACPI (MADT) for SMP configuration information
(XEN) [0000001c598c510b] SMP: Allowing 6 CPUs (0 hotplug CPUs)
(XEN) [0000001c5cb8ceb8] IRQ limits: 56 GSI, 1192 MSI/MSI-X
(XEN) [0000001c5fbf42ca] microcode: CPU0 updated from revision 0x10000bf to 0x10000dc
(XEN) [0000001c640fb75e] CPU0: 3200 (800 ... 3600) MHz
(XEN) [0000001c66d6ab4a] CPU0: AMD Fam10h machine check reporting enabled
(XEN) [0000001c6a8ebe36] Speculative mitigation facilities:
(XEN) [0000001c6d953e9b]   Hardware features:
(XEN) [0000001c6fe9dca6]   Compiled-in support: INDIRECT_THUNK SHADOW_PAGING
(XEN) [0000001c73c82c33]   Xen settings: BTI-Thunk LFENCE, SPEC_CTRL: No, Other: BRANCH_HARDEN
(XEN) [0000001c788ad506]   Support for HVM VMs: RSB
(XEN) [0000001c7b2bb0b6]   Support for PV VMs: RSB
(XEN) [0000001c7dbfe7f3]   XPTI (64-bit PV only): Dom0 disabled, DomU disabled (without PCID)
(XEN) [0000001c8275f58d]   PV L1TF shadowing: Dom0 disabled, DomU disabled
(XEN) [0000001c863abd26] Using scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) [0000001c8a25b69e] Initializing Credit2 scheduler
(XEN) [0000001c8cf94e9a]  load_precision_shift: 18
(XEN) [0000001c8f8d85f0]  load_window_shift: 30
(XEN) [0000001c91fb8e4d]  underload_balance_tolerance: 0
(XEN) [0000001c94dbd833]  overload_balance_tolerance: -3
(XEN) [0000001c97bc45d3]  runqueues arrangement: socket
(XEN) [0000001c9a8fe3cd]  cap enforcement granularity: 10ms
(XEN) [0000001c9d964efa] load tracking window length 1073741824 ns
(XEN) [0000001caa6d1c98] Platform timer is 14.318MHz HPET
(XEN) [    3.457428] Detected 3200.141 MHz processor.
(XEN) [    3.473549] alt table ffff82d04048b3f0 -> ffff82d04049940c
(XEN) [    3.499885] AMD-Vi: IVRS Block: Found type 0x10 flags 0x3e len 0xd8 id 0x2
(XEN) [    3.521982] AMD-Vi: Using IVHD type 0x10
(XEN) [    3.535245] AMD-Vi: ACPI Table:
(XEN) [    3.546162] AMD-Vi:  Signature IVRS
(XEN) [    3.558122] AMD-Vi:  Length 0x108
(XEN) [    3.569562] AMD-Vi:  Revision 0x1
(XEN) [    3.581002] AMD-Vi:  CheckSum 0x79
(XEN) [    3.592702] AMD-Vi:  OEM_Id AMD  
(XEN) [    3.604140] AMD-Vi:  OEM_Table_Id RD890S
(XEN) [    3.617399] AMD-Vi:  OEM_Revision 0x202031
(XEN) [    3.631180] AMD-Vi:  Creator_Id AMD 
(XEN) [    3.648391] AMD-Vi:  Creator_Revision 0
(XEN) [    3.666369] AMD-Vi: IVRS Block: type 0x10 flags 0x3e len 0xd8 id 0x2
(XEN) [    3.691965] AMD-Vi: IVHD Device Entry: type 0x3 id 0 flags 0
(XEN) [    3.715481] AMD-Vi:  Dev_Id Range: 0 -> 0x2
(XEN) [    3.734563] AMD-Vi: IVHD Device Entry: type 0x2 id 0x10 flags 0
(XEN) [    3.758820] AMD-Vi: IVHD Device Entry: type 0x2 id 0xe00 flags 0
(XEN) [    3.783336] AMD-Vi: IVHD Device Entry: type 0x2 id 0x18 flags 0
(XEN) [    3.807621] AMD-Vi: IVHD Device Entry: type 0x2 id 0xd00 flags 0
(XEN) [    3.832164] AMD-Vi: IVHD Device Entry: type 0x2 id 0x28 flags 0
(XEN) [    3.856420] AMD-Vi: IVHD Device Entry: type 0x2 id 0xc00 flags 0
(XEN) [    3.880925] AMD-Vi: IVHD Device Entry: type 0x2 id 0x30 flags 0
(XEN) [    3.905166] AMD-Vi: IVHD Device Entry: type 0x2 id 0xb00 flags 0
(XEN) [    3.929671] AMD-Vi: IVHD Device Entry: type 0x2 id 0x48 flags 0
(XEN) [    3.953903] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa00 flags 0
(XEN) [    3.978369] AMD-Vi: IVHD Device Entry: type 0x2 id 0x50 flags 0
(XEN) [    4.002584] AMD-Vi: IVHD Device Entry: type 0x3 id 0x900 flags 0
(XEN) [    4.027049] AMD-Vi:  Dev_Id Range: 0x900 -> 0x907
(XEN) [    4.047563] AMD-Vi: IVHD Device Entry: type 0x2 id 0x60 flags 0
(XEN) [    4.071691] AMD-Vi: IVHD Device Entry: type 0x2 id 0x500 flags 0
(XEN) [    4.096104] AMD-Vi: IVHD Device Entry: type 0x2 id 0x608 flags 0
(XEN) [    4.120543] AMD-Vi: IVHD Device Entry: type 0x2 id 0x800 flags 0
(XEN) [    4.145019] AMD-Vi: IVHD Device Entry: type 0x2 id 0x610 flags 0
(XEN) [    4.169472] AMD-Vi: IVHD Device Entry: type 0x2 id 0x700 flags 0
(XEN) [    4.193924] AMD-Vi: IVHD Device Entry: type 0x2 id 0x68 flags 0
(XEN) [    4.218130] AMD-Vi: IVHD Device Entry: type 0x3 id 0x400 flags 0
(XEN) [    4.242569] AMD-Vi:  Dev_Id Range: 0x400 -> 0x407
(XEN) [    4.263094] AMD-Vi: IVHD Device Entry: type 0x2 id 0x88 flags 0
(XEN) [    4.287235] AMD-Vi: IVHD Device Entry: type 0x3 id 0x90 flags 0
(XEN) [    4.311374] AMD-Vi:  Dev_Id Range: 0x90 -> 0x92
(XEN) [    4.331354] AMD-Vi: IVHD Device Entry: type 0x3 id 0x98 flags 0
(XEN) [    4.355520] AMD-Vi:  Dev_Id Range: 0x98 -> 0x9a
(XEN) [    4.375460] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa0 flags 0xd7
(XEN) [    4.400369] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa2 flags 0
(XEN) [    4.424534] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa3 flags 0
(XEN) [    4.448688] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa4 flags 0
(XEN) [    4.472827] AMD-Vi: IVHD Device Entry: type 0 id 0 flags 0
(XEN) [    4.495628] AMD-Vi: IVHD Device Entry: type 0x43 id 0x300 flags 0
(XEN) [    4.520248] AMD-Vi:  Dev_Id Range: 0x300 -> 0x3ff alias 0xa4
(XEN) [    4.543623] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa5 flags 0
(XEN) [    4.567722] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa8 flags 0
(XEN) [    4.591811] AMD-Vi: IVHD Device Entry: type 0x2 id 0xa9 flags 0
(XEN) [    4.615887] AMD-Vi: IVHD Device Entry: type 0x2 id 0x100 flags 0
(XEN) [    4.640220] AMD-Vi: IVHD Device Entry: type 0x3 id 0xb0 flags 0
(XEN) [    4.664321] AMD-Vi:  Dev_Id Range: 0xb0 -> 0xb2
(XEN) [    4.684275] AMD-Vi: IVHD Device Entry: type 0 id 0 flags 0
(XEN) [    4.707129] AMD-Vi: IVHD Device Entry: type 0x48 id 0 flags 0xd7
(XEN) [    4.731593] AMD-Vi: IVHD Special: 0000:00:14.0 variety 0x2 handle 0
(XEN) [    4.756840] AMD-Vi: IVHD Device Entry: type 0x48 id 0 flags 0
(XEN) [    4.780576] AMD-Vi: IVHD Special: 0000:00:00.1 variety 0x1 handle 0x7
(XEN) [    4.806537] AMD-Vi: Disabled HAP memory map sharing with IOMMU
(XEN) [    4.830584] AMD-Vi: IOMMU 0 Enabled.
(XEN) [    4.847914] I/O virtualisation enabled
(XEN) [    4.865671]  - Dom0 mode: Relaxed
(XEN) [    4.882062] Interrupt remapping enabled
(XEN) [    4.899988] nr_sockets: 1
(XEN) [    4.914534] ENABLING IO-APIC IRQs
(XEN) [    4.930849]  -> Using new ACK method
(XEN) [    4.948165] ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=-1 pin2=-1
(XEN) [2020-10-10 16:12:36.665] HVM: ASIDs enabled.
(XEN) [2020-10-10 16:12:36.671] SVM: Supported advanced features:
(XEN) [2020-10-10 16:12:36.677]  - Nested Page Tables (NPT)
(XEN) [2020-10-10 16:12:36.682]  - Last Branch Record (LBR) Virtualisation
(XEN) [2020-10-10 16:12:36.688]  - Next-RIP Saved on #VMEXIT
(XEN) [2020-10-10 16:12:36.694]  - Pause-Intercept Filter
(XEN) [2020-10-10 16:12:36.700] HVM: SVM enabled
(XEN) [2020-10-10 16:12:36.705] HVM: Hardware Assisted Paging (HAP) detected
(XEN) [2020-10-10 16:12:36.711] HVM: HAP page sizes: 4kB, 2MB, 1GB
(XEN) [2020-10-10 16:12:36.717] alt table ffff82d04048b3f0 -> ffff82d04049940c
(XEN) [2020-10-10 16:12:30.818] microcode: CPU1 updated from revision 0x10000bf to 0x10000dc
(XEN) [2020-10-10 16:12:30.818] microcode: CPU2 updated from revision 0x10000bf to 0x10000dc
(XEN) [2020-10-10 16:12:30.818] microcode: CPU3 updated from revision 0x10000bf to 0x10000dc
(XEN) [2020-10-10 16:12:30.818] microcode: CPU4 updated from revision 0x10000bf to 0x10000dc
(XEN) [2020-10-10 16:12:30.818] microcode: CPU5 updated from revision 0x10000bf to 0x10000dc
(XEN) [2020-10-10 16:12:36.806] Brought up 6 CPUs
(XEN) [2020-10-10 16:12:36.818] Scheduling granularity: cpu, 1 CPU per sched-resource
(XEN) [2020-10-10 16:12:36.824] Adding cpu 0 to runqueue 0
(XEN) [2020-10-10 16:12:36.830]  First cpu on runqueue, activating
(XEN) [2020-10-10 16:12:36.836] Adding cpu 1 to runqueue 0
(XEN) [2020-10-10 16:12:36.842] Adding cpu 2 to runqueue 0
(XEN) [2020-10-10 16:12:36.848] Adding cpu 3 to runqueue 0
(XEN) [2020-10-10 16:12:36.854] Adding cpu 4 to runqueue 0
(XEN) [2020-10-10 16:12:36.860] Adding cpu 5 to runqueue 0
(XEN) [2020-10-10 16:12:36.866] MCA: Use hw thresholding to adjust polling frequency
(XEN) [2020-10-10 16:12:36.872] mcheck_poll: Machine check polling timer started.
(XEN) [2020-10-10 16:12:36.878] Xenoprofile: Failed to setup IBS LVT offset, IBSCTL = 0xffffffff
(XEN) [2020-10-10 16:12:36.884] Running stub recovery selftests...
(XEN) [2020-10-10 16:12:36.890] Fixup #UD[0000]: ffff82d07fffe040 [ffff82d07fffe040] -> ffff82d040396a01
(XEN) [2020-10-10 16:12:36.896] Fixup #GP[0000]: ffff82d07fffe041 [ffff82d07fffe041] -> ffff82d040396a01
(XEN) [2020-10-10 16:12:36.902] Fixup #SS[0000]: ffff82d07fffe040 [ffff82d07fffe040] -> ffff82d040396a01
(XEN) [2020-10-10 16:12:36.908] Fixup #BP[0000]: ffff82d07fffe041 [ffff82d07fffe041] -> ffff82d040396a01
(XEN) [2020-10-10 16:12:36.934] NX (Execute Disable) protection active
(XEN) [2020-10-10 16:12:36.941] Multiple initrd candidates, picking module #1
(XEN) [2020-10-10 16:12:36.947] Dom0 has maximum 680 PIRQs
(XEN) [2020-10-10 16:12:36.953] *** Building a PV Dom0 ***
(XEN) [2020-10-10 16:12:37.254] ELF: phdr: paddr=0x1000000 memsz=0x1c1e82c
(XEN) [2020-10-10 16:12:37.260] ELF: phdr: paddr=0x2e00000 memsz=0x7d0000
(XEN) [2020-10-10 16:12:37.267] ELF: phdr: paddr=0x35d0000 memsz=0x2bad8
(XEN) [2020-10-10 16:12:37.273] ELF: phdr: paddr=0x35fc000 memsz=0x42a000
(XEN) [2020-10-10 16:12:37.279] ELF: memory: 0x1000000 -> 0x3a26000
(XEN) [2020-10-10 16:12:37.285] ELF: note: GUEST_OS = "linux"
(XEN) [2020-10-10 16:12:37.291] ELF: note: GUEST_VERSION = "2.6"
(XEN) [2020-10-10 16:12:37.297] ELF: note: XEN_VERSION = "xen-3.0"
(XEN) [2020-10-10 16:12:37.304] ELF: note: VIRT_BASE = 0xffffffff80000000
(XEN) [2020-10-10 16:12:37.310] ELF: note: INIT_P2M = 0x8000000000
(XEN) [2020-10-10 16:12:37.316] ELF: note: ENTRY = 0xffffffff835fc180
(XEN) [2020-10-10 16:12:37.322] ELF: note: HYPERCALL_PAGE = 0xffffffff81002000
(XEN) [2020-10-10 16:12:37.328] ELF: note: FEATURES = "!writable_page_tables|pae_pgdir_above_4gb"
(XEN) [2020-10-10 16:12:37.334] ELF: note: SUPPORTED_FEATURES = 0x8801
(XEN) [2020-10-10 16:12:37.341] ELF: note: PAE_MODE = "yes"
(XEN) [2020-10-10 16:12:37.347] ELF: note: LOADER = "generic"
(XEN) [2020-10-10 16:12:37.353] ELF: note: unknown (0xd)
(XEN) [2020-10-10 16:12:37.359] ELF: note: SUSPEND_CANCEL = 0x1
(XEN) [2020-10-10 16:12:37.365] ELF: note: MOD_START_PFN = 0x1
(XEN) [2020-10-10 16:12:37.371] ELF: note: HV_START_LOW = 0xffff800000000000
(XEN) [2020-10-10 16:12:37.378] ELF: note: PADDR_OFFSET = 0
(XEN) [2020-10-10 16:12:37.384] ELF: note: PHYS32_ENTRY = 0x1000420
(XEN) [2020-10-10 16:12:37.390] ELF: Found PVH image
(XEN) [2020-10-10 16:12:37.396] ELF: addresses:
(XEN) [2020-10-10 16:12:37.402]     virt_base        = 0xffffffff80000000
(XEN) [2020-10-10 16:12:37.409]     elf_paddr_offset = 0x0
(XEN) [2020-10-10 16:12:37.415]     virt_offset      = 0xffffffff80000000
(XEN) [2020-10-10 16:12:37.421]     virt_kstart      = 0xffffffff81000000
(XEN) [2020-10-10 16:12:37.427]     virt_kend        = 0xffffffff83a26000
(XEN) [2020-10-10 16:12:37.434]     virt_entry       = 0xffffffff835fc180
(XEN) [2020-10-10 16:12:37.440]     p2m_base         = 0x8000000000
(XEN) [2020-10-10 16:12:37.446]  Xen  kernel: 64-bit, lsb, compat32
(XEN) [2020-10-10 16:12:37.453]  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x3a26000
(XEN) [2020-10-10 16:12:37.460] PHYSICAL MEMORY ARRANGEMENT:
(XEN) [2020-10-10 16:12:37.467]  Dom0 alloc.:   0000000698000000->000000069c000000 (497183 pages to be allocated)
(XEN) [2020-10-10 16:12:37.474]  Init. ramdisk: 00000006b561b000->00000006b7ffb846
(XEN) [2020-10-10 16:12:37.480] VIRTUAL MEMORY ARRANGEMENT:
(XEN) [2020-10-10 16:12:37.487]  Loaded kernel: ffffffff81000000->ffffffff83a26000
(XEN) [2020-10-10 16:12:37.493]  Init. ramdisk: 0000000000000000->0000000000000000
(XEN) [2020-10-10 16:12:37.500]  Phys-Mach map: 0000008000000000->0000008000400000
(XEN) [2020-10-10 16:12:37.506]  Start info:    ffffffff83a26000->ffffffff83a264b8
(XEN) [2020-10-10 16:12:37.513]  Xenstore ring: 0000000000000000->0000000000000000
(XEN) [2020-10-10 16:12:37.519]  Console ring:  0000000000000000->0000000000000000
(XEN) [2020-10-10 16:12:37.526]  Page tables:   ffffffff83a27000->ffffffff83a48000
(XEN) [2020-10-10 16:12:37.532]  Boot stack:    ffffffff83a48000->ffffffff83a49000
(XEN) [2020-10-10 16:12:37.538]  TOTAL:         ffffffff80000000->ffffffff83c00000
(XEN) [2020-10-10 16:12:37.545]  ENTRY ADDRESS: ffffffff835fc180
(XEN) [2020-10-10 16:12:37.552] Dom0 has maximum 6 VCPUs
(XEN) [2020-10-10 16:12:37.559] ELF: phdr 0 at 0xffffffff81000000 -> 0xffffffff82c1e82c
(XEN) [2020-10-10 16:12:37.587] ELF: phdr 1 at 0xffffffff82e00000 -> 0xffffffff835d0000
(XEN) [2020-10-10 16:12:37.600] ELF: phdr 2 at 0xffffffff835d0000 -> 0xffffffff835fbad8
(XEN) [2020-10-10 16:12:37.607] ELF: phdr 3 at 0xffffffff835fc000 -> 0xffffffff8374d000
(XEN) [2020-10-10 16:12:39.208] AMD-Vi: Setup I/O page table: device id = 0, type = 0x6, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.215] AMD-Vi: Setup I/O page table: device id = 0x10, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.222] AMD-Vi: Setup I/O page table: device id = 0x18, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.229] AMD-Vi: Setup I/O page table: device id = 0x28, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.236] AMD-Vi: Setup I/O page table: device id = 0x30, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.243] AMD-Vi: Setup I/O page table: device id = 0x48, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.250] AMD-Vi: Setup I/O page table: device id = 0x50, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.258] AMD-Vi: Setup I/O page table: device id = 0x60, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.265] AMD-Vi: Setup I/O page table: device id = 0x68, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.272] AMD-Vi: Setup I/O page table: device id = 0x88, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.280] AMD-Vi: Setup I/O page table: device id = 0x90, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.288] AMD-Vi: Setup I/O page table: device id = 0x92, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.296] AMD-Vi: Setup I/O page table: device id = 0x98, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.303] AMD-Vi: Setup I/O page table: device id = 0x9a, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.311] AMD-Vi: Setup I/O page table: device id = 0xa0, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.320] AMD-Vi: Setup I/O page table: device id = 0xa2, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.328] AMD-Vi: Setup I/O page table: device id = 0xa3, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.336] AMD-Vi: Setup I/O page table: device id = 0xa4, type = 0x5, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.345] AMD-Vi: Setup I/O page table: device id = 0xa5, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.353] AMD-Vi: Setup I/O page table: device id = 0xa8, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.362] AMD-Vi: Setup I/O page table: device id = 0xb0, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.371] AMD-Vi: Setup I/O page table: device id = 0xb2, type = 0x7, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.379] AMD-Vi: Skipping host bridge 0000:00:18.0
(XEN) [2020-10-10 16:12:39.388] AMD-Vi: Skipping host bridge 0000:00:18.1
(XEN) [2020-10-10 16:12:39.397] AMD-Vi: Skipping host bridge 0000:00:18.2
(XEN) [2020-10-10 16:12:39.406] AMD-Vi: Skipping host bridge 0000:00:18.3
(XEN) [2020-10-10 16:12:39.414] AMD-Vi: Skipping host bridge 0000:00:18.4
(XEN) [2020-10-10 16:12:39.423] AMD-Vi: Setup I/O page table: device id = 0x400, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.432] AMD-Vi: Setup I/O page table: device id = 0x401, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.441] AMD-Vi: Setup I/O page table: device id = 0x402, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.451] AMD-Vi: Setup I/O page table: device id = 0x403, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.460] AMD-Vi: Setup I/O page table: device id = 0x404, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.470] AMD-Vi: Setup I/O page table: device id = 0x405, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.479] AMD-Vi: Setup I/O page table: device id = 0x406, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.489] AMD-Vi: Setup I/O page table: device id = 0x407, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.499] AMD-Vi: Setup I/O page table: device id = 0x500, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.509] AMD-Vi: Setup I/O page table: device id = 0x608, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.519] AMD-Vi: Setup I/O page table: device id = 0x610, type = 0x2, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.529] AMD-Vi: Setup I/O page table: device id = 0x700, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.540] AMD-Vi: Setup I/O page table: device id = 0x800, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.550] AMD-Vi: Setup I/O page table: device id = 0x900, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.561] AMD-Vi: Setup I/O page table: device id = 0x901, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.571] AMD-Vi: Setup I/O page table: device id = 0x902, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.582] AMD-Vi: Setup I/O page table: device id = 0x903, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.593] AMD-Vi: Setup I/O page table: device id = 0x904, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.604] AMD-Vi: Setup I/O page table: device id = 0x905, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.615] AMD-Vi: Setup I/O page table: device id = 0x906, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.626] AMD-Vi: Setup I/O page table: device id = 0x907, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.637] AMD-Vi: Setup I/O page table: device id = 0xa00, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.648] AMD-Vi: Setup I/O page table: device id = 0xb00, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.660] AMD-Vi: Setup I/O page table: device id = 0xc00, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.671] AMD-Vi: Setup I/O page table: device id = 0xd00, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.683] AMD-Vi: Setup I/O page table: device id = 0xe00, type = 0x1, root table = 0x6b5618000, domain = 0, paging mode = 3
(XEN) [2020-10-10 16:12:39.700] Initial low memory virq threshold set at 0x4000 pages.
(XEN) [2020-10-10 16:12:39.712] Scrubbing Free RAM in background
(XEN) [2020-10-10 16:12:39.723] Std. Loglevel: All
(XEN) [2020-10-10 16:12:39.735] Guest Loglevel: All
(XEN) [2020-10-10 16:12:39.746] Xen is relinquishing VGA console.
(XEN) [2020-10-10 16:12:39.842] *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
(XEN) [2020-10-10 16:12:39.842] Freed 556kB init memory
(XEN) [2020-10-10 16:12:39.843] emul-priv-op.c:993:d0v0 RDMSR 0xc0010112 unimplemented
(XEN) [2020-10-10 16:12:39.843] emul-priv-op.c:993:d0v0 RDMSR 0xc0010015 unimplemented
(XEN) [2020-10-10 16:12:40.224] emul-priv-op.c:993:d0v0 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.224] emul-priv-op.c:993:d0v0 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.228] emul-priv-op.c:993:d0v0 RDMSR 0xc0010055 unimplemented
(XEN) [2020-10-10 16:12:40.229] emul-priv-op.c:993:d0v1 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.229] emul-priv-op.c:993:d0v1 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.230] emul-priv-op.c:993:d0v2 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.230] emul-priv-op.c:993:d0v2 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.230] emul-priv-op.c:993:d0v3 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.230] emul-priv-op.c:993:d0v3 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.231] emul-priv-op.c:993:d0v4 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.231] emul-priv-op.c:993:d0v4 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.231] emul-priv-op.c:993:d0v5 RDMSR 0xc0010048 unimplemented
(XEN) [2020-10-10 16:12:40.231] emul-priv-op.c:993:d0v5 RDMSR 0xc001102a unimplemented
(XEN) [2020-10-10 16:12:40.299] emul-priv-op.c:993:d0v1 RDMSR 0xc001001a unimplemented
(XEN) [2020-10-10 16:12:40.299] emul-priv-op.c:993:d0v1 RDMSR 0xc0010010 unimplemented
(XEN) [2020-10-10 16:12:40.371] PCI: Using MCFG for segment 0000 bus 00-ff
(XEN) [2020-10-10 16:12:40.371] PCI add device 0000:00:00.0
(XEN) [2020-10-10 16:12:40.372] PCI add device 0000:00:00.2
(XEN) [2020-10-10 16:12:40.372] PCI add device 0000:00:02.0
(XEN) [2020-10-10 16:12:40.372] PCI add device 0000:00:03.0
(XEN) [2020-10-10 16:12:40.373] PCI add device 0000:00:05.0
(XEN) [2020-10-10 16:12:40.373] PCI add device 0000:00:06.0
(XEN) [2020-10-10 16:12:40.373] PCI add device 0000:00:09.0
(XEN) [2020-10-10 16:12:40.374] PCI add device 0000:00:0a.0
(XEN) [2020-10-10 16:12:40.374] PCI add device 0000:00:0c.0
(XEN) [2020-10-10 16:12:40.374] PCI add device 0000:00:0d.0
(XEN) [2020-10-10 16:12:40.375] PCI add device 0000:00:11.0
(XEN) [2020-10-10 16:12:40.375] PCI add device 0000:00:12.0
(XEN) [2020-10-10 16:12:40.375] PCI add device 0000:00:12.2
(XEN) [2020-10-10 16:12:40.376] PCI add device 0000:00:13.0
(XEN) [2020-10-10 16:12:40.376] PCI add device 0000:00:13.2
(XEN) [2020-10-10 16:12:40.376] PCI add device 0000:00:14.0
(XEN) [2020-10-10 16:12:40.377] PCI add device 0000:00:14.2
(XEN) [2020-10-10 16:12:40.377] PCI add device 0000:00:14.3
(XEN) [2020-10-10 16:12:40.377] PCI add device 0000:00:14.4
(XEN) [2020-10-10 16:12:40.377] PCI add device 0000:00:14.5
(XEN) [2020-10-10 16:12:40.378] PCI add device 0000:00:15.0
(XEN) [2020-10-10 16:12:40.378] PCI add device 0000:00:16.0
(XEN) [2020-10-10 16:12:40.378] PCI add device 0000:00:16.2
(XEN) [2020-10-10 16:12:40.378] PCI add device 0000:00:18.0
(XEN) [2020-10-10 16:12:40.379] PCI add device 0000:00:18.1
(XEN) [2020-10-10 16:12:40.379] PCI add device 0000:00:18.2
(XEN) [2020-10-10 16:12:40.379] PCI add device 0000:00:18.3
(XEN) [2020-10-10 16:12:40.379] PCI add device 0000:00:18.4
(XEN) [2020-10-10 16:12:40.380] PCI add device 0000:0e:00.0
(XEN) [2020-10-10 16:12:40.391] PCI add device 0000:0d:00.0
(XEN) [2020-10-10 16:12:40.391] PCI add device 0000:0c:00.0
(XEN) [2020-10-10 16:12:40.401] PCI add device 0000:0b:00.0
(XEN) [2020-10-10 16:12:40.411] PCI add device 0000:0a:00.0
(XEN) [2020-10-10 16:12:40.411] PCI add device 0000:09:00.0
(XEN) [2020-10-10 16:12:40.412] PCI add device 0000:09:00.1
(XEN) [2020-10-10 16:12:40.412] PCI add device 0000:09:00.2
(XEN) [2020-10-10 16:12:40.413] PCI add device 0000:09:00.3
(XEN) [2020-10-10 16:12:40.413] PCI add device 0000:09:00.4
(XEN) [2020-10-10 16:12:40.413] PCI add device 0000:09:00.5
(XEN) [2020-10-10 16:12:40.414] PCI add device 0000:09:00.6
(XEN) [2020-10-10 16:12:40.414] PCI add device 0000:09:00.7
(XEN) [2020-10-10 16:12:40.415] PCI add device 0000:05:00.0
(XEN) [2020-10-10 16:12:40.415] PCI add device 0000:06:01.0
(XEN) [2020-10-10 16:12:40.416] PCI add device 0000:06:02.0
(XEN) [2020-10-10 16:12:40.416] PCI add device 0000:08:00.0
(XEN) [2020-10-10 16:12:40.417] PCI add device 0000:07:00.0
(XEN) [2020-10-10 16:12:40.418] PCI add device 0000:04:00.0
(XEN) [2020-10-10 16:12:40.418] PCI add device 0000:04:00.1
(XEN) [2020-10-10 16:12:40.418] PCI add device 0000:04:00.2
(XEN) [2020-10-10 16:12:40.419] PCI add device 0000:04:00.3
(XEN) [2020-10-10 16:12:40.419] PCI add device 0000:04:00.4
(XEN) [2020-10-10 16:12:40.420] PCI add device 0000:04:00.5
(XEN) [2020-10-10 16:12:40.420] PCI add device 0000:04:00.6
(XEN) [2020-10-10 16:12:40.420] PCI add device 0000:04:00.7
(XEN) [2020-10-10 16:12:45.301] d0: Forcing read-only access to MFN fed00
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: CPU
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: CPU
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: PIC
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: IOAPIC
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: LAPIC
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: LAPIC
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: LAPIC_REGS
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: LAPIC_REGS
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: PCI_IRQ
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: ISA_IRQ
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: PCI_LINK
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: PIT
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: RTC
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: HPET
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: PMTIMER
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: MTRR
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: MTRR
(XEN) [2020-10-10 16:21:04.830] HVM d1 save: VIRIDIAN_DOMAIN
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: CPU_XSAVE
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: CPU_XSAVE
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: VIRIDIAN_VCPU
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: VIRIDIAN_VCPU
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: VMCE_VCPU
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: VMCE_VCPU
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: TSC_ADJUST
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: TSC_ADJUST
(XEN) [2020-10-10 16:21:04.830] HVM d1v0 save: CPU_MSR
(XEN) [2020-10-10 16:21:04.830] HVM d1v1 save: CPU_MSR
(XEN) [2020-10-10 16:21:04.830] HVM1 restore: CPU 0
(d1) [2020-10-10 16:21:06.051] HVM Loader
(d1) [2020-10-10 16:21:06.051] Detected Xen v4.15-unstable
(d1) [2020-10-10 16:21:06.051] Xenbus rings @0xfeffc000, event channel 1
(d1) [2020-10-10 16:21:06.051] System requested SeaBIOS
(d1) [2020-10-10 16:21:06.051] CPU speed is 3200 MHz
(d1) [2020-10-10 16:21:06.051] Relocating guest memory for lowmem MMIO space disabled
(XEN) [2020-10-10 16:21:06.051] irq.c:378: Dom1 PCI link 0 changed 0 -> 5
(d1) [2020-10-10 16:21:06.051] PCI-ISA link 0 routed to IRQ5
(XEN) [2020-10-10 16:21:06.051] irq.c:378: Dom1 PCI link 1 changed 0 -> 10
(d1) [2020-10-10 16:21:06.052] PCI-ISA link 1 routed to IRQ10
(XEN) [2020-10-10 16:21:06.052] irq.c:378: Dom1 PCI link 2 changed 0 -> 11
(d1) [2020-10-10 16:21:06.052] PCI-ISA link 2 routed to IRQ11
(XEN) [2020-10-10 16:21:06.052] irq.c:378: Dom1 PCI link 3 changed 0 -> 5
(d1) [2020-10-10 16:21:06.052] PCI-ISA link 3 routed to IRQ5
(d1) [2020-10-10 16:21:06.063] pci dev 01:3 INTA->IRQ10
(d1) [2020-10-10 16:21:06.065] pci dev 02:0 INTA->IRQ11
(d1) [2020-10-10 16:21:06.071] pci dev 04:0 INTA->IRQ5
(d1) [2020-10-10 16:21:06.093] No RAM in high memory; setting high_mem resource base to 100000000
(d1) [2020-10-10 16:21:06.093] pci dev 03:0 bar 10 size 002000000: 0f0000008
(d1) [2020-10-10 16:21:06.094] pci dev 02:0 bar 14 size 001000000: 0f2000008
(d1) [2020-10-10 16:21:06.094] pci dev 04:0 bar 30 size 000040000: 0f3000000
(d1) [2020-10-10 16:21:06.094] pci dev 03:0 bar 30 size 000010000: 0f3040000
(d1) [2020-10-10 16:21:06.094] pci dev 03:0 bar 14 size 000001000: 0f3050000
(d1) [2020-10-10 16:21:06.094] pci dev 02:0 bar 10 size 000000100: 00000c001
(d1) [2020-10-10 16:21:06.094] pci dev 04:0 bar 10 size 000000100: 00000c101
(d1) [2020-10-10 16:21:06.095] pci dev 04:0 bar 14 size 000000100: 0f3051000
(d1) [2020-10-10 16:21:06.095] pci dev 01:1 bar 20 size 000000010: 00000c201
(d1) [2020-10-10 16:21:06.101] Multiprocessor initialisation:
(d1) [2020-10-10 16:21:06.101]  - CPU0 ... 48-bit phys ... fixed MTRRs ... var MTRRs [1/8] ... done.
(d1) [2020-10-10 16:21:06.101]  - CPU1 ... 48-bit phys ... fixed MTRRs ... var MTRRs [1/8] ... done.
(d1) [2020-10-10 16:21:06.101] Testing HVM environment:
(d1) [2020-10-10 16:21:06.101] Using scratch memory at 400000
(d1) [2020-10-10 16:21:06.113]  - REP INSB across page boundaries ... passed
(d1) [2020-10-10 16:21:06.125]  - REP INSW across page boundaries ... passed
(d1) [2020-10-10 16:21:06.136]  - GS base MSRs and SWAPGS ... passed
(d1) [2020-10-10 16:21:06.136] Passed 3 of 3 tests
(d1) [2020-10-10 16:21:06.136] Writing SMBIOS tables ...
(d1) [2020-10-10 16:21:06.137] Loading SeaBIOS ...
(d1) [2020-10-10 16:21:06.137] Creating MP tables ...
(d1) [2020-10-10 16:21:06.137] Loading ACPI ...
(d1) [2020-10-10 16:21:06.138] vm86 TSS at fc100280
(d1) [2020-10-10 16:21:06.138] BIOS map:
(d1) [2020-10-10 16:21:06.138]  10000-100e3: Scratch space
(d1) [2020-10-10 16:21:06.138]  c0000-fffff: Main BIOS
(d1) [2020-10-10 16:21:06.138] E820 table:
(d1) [2020-10-10 16:21:06.138]  [00]: 00000000:00000000 - 00000000:000a0000: RAM
(d1) [2020-10-10 16:21:06.138]  HOLE: 00000000:000a0000 - 00000000:000c0000
(d1) [2020-10-10 16:21:06.138]  [01]: 00000000:000c0000 - 00000000:00100000: RESERVED
(d1) [2020-10-10 16:21:06.138]  [02]: 00000000:00100000 - 00000000:0f800000: RAM
(d1) [2020-10-10 16:21:06.138]  HOLE: 00000000:0f800000 - 00000000:fc000000
(d1) [2020-10-10 16:21:06.139]  [03]: 00000000:fc000000 - 00000000:fc00b000: ACPI
(d1) [2020-10-10 16:21:06.139]  [04]: 00000000:fc00b000 - 00000001:00000000: RESERVED
(d1) [2020-10-10 16:21:06.139] Invoking SeaBIOS ...
(d1) [2020-10-10 16:21:06.139] SeaBIOS (version rel-1.14.0-0-g155821a-Xen)
(d1) [2020-10-10 16:21:06.139] BUILD: gcc: (Debian 8.3.0-6) 8.3.0 binutils: (GNU Binutils for Debian) 2.31.1
(d1) [2020-10-10 16:21:06.139] 
(d1) [2020-10-10 16:21:06.139] Found Xen hypervisor signature at 40000000
(d1) [2020-10-10 16:21:06.140] Running on QEMU (i440fx)
(d1) [2020-10-10 16:21:06.140] xen: copy e820...
(d1) [2020-10-10 16:21:06.140] Relocating init from 0x000d62e0 to 0x0f7aa760 (size 88064)
(d1) [2020-10-10 16:21:06.140] Found QEMU fw_cfg
(d1) [2020-10-10 16:21:06.142] RamSizeOver4G: 0x0000000000000000 [cmos]
(d1) [2020-10-10 16:21:06.142] boot order:
(d1) [2020-10-10 16:21:06.142] 1: /rom@genroms/linuxboot.bin
(d1) [2020-10-10 16:21:06.146] Found 7 PCI devices (max PCI bus is 00)
(d1) [2020-10-10 16:21:06.146] Allocated Xen hypercall page at f7ff000
(d1) [2020-10-10 16:21:06.146] Detected Xen v4.15-unstable
(d1) [2020-10-10 16:21:06.146] xen: copy BIOS tables...
(d1) [2020-10-10 16:21:06.146] Copying SMBIOS entry point from 0x00010020 to 0x000f5b80
(d1) [2020-10-10 16:21:06.146] Copying MPTABLE from 0xfc100180/fc100190 to 0x000f5a80
(d1) [2020-10-10 16:21:06.146] Copying PIR from 0x00010040 to 0x000f5a00
(d1) [2020-10-10 16:21:06.146] Copying ACPI RSDP from 0x000100c0 to 0x000f59d0
(d1) [2020-10-10 16:21:06.146] table(50434146)=0xfc00a370 (via xsdt)
(d1) [2020-10-10 16:21:06.146] Using pmtimer, ioport 0xb008
(d1) [2020-10-10 16:21:06.146] table(50434146)=0xfc00a370 (via xsdt)
(d1) [2020-10-10 16:21:06.146] ACPI: parse DSDT at 0xfc001040 (len 37539)
(d1) [2020-10-10 16:21:06.146] parse_termlist: parse error, skip from 16/27641
(d1) [2020-10-10 16:21:06.146] parse_termlist: parse error, skip from 87/6041
(d1) [2020-10-10 16:21:06.146] Scan for VGA option rom
(d1) [2020-10-10 16:21:06.158] Running option rom at c000:0003
(XEN) [2020-10-10 16:21:06.158] stdvga.c:173:d1v0 entering stdvga mode
(d1) [2020-10-10 16:21:06.168] pmm call arg1=0
(d1) [2020-10-10 16:21:06.168] Turning on vga text mode console
(d1) [2020-10-10 16:21:06.231] SeaBIOS (version rel-1.14.0-0-g155821a-Xen)
(d1) [2020-10-10 16:21:06.238] Machine UUID 1f33e35b-24be-4bef-9e46-79ce8abf5c7f
(d1) [2020-10-10 16:21:06.239] ATA controller 1 at 1f0/3f4/c200 (irq 14 dev 9)
(d1) [2020-10-10 16:21:06.240] ATA controller 2 at 170/374/c208 (irq 15 dev 9)
(d1) [2020-10-10 16:21:06.241] Searching bootorder for: HALT
(d1) [2020-10-10 16:21:06.241] Found 0 lpt ports
(d1) [2020-10-10 16:21:06.241] Found 0 serial ports
(d1) [2020-10-10 16:21:06.244] ata0-0: QEMU HARDDISK ATA-7 Hard-Disk (5120 MiBytes)
(d1) [2020-10-10 16:21:06.244] Searching bootorder for: /pci@i0cf8/*@1,1/drive@0/disk@0
(d1) [2020-10-10 16:21:06.244] Searching bios-geometry for: /pci@i0cf8/*@1,1/drive@0/disk@0
(d1) [2020-10-10 16:21:06.245] PS2 keyboard initialized
(d1) [2020-10-10 16:21:06.245] All threads complete.
(d1) [2020-10-10 16:21:06.245] Scan for option roms
(d1) [2020-10-10 16:21:06.266] Running option rom at c980:0003
(d1) [2020-10-10 16:21:06.271] pmm call arg1=1
(d1) [2020-10-10 16:21:06.271] pmm call arg1=0
(d1) [2020-10-10 16:21:06.272] pmm call arg1=1
(d1) [2020-10-10 16:21:06.272] pmm call arg1=0
(d1) [2020-10-10 16:21:06.288] Running option rom at ca80:0003
(d1) [2020-10-10 16:21:06.289] Searching bootorder for: /pci@i0cf8/*@4
(d1) [2020-10-10 16:21:06.289] Searching bootorder for: /rom@genroms/linuxboot.bin
(d1) [2020-10-10 16:21:06.289] Searching bootorder for: HALT
(d1) [2020-10-10 16:21:06.289] drive 0x000f5960: PCHS=10402/16/63 translation=lba LCHS=652/255/63 s=10485760
(d1) [2020-10-10 16:21:06.289] Space available for UMB: cb000-eb000, f53a0-f5960
(d1) [2020-10-10 16:21:06.289] Returned 258048 bytes of ZoneHigh
(d1) [2020-10-10 16:21:06.289] e820 map has 7 items:
(d1) [2020-10-10 16:21:06.289]   0: 0000000000000000 - 000000000009fc00 = 1 RAM
(d1) [2020-10-10 16:21:06.289]   1: 000000000009fc00 - 00000000000a0000 = 2 RESERVED
(d1) [2020-10-10 16:21:06.289]   2: 00000000000f0000 - 0000000000100000 = 2 RESERVED
(d1) [2020-10-10 16:21:06.289]   3: 0000000000100000 - 000000000f7ff000 = 1 RAM
(d1) [2020-10-10 16:21:06.289]   4: 000000000f7ff000 - 000000000f800000 = 2 RESERVED
(d1) [2020-10-10 16:21:06.289]   5: 00000000fc000000 - 00000000fc00b000 = 3 ACPI
(d1) [2020-10-10 16:21:06.289]   6: 00000000fc00b000 - 0000000100000000 = 2 RESERVED
(d1) [2020-10-10 16:21:06.290] enter handle_19:
(d1) [2020-10-10 16:21:06.290]   NULL
(d1) [2020-10-10 16:21:06.294] Booting from ROM...
(d1) [2020-10-10 16:21:06.294] Booting from ca80:003c
(XEN) [2020-10-10 16:27:56.721] 'h' pressed -> showing installed handlers
(XEN) [2020-10-10 16:27:56.721]  key '%' (ascii '25') => trap to xendbg
(XEN) [2020-10-10 16:27:56.721]  key '*' (ascii '2a') => print all diagnostics
(XEN) [2020-10-10 16:27:56.721]  key '+' (ascii '2b') => increase log level threshold
(XEN) [2020-10-10 16:27:56.721]  key '-' (ascii '2d') => decrease log level threshold
(XEN) [2020-10-10 16:27:56.721]  key '0' (ascii '30') => dump Dom0 registers
(XEN) [2020-10-10 16:27:56.721]  key 'A' (ascii '41') => toggle alternative key handling
(XEN) [2020-10-10 16:27:56.721]  key 'G' (ascii '47') => toggle host/guest log level adjustment
(XEN) [2020-10-10 16:27:56.721]  key 'H' (ascii '48') => dump heap info
(XEN) [2020-10-10 16:27:56.721]  key 'I' (ascii '49') => dump HVM irq info
(XEN) [2020-10-10 16:27:56.721]  key 'M' (ascii '4d') => dump MSI state
(XEN) [2020-10-10 16:27:56.721]  key 'N' (ascii '4e') => trigger an NMI
(XEN) [2020-10-10 16:27:56.721]  key 'O' (ascii '4f') => toggle shadow audits
(XEN) [2020-10-10 16:27:56.721]  key 'Q' (ascii '51') => dump PCI devices
(XEN) [2020-10-10 16:27:56.721]  key 'R' (ascii '52') => reboot machine
(XEN) [2020-10-10 16:27:56.721]  key 'S' (ascii '53') => reset shadow pagetables
(XEN) [2020-10-10 16:27:56.721]  key 'V' (ascii '56') => dump IOMMU intremap tables
(XEN) [2020-10-10 16:27:56.721]  key 'a' (ascii '61') => dump timer queues
(XEN) [2020-10-10 16:27:56.721]  key 'c' (ascii '63') => dump ACPI Cx structures
(XEN) [2020-10-10 16:27:56.721]  key 'd' (ascii '64') => dump registers
(XEN) [2020-10-10 16:27:56.721]  key 'e' (ascii '65') => dump evtchn info
(XEN) [2020-10-10 16:27:56.721]  key 'g' (ascii '67') => print grant table usage
(XEN) [2020-10-10 16:27:56.721]  key 'h' (ascii '68') => show this message
(XEN) [2020-10-10 16:27:56.721]  key 'i' (ascii '69') => dump interrupt bindings
(XEN) [2020-10-10 16:27:56.721]  key 'm' (ascii '6d') => memory info
(XEN) [2020-10-10 16:27:56.721]  key 'n' (ascii '6e') => NMI statistics
(XEN) [2020-10-10 16:27:56.721]  key 'o' (ascii '6f') => dump iommu p2m table
(XEN) [2020-10-10 16:27:56.721]  key 'q' (ascii '71') => dump domain (and guest debug) info
(XEN) [2020-10-10 16:27:56.721]  key 'r' (ascii '72') => dump run queues
(XEN) [2020-10-10 16:27:56.721]  key 's' (ascii '73') => dump softtsc stats
(XEN) [2020-10-10 16:27:56.721]  key 't' (ascii '74') => display multi-cpu clock info
(XEN) [2020-10-10 16:27:56.721]  key 'u' (ascii '75') => dump NUMA info
(XEN) [2020-10-10 16:27:56.721]  key 'v' (ascii '76') => dump AMD-V VMCBs
(XEN) [2020-10-10 16:27:56.721]  key 'w' (ascii '77') => synchronously dump console ring buffer (dmesg)
(XEN) [2020-10-10 16:27:56.721]  key 'x' (ascii '78') => print livepatch info
(XEN) [2020-10-10 16:27:56.721]  key 'z' (ascii '7a') => dump IOAPIC info
(XEN) [2020-10-10 16:28:15.913] 'q' pressed -> dumping domain info (now = 945314247960)
(XEN) [2020-10-10 16:28:15.913] General information for domain 0:
(XEN) [2020-10-10 16:28:15.913]     refcnt=4 dying=0 pause_count=0
(XEN) [2020-10-10 16:28:15.913]     nr_pages=524287 xenheap_pages=2 shared_pages=0 paged_pages=0 dirty_cpus={0-4} max_pages=524288
(XEN) [2020-10-10 16:28:15.913]     handle=00000000-0000-0000-0000-000000000000 vm_assist=0000002d
(XEN) [2020-10-10 16:28:15.913] Rangesets belonging to domain 0:
(XEN) [2020-10-10 16:28:15.913]     Interrupts { 1-55, 57-79 }
(XEN) [2020-10-10 16:28:15.913]     I/O Memory { 0-f5fff, f6004-fedff, fef00-fcfffff, 10000000-fffffffff }
(XEN) [2020-10-10 16:28:15.913]     I/O Ports  { 0-1f, 22-3f, 44-60, 62-9f, a2-3f7, 400-807, 80c-cfb, d00-ffff }
(XEN) [2020-10-10 16:28:15.913]     log-dirty  { }
(XEN) [2020-10-10 16:28:15.913] Memory pages belonging to domain 0:
(XEN) [2020-10-10 16:28:15.913]     DomPage list too long to display
(XEN) [2020-10-10 16:28:15.913]     XenPage 00000000000c7f8c: caf=c000000000000002, taf=e400000000000002
(XEN) [2020-10-10 16:28:15.913]     XenPage 000000000069f97f: caf=c000000000000002, taf=e400000000000002
(XEN) [2020-10-10 16:28:15.913] NODE affinity for domain 0: [0]
(XEN) [2020-10-10 16:28:15.913] VCPU information and callbacks for domain 0:
(XEN) [2020-10-10 16:28:15.913]   UNIT0 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913]     VCPU0: CPU1 [has=F] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=1
(XEN) [2020-10-10 16:28:15.913]     pause_count=0 pause_flags=1
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913]   UNIT1 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913]     VCPU1: CPU0 [has=T] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=0
(XEN) [2020-10-10 16:28:15.913]     pause_count=0 pause_flags=0
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913]   UNIT2 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913]     VCPU2: CPU3 [has=F] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=3
(XEN) [2020-10-10 16:28:15.913]     pause_count=0 pause_flags=1
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913]   UNIT3 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913]     VCPU3: CPU2 [has=F] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=2
(XEN) [2020-10-10 16:28:15.913]     pause_count=0 pause_flags=1
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913]   UNIT4 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913]     VCPU4: CPU4 [has=T] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=4
(XEN) [2020-10-10 16:28:15.913]     pause_count=0 pause_flags=0
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913]   UNIT5 affinities: hard={0-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913]     VCPU5: CPU3 [has=F] poll=0 upcall_pend=00 upcall_mask=00 
(XEN) [2020-10-10 16:28:15.913]     pause_count=0 pause_flags=1
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913] General information for domain 1:
(XEN) [2020-10-10 16:28:15.913]     refcnt=3 dying=0 pause_count=0
(XEN) [2020-10-10 16:28:15.913]     nr_pages=65612 xenheap_pages=2 shared_pages=0 paged_pages=0 dirty_cpus={5} max_pages=65792
(XEN) [2020-10-10 16:28:15.913]     handle=1f33e35b-24be-4bef-9e46-79ce8abf5c7f vm_assist=00000000
(XEN) [2020-10-10 16:28:15.913]     paging assistance: hap refcounts translate external 
(XEN) [2020-10-10 16:28:15.913] Rangesets belonging to domain 1:
(XEN) [2020-10-10 16:28:15.913]     ioreq_server 0 pci { 0, 8-9, b, 10, 18, 20 }
(XEN) [2020-10-10 16:28:15.913]     ioreq_server 0 memory { a0000-bffff, f0000000-f07fffff, f1000000-f13fffff, f2000000-f2ffffff, f3050000-f30510ff, fec00000-fec00fff, fed00000-fed003ff, fee00000-feefffff }
(XEN) [2020-10-10 16:28:15.913]     ioreq_server 0 port { 0-1f, 60, 64, 70-71, 80-83, 87, 89-8b, 8f, 92, b2-b3, c0-df, f0, 170-177, 1f0-1f7, 376, 3b0-3df, 3f1-3f7, 510-511, cf8-cff, ae00-ae13, af00-af1f, afe0-afe3, b000-b005, b008-b00b, c000-c20f }
(XEN) [2020-10-10 16:28:15.913]     Interrupts { }
(XEN) [2020-10-10 16:28:15.913]     I/O Memory { }
(XEN) [2020-10-10 16:28:15.913]     I/O Ports  { }
(XEN) [2020-10-10 16:28:15.913]     log-dirty  { }
(XEN) [2020-10-10 16:28:15.913] Memory pages belonging to domain 1:
(XEN) [2020-10-10 16:28:15.913]     DomPage list too long to display
(XEN) [2020-10-10 16:28:15.913]     PoD entries=0 cachesize=0
(XEN) [2020-10-10 16:28:15.913]     XenPage 00000000000c7dfd: caf=c000000000000001, taf=e400000000000001
(XEN) [2020-10-10 16:28:15.913]     XenPage 0000000000446cc9: caf=c000000000000001, taf=e400000000000001
(XEN) [2020-10-10 16:28:15.913]     ExtraPage 0000000000442ec2: caf=8040000000000003, taf=e400000000000001
(XEN) [2020-10-10 16:28:15.913]     ExtraPage 0000000000442ec1: caf=8040000000000003, taf=e400000000000001
(XEN) [2020-10-10 16:28:15.913] NODE affinity for domain 1: [0]
(XEN) [2020-10-10 16:28:15.913] VCPU information and callbacks for domain 1:
(XEN) [2020-10-10 16:28:15.913]   UNIT0 affinities: hard={2-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913]     VCPU0: CPU5 [has=F] poll=0 upcall_pend=00 upcall_mask=00 dirty_cpu=5
(XEN) [2020-10-10 16:28:15.913]     pause_count=0 pause_flags=4
(XEN) [2020-10-10 16:28:15.913]     paging assistance: hap, 1 levels
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913]   UNIT1 affinities: hard={2-5} soft={0-5}
(XEN) [2020-10-10 16:28:15.913]     VCPU1: CPU5 [has=F] poll=0 upcall_pend=00 upcall_mask=00 
(XEN) [2020-10-10 16:28:15.913]     pause_count=0 pause_flags=2
(XEN) [2020-10-10 16:28:15.913]     paging assistance: hap, 1 levels
(XEN) [2020-10-10 16:28:15.913] No periodic timer
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:0 (virq 1, port 5)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:1 (virq 1, port 11)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:2 (virq 1, port 18)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:3 (virq 1, port 25)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:4 (virq 1, port 32)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 0:5 (virq 1, port 39)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 1:0 (virq 1, port 0)
(XEN) [2020-10-10 16:28:15.913] Notifying guest 1:1 (virq 1, port 0)
(XEN) [2020-10-10 16:28:15.913] Shared frames 0 -- Saved frames 0
(XEN) [2020-10-10 16:28:42.384] sched_smt_power_savings: disabled
(XEN) [2020-10-10 16:28:42.384] NOW=971785332421
(XEN) [2020-10-10 16:28:42.384] Online Cpus: 0-5
(XEN) [2020-10-10 16:28:42.384] Cpupool 0:
(XEN) [2020-10-10 16:28:42.384] Cpus: 0-5
(XEN) [2020-10-10 16:28:42.384] Scheduling granularity: cpu, 1 CPU per sched-resource
(XEN) [2020-10-10 16:28:42.384] Scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) [2020-10-10 16:28:42.384] Active queues: 1
(XEN) [2020-10-10 16:28:42.384] 	default-weight     = 256
(XEN) [2020-10-10 16:28:42.384] Runqueue 0:
(XEN) [2020-10-10 16:28:42.384] 	ncpus              = 6
(XEN) [2020-10-10 16:28:42.384] 	cpus               = 0-5
(XEN) [2020-10-10 16:28:42.384] 	max_weight         = 1024
(XEN) [2020-10-10 16:28:42.384] 	pick_bias          = 4
(XEN) [2020-10-10 16:28:42.384] 	instload           = 2
(XEN) [2020-10-10 16:28:42.384] 	aveload            = 394963 (~150%)
(XEN) [2020-10-10 16:28:42.384] 	idlers: 2b
(XEN) [2020-10-10 16:28:42.384] 	tickled: 00
(XEN) [2020-10-10 16:28:42.384] 	fully idle cores: 2b
(XEN) [2020-10-10 16:28:42.384] Domain info:
(XEN) [2020-10-10 16:28:42.384] 	Domain: 0 w 1024 c 0 v 6
(XEN) [2020-10-10 16:28:42.384] 	  1: [0.0] flags=2 cpu=4 credit=10500000 [w=1024] load=443 (~0%)
(XEN) [2020-10-10 16:28:42.384] 	  2: [0.1] flags=0 cpu=0 credit=10340892 [w=1024] load=218 (~0%)
(XEN) [2020-10-10 16:28:42.384] 	  3: [0.2] flags=0 cpu=5 credit=10276435 [w=1024] load=278 (~0%)
(XEN) [2020-10-10 16:28:42.384] 	  4: [0.3] flags=0 cpu=4 credit=10500000 [w=1024] load=176 (~0%)
(XEN) [2020-10-10 16:28:42.384] 	  5: [0.4] flags=2 cpu=2 credit=8445124 [w=1024] load=262144 (~100%)
(XEN) [2020-10-10 16:28:42.384] 	  6: [0.5] flags=0 cpu=1 credit=9209406 [w=1024] load=501 (~0%)
(XEN) [2020-10-10 16:28:42.384] 	Domain: 1 w 256 c 0 v 2
(XEN) [2020-10-10 16:28:42.384] 	  7: [1.0] flags=2 cpu=3 credit=1777916 [w=256] load=131072 (~50%)
(XEN) [2020-10-10 16:28:42.384] 	  8: [1.1] flags=0 cpu=5 credit=10500000 [w=256] load=51 (~0%)
(XEN) [2020-10-10 16:28:42.384] Runqueue 0:
(XEN) [2020-10-10 16:28:42.384] CPU[00] runq=0, sibling={0}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] CPU[01] runq=0, sibling={1}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] CPU[02] runq=0, sibling={2}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] 	run: [0.4] flags=2 cpu=2 credit=8445124 [w=1024] load=262144 (~100%)
(XEN) [2020-10-10 16:28:42.384] CPU[03] runq=0, sibling={3}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] CPU[04] runq=0, sibling={4}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] 	run: [0.0] flags=2 cpu=4 credit=10500000 [w=1024] load=443 (~0%)
(XEN) [2020-10-10 16:28:42.384] CPU[05] runq=0, sibling={5}, core={0-5}
(XEN) [2020-10-10 16:28:42.384] RUNQ:
(XEN) [2020-10-10 16:28:42.384] CPUs info:
(XEN) [2020-10-10 16:28:42.384] CPU[00] current=d[IDLE]v0, curr=d[IDLE]v0, prev=NULL
(XEN) [2020-10-10 16:28:42.384] CPU[01] current=d[IDLE]v1, curr=d[IDLE]v1, prev=NULL
(XEN) [2020-10-10 16:28:42.384] CPU[02] current=d0v4, curr=d0v4, prev=NULL
(XEN) [2020-10-10 16:28:42.384] CPU[03] current=d1v0, curr=d1v0, prev=NULL
(XEN) [2020-10-10 16:28:42.384] CPU[04] current=d0v0, curr=d0v0, prev=NULL
(XEN) [2020-10-10 16:28:42.384] CPU[05] current=d[IDLE]v5, curr=d[IDLE]v5, prev=NULL

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [SUSPECTED SPAM]Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
  2020-10-10 17:51 Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820" Sander Eikelenboom
@ 2020-10-11  0:06 ` Igor Druzhinin
  2020-10-11  9:43   ` Sander Eikelenboom
  0 siblings, 1 reply; 6+ messages in thread
From: Igor Druzhinin @ 2020-10-11  0:06 UTC (permalink / raw)
  To: Sander Eikelenboom, xen-devel, Jan Beulich

On 10/10/2020 18:51, Sander Eikelenboom wrote:
> Hi Igor/Jan,
> 
> I tried to update my AMD machine to current xen-unstable, but
> unfortunately the HVM guests don't boot after that. The guest keeps
> using CPU-cycles but I don't get to a command prompt (or any output at
> all). PVH guests run fine.
> 
> Bisection leads to commit:
> 
> 8efa46516c5f4cf185c8df179812c185d3c27eb6
> hvmloader: indicate ACPI tables with "ACPI data" type in e820
> 
> I tried xen-unstable with this commit reverted and with that everything
> works fine.
> 
> I attached the xl-dmesg output.

What guests are you using? Could you get serial output from the guest?
Is it AMD specific? If it's a Linux guest could you get a stacktrace from
the guest using xenctx?

We have tested the change on all modern guests in our Citrix lab and haven't
found any problem for several months. 

Igor


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [SUSPECTED SPAM]Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
  2020-10-11  0:06 ` [SUSPECTED SPAM]Xen-unstable " Igor Druzhinin
@ 2020-10-11  9:43   ` Sander Eikelenboom
  2020-10-11 10:40     ` Igor Druzhinin
  0 siblings, 1 reply; 6+ messages in thread
From: Sander Eikelenboom @ 2020-10-11  9:43 UTC (permalink / raw)
  To: Igor Druzhinin, xen-devel, Jan Beulich

On 11/10/2020 02:06, Igor Druzhinin wrote:
> On 10/10/2020 18:51, Sander Eikelenboom wrote:
>> Hi Igor/Jan,
>>
>> I tried to update my AMD machine to current xen-unstable, but
>> unfortunately the HVM guests don't boot after that. The guest keeps
>> using CPU-cycles but I don't get to a command prompt (or any output at
>> all). PVH guests run fine.
>>
>> Bisection leads to commit:
>>
>> 8efa46516c5f4cf185c8df179812c185d3c27eb6
>> hvmloader: indicate ACPI tables with "ACPI data" type in e820
>>
>> I tried xen-unstable with this commit reverted and with that everything
>> works fine.
>>
>> I attached the xl-dmesg output.
> 
> What guests are you using? 
Not sure I understand what you ask for, but:
dom0 PV
guest HVM (qemu-xen)

> Could you get serial output from the guest?
Not getting any, it seems to be stuck in very early boot.

> Is it AMD specific?
Can't tell, this is the only machine I test xen-unstable on.
It's a AMD phenom X6.
Both dom0 and guest kernel are 5.9-rc8.

Tested with guest config:
kernel      = '/boot/vmlinuz-xen-guest'
ramdisk     = '/boot/initrd.img-xen-guest'

cmdline     = 'root=UUID=7cc4a90d-d6b0-4958-bb7d-50497aa29f18 ro
nomodeset console=tty1 console=ttyS0 console=hvc0 earlyprintk=xen'

type='hvm'

device_model_version = 'qemu-xen'

cpus        = "2-5"
vcpus = 2

memory      = '512'

disk        = [
                  'phy:/dev/xen_vms_ssd/media,xvda,w'
              ]

name        = 'guest'

vif         = [ 'bridge=xen_bridge,ip=192.168.1.10,mac=00:16:3E:DC:0A:F1' ]

on_poweroff = 'destroy'
on_reboot   = 'restart'
on_crash    = 'preserve'

vnc=0


>If it's a Linux guest could you get a stacktrace from
> the guest using xenctx?

It is, here are few subsequent runs:

~# /usr/local/lib/xen/bin/xenctx -s
/boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
vcpu0:
cs:eip: ca80:00000256
flags: 00000016 nz a p
ss:esp: 0000:00006f38
eax: 029e0012	ebx: 0000fb00	ecx: 028484e3	edx: 00000511
esi: 00000000	edi: f97b7363	ebp: 00006f38
 ds:     ca80	 es:     0010	 fs:     0000	 gs:     0000

cr0: 00000011
cr2: 00000000
cr3: 00400000
cr4: 00000000

dr0: 00000000
dr1: 00000000
dr2: 00000000
dr3: 00000000
dr6: ffff0ff0
dr7: 00000400
Code (instr addr 00000256)
ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff <00> f0
53 ff 00 f0 53 ff 00 f0 53



vcpu1 offline

~# /usr/local/lib/xen/bin/xenctx -s
/boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
vcpu0:
cs:eip: ca80:00000256
flags: 00000016 nz a p
ss:esp: 0000:00006f38
eax: 029e0012	ebx: 0000fb00	ecx: 028444b7	edx: 00000511
esi: 00000000	edi: f97bb38f	ebp: 00006f38
 ds:     ca80	 es:     0010	 fs:     0000	 gs:     0000

cr0: 00000011
cr2: 00000000
cr3: 00400000
cr4: 00000000

dr0: 00000000
dr1: 00000000
dr2: 00000000
dr3: 00000000
dr6: ffff0ff0
dr7: 00000400
Code (instr addr 00000256)
ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff <00> f0
53 ff 00 f0 53 ff 00 f0 53



vcpu1 offline

~# /usr/local/lib/xen/bin/xenctx -s
/boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
vcpu0:
cs:eip: ca80:00000256
flags: 00000016 nz a p
ss:esp: 0000:00006f38
eax: 029e0012	ebx: 0000fb00	ecx: 02840901	edx: 00000511
esi: 00000000	edi: f97bef45	ebp: 00006f38
 ds:     ca80	 es:     0010	 fs:     0000	 gs:     0000

cr0: 00000011
cr2: 00000000
cr3: 00400000
cr4: 00000000

dr0: 00000000
dr1: 00000000
dr2: 00000000
dr3: 00000000
dr6: ffff0ff0
dr7: 00000400
Code (instr addr 00000256)
ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff <00> f0
53 ff 00 f0 53 ff 00 f0 53



vcpu1 offline

~# /usr/local/lib/xen/bin/xenctx -s
/boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
vcpu0:
cs:eip: ca80:00000256
flags: 00000016 nz a p
ss:esp: 0000:00006f38
eax: 029e0012	ebx: 0000fb00	ecx: 0283d4bd	edx: 00000511
esi: 00000000	edi: f97c2389	ebp: 00006f38
 ds:     ca80	 es:     0010	 fs:     0000	 gs:     0000

cr0: 00000011
cr2: 00000000
cr3: 00400000
cr4: 00000000

dr0: 00000000
dr1: 00000000
dr2: 00000000
dr3: 00000000
dr6: ffff0ff0
dr7: 00000400
Code (instr addr 00000256)
ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff <00> f0
53 ff 00 f0 53 ff 00 f0 53



vcpu1 offline

~# /usr/local/lib/xen/bin/xenctx -s
/boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
vcpu0:
cs:eip: ca80:00000256
flags: 00000016 nz a p
ss:esp: 0000:00006f38
eax: 029e0012	ebx: 0000fb00	ecx: 02838e90	edx: 00000511
esi: 00000000	edi: f97c69b6	ebp: 00006f38
 ds:     ca80	 es:     0010	 fs:     0000	 gs:     0000

cr0: 00000011
cr2: 00000000
cr3: 00400000
cr4: 00000000

dr0: 00000000
dr1: 00000000
dr2: 00000000
dr3: 00000000
dr6: ffff0ff0
dr7: 00000400
Code (instr addr 00000256)
ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff 00 f0 53 ff <00> f0
53 ff 00 f0 53 ff 00 f0 53



vcpu1 offline


> We have tested the change on all modern guests in our Citrix lab and haven't
> found any problem for several months. 

> Igor
> 

--
Sander



^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [SUSPECTED SPAM]Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
  2020-10-11  9:43   ` Sander Eikelenboom
@ 2020-10-11 10:40     ` Igor Druzhinin
  2020-10-11 11:20       ` Igor Druzhinin
  0 siblings, 1 reply; 6+ messages in thread
From: Igor Druzhinin @ 2020-10-11 10:40 UTC (permalink / raw)
  To: Sander Eikelenboom, xen-devel, Jan Beulich

On 11/10/2020 10:43, Sander Eikelenboom wrote:
> On 11/10/2020 02:06, Igor Druzhinin wrote:
>> On 10/10/2020 18:51, Sander Eikelenboom wrote:
>>> Hi Igor/Jan,
>>>
>>> I tried to update my AMD machine to current xen-unstable, but
>>> unfortunately the HVM guests don't boot after that. The guest keeps
>>> using CPU-cycles but I don't get to a command prompt (or any output at
>>> all). PVH guests run fine.
>>>
>>> Bisection leads to commit:
>>>
>>> 8efa46516c5f4cf185c8df179812c185d3c27eb6
>>> hvmloader: indicate ACPI tables with "ACPI data" type in e820
>>>
>>> I tried xen-unstable with this commit reverted and with that everything
>>> works fine.
>>>
>>> I attached the xl-dmesg output.
>>
>> What guests are you using? 
> Not sure I understand what you ask for, but:
> dom0 PV
> guest HVM (qemu-xen)
> 
>> Could you get serial output from the guest?
> Not getting any, it seems to be stuck in very early boot.
> 
>> Is it AMD specific?
> Can't tell, this is the only machine I test xen-unstable on.
> It's a AMD phenom X6.
> Both dom0 and guest kernel are 5.9-rc8.
> 
> Tested with guest config:
> kernel      = '/boot/vmlinuz-xen-guest'
> ramdisk     = '/boot/initrd.img-xen-guest'
> 
> cmdline     = 'root=UUID=7cc4a90d-d6b0-4958-bb7d-50497aa29f18 ro
> nomodeset console=tty1 console=ttyS0 console=hvc0 earlyprintk=xen'
> 
> type='hvm'
> 
> device_model_version = 'qemu-xen'
> 
> cpus        = "2-5"
> vcpus = 2
> 
> memory      = '512'
> 
> disk        = [
>                   'phy:/dev/xen_vms_ssd/media,xvda,w'
>               ]
> 
> name        = 'guest'
> 
> vif         = [ 'bridge=xen_bridge,ip=192.168.1.10,mac=00:16:3E:DC:0A:F1' ]
> 
> on_poweroff = 'destroy'
> on_reboot   = 'restart'
> on_crash    = 'preserve'
> 
> vnc=0
> 
> 
>> If it's a Linux guest could you get a stacktrace from
>> the guest using xenctx?
> 
> It is, here are few subsequent runs:
> 
> ~# /usr/local/lib/xen/bin/xenctx -s
> /boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
> vcpu0:
> cs:eip: ca80:00000256

Ok, it's stuck in linuxboot.bin option ROM. That's not something we test in Citrix -
we don't use fw_cfg. It could be something with caching (given it's moving but slowly) or a
bug uncovered by memory map changes. I'll try to get a repro on Monday.

It could be AMD specific if it's caching related and that's why osstest didn't pick it up.

Igor


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [SUSPECTED SPAM]Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
  2020-10-11 10:40     ` Igor Druzhinin
@ 2020-10-11 11:20       ` Igor Druzhinin
  2020-10-11 14:35         ` Sander Eikelenboom
  0 siblings, 1 reply; 6+ messages in thread
From: Igor Druzhinin @ 2020-10-11 11:20 UTC (permalink / raw)
  To: Sander Eikelenboom, xen-devel, Jan Beulich

On 11/10/2020 11:40, Igor Druzhinin wrote:
> On 11/10/2020 10:43, Sander Eikelenboom wrote:
>> On 11/10/2020 02:06, Igor Druzhinin wrote:
>>> On 10/10/2020 18:51, Sander Eikelenboom wrote:
>>>> Hi Igor/Jan,
>>>>
>>>> I tried to update my AMD machine to current xen-unstable, but
>>>> unfortunately the HVM guests don't boot after that. The guest keeps
>>>> using CPU-cycles but I don't get to a command prompt (or any output at
>>>> all). PVH guests run fine.
>>>>
>>>> Bisection leads to commit:
>>>>
>>>> 8efa46516c5f4cf185c8df179812c185d3c27eb6
>>>> hvmloader: indicate ACPI tables with "ACPI data" type in e820
>>>>
>>>> I tried xen-unstable with this commit reverted and with that everything
>>>> works fine.
>>>>
>>>> I attached the xl-dmesg output.
>>>
>>> What guests are you using? 
>> Not sure I understand what you ask for, but:
>> dom0 PV
>> guest HVM (qemu-xen)
>>
>>> Could you get serial output from the guest?
>> Not getting any, it seems to be stuck in very early boot.
>>
>>> Is it AMD specific?
>> Can't tell, this is the only machine I test xen-unstable on.
>> It's a AMD phenom X6.
>> Both dom0 and guest kernel are 5.9-rc8.
>>
>> Tested with guest config:
>> kernel      = '/boot/vmlinuz-xen-guest'
>> ramdisk     = '/boot/initrd.img-xen-guest'
>>
>> cmdline     = 'root=UUID=7cc4a90d-d6b0-4958-bb7d-50497aa29f18 ro
>> nomodeset console=tty1 console=ttyS0 console=hvc0 earlyprintk=xen'
>>
>> type='hvm'
>>
>> device_model_version = 'qemu-xen'
>>
>> cpus        = "2-5"
>> vcpus = 2
>>
>> memory      = '512'
>>
>> disk        = [
>>                   'phy:/dev/xen_vms_ssd/media,xvda,w'
>>               ]
>>
>> name        = 'guest'
>>
>> vif         = [ 'bridge=xen_bridge,ip=192.168.1.10,mac=00:16:3E:DC:0A:F1' ]
>>
>> on_poweroff = 'destroy'
>> on_reboot   = 'restart'
>> on_crash    = 'preserve'
>>
>> vnc=0
>>
>>
>>> If it's a Linux guest could you get a stacktrace from
>>> the guest using xenctx?
>>
>> It is, here are few subsequent runs:
>>
>> ~# /usr/local/lib/xen/bin/xenctx -s
>> /boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
>> vcpu0:
>> cs:eip: ca80:00000256
> 
> Ok, it's stuck in linuxboot.bin option ROM. That's not something we test in Citrix -
> we don't use fw_cfg. It could be something with caching (given it's moving but slowly) or a
> bug uncovered by memory map changes. I'll try to get a repro on Monday.

Right, I think I know what will fix your problem - could you flip "ACPI data"
type to "ACPI NVS" in my commit.

Jan, this is what we've discussed on the list as an ambiguity in ACPI spec but
couldn't reach a clean resolution after all.
SeaBIOS thinks that "ACPI data" type is essentially RAM that could be reported
as RAM resource to the guest in E801.
https://wiki.osdev.org/Detecting_Memory_(x86)#BIOS_Function:_INT_0x15.2C_AX_.3D_0xE801

// Calculate the maximum ramsize (less than 4gig) from e820 map.
static void
calcRamSize(void)
{
    u32 rs = 0;
    int i;
    for (i=e820_count-1; i>=0; i--) {
        struct e820entry *en = &e820_list[i];
        u64 end = en->start + en->size;
        u32 type = en->type;
        if (end <= 0xffffffff && (type == E820_ACPI || type == E820_RAM)) {
            rs = end;
            break;
        }
    }
    LegacyRamSize = rs >= 1024*1024 ? rs : 1024*1024;
}

what is wrong here I think is that it clearly doesn't handle holes and worked more
by luck. So SeaBIOS needs to be fixed but I think that using ACPI NVS in hvmloader
is still safer.

Igor


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [SUSPECTED SPAM]Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820"
  2020-10-11 11:20       ` Igor Druzhinin
@ 2020-10-11 14:35         ` Sander Eikelenboom
  0 siblings, 0 replies; 6+ messages in thread
From: Sander Eikelenboom @ 2020-10-11 14:35 UTC (permalink / raw)
  To: Igor Druzhinin, xen-devel, Jan Beulich

On 11/10/2020 13:20, Igor Druzhinin wrote:
> On 11/10/2020 11:40, Igor Druzhinin wrote:
>> On 11/10/2020 10:43, Sander Eikelenboom wrote:
>>> On 11/10/2020 02:06, Igor Druzhinin wrote:
>>>> On 10/10/2020 18:51, Sander Eikelenboom wrote:
>>>>> Hi Igor/Jan,
>>>>>
>>>>> I tried to update my AMD machine to current xen-unstable, but
>>>>> unfortunately the HVM guests don't boot after that. The guest keeps
>>>>> using CPU-cycles but I don't get to a command prompt (or any output at
>>>>> all). PVH guests run fine.
>>>>>
>>>>> Bisection leads to commit:
>>>>>
>>>>> 8efa46516c5f4cf185c8df179812c185d3c27eb6
>>>>> hvmloader: indicate ACPI tables with "ACPI data" type in e820
>>>>>
>>>>> I tried xen-unstable with this commit reverted and with that everything
>>>>> works fine.
>>>>>
>>>>> I attached the xl-dmesg output.
>>>>
>>>> What guests are you using? 
>>> Not sure I understand what you ask for, but:
>>> dom0 PV
>>> guest HVM (qemu-xen)
>>>
>>>> Could you get serial output from the guest?
>>> Not getting any, it seems to be stuck in very early boot.
>>>
>>>> Is it AMD specific?
>>> Can't tell, this is the only machine I test xen-unstable on.
>>> It's a AMD phenom X6.
>>> Both dom0 and guest kernel are 5.9-rc8.
>>>
>>> Tested with guest config:
>>> kernel      = '/boot/vmlinuz-xen-guest'
>>> ramdisk     = '/boot/initrd.img-xen-guest'
>>>
>>> cmdline     = 'root=UUID=7cc4a90d-d6b0-4958-bb7d-50497aa29f18 ro
>>> nomodeset console=tty1 console=ttyS0 console=hvc0 earlyprintk=xen'
>>>
>>> type='hvm'
>>>
>>> device_model_version = 'qemu-xen'
>>>
>>> cpus        = "2-5"
>>> vcpus = 2
>>>
>>> memory      = '512'
>>>
>>> disk        = [
>>>                   'phy:/dev/xen_vms_ssd/media,xvda,w'
>>>               ]
>>>
>>> name        = 'guest'
>>>
>>> vif         = [ 'bridge=xen_bridge,ip=192.168.1.10,mac=00:16:3E:DC:0A:F1' ]
>>>
>>> on_poweroff = 'destroy'
>>> on_reboot   = 'restart'
>>> on_crash    = 'preserve'
>>>
>>> vnc=0
>>>
>>>
>>>> If it's a Linux guest could you get a stacktrace from
>>>> the guest using xenctx?
>>>
>>> It is, here are few subsequent runs:
>>>
>>> ~# /usr/local/lib/xen/bin/xenctx -s
>>> /boot/System.map-5.9.0-rc8-20201010-doflr-mac80211debug+ -f -a -C 4
>>> vcpu0:
>>> cs:eip: ca80:00000256
>>
>> Ok, it's stuck in linuxboot.bin option ROM. That's not something we test in Citrix -
>> we don't use fw_cfg. It could be something with caching (given it's moving but slowly) or a
>> bug uncovered by memory map changes. I'll try to get a repro on Monday.
> 
> Right, I think I know what will fix your problem - could you flip "ACPI data"
> type to "ACPI NVS" in my commit.

Just did and the guest now boots fine.

--
Sander

> Jan, this is what we've discussed on the list as an ambiguity in ACPI spec but
> couldn't reach a clean resolution after all.
> SeaBIOS thinks that "ACPI data" type is essentially RAM that could be reported
> as RAM resource to the guest in E801.
> https://wiki.osdev.org/Detecting_Memory_(x86)#BIOS_Function:_INT_0x15.2C_AX_.3D_0xE801
> 
> // Calculate the maximum ramsize (less than 4gig) from e820 map.
> static void
> calcRamSize(void)
> {
>     u32 rs = 0;
>     int i;
>     for (i=e820_count-1; i>=0; i--) {
>         struct e820entry *en = &e820_list[i];
>         u64 end = en->start + en->size;
>         u32 type = en->type;
>         if (end <= 0xffffffff && (type == E820_ACPI || type == E820_RAM)) {
>             rs = end;
>             break;
>         }
>     }
>     LegacyRamSize = rs >= 1024*1024 ? rs : 1024*1024;
> }
> 
> what is wrong here I think is that it clearly doesn't handle holes and worked more
> by luck. So SeaBIOS needs to be fixed but I think that using ACPI NVS in hvmloader
> is still safer.
> 
> Igor
> 



^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2020-10-11 14:36 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-10-10 17:51 Xen-unstable :can't boot HVM guests, bisected to commit: "hvmloader: indicate ACPI tables with "ACPI data" type in e820" Sander Eikelenboom
2020-10-11  0:06 ` [SUSPECTED SPAM]Xen-unstable " Igor Druzhinin
2020-10-11  9:43   ` Sander Eikelenboom
2020-10-11 10:40     ` Igor Druzhinin
2020-10-11 11:20       ` Igor Druzhinin
2020-10-11 14:35         ` Sander Eikelenboom

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.