xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
* [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
@ 2019-07-19 19:31 Roman Shaposhnik
  2019-07-19 20:02 ` Roman Shaposhnik
                   ` (2 more replies)
  0 siblings, 3 replies; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-19 19:31 UTC (permalink / raw)
  To: xen-devel

[-- Attachment #1: Type: text/plain, Size: 35009 bytes --]

Hi!

we're using Xen on Advantech ARK-2250 Embedded Box PC:
    https://www.elmark.com.pl/web/uploaded/karty_produktow/advantech/ark-2250l/ark-2250l_instrukcja-uzytkownika.pdf

After upgrading to Xen 4.12.0 from 4.11.0 we now have to utilize  iommu=no-igfx
workaround as per:
     https://xenbits.xen.org/docs/unstable/misc/xen-command-line.html#iommu

Without the workaround the screen appears to be garbled with colored
static noise and the following message keeps showing up:
(XEN) printk: 26235 messages suppressed.
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
8e43c000, iommu reg = ffff82c00021d000
(XEN) printk: 26303 messages suppressed.
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
8e2c6000, iommu reg = ffff82c00021d000

Once iommu=no-igfx is applied the box can boot fine.

At the end of this email, you can see a full log of the box booting
all the way into Dom0 with iommu=no-igfx applied. I am also attaching
similar log without no-igfx

Please let me know if you need any more information to help us diagnose this.

Thanks,
Roman.

0x0000:0x00:0x02.0x0: ROM: 0x10000 bytes at 0x8968d018
0x0000:0x02:0x00.0x0: ROM: 0x10000 bytes at 0x89640018
0x0000:0x00:0x1f.0x6: ROM: 0x10c00 bytes at 0x8962f018
 Xen 4.12.0
(XEN) Xen version 4.12.0 (@) (gcc (Alpine 6.4.0) 6.4.0) debug=n  Mon
Jun 17 18:50:07 UTC 2019
(XEN) Latest ChangeSet:
(XEN) Bootloader: GRUB 2.03
(XEN) Command line: iommu=no-igfx com1=115200,8n1 console=com1,vga
dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=false
(XEN) Xen image load base address: 0x88600000
(XEN) Video information:
(XEN)  VGA is graphics mode 1680x1050, 32 bpp
(XEN) Disc information:
(XEN)  Found 0 MBR signatures
(XEN)  Found 1 EDD information structures
(XEN) EFI RAM map:
(XEN)  0000000000000000 - 0000000000058000 (usable)
(XEN)  0000000000058000 - 0000000000059000 (reserved)
(XEN)  0000000000059000 - 000000000009f000 (usable)
(XEN)  000000000009f000 - 00000000000a0000 (reserved)
(XEN)  0000000000100000 - 000000008648a000 (usable)
(XEN)  000000008648a000 - 000000008648b000 (ACPI NVS)
(XEN)  000000008648b000 - 00000000864b5000 (reserved)
(XEN)  00000000864b5000 - 000000008c224000 (usable)
(XEN)  000000008c224000 - 000000008c528000 (reserved)
(XEN)  000000008c528000 - 000000008c736000 (usable)
(XEN)  000000008c736000 - 000000008cea7000 (ACPI NVS)
(XEN)  000000008cea7000 - 000000008d2ff000 (reserved)
(XEN)  000000008d2ff000 - 000000008d300000 (usable)
(XEN)  000000008d300000 - 000000008d400000 (reserved)
(XEN)  00000000e0000000 - 00000000f0000000 (reserved)
(XEN)  00000000fe000000 - 00000000fe011000 (reserved)
(XEN)  00000000fec00000 - 00000000fec01000 (reserved)
(XEN)  00000000fee00000 - 00000000fee01000 (reserved)
(XEN)  00000000ff000000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 000000016e000000 (usable)
(XEN) ACPI: RSDP 8CE49000, 0024 (r2 ALASKA)
(XEN) ACPI: XSDT 8CE490A8, 00CC (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FACP 8CE6C370, 010C (r5 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DSDT 8CE49208, 23167 (r2 ALASKA   A M I   1072009 INTL 20120913)
(XEN) ACPI: FACS 8CE8EF80, 0040
(XEN) ACPI: APIC 8CE6C480, 0084 (r3 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FPDT 8CE6C508, 0044 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FIDT 8CE6C550, 009C (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: MCFG 8CE6C5F0, 003C (r1 ALASKA   A M I   1072009 MSFT       97)
(XEN) ACPI: HPET 8CE6C630, 0038 (r1 ALASKA   A M I   1072009 AMI.    5000B)
(XEN) ACPI: LPIT 8CE6C668, 0094 (r1 INTEL   SKL-ULT        0 MSFT       5F)
(XEN) ACPI: SSDT 8CE6C700, 0248 (r2 INTEL  sensrhub        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE6C948, 2BAE (r2 INTEL  PtidDevc     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE6F4F8, 0BE3 (r2 INTEL  Ther_Rvp     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE700E0, 04A3 (r2 INTEL     zpodd     1000 INTL 20120913)
(XEN) ACPI: DBGP 8CE70588, 0034 (r1 INTEL                  0 MSFT       5F)
(XEN) ACPI: DBG2 8CE705C0, 0054 (r0 INTEL                  0 MSFT       5F)
(XEN) ACPI: SSDT 8CE70618, 06E9 (r2  INTEL xh_rvp07        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE70D08, 547E (r2 SaSsdt  SaSsdt      3000 INTL 20120913)
(XEN) ACPI: UEFI 8CE76188, 0042 (r1                        0             0)
(XEN) ACPI: SSDT 8CE761D0, 0E73 (r2 CpuRef  CpuSsdt     3000 INTL 20120913)
(XEN) ACPI: BGRT 8CE77048, 0038 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DMAR 8CE77080, 00A8 (r1 INTEL      SKL         1 INTL        1)
(XEN) ACPI: TPM2 8CE77128, 0034 (r3        Tpm2Tabl        1 AMI         0)
(XEN) ACPI: ASF! 8CE77160, 00A5 (r32 INTEL       HCG        1 TFSM    F4240)
(XEN) System RAM: 4003MB (4099736kB)
(XEN) Domain heap initialised
(XEN) ACPI: 32/64X FACS address mismatch in FADT -
8ce8ef80/0000000000000000, using 32
(XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
(XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
(XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved
memory; need "iommu_inclusive_mapping=1"?
(XEN) Switched to APIC driver x2apic_cluster.
(XEN) xstate: size: 0x440 and states: 0x1f
(XEN) Speculative mitigation facilities:
(XEN)   Hardware features:
(XEN)   Compiled-in support: SHADOW_PAGING
(XEN)   Xen settings: BTI-Thunk N/A, SPEC_CTRL: No, Other:
(XEN)   L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 39, Safe
address 8000000000
(XEN)   Support for HVM VMs: RSB EAGER_FPU
(XEN)   Support for PV VMs: RSB EAGER_FPU
(XEN)   XPTI (64-bit PV only): Dom0 enabled, DomU enabled (with PCID)
(XEN)   PV L1TF shadowing: Dom0 disabled, DomU enabled
(XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) Initializing Credit2 scheduler
(XEN) Platform timer is 23.999MHz HPET
(XEN) Detected 2496.011 MHz processor.
(XEN) Initing memory sharing.
(XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d Snoop Control not enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) Intel VT-d Posted Interrupt not enabled.
(XEN) Intel VT-d Shared EPT tables enabled.
(XEN) I/O virtualisation enabled
(XEN)  - Dom0 mode: Relaxed
(XEN) Interrupt remapping enabled
(XEN) Enabled directed EOI with ioapic_ack_old on!
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using old ACK method
(XEN) TSC_DEADLINE disabled due to Errata; please update microcode to
version 0xb2 (or later)
(XEN) Allocated console ring of 16 KiB.
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) VMX: Supported advanced features:
(XEN)  - APIC MMIO access virtualisation
(XEN)  - APIC TPR shadow
(XEN)  - Extended Page Tables (EPT)
(XEN)  - Virtual-Processor Identifiers (VPID)
(XEN)  - Virtual NMI
(XEN)  - MSR direct-access bitmap
(XEN)  - Unrestricted Guest
(XEN)  - VMCS shadowing
(XEN)  - VM Functions
(XEN)  - Virtualisation Exceptions
(XEN)  - Page Modification Logging
(XEN) HVM: ASIDs enabled.
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging (HAP) detected
(XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) Brought up 2 CPUs
(XEN) Dom0 has maximum 312 PIRQs
(XEN)  Xen  kernel: 64-bit, lsb, compat32
(XEN)  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x2a2c000
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000164000000->0000000168000000 (245760 pages
to be allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: ffffffff81000000->ffffffff82a2c000
(XEN)  Init. ramdisk: 0000000000000000->0000000000000000
(XEN)  Phys-Mach map: 0000008000000000->0000008000200000
(XEN)  Start info:    ffffffff82a2c000->ffffffff82a2c4b4
(XEN)  Xenstore ring: 0000000000000000->0000000000000000
(XEN)  Console ring:  0000000000000000->0000000000000000
(XEN)  Page tables:   ffffffff82a2d000->ffffffff82a46000
(XEN)  Boot stack:    ffffffff82a46000->ffffffff82a47000
(XEN)  TOTAL:         ffffffff80000000->ffffffff82c00000
(XEN)  ENTRY ADDRESS: ffffffff826aa180
(XEN) Dom0 has maximum 1 VCPUs
(XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Scrubbing Free RAM in background
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) Xen is relinquishing VGA console.
(XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
(XEN) Freed 480kB init memory
mapping kernel into physical memory
about to get started...
[    0.000000] Linux version 4.19.5-linuxkit (root@48efbd0309a6) (gcc
version 6.3.0 (Alpine 6.3.0)) #1 SMP Mon Jun 17 17:43:29 UTC 2019
[    0.000000] Command line: console=hvc0 earlyprintk=xen rootdelay=3
root=PARTUUID=61ff5ba4-aea3-4c21-a11c-b899a6a88def text
[    0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating
point registers'
[    0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
[    0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
[    0.000000] x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
[    0.000000] x86/fpu: Enabled xstate features 0x7, context size is
832 bytes, using 'standard' format.
[    0.000000] Released 0 page(s)
[    0.000000] BIOS-provided physical RAM map:
[    0.000000] Xen: [mem 0x0000000000000000-0x0000000000057fff] usable
[    0.000000] Xen: [mem 0x0000000000058000-0x0000000000058fff] reserved
[    0.000000] Xen: [mem 0x0000000000059000-0x000000000009efff] usable
[    0.000000] Xen: [mem 0x000000000009f000-0x00000000000fffff] reserved
[    0.000000] Xen: [mem 0x0000000000100000-0x0000000040061fff] usable
[    0.000000] Xen: [mem 0x0000000040062000-0x0000000086489fff] unusable
[    0.000000] Xen: [mem 0x000000008648a000-0x000000008648afff] ACPI NVS
[    0.000000] Xen: [mem 0x000000008648b000-0x00000000864b4fff] reserved
[    0.000000] Xen: [mem 0x00000000864b5000-0x000000008c223fff] unusable
[    0.000000] Xen: [mem 0x000000008c224000-0x000000008c527fff] reserved
[    0.000000] Xen: [mem 0x000000008c528000-0x000000008c735fff] unusable
[    0.000000] Xen: [mem 0x000000008c736000-0x000000008cea6fff] ACPI NVS
[    0.000000] Xen: [mem 0x000000008cea7000-0x000000008d2fefff] reserved
[    0.000000] Xen: [mem 0x000000008d2ff000-0x000000008d2fffff] unusable
[    0.000000] Xen: [mem 0x000000008d300000-0x000000008d3fffff] reserved
[    0.000000] Xen: [mem 0x00000000e0000000-0x00000000efffffff] reserved
[    0.000000] Xen: [mem 0x00000000fe000000-0x00000000fe010fff] reserved
[    0.000000] Xen: [mem 0x00000000fec00000-0x00000000fec00fff] reserved
[    0.000000] Xen: [mem 0x00000000fed90000-0x00000000fed91fff] reserved
[    0.000000] Xen: [mem 0x00000000fee00000-0x00000000feefffff] reserved
[    0.000000] Xen: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
[    0.000000] Xen: [mem 0x0000000100000000-0x000000016dffffff] unusable
[    0.000000] NX (Execute Disable) protection: active
[    0.000000] efi: EFI v2.40 by American Megatrends
[    0.000000] efi:  ESRT=0x8d29c098  ACPI=0x8ce49000  ACPI
2.0=0x8ce49000  SMBIOS=0xf05e0  SMBIOS 3.0=0xf0600  MPS=0xfc9c0
[    0.000000] SMBIOS 3.0.0 present.
[    0.000000] DMI:  /, BIOS 5.11 06/12/2017
[    0.000000] Hypervisor detected: Xen PV
[    0.000689] tsc: Detected 2496.010 MHz processor
[    0.010540] last_pfn = 0x40062 max_arch_pfn = 0x400000000
[    0.010541] Disabled
[    0.010543] x86/PAT: MTRRs disabled, skipping PAT initialization too.
[    0.010546] x86/PAT: Configuration [0-7]: WB  WT  UC- UC  WC  WP  UC  UC
[    0.010576] Kernel/User page tables isolation: disabled on XEN PV.
[    0.176019] Secure boot disabled
[    0.176033] ACPI: Early table checksum verification disabled
[    0.176039] ACPI: RSDP 0x000000008CE49000 000024 (v02 ALASKA)
[    0.176048] ACPI: XSDT 0x000000008CE490A8 0000CC (v01 ALASKA A M I
  01072009 AMI  00010013)
[    0.176078] ACPI: FACP 0x000000008CE6C370 00010C (v05 ALASKA A M I
  01072009 AMI  00010013)
[    0.176134] ACPI: DSDT 0x000000008CE49208 023167 (v02 ALASKA A M I
  01072009 INTL 20120913)
[    0.176145] ACPI: FACS 0x000000008CE8EF80 000040
[    0.176157] ACPI: APIC 0x000000008CE6C480 000084 (v03 ALASKA A M I
  01072009 AMI  00010013)
[    0.176168] ACPI: FPDT 0x000000008CE6C508 000044 (v01 ALASKA A M I
  01072009 AMI  00010013)
[    0.176180] ACPI: FIDT 0x000000008CE6C550 00009C (v01 ALASKA A M I
  01072009 AMI  00010013)
[    0.176191] ACPI: MCFG 0x000000008CE6C5F0 00003C (v01 ALASKA A M I
  01072009 MSFT 00000097)
[    0.176203] ACPI: HPET 0x000000008CE6C630 000038 (v01 ALASKA A M I
  01072009 AMI. 0005000B)
[    0.176214] ACPI: LPIT 0x000000008CE6C668 000094 (v01 INTEL
SKL-ULT  00000000 MSFT 0000005F)
[    0.176226] ACPI: SSDT 0x000000008CE6C700 000248 (v02 INTEL
sensrhub 00000000 INTL 20120913)
[    0.176245] ACPI: SSDT 0x000000008CE6C948 002BAE (v02 INTEL
PtidDevc 00001000 INTL 20120913)
[    0.176257] ACPI: SSDT 0x000000008CE6F4F8 000BE3 (v02 INTEL
Ther_Rvp 00001000 INTL 20120913)
[    0.176268] ACPI: SSDT 0x000000008CE700E0 0004A3 (v02 INTEL  zpodd
  00001000 INTL 20120913)
[    0.176280] ACPI: DBGP 0x000000008CE70588 000034 (v01 INTEL
  00000000 MSFT 0000005F)
[    0.176291] ACPI: DBG2 0x000000008CE705C0 000054 (v00 INTEL
  00000000 MSFT 0000005F)
[    0.176303] ACPI: SSDT 0x000000008CE70618 0006E9 (v02 INTEL
xh_rvp07 00000000 INTL 20120913)
[    0.176315] ACPI: SSDT 0x000000008CE70D08 00547E (v02 SaSsdt SaSsdt
  00003000 INTL 20120913)
[    0.176327] ACPI: UEFI 0x000000008CE76188 000042 (v01
  00000000      00000000)
[    0.176338] ACPI: SSDT 0x000000008CE761D0 000E73 (v02 CpuRef
CpuSsdt  00003000 INTL 20120913)
[    0.176350] ACPI: BGRT 0x000000008CE77048 000038 (v01 ALASKA A M I
  01072009 AMI  00010013)
[    0.176362] ACPI: RMAD 0x000000008CE77080 0000A8 (v01 INTEL  SKL
  00000001 INTL 00000001)
[    0.176374] ACPI: TPM2 0x000000008CE77128 000034 (v03
Tpm2Tabl 00000001 AMI  00000000)
[    0.176385] ACPI: ASF! 0x000000008CE77160 0000A5 (v32 INTEL   HCG
  00000001 TFSM 000F4240)
[    0.176416] Setting APIC routing to Xen PV.
[    0.179941] Zone ranges:
[    0.179943]   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
[    0.179945]   DMA32    [mem 0x0000000001000000-0x0000000040061fff]
[    0.179947]   Normal   empty
[    0.179948] Movable zone start for each node
[    0.179949] Early memory node ranges
[    0.179951]   node   0: [mem 0x0000000000001000-0x0000000000057fff]
[    0.179952]   node   0: [mem 0x0000000000059000-0x000000000009efff]
[    0.179954]   node   0: [mem 0x0000000000100000-0x0000000040061fff]
[    0.180528] Reserved but unavailable: 32769 pages
[    0.180530] Initmem setup node 0 [mem 0x0000000000001000-0x0000000040061fff]
[    0.185470] p2m virtual area at (____ptrval____), size is 40000000
[    0.285486] Remapped 98 page(s)
[    0.285528] Reserving Intel graphics memory at [mem 0x8e000000-0x8fffffff]
[    0.285848] ACPI: PM-Timer IO Port: 0x1808
[    0.285881] ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
[    0.285883] ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
[    0.285885] ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
[    0.285887] ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
[    0.285929] IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
[    0.285938] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
[    0.285941] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
[    0.285954] Using ACPI (MADT) for SMP configuration information
[    0.285958] ACPI: HPET id: 0x8086a701 base: 0xfed00000
[    0.285980] smpboot: Allowing 4 CPUs, 0 hotplug CPUs
[    0.286001] [mem 0x90000000-0xdfffffff] available for PCI devices
[    0.286005] Booting paravirtualized kernel on Xen
[    0.286006] Xen version: 4.12.0 (preserve-AD)
[    0.286009] clocksource: refined-jiffies: mask: 0xffffffff
max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[    0.400398] random: get_random_bytes called from
start_kernel+0x92/0x4be with crng_init=0
[    0.400407] setup_percpu: NR_CPUS:128 nr_cpumask_bits:128
nr_cpu_ids:4 nr_node_ids:1
[    0.400651] percpu: Embedded 45 pages/cpu @(____ptrval____) s143768
r8192 d32360 u524288
[    0.400710] Built 1 zonelists, mobility grouping on.  Total pages: 258024
[    0.400722] Kernel command line: console=hvc0 earlyprintk=xen
rootdelay=3 root=PARTUUID=61ff5ba4-aea3-4c21-a11c-b899a6a88def text
[    0.400935] Dentry cache hash table entries: 131072 (order: 8, 1048576 bytes)
[    0.400976] Inode-cache hash table entries: 65536 (order: 7, 524288 bytes)
[    0.401125] x2apic disabled
[    0.430609] software IO TLB: mapped [mem 0x3a600000-0x3e600000] (64MB)
[    0.441378] Memory: 930940K/1048572K available (12300K kernel code,
1595K rwdata, 3068K rodata, 1584K init, 1952K bss, 117632K reserved,
0K cma-reserved)
[    0.441440] ftrace: allocating 43497 entries in 170 pages
[    0.458530] rcu: Hierarchical RCU implementation.
[    0.458533] rcu: RCU restricting CPUs from NR_CPUS=128 to nr_cpu_ids=1.
[    0.458534] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1
[    0.461631] Using NULL legacy PIC
[    0.461633] NR_IRQS: 8448, nr_irqs: 256, preallocated irqs: 0
[    0.461649] xen:events: Using FIFO-based ABI
[    0.461818] Console: colour dummy device 80x25
[    0.461995] console [tty0] enabled
[    0.462487] console [hvc0] enabled
[    0.462494] ACPI: Core revision 20180810
[    0.477623] ACPI BIOS Warning (bug): Incorrect checksum in table
[BGRT] - 0x99, should be 0xAF (20180810/tbprint-177)
[    0.477695] clocksource: xen: mask: 0xffffffffffffffff max_cycles:
0x1cd42e4dffb, max_idle_ns: 881590591483 ns
[    0.477716] installing Xen timer for CPU 0
[    0.477801] clocksource: tsc-early: mask: 0xffffffffffffffff
max_cycles: 0x23fa80a809f, max_idle_ns: 440795273818 ns
[    0.477865] Calibrating delay loop (skipped), value calculated
using timer frequency.. 4992.02 BogoMIPS (lpj=24960100)
[    0.477874] pid_max: default: 32768 minimum: 301
[    0.477951] Security Framework initialized
[    0.477956] Yama: becoming mindful.
[    0.477981] Mount-cache hash table entries: 2048 (order: 2, 16384 bytes)
[    0.477990] Mountpoint-cache hash table entries: 2048 (order: 2, 16384 bytes)
[    0.478256] Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
[    0.478262] Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
[    0.478268] Spectre V2 : Vulnerable: Minimal generic ASM retpoline
[    0.478273] Spectre V2 : Spectre v2 / SpectreRSB mitigation:
Filling RSB on context switch
[    0.478279] Speculative Store Bypass: Vulnerable
[    0.527925] Freeing SMP alternatives memory: 24K
[    0.529303] VPMU disabled by hypervisor.
[    0.529471] Performance Events: unsupported p6 CPU model 78 no PMU
driver, software events only.
[    0.529545] rcu: Hierarchical SRCU implementation.
[    0.529706] NMI watchdog: Perf NMI watchdog permanently disabled
[    0.529768] smp: Bringing up secondary CPUs ...
[    0.529773] smp: Brought up 1 node, 1 CPU
[    0.529777] smpboot: Max logical packages: 1
[    0.529942] devtmpfs: initialized
[    0.529996] x86/mm: Memory block size: 128MB
[    0.530398] clocksource: jiffies: mask: 0xffffffff max_cycles:
0xffffffff, max_idle_ns: 19112604462750000 ns
[    0.530409] futex hash table entries: 256 (order: 2, 16384 bytes)
[    0.530623] NET: Registered protocol family 16
[    0.530644] xen:grant_table: Grant tables using version 1 layout
[    0.530659] Grant table initialized
[    0.530809] audit: initializing netlink subsys (disabled)
[    0.530908] audit: type=2000 audit(1563563921.812:1):
state=initialized audit_enabled=0 res=1
[    0.531069] ACPI FADT declares the system doesn't support PCIe
ASPM, so disable it
[    0.531077] ACPI: bus type PCI registered
[    0.531203] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem
0xe0000000-0xefffffff] (base 0xe0000000)
[    0.531212] PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820
[    0.585062] PCI: Using configuration type 1 for base access
[    0.587021] cryptd: max_cpu_qlen set to 1000
[    0.587137] ACPI: Added _OSI(Module Device)
[    0.587142] ACPI: Added _OSI(Processor Device)
[    0.587147] ACPI: Added _OSI(3.0 _SCP Extensions)
[    0.587151] ACPI: Added _OSI(Processor Aggregator Device)
[    0.587156] ACPI: Added _OSI(Linux-Dell-Video)
[    0.587160] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
[    0.634267] ACPI: 8 ACPI AML tables successfully acquired and loaded
[    0.640637] ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored
[    0.645652] ACPI: Dynamic OEM Table Load:
[    0.645663] ACPI: SSDT 0xFFFF88803A316000 00037F (v02 PmRef
Cpu0Cst  00003001 INTL 20120913)
[    0.646212] ACPI: Dynamic OEM Table Load:
[    0.646221] ACPI: SSDT 0xFFFF888039811800 00063F (v02 PmRef
Cpu0Ist  00003000 INTL 20120913)
[    0.648440] ACPI: EC: EC started
[    0.648446] ACPI: EC: interrupt blocked
[    0.648501] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as first EC
[    0.648507] ACPI: \_SB_.PCI0.LPCB.EC0_: GPE=0x50,
EC_CMD/EC_SC=0x66, EC_DATA=0x62
[    0.648513] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as boot DSDT EC to
handle transactions
[    0.648519] ACPI: Interpreter enabled
[    0.648531] ACPI: (supports S0 S5)
[    0.648535] ACPI: Using IOAPIC for interrupt routing
[    0.648582] PCI: Using host bridge windows from ACPI; if necessary,
use "pci=nocrs" and report a bug
[    0.649911] ACPI: Enabled 7 GPEs in block 00 to 7F
[    0.653085] ACPI: Power Resource [PG00] (on)
[    0.653513] ACPI: Power Resource [PG01] (on)
[    0.653972] ACPI: Power Resource [PG02] (on)
[    0.660615] ACPI: Power Resource [WRST] (on)
[    0.661101] ACPI: Power Resource [WRST] (on)
[    0.661544] ACPI: Power Resource [WRST] (on)
[    0.661975] ACPI: Power Resource [WRST] (on)
[    0.662467] ACPI: Power Resource [WRST] (on)
[    0.662901] ACPI: Power Resource [WRST] (on)
[    0.663328] ACPI: Power Resource [WRST] (on)
[    0.663818] ACPI: Power Resource [WRST] (on)
[    0.664249] ACPI: Power Resource [WRST] (on)
[    0.664690] ACPI: Power Resource [WRST] (on)
[    0.665203] ACPI: Power Resource [WRST] (on)
[    0.665634] ACPI: Power Resource [WRST] (on)
[    0.666070] ACPI: Power Resource [WRST] (on)
[    0.666553] ACPI: Power Resource [WRST] (on)
[    0.666979] ACPI: Power Resource [WRST] (on)
[    0.667406] ACPI: Power Resource [WRST] (on)
[    0.667897] ACPI: Power Resource [WRST] (on)
[    0.668338] ACPI: Power Resource [WRST] (on)
[    0.668780] ACPI: Power Resource [WRST] (on)
[    0.669265] ACPI: Power Resource [WRST] (on)
[    0.684236] ACPI: Power Resource [FN00] (off)
[    0.684400] ACPI: Power Resource [FN01] (off)
[    0.684510] ACPI: Power Resource [FN02] (off)
[    0.684616] ACPI: Power Resource [FN03] (off)
[    0.684730] ACPI: Power Resource [FN04] (off)
[    0.686266] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe])
[    0.686279] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM
ClockPM Segments MSI]
[    0.689484] acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug
SHPCHotplug PME PCIeCapability LTR]
[    0.689492] acpi PNP0A08:00: FADT indicates ASPM is unsupported,
using BIOS configuration
[    0.690190] PCI host bridge to bus 0000:00
[    0.690197] pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
[    0.690203] pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
[    0.690208] pci_bus 0000:00: root bus resource [mem
0x000a0000-0x000bffff window]
[    0.690215] pci_bus 0000:00: root bus resource [mem
0x90000000-0xdfffffff window]
[    0.690221] pci_bus 0000:00: root bus resource [mem
0xfd000000-0xfe7fffff window]
[    0.690227] pci_bus 0000:00: root bus resource [bus 00-fe]
(XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
[    0.691006] pci 0000:00:02.0: BAR 2: assigned to efifb
[    0.694276] pci 0000:00:1c.0: Intel SPT PCH root port ACS workaround enabled
[    0.694833] pci 0000:00:1c.5: Intel SPT PCH root port ACS workaround enabled
[    0.698688] pci 0000:00:1c.0: PCI bridge to [bus 01]
[    0.699418] pci 0000:02:00.0: 2.000 Gb/s available PCIe bandwidth,
limited by 2.5 GT/s x1 link at 0000:00:1c.5 (capable of 7.876 Gb/s
with 8 GT/s x1 link)
[    0.699724] pci 0000:00:1c.5: PCI bridge to [bus 02]
[    0.704143] ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.704232] ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 *10 11 12 14 15)
[    0.704322] ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.704418] ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.704507] ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.704592] ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.704680] ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.704768] ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.705534] ACPI: EC: interrupt unblocked
[    0.705573] ACPI: EC: event unblocked
[    0.705598] ACPI: \_SB_.PCI0.LPCB.EC0_: GPE=0x50,
EC_CMD/EC_SC=0x66, EC_DATA=0x62
[    0.705605] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as boot DSDT EC to
handle transactions and events
[    0.705655] xen:balloon: Initialising balloon driver
[    0.705801] SCSI subsystem initialized
[    0.705887] ACPI: bus type USB registered
[    0.705909] usbcore: registered new interface driver usbfs
[    0.705920] usbcore: registered new interface driver hub
[    0.705940] usbcore: registered new device driver usb
[    0.705956] pps_core: LinuxPPS API ver. 1 registered
[    0.705961] pps_core: Software ver. 5.3.6 - Copyright 2005-2007
Rodolfo Giometti <giometti@linux.it>
[    0.705969] PTP clock support registered
[    0.706008] Registered efivars operations
[    0.710766] PCI: Using ACPI for IRQ routing
[    0.748524] NetLabel: Initializing
[    0.748529] NetLabel:  domain hash size = 128
[    0.748533] NetLabel:  protocols = UNLABELED CIPSOv4 CALIPSO
[    0.748553] NetLabel:  unlabeled traffic allowed by default
[    0.748718] clocksource: Switched to clocksource tsc-early
[    0.765269] VFS: Disk quotas dquot_6.6.0
[    0.765291] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
[    0.765339] FS-Cache: Loaded
[    0.765343] hugetlbfs: disabling because there are no supported
hugepage sizes
[    0.765401] CacheFiles: Loaded
[    0.765415] pnp: PnP ACPI init
[    0.765704] system 00:00: [io  0x0a00-0x0a2f] has been reserved
[    0.766250] Already setup the GSI :4
[    0.768279] system 00:05: [io  0x0200-0x027f] has been reserved
[    0.769079] system 00:06: [io  0x029c-0x029d] has been reserved
[    0.769352] system 00:07: [io  0x0680-0x069f] has been reserved
[    0.769359] system 00:07: [io  0xffff] has been reserved
[    0.769364] system 00:07: [io  0xffff] has been reserved
[    0.769369] system 00:07: [io  0xffff] has been reserved
[    0.769374] system 00:07: [io  0x1800-0x18fe] has been reserved
[    0.769380] system 00:07: [io  0x164e-0x164f] has been reserved
[    0.769579] system 00:09: [io  0x1854-0x1857] has been reserved
[    0.769879] system 00:0a: [mem 0xfed10000-0xfed17fff] has been reserved
[    0.769886] system 00:0a: [mem 0xfed18000-0xfed18fff] has been reserved
[    0.769892] system 00:0a: [mem 0xfed19000-0xfed19fff] has been reserved
[    0.769898] system 00:0a: [mem 0xe0000000-0xefffffff] has been reserved
[    0.769904] system 00:0a: [mem 0xfed20000-0xfed3ffff] has been reserved
[    0.769909] system 00:0a: [mem 0xfed90000-0xfed93fff] could not be reserved
[    0.769915] system 00:0a: [mem 0xfed45000-0xfed8ffff] has been reserved
[    0.769921] system 00:0a: [mem 0xff000000-0xffffffff] has been reserved
[    0.769927] system 00:0a: [mem 0xfee00000-0xfeefffff] has been reserved
[    0.769933] system 00:0a: [mem 0xdffe0000-0xdfffffff] has been reserved
[    0.769988] system 00:0b: [mem 0xfd000000-0xfdabffff] has been reserved
[    0.769995] system 00:0b: [mem 0xfdad0000-0xfdadffff] has been reserved
[    0.770001] system 00:0b: [mem 0xfdb00000-0xfdffffff] has been reserved
[    0.7[    1.491547] Key type encrypted registered
[    1.493473] rtc_cmos 00:08: setting system clock to 2019-07-19
19:18:43 UTC (1563563923)
[    1.494433] Waiting 3 sec before mounting root device...
[    1.700989] ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
[    1.706737] ata1.00: ATA-9: SQF-S25M8-64G-SAC, SAFM02A3, max UDMA/133
[    1.707867] ata1.00: 125045424 sectors, multi 16: LBA48 NCQ (depth 32), AA
[    1.709118] ata1.00: configured for UDMA/133
[    1.710321] scsi 0:0:0:0: Direct-Access     ATA
SQF-S25M8-64G-SA 02A3 PQ: 0 ANSI: 5
[    1.711647] sd 0:0:0:0: [sda] 125045424 512-byte logical blocks:
(64.0 GB/59.6 GiB)
[    1.712791] sd 0:0:0:0: [sda] Write Protect is off
[    1.713976] sd 0:0:0:0: Attached scsi generic sg0 type 0
[    1.715068] sd 0:0:0:0: [sda] Write cache: enabled, read cache:
enabled, doesn't support DPO or FUA
[    1.717800]  sda: sda1 sda2 sda3 sda4 sda9
[    1.719269] sd 0:0:0:0: [sda] Attached SCSI disk
[    1.721673] ata2: SATA link down (SStatus 4 SControl 300)
[    1.737879] usb 1-1: new low-speed USB device number 2 using xhci_hcd
[    1.837912] clocksource: tsc: mask: 0xffffffffffffffff max_cycles:
0x23fa80a809f, max_idle_ns: 440795273818 ns
[    1.839077] clocksource: Switched to clocksource tsc
[    1.928802] input: Logitech USB Keyboard as
/devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.0/0003:046D:C31C.0001/input/input6
[    1.997981] hid-generic 0003:046D:C31C.0001: input: USB HID v1.10
Keyboard [Logitech USB Keyboard] on usb-0000:00:14.0-1/input0
[    2.004853] input: Logitech USB Keyboard Consumer Control as
/devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.1/0003:046D:C31C.0002/input/input7
[    2.068052] input: Logitech USB Keyboard System Control as
/devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.1/0003:046D:C31C.0002/input/input8
[    2.069388] hid-generic 0003:046D:C31C.0002: input: USB HID v1.10
Device [Logitech USB Keyboard] on usb-0000:00:14.0-1/input1
[    2.217897] usb 1-7: new full-speed USB device number 3 using xhci_hcd
[    2.399047] random: fast init done
[    4.484487] VFS: Mounted root (squashfs filesystem) readonly on device 8:2.
[    4.487173] Freeing unused kernel image memory: 1584K
[    4.507975] Write protecting the kernel read-only data: 18432k
[    4.516183] Freeing unused kernel image memory: 2020K
[    4.517742] Freeing unused kernel image memory: 1028K
[    4.518785] Run /sbin/init as init process
[    5.129834] e1000e: Intel(R) PRO/1000 Network Driver - 3.2.6-k
[    5.130918] e1000e: Copyright(c) 1999 - 2015 Intel Corporation.
[    5.132125] Already setup the GSI :16
[    5.133307] e1000e 0000:00:1f.6: Interrupt Throttling Rate
(ints/sec) set to dynamic conservative mode
[    5.234464] e1000e 0000:00:1f.6 0000:00:1f.6 (uninitialized):
registered PHC clock
[    5.326539] e1000e 0000:00:1f.6 eth0: (PCI Express:2.5GT/s:Width
x1) 00:0b:ab:e4:d0:c5
[    5.327674] e1000e 0000:00:1f.6 eth0: Intel(R) PRO/1000 Network Connection
[    5.330518] e1000e 0000:00:1f.6 eth0: MAC: 12, PHY: 12, PBA No: FFFFFF-0FF
[    5.362049] cfg80211: Loading compiled-in X.509 certificates for
regulatory database
[    5.371724] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
[    5.372933] platform regulatory.0: Direct firmware load for
regulatory.db failed with error -2
[    5.374112] cfg80211: failed to load regulatory.db
[    5.424847] rtl8723be 0000:01:00.0: enabling device (0000 -> 0003)
[    5.426136] Already setup the GSI :18
[    5.459064] rtl8723be: Using firmware rtlwifi/rtl8723befw_36.bin
[    5.462917] rtlwifi: rtlwifi: wireless switch is on
[    5.481131] igb: Intel(R) Gigabit Ethernet Network Driver - version 5.4.0-k
[    5.482341] igb: Copyright (c) 2007-2014 Intel Corporation.
[    5.483648] Already setup the GSI :17
[    5.514869] pps pps0: new PPS source ptp1
[    5.516458] igb 0000:02:00.0: added PHC on eth1
[    5.517974] igb 0000:02:00.0: Intel(R) Gigabit Ethernet Network Connection
[    5.519441] igb 0000:02:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:0b:ab:e4:d0:c6
[    5.520701] igb 0000:02:00.0: eth1: PBA No: 000200-000
[    5.521831] igb 0000:02:00.0: Using MSI-X interrupts. 1 rx
queue(s), 1 tx queue(s)
................   ..............   ................
 ................   ............   ................
              ....    .........   ....
    ................   .......   ................
     ................   .....   ................
                    ...   .   ....
        ................     ................
          ...............   ................

              Edge Virtualization Engine
Take a look around and don't forget to use eve(1).
login[518]: root login on 'hvc0'
linuxkit-000babe4d0c5:~#
[    6.069552] IPVS: ftp: loaded support on port[0] = 21
[    6.158121] FAT-fs (sda4): utf8 is not a recommended IO charset for
FAT filesystems, filesystem will be case sensitive!
[    6.163850] FAT-fs (sda4): Volume was not properly unmounted. Some
data may be corrupt. Please run fsck.
[    6.222733] IPVS: ftp: loaded support on port[0] = 21
[    6.261491] random: crng init done
2019/07/19 19:18:48 Wrote 1000 bytes of entropy, exiting as oneshot
[    8.572992] usbcore: registered new interface driver qcserial
[    8.574283] usbserial: USB Serial support registered for Qualcomm USB modem
[    8.586813] usbcore: registered new interface driver cdc_wdm
[    8.593148] usbcore: registered new interface driver qmi_wwan
[    8.823492] EXT4-fs (sda9): mounting ext3 file system using the
ext4 subsystem
[    8.834988] EXT4-fs (sda9): mounted filesystem with ordered data
mode. Opts: (null)

linuxkit-000babe4d0c5:~# eve enter
/ # xl info
host                   : linuxkit-000babe4d0c5
release                : 4.19.5-linuxkit
version                : #1 SMP Mon Jun 17 17:43:29 UTC 2019
machine                : x86_64
nr_cpus                : 2
max_cpu_id             : 3
nr_nodes               : 1
cores_per_socket       : 2
threads_per_core       : 1
cpu_mhz                : 2496.011
hw_caps                :
bfebfbff:76faf3ff:2c100800:00000121:0000000f:009c6fbf:00000000:00000100
virt_caps              : pv hvm hvm_directio pv_directio
total_memory           : 4003
free_memory            : 2912
sharing_freed_memory   : 0
sharing_used_memory    : 0
outstanding_claims     : 0
free_cpus              : 0
xen_major              : 4
xen_minor              : 12
xen_extra              : .0
xen_version            : 4.12.0
xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
hvm-3.0-x86_32p hvm-3.0-x86_64
xen_scheduler          : credit2
xen_pagesize           : 4096
platform_params        : virt_start=0xffff800000000000
xen_changeset          :
xen_commandline        : iommu=no-igfx com1=115200,8n1
console=com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1
dom0_vcpus_pin smt=false
cc_compiler            : gcc (Alpine 6.4.0) 6.4.0
cc_compile_by          :
cc_compile_domain      :
cc_compile_date        : Mon Jun 17 18:50:07 UTC 2019
build_id               : 00f4459480dee2ae1aab93918bb20f4b9719364b
xend_config_format     : 4

[-- Attachment #2: boot_without_workaround.txt --]
[-- Type: text/plain, Size: 37771 bytes --]

 Xen 4.12.0
(XEN) Xen version 4.12.0 (@) (gcc (Alpine 6.4.0) 6.4.0) debug=n  Mon Jun 17 18:50:07 UTC 2019
(XEN) Latest ChangeSet:
(XEN) Bootloader: GRUB 2.03
(XEN) Command line: com1=115200,8n1 console=com1 dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=false
(XEN) Xen image load base address: 0x88600000
(XEN) Video information:
(XEN)  VGA is graphics mode 1680x1050, 32 bpp
(XEN) Disc information:
(XEN)  Found 0 MBR signatures
(XEN)  Found 1 EDD information structures
(XEN) EFI RAM map:
(XEN)  0000000000000000 - 0000000000058000 (usable)
(XEN)  0000000000058000 - 0000000000059000 (reserved)
(XEN)  0000000000059000 - 000000000009f000 (usable)
(XEN)  000000000009f000 - 00000000000a0000 (reserved)
(XEN)  0000000000100000 - 000000008648a000 (usable)
(XEN)  000000008648a000 - 000000008648b000 (ACPI NVS)
(XEN)  000000008648b000 - 00000000864b5000 (reserved)
(XEN)  00000000864b5000 - 000000008c224000 (usable)
(XEN)  000000008c224000 - 000000008c528000 (reserved)
(XEN)  000000008c528000 - 000000008c736000 (usable)
(XEN)  000000008c736000 - 000000008cea7000 (ACPI NVS)
(XEN)  000000008cea7000 - 000000008d2ff000 (reserved)
(XEN)  000000008d2ff000 - 000000008d300000 (usable)
(XEN)  000000008d300000 - 000000008d400000 (reserved)
(XEN)  00000000e0000000 - 00000000f0000000 (reserved)
(XEN)  00000000fe000000 - 00000000fe011000 (reserved)
(XEN)  00000000fec00000 - 00000000fec01000 (reserved)
(XEN)  00000000fee00000 - 00000000fee01000 (reserved)
(XEN)  00000000ff000000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 000000016e000000 (usable)
(XEN) ACPI: RSDP 8CE49000, 0024 (r2 ALASKA)
(XEN) ACPI: XSDT 8CE490A8, 00CC (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FACP 8CE6C370, 010C (r5 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DSDT 8CE49208, 23167 (r2 ALASKA   A M I   1072009 INTL 20120913)
(XEN) ACPI: FACS 8CE8EF80, 0040
(XEN) ACPI: APIC 8CE6C480, 0084 (r3 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FPDT 8CE6C508, 0044 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FIDT 8CE6C550, 009C (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: MCFG 8CE6C5F0, 003C (r1 ALASKA   A M I   1072009 MSFT       97)
(XEN) ACPI: HPET 8CE6C630, 0038 (r1 ALASKA   A M I   1072009 AMI.    5000B)
(XEN) ACPI: LPIT 8CE6C668, 0094 (r1 INTEL   SKL-ULT        0 MSFT       5F)
(XEN) ACPI: SSDT 8CE6C700, 0248 (r2 INTEL  sensrhub        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE6C948, 2BAE (r2 INTEL  PtidDevc     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE6F4F8, 0BE3 (r2 INTEL  Ther_Rvp     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE700E0, 04A3 (r2 INTEL     zpodd     1000 INTL 20120913)
(XEN) ACPI: DBGP 8CE70588, 0034 (r1 INTEL                  0 MSFT       5F)
(XEN) ACPI: DBG2 8CE705C0, 0054 (r0 INTEL                  0 MSFT       5F)
(XEN) ACPI: SSDT 8CE70618, 06E9 (r2  INTEL xh_rvp07        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE70D08, 547E (r2 SaSsdt  SaSsdt      3000 INTL 20120913)
(XEN) ACPI: UEFI 8CE76188, 0042 (r1                        0             0)
(XEN) ACPI: SSDT 8CE761D0, 0E73 (r2 CpuRef  CpuSsdt     3000 INTL 20120913)
(XEN) ACPI: BGRT 8CE77048, 0038 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DMAR 8CE77080, 00A8 (r1 INTEL      SKL         1 INTL        1)
(XEN) ACPI: TPM2 8CE77128, 0034 (r3        Tpm2Tabl        1 AMI         0)
(XEN) ACPI: ASF! 8CE77160, 00A5 (r32 INTEL       HCG        1 TFSM    F4240)
(XEN) System RAM: 4003MB (4099736kB)
(XEN) Domain heap initialised
(XEN) ACPI: 32/64X FACS address mismatch in FADT - 8ce8ef80/0000000000000000, using 32
(XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
(XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
(XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved memory; need "iommu_inclusive_mapping=1"?
(XEN) Switched to APIC driver x2apic_cluster.
(XEN) xstate: size: 0x440 and states: 0x1f
(XEN) Speculative mitigation facilities:
(XEN)   Hardware features:
(XEN)   Compiled-in support: SHADOW_PAGING
(XEN)   Xen settings: BTI-Thunk N/A, SPEC_CTRL: No, Other:
(XEN)   L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 39, Safe address 8000000000
(XEN)   Support for HVM VMs: RSB EAGER_FPU
(XEN)   Support for PV VMs: RSB EAGER_FPU
(XEN)   XPTI (64-bit PV only): Dom0 enabled, DomU enabled (with PCID)
(XEN)   PV L1TF shadowing: Dom0 disabled, DomU enabled
(XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) Initializing Credit2 scheduler
(XEN) Platform timer is 23.999MHz HPET
(XEN) Detected 2496.110 MHz processor.
(XEN) Initing memory sharing.
(XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d Snoop Control not enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) Intel VT-d Posted Interrupt not enabled.
(XEN) Intel VT-d Shared EPT tables enabled.
(XEN) I/O virtualisation enabled
(XEN)  - Dom0 mode: Relaxed
(XEN) Interrupt remapping enabled
(XEN) Enabled directed EOI with ioapic_ack_old on!
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using old ACK method
(XEN) TSC_DEADLINE disabled due to Errata; please update microcode to version 0xb2 (or later)
(XEN) Allocated console ring of 16 KiB.
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) VMX: Supported advanced features:
(XEN)  - APIC MMIO access virtualisation
(XEN)  - APIC TPR shadow
(XEN)  - Extended Page Tables (EPT)
(XEN)  - Virtual-Processor Identifiers (VPID)
(XEN)  - Virtual NMI
(XEN)  - MSR direct-access bitmap
(XEN)  - Unrestricted Guest
(XEN)  - VMCS shadowing
(XEN)  - VM Functions
(XEN)  - Virtualisation Exceptions
(XEN)  - Page Modification Logging
(XEN) HVM: ASIDs enabled.
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging (HAP) detected
(XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) Brought up 2 CPUs
(XEN) Dom0 has maximum 312 PIRQs
(XEN)  Xen  kernel: 64-bit, lsb, compat32
(XEN)  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x2a2c000
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000164000000->0000000168000000 (245760 pages to be allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: ffffffff81000000->ffffffff82a2c000
(XEN)  Init. ramdisk: 0000000000000000->0000000000000000
(XEN)  Phys-Mach map: 0000008000000000->0000008000200000
(XEN)  Start info:    ffffffff82a2c000->ffffffff82a2c4b4
(XEN)  Xenstore ring: 0000000000000000->0000000000000000
(XEN)  Console ring:  0000000000000000->0000000000000000
(XEN)  Page tables:   ffffffff82a2d000->ffffffff82a46000
(XEN)  Boot stack:    ffffffff82a46000->ffffffff82a47000
(XEN)  TOTAL:         ffffffff80000000->ffffffff82c00000
(XEN)  ENTRY ADDRESS: ffffffff826aa180
(XEN) Dom0 has maximum 1 VCPUs
(XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Scrubbing Free RAM in background
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
(XEN) Freed 480kB init memory
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr 8e480000, iommu reg = ffff82c00021d000
(XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
(XEN) [VT-D]INTR-REMAP: Request device [0000:f0:1f.0] fault index 0, iommu reg = ffff82c00021f000
(XEN) [VT-D]INTR-REMAP: reason 22 - Present field in the IRTE entry is clear
mapping kernel into physical memory
about to get started...
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr 8e480000, iommu reg = ffff82c00021d000
(XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr 8e4a7000, iommu reg = ffff82c00021d000
(XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr 8e4c2000, iommu reg = ffff82c00021d000
(XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
[    0.000000] Linux version 4.19.5-linuxkit (root@48efbd0309a6) (gcc version 6.3.0 (Alpine 6.3.0)) #1 SMP Mon Jun 17 17:43:29 UTC 2019
[    0.000000] Command line: console=hvc0 earlyprintk=xen rootdelay=3 root=PARTUUID=61ff5ba4-aea3-4c21-a11c-b899a6a88def text
[    0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
[    0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
[    0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
[    0.000000] x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
[    0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format.
[    0.000000] Released 0 page(s)
[    0.000000] BIOS-provided physical RAM map:
[    0.000000] Xen: [mem 0x0000000000000000-0x0000000000057fff] usable
[    0.000000] Xen: [mem 0x0000000000058000-0x0000000000058fff] reserved
[    0.000000] Xen: [mem 0x0000000000059000-0x000000000009efff] usable
[    0.000000] Xen: [mem 0x000000000009f000-0x00000000000fffff] reserved
[    0.000000] Xen: [mem 0x0000000000100000-0x0000000040061fff] usable
[    0.000000] Xen: [mem 0x0000000040062000-0x0000000086489fff] unusable
[    0.000000] Xen: [mem 0x000000008648a000-0x000000008648afff] ACPI NVS
[    0.000000] Xen: [mem 0x000000008648b000-0x00000000864b4fff] reserved
[    0.000000] Xen: [mem 0x00000000864b5000-0x000000008c223fff] unusable
[    0.000000] Xen: [mem 0x000000008c224000-0x000000008c527fff] reserved
[    0.000000] Xen: [mem 0x000000008c528000-0x000000008c735fff] unusable
[    0.000000] Xen: [mem 0x000000008c736000-0x000000008cea6fff] ACPI NVS
[    0.000000] Xen: [mem 0x000000008cea7000-0x000000008d2fefff] reserved
[    0.000000] Xen: [mem 0x000000008d2ff000-0x000000008d2fffff] unusable
[    0.000000] Xen: [mem 0x000000008d300000-0x000000008d3fffff] reserved
[    0.000000] Xen: [mem 0x00000000e0000000-0x00000000efffffff] reserved
[    0.000000] Xen: [mem 0x00000000fe000000-0x00000000fe010fff] reserved
[    0.000000] Xen: [mem 0x00000000fec00000-0x00000000fec00fff] reserved
[    0.000000] Xen: [mem 0x00000000fed90000-0x00000000fed91fff] reserved
[    0.000000] Xen: [mem 0x00000000fee00000-0x00000000feefffff] reserved
[    0.000000] Xen: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
[    0.000000] Xen: [mem 0x0000000100000000-0x000000016dffffff] unusable
[    0.000000] NX (Execute Disable) protection: active
[    0.000000] efi: EFI v2.40 by American Megatrends
[    0.000000] efi:  ESRT=0x8d29c098  ACPI=0x8ce49000  ACPI 2.0=0x8ce49000  SMBIOS=0xf05e0  SMBIOS 3.0=0xf0600  MPS=0xfc9c0
[    0.000000] SMBIOS 3.0.0 present.
[    0.000000] DMI:  /, BIOS 5.11 06/12/2017
[    0.000000] Hypervisor detected: Xen PV
[    0.000650] tsc: Detected 2496.110 MHz processor
[    0.010731] last_pfn = 0x40062 max_arch_pfn = 0x400000000
[    0.010732] Disabled
[    0.010734] x86/PAT: MTRRs disabled, skipping PAT initialization too.
[    0.010737] x86/PAT: Configuration [0-7]: WB  WT  UC- UC  WC  WP  UC  UC
[    0.010767] Kernel/User page tables isolation: disabled on XEN PV.
[    0.185995] Secure boot disabled
[    0.186009] ACPI: Early table checksum verification disabled
[    0.186016] ACPI: RSDP 0x000000008CE49000 000024 (v02 ALASKA)
[    0.186024] ACPI: XSDT 0x000000008CE490A8 0000CC (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.186055] ACPI: FACP 0x000000008CE6C370 00010C (v05 ALASKA A M I    01072009 AMI  00010013)
[    0.186110] ACPI: DSDT 0x000000008CE49208 023167 (v02 ALASKA A M I    01072009 INTL 20120913)
[    0.186121] ACPI: FACS 0x000000008CE8EF80 000040
[    0.186133] ACPI: APIC 0x000000008CE6C480 000084 (v03 ALASKA A M I    01072009 AMI  00010013)
[    0.186144] ACPI: FPDT 0x000000008CE6C508 000044 (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.186156] ACPI: FIDT 0x000000008CE6C550 00009C (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.186167] ACPI: MCFG 0x000000008CE6C5F0 00003C (v01 ALASKA A M I    01072009 MSFT 00000097)
[    0.186179] ACPI: HPET 0x000000008CE6C630 000038 (v01 ALASKA A M I    01072009 AMI. 0005000B)
[    0.186190] ACPI: LPIT 0x000000008CE6C668 000094 (v01 INTEL  SKL-ULT  00000000 MSFT 0000005F)
[    0.186202] ACPI: SSDT 0x000000008CE6C700 000248 (v02 INTEL  sensrhub 00000000 INTL 20120913)
[    0.186213] ACPI: SSDT 0x000000008CE6C948 002BAE (v02 INTEL  PtidDevc 00001000 INTL 20120913)
[    0.186225] ACPI: SSDT 0x000000008CE6F4F8 000BE3 (v02 INTEL  Ther_Rvp 00001000 INTL 20120913)
[    0.186236] ACPI: SSDT 0x000000008CE700E0 0004A3 (v02 INTEL  zpodd    00001000 INTL 20120913)
[    0.186248] ACPI: DBGP 0x000000008CE70588 000034 (v01 INTEL           00000000 MSFT 0000005F)
[    0.186259] ACPI: DBG2 0x000000008CE705C0 000054 (v00 INTEL           00000000 MSFT 0000005F)
[    0.186271] ACPI: SSDT 0x000000008CE70618 0006E9 (v02 INTEL  xh_rvp07 00000000 INTL 20120913)
[    0.186282] ACPI: SSDT 0x000000008CE70D08 00547E (v02 SaSsdt SaSsdt   00003000 INTL 20120913)
[    0.186294] ACPI: UEFI 0x000000008CE76188 000042 (v01                 00000000      00000000)
[    0.186326] ACPI: SSDT 0x000000008CE761D0 000E73 (v02 CpuRef CpuSsdt  00003000 INTL 20120913)
[    0.186337] ACPI: BGRT 0x000000008CE77048 000038 (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.186349] ACPI: RMAD 0x000000008CE77080 0000A8 (v01 INTEL  SKL      00000001 INTL 00000001)
[    0.186361] ACPI: TPM2 0x000000008CE77128 000034 (v03        Tpm2Tabl 00000001 AMI  00000000)
[    0.186372] ACPI: ASF! 0x000000008CE77160 0000A5 (v32 INTEL   HCG     00000001 TFSM 000F4240)
[    0.186403] Setting APIC routing to Xen PV.
[    0.190091] Zone ranges:
[    0.190093]   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
[    0.190095]   DMA32    [mem 0x0000000001000000-0x0000000040061fff]
[    0.190097]   Normal   empty
[    0.190098] Movable zone start for each node
[    0.190099] Early memory node ranges
[    0.190101]   node   0: [mem 0x0000000000001000-0x0000000000057fff]
[    0.190102]   node   0: [mem 0x0000000000059000-0x000000000009efff]
[    0.190103]   node   0: [mem 0x0000000000100000-0x0000000040061fff]
[    0.190689] Reserved but unavailable: 32769 pages
[    0.190691] Initmem setup node 0 [mem 0x0000000000001000-0x0000000040061fff]
[    0.195746] p2m virtual area at (____ptrval____), size is 40000000
[    0.300207] Remapped 98 page(s)
[    0.300250] Reserving Intel graphics memory at [mem 0x8e000000-0x8fffffff]
[    0.300600] ACPI: PM-Timer IO Port: 0x1808
[    0.300633] ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
[    0.300635] ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
[    0.300637] ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
[    0.300639] ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
[    0.300681] IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
[    0.300689] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
[    0.300693] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
[    0.300705] Using ACPI (MADT) for SMP configuration information
[    0.300710] ACPI: HPET id: 0x8086a701 base: 0xfed00000
[    0.300716] smpboot: Allowing 4 CPUs, 0 hotplug CPUs
[    0.300737] [mem 0x90000000-0xdfffffff] available for PCI devices
[    0.300741] Booting paravirtualized kernel on Xen
[    0.300742] Xen version: 4.12.0 (preserve-AD)
[    0.300744] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[    0.420237] random: get_random_bytes called from start_kernel+0x92/0x4be with crng_init=0
[    0.420246] setup_percpu: NR_CPUS:128 nr_cpumask_bits:128 nr_cpu_ids:4 nr_node_ids:1
[    0.420513] percpu: Embedded 45 pages/cpu @(____ptrval____) s143768 r8192 d32360 u524288
[    0.420571] Built 1 zonelists, mobility grouping on.  Total pages: 258024
[    0.420574] Kernel command line: console=hvc0 earlyprintk=xen rootdelay=3 root=PARTUUID=61ff5ba4-aea3-4c21-a11c-b899a6a88def text
[    0.420780] Dentry cache hash table entries: 131072 (order: 8, 1048576 bytes)
[    0.420854] Inode-cache hash table entries: 65536 (order: 7, 524288 bytes)
[    0.421002] x2apic disabled
[    0.451209] software IO TLB: mapped [mem 0x3a600000-0x3e600000] (64MB)
[    0.462426] Memory: 930940K/1048572K available (12300K kernel code, 1595K rwdata, 3068K rodata, 1584K init, 1952K bss, 117632K reserved, 0K cma-reserved)
[    0.462488] ftrace: allocating 43497 entries in 170 pages
[    0.480152] rcu: Hierarchical RCU implementation.
[    0.480154] rcu: 	RCU restricting CPUs from NR_CPUS=128 to nr_cpu_ids=1.
[    0.480156] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1
[    0.483362] Using NULL legacy PIC
[    0.483364] NR_IRQS: 8448, nr_irqs: 256, preallocated irqs: 0
[    0.483381] xen:events: Using FIFO-based ABI
[    0.483555] Console: colour dummy device 80x25
[    0.483732] console [tty0] enabled
[    0.484246] console [hvc0] enabled
[    0.484254] ACPI: Core revision 20180810
[    0.499592] ACPI BIOS Warning (bug): Incorrect checksum in table [BGRT] - 0x99, should be 0xAF (20180810/tbprint-177)
[    0.499685] clocksource: xen: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
[    0.499705] installing Xen timer for CPU 0
[    0.499791] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23fadf271f8, max_idle_ns: 440795328257 ns
[    0.499855] Calibrating delay loop (skipped), value calculated using timer frequency.. 4992.22 BogoMIPS (lpj=24961100)
[    0.499864] pid_max: default: 32768 minimum: 301
[    0.499941] Security Framework initialized
[    0.499946] Yama: becoming mindful.
[    0.499972] Mount-cache hash table entries: 2048 (order: 2, 16384 bytes)
[    0.499980] Mountpoint-cache hash table entries: 2048 (order: 2, 16384 bytes)
[    0.500263] Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
[    0.500269] Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
[    0.500275] Spectre V2 : Vulnerable: Minimal generic ASM retpoline
[    0.500280] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
[    0.500286] Speculative Store Bypass: Vulnerable
[    0.551920] Freeing SMP alternatives memory: 24K
[    0.553318] VPMU disabled by hypervisor.
[    0.553487] Performance Events: unsupported p6 CPU model 78 no PMU driver, software events only.
[    0.553554] rcu: Hierarchical SRCU implementation.
[    0.553715] NMI watchdog: Perf NMI watchdog permanently disabled
[    0.553808] smp: Bringing up secondary CPUs ...
[    0.553813] smp: Brought up 1 node, 1 CPU
[    0.553817] smpboot: Max logical packages: 1
[    0.553978] devtmpfs: initialized
[    0.554033] x86/mm: Memory block size: 128MB
[    0.554459] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[    0.554470] futex hash table entries: 256 (order: 2, 16384 bytes)
[    0.554668] NET: Registered protocol family 16
[    0.554689] xen:grant_table: Grant tables using version 1 layout
[    0.554705] Grant table initialized
[    0.554888] audit: initializing netlink subsys (disabled)
[    0.554988] audit: type=2000 audit(1563560595.862:1): state=initialized audit_enabled=0 res=1
[    0.555146] ACPI FADT declares the system doesn't support PCIe ASPM, so disable it
[    0.555154] ACPI: bus type PCI registered
[    0.555310] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000)
[    0.555319] PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820
[    0.612036] PCI: Using configuration type 1 for base access
[    0.614067] cryptd: max_cpu_qlen set to 1000
[    0.614235] ACPI: Added _OSI(Module Device)
[    0.614240] ACPI: Added _OSI(Processor Device)
[    0.614244] ACPI: Added _OSI(3.0 _SCP Extensions)
[    0.614249] ACPI: Added _OSI(Processor Aggregator Device)
[    0.614254] ACPI: Added _OSI(Linux-Dell-Video)
[    0.614258] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
[    0.663160] ACPI: 8 ACPI AML tables successfully acquired and loaded
[    0.669760] ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored
[    0.674867] ACPI: Dynamic OEM Table Load:
[    0.674879] ACPI: SSDT 0xFFFF88803A316400 00037F (v02 PmRef  Cpu0Cst  00003001 INTL 20120913)
[    0.675514] ACPI: Dynamic OEM Table Load:
[    0.675523] ACPI: SSDT 0xFFFF888039811800 00063F (v02 PmRef  Cpu0Ist  00003000 INTL 20120913)
[    0.677763] ACPI: EC: EC started
[    0.677769] ACPI: EC: interrupt blocked
[    0.677824] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as first EC
[    0.677829] ACPI: \_SB_.PCI0.LPCB.EC0_: GPE=0x50, EC_CMD/EC_SC=0x66, EC_DATA=0x62
[    0.677836] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as boot DSDT EC to handle transactions
[    0.677893] ACPI: Interpreter enabled
[    0.677905] ACPI: (supports S0 S5)
[    0.677909] ACPI: Using IOAPIC for interrupt routing
[    0.677981] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
[    0.679338] ACPI: Enabled 7 GPEs in block 00 to 7F
[    0.682660] ACPI: Power Resource [PG00] (on)
[    0.683113] ACPI: Power Resource [PG01] (on)
[    0.683590] ACPI: Power Resource [PG02] (on)
[    0.690421] ACPI: Power Resource [WRST] (on)
[    0.690875] ACPI: Power Resource [WRST] (on)
[    0.691324] ACPI: Power Resource [WRST] (on)
[    0.691832] ACPI: Power Resource [WRST] (on)
[    0.692286] ACPI: Power Resource [WRST] (on)
[    0.692739] ACPI: Power Resource [WRST] (on)
[    0.693227] ACPI: Power Resource [WRST] (on)
[    0.693696] ACPI: Power Resource [WRST] (on)
[    0.694144] ACPI: Power Resource [WRST] (on)
[    0.694650] ACPI: Power Resource [WRST] (on)
[    0.695139] ACPI: Power Resource [WRST] (on)
[    0.695571] ACPI: Power Resource [WRST] (on)
[    0.696071] ACPI: Power Resource [WRST] (on)
[    0.696519] ACPI: Power Resource [WRST] (on)
[    0.696974] ACPI: Power Resource [WRST] (on)
[    0.697481] ACPI: Power Resource [WRST] (on)
[    0.697934] ACPI: Power Resource [WRST] (on)
[    0.698387] ACPI: Power Resource [WRST] (on)
[    0.698895] ACPI: Power Resource [WRST] (on)
[    0.699348] ACPI: Power Resource [WRST] (on)
[    0.714901] ACPI: Power Resource [FN00] (off)
[    0.715016] ACPI: Power Resource [FN01] (off)
[    0.715126] ACPI: Power Resource [FN02] (off)
[    0.715235] ACPI: Power Resource [FN03] (off)
[    0.715403] ACPI: Power Resource [FN04] (off)
[    0.716997] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe])
[    0.717010] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI]
[    0.720281] acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME PCIeCapability LTR]
[    0.720289] acpi PNP0A08:00: FADT indicates ASPM is unsupported, using BIOS configuration
[    0.721013] PCI host bridge to bus 0000:00
[    0.721020] pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
[    0.721026] pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
[    0.721032] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
[    0.721038] pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window]
[    0.721044] pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window]
[    0.721051] pci_bus 0000:00: root bus resource [bus 00-fe]
(XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
[    0.721842] pci 0000:00:02.0: BAR 2: assigned to efifb
[    0.725291] pci 0000:00:1c.0: Intel SPT PCH root port ACS workaround enabled
[    0.725880] pci 0000:00:1c.5: Intel SPT PCH root port ACS workaround enabled
[    0.729944] pci 0000:00:1c.0: PCI bridge to [bus 01]
[    0.730772] pci 0000:02:00.0: 2.000 Gb/s available PCIe bandwidth, limited by 2.5 GT/s x1 link at 0000:00:1c.5 (capable of 7.876 Gb/s with 8 GT/s x1 link)
[    0.731038] pci 0000:00:1c.5: PCI bridge to [bus 02]
[    0.735588] ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.735680] ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 *10 11 12 14 15)
[    0.735770] ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.735855] ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.735943] ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.736084] ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.736173] ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.736263] ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.736980] ACPI: EC: interrupt unblocked
[    0.737020] ACPI: EC: event unblocked
[    0.737040] ACPI: \_SB_.PCI0.LPCB.EC0_: GPE=0x50, EC_CMD/EC_SC=0x66, EC_DATA=0x62
[    0.737072] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as boot DSDT EC to handle transactions and events
[    0.737125] xen:balloon: Initialising balloon driver
[    0.737271] SCSI subsystem initialized
[    0.737342] ACPI: bus type USB registered
[    0.737367] usbcore: registered new interface driver usbfs
[    0.737378] usbcore: registered new interface driver hub
[    0.737397] usbcore: registered new device driver usb
[    0.737465] pps_core: LinuxPPS API ver. 1 registered
[    0.737469] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
[    0.737478] PTP clock support registered
[    0.737517] Registered efivars operations
[    0.742462] PCI: Using ACPI for IRQ routing
[    0.782378] NetLabel: Initializing
[    0.782383] NetLabel:  domain hash size = 128
[    0.782387] NetLabel:  protocols = UNLABELED CIPSOv4 CALIPSO
[    0.782407] NetLabel:  unlabeled traffic allowed by default
[    0.782599] clocksource: Switched to clocksource tsc-early
[    0.797016] VFS: Disk quotas dquot_6.6.0
[    0.797016] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
[    0.797016] FS-Cache: Loaded
[    0.797016] hugetlbfs: disabling because there are no supported hugepage sizes
[    0.797016] CacheFiles: Loaded
[    0.797016] pnp: PnP ACPI init
[    0.797016] system 00:00: [io  0x0a00-0x0a2f] has been reserved
[    0.797016] Already setup the GSI :4
[    0.800874] system 00:05: [io  0x0200-0x027f] has been reserved
[    0.801739] system 00:06: [io  0x029c-0x029d] has been reserved
[    0.801988] system 00:07: [io  0x0680-0x069f] has been reserved
[    0.801995] system 00:07: [io  0xffff] has been reserved
[    0.802000] system 00:07: [io  0xffff] has been reserved
[    0.802005] system 00:07: [io  0xffff] has been reserved
[    0.802010] system 00:07: [io  0x1800-0x18fe] has been reserved
[    0.802016] system 00:07: [io  0x164e-0x164f] has been reserved
[    0.802214] system 00:09: [io  0x1854-0x1857] has been reserved
[    0.802593] system 00:0a: [mem 0xfed10000-0xfed17fff] has been reserved
[    0.802600] system 00:0a: [mem 0xfed18000-0xfed18fff] has been reserved
[    0.802606] system 00:0a: [mem 0xfed19000-0xfed19fff] has been reserved
[    0.802611] system 00:0a: [mem 0xe0000000-0xefffffff] has been reserved
[    0.802617] system 00:0a: [mem 0xfed20000-0xfed3ffff] has been reserved
[    0.802623] system 00:0a: [mem 0xfed90000-0xfed93fff] could not be reserved
[    0.802629] system 00:0a: [mem 0xfed45000-0xfed8ffff] has been reserved
[    0.802635] system 00:0a: [mem 0xff000000-0xffffffff] has been reserved
[    0.802640] system 00:0a: [mem 0xfee00000-0xfeefffff] has been reserved
[    0.802646] system 00:0a: [mem 0xdffe0000-0xdfffffff] has been reserved
[    0.802702] system 00:0b: [mem 0xfd000000-0xfdabffff] has been reserved
[    0.802708] system 00:0b: [mem 0xfdad0000-0xfdadffff] has been reserved
[    0.802714] system 00:0b: [mem 0xfdb00000-0xfdffffff] has been reserved
[    0.802720] system 00:0b: [mem 0xfe000000-0xfe01ffff] could not be reserved
[    0.802726] system 00:0b: [mem 0xfe036000-0xfe03bfff] has been reserved
[    0.802[    1.564072] loop: module loaded
[    1.566823] Invalid max_queues (4), will use default max: 1.
[    1.567332] VMware PVSCSI driver - version 1.0.7.0-k
[    1.567703] hv_vmbus: registering driver hv_storvsc
[    1.568474] Already setup the GSI :16
[    1.578986] ahci 0000:00:17.0: AHCI 0001.0301 32 slots 2 ports 6 Gbps 0x3 impl SATA mode
[    1.579604] ahci 0000:00:17.0: flags: 64bit ncq pm led clo only pio slum part deso sadm sds apst
[    1.580607] scsi host0: ahci
[    1.580896] scsi host1: ahci
[    1.581121] ata1: SATA max UDMA/133 abar m2048@0xdf44b000 port 0xdf44b100 irq 131
[    1.581636] ata2: SATA max UDMA/133 abar m2048@0xdf44b000 port 0xdf44b180 irq 131
[    1.582451] tun: Universal TUN/TAP device driver, 1.6
[    1.582832] VMware vmxnet3 virtual NIC driver - version 1.4.16.0-k-NAPI
[    1.583246] xen_netfront: Initialising Xen virtual ethernet driver
[    1.583609] hv_vmbus: registering driver hv_netvsc
[    1.583875] Fusion MPT base driver 3.04.20
[    1.584093] Copyright (c) 1999-2008 LSI Corporation
[    1.584382] Fusion MPT SPI Host driver 3.04.20
[    1.601974] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
[    1.619637] ehci-pci: EHCI PCI platform driver
[    1.637197] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
[    1.654944] ohci-pci: OHCI PCI platform driver
[    1.672711] uhci_hcd: USB Universal Host Controller Interface driver
[    1.690701] Already setup the GSI :16
[    1.708576] xhci_hcd 0000:00:14.0: xHCI Host Controller
[    1.726427] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1
[    1.745275] xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000001109810
[    1.763814] hub 1-0:1.0: USB hub found
[    1.781925] hub 1-0:1.0: 12 ports detected
[    1.801124] xhci_hcd 0000:00:14.0: xHCI Host Controller
[    1.819359] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2
[    1.837735] xhci_hcd 0000:00:14.0: Host supports USB 3.0  SuperSpeed
[    1.856300] hub 2-0:1.0: USB hub found
[    1.874784] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23fadf271f8, max_idle_ns: 440795328257 ns
[    1.893722] hub 2-0:1.0: 6 ports detected
[    1.912555] clocksource: Switched to clocksource tsc
[    1.931793] usb: port power management may be unreliable
[    1.950793] ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
[    1.970409] usbcore: registered new interface driver usb-storage
[    1.988239] i8042: PNP: No PS/2 controller found.
[    2.007193] i8042: Probing ports directly.
[    2.027431] ata1.00: ATA-9: SQF-S25M8-64G-SAC, SAFM02A3, max UDMA/133
[    2.046472] ata1.00: 125045424 sectors, multi 16: LBA48 NCQ (depth 32), AA
[    2.065612] ata2: SATA link down (SStatus 4 SControl 300)
[    2.087573] ata1.00: configured for UDMA/133
[    2.106456] scsi 0:0:0:0: Direct-Access     ATA      SQF-S25M8-64G-SA 02A3 PQ: 0 ANSI: 5
[    2.127984] serio: i8042 KBD port at 0x60,0x64 irq 1
[    2.145455] sd 0:0:0:0: Attached scsi generic sg0 type 0
[    2.164105] sd 0:0:0:0: [sda] 125045424 512-byte logical blocks: (64.0 GB/59.6 GiB)
[    2.182878] serio: i8042 AUX port at 0x60,0x64 irq 12
[    2.201550] sd 0:0:0:0: [sda] Write Protect is off
[    2.220189] hv_vmbus: registering driver hyperv_keyboard
[    2.238762] usb 1-1: new low-speed USB device number 2 using xhci_hcd
[    2.257476] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
[    2.276517] mousedev: PS/2 mouse device common for all mice
[    2.295904] input: PC Speaker as /devices/platform/pcspkr/input/input4
[    2.312397] rtc_cmos 00:08: RTC can wake from S4
[    2.332272] rtc_cmos 00:08: registered as rtc0
[    2.349780] rtc_cmos 00:08: alarms up to one month, y3k, 242 bytes nvram
[    2.367656] i2c /dev entries driver
[    2.384264] device-mapper: ioctl: 4.39.0-ioctl (2018-04-03) initialised: dm-devel@redhat.com
[    2.402582]  sda: sda1 sda2 sda3 sda4 sda9
[    2.422233] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input3
[    2.442164] sdhci: Secure Digital Host Controller Interface driver
[    2.461853] sdhci: Copyright(c) Pierre Ossman
[    2.481529] sd 0:0:0:0: [sda] Attached SCSI disk
[    2.501277] sdhci-pltfm: SDHCI platform and OF driver helper
[    2.522079] EFI Variables Facility v0.08 2004-May-17
[    2.547129] pstore: Registered efi as persistent store backend
[    2.565338] usbcore: registered new interface driver usbhid
[    2.583396] usbhid: USB HID core driver
[    2.602612] hv_utils: Registering HyperV Utility Driver
[    2.620274] hv_vmbus: registering driver hv_util
[    2.639426] hv_vmbus: registering driver hv_balloon
[    2.657942] oprofile: using NMI timer interrupt.
[    2.675328] GACT probability on
[    2.692398] Mirror/redirect action on
[    2.709287] Simple TC action Loaded
[    2.726194] u32 classifier
[    2.742839]     Performance counters on
[    2.760895]     input device check on
[    2.778755]     Actions configured
[    2.796668] xt_time: kernel timezone is -0000
[    2.813176] IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP)
[    2.829862] input: Logitech USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.0/0003:046D:C31C.0001/input/input6
[    2.847239] IPVS: Connection hash table configured (size=4096, memory=64Kbytes)
[    2.865987] IPVS: ipvs loaded.
[    2.884178] IPVS: [rr] scheduler registered.
[    2.902401] IPVS: [wrr] scheduler registered.
[    2.920549] IPVS: [lc] scheduler registered.
[    2.938691] hid-generic 0003:046D:C31C.0001: input: USB HID v1.10 Keyboard [Logitech USB Keyboard] on usb-0000:00:14.0-1/input0
[    2.957618] IPVS: [wlc] scheduler registered.
[    2.976096] IPVS: [fo] scheduler registered.
[    2.993312] IPVS: [ovf] scheduler registered.
[    3.010342] IPVS: [lblc] scheduler registered.
[    3.027529] input: Logitech USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.1/0003:046D:C31C.0002/input/input7
[    3.047094] IPVS: [lblcr] scheduler registered.
[    3.066194] IPVS: [dh] scheduler registered.
[    3.084943] IPVS: [sh] scheduler registered.
[    3.103170] random: fast init done
[    3.121393] IPVS: [sed] scheduler registered.
[    3.139655] input: Logitech USB Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.1/0003:046D:C31C.0002/input/input8
[    3.158999] IPVS: [nq] scheduler registered.
[    3.177948] hid-generic 0003:046D:C31C.0002: input: USB HID v1.10 Device [Logitech USB Keyboard] on usb-0000:00:14.0-1/input1
[    3.197663] IPVS: ftp: loaded support on port[0] = 21
[    3.217485] ipip: IPv4 and MPLS over IPv4 tunneling driver
[    3.237175] gre: GRE over IPv4 demultiplexor driver
[    3.256792] ipt_CLUSTERIP: ClusterIP Version 0.8 loaded successfully
[    3.275692] Initializing XFRM netlink socket
[    3.295241] NET: Registered protocol family 10
[    3.314803] Segment Routing with IPv6
[    3.334129] NET: Registered protocol family 17
[    3.353348] NET: Registered protocol family 15
[    3.372242] usb 1-7: new full-speed USB device number 3 using xhci_hcd
[    3.391270] Bridge firewalling registered
[    3.410246] 8021q: 802.1Q VLAN Support v1.8
[    3.427810] 9pnet: Installing 9P2000 support
[    3.446585] Key type dns_resolver registered
[    3.465191] AVX2 version of gcm_enc/dec engaged.
[    3.483487] AES CTR mode by8 optimization enabled
[    3.500910] sched_clock: Marking stable (3483979482, 16324393)->(3503290016, -2986141)
[    3.519617] registered taskstats version 1
[    3.538042] Loading compiled-in X.509 certificates
[    3.556785] Key type big_key registered
[    3.575347] Key type encrypted registered
[    3.594520] rtc_cmos 00:08: setting system clock to 2019-07-19 18:23:19 UTC (1563560599)
[    3.613104] Waiting 3 sec before mounting root device...
(XEN) printk: 468662 messages suppressed.
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr 8e28e000, iommu reg = ffff82c00021d000
[    6.665507] VFS: Mounted root (squashfs filesystem) readonly on device 8:2.
[    6.687907] Freeing unused kernel image memory: 1584K
[    6.719850] Write protecting the kernel read-only data: 18432k
[    6.749182] Freeing unused kernel image memory: 2020K
[    6.767889] Freeing unused kernel image memory: 1028K
[    6.785848] Run /sbin/init as init process
[    7.437605] e1000e: Intel(R) PRO/1000 Network Driver - 3.2.6-k
[    7.455673] e1000e: Copyright(c) 1999 - 2015 Intel Corporation.
[    7.474472] Already setup the GSI :16
[    7.492454] e1000e 0000:00:1f.6: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode
[    7.616061] e1000e 0000:00:1f.6 0000:00:1f.6 (uninitialized): registered PHC clock
[    7.728226] e1000e 0000:00:1f.6 eth0: (PCI Express:2.5GT/s:Width x1) 00:0b:ab:e4:d0:c5
[    7.749916] e1000e 0000:00:1f.6 eth0: Intel(R) PRO/1000 Network Connection
[    7.770331] e1000e 0000:00:1f.6 eth0: MAC: 12, PHY: 12, PBA No: FFFFFF-0FF
[    7.819315] cfg80211: Loading compiled-in X.509 certificates for regulatory database
[    7.847519] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
[    7.867315] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
[    7.887520] cfg80211: failed to load regulatory.db
[    7.957347] rtl8723be 0000:01:00.0: enabling device (0000 -> 0003)
[    7.977972] Already setup the GSI :18
[    8.028399] rtl8723be: Using firmware rtlwifi/rtl8723befw_36.bin
[    8.051007] rtlwifi: rtlwifi: wireless switch is on
[    8.087872] igb: Intel(R) Gigabit Ethernet Network Driver - version 5.4.0-k
[    8.107370] igb: Copyright (c) 2007-2014 Intel Corporation.
[    8.127415] Already setup the GSI :17
[    8.176736] pps pps0: new PPS source ptp1
[    8.207141] igb 0000:02:00.0: added PHC on eth1
[    8.226651] igb 0000:02:00.0: Intel(R) Gigabit Ethernet Network Connection
[    8.245906] igb 0000:02:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:0b:ab:e4:d0:c6
[    8.265019] igb 0000:02:00.0: eth1: PBA No: 000200-000
[    8.283946] igb 0000:02:00.0: Using MSI-X interrupts. 1 rx queue(s), 1 tx queue(s)

[-- Attachment #3: Type: text/plain, Size: 157 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-19 19:31 [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx Roman Shaposhnik
@ 2019-07-19 20:02 ` Roman Shaposhnik
  2019-07-22  8:20   ` Paul Durrant
  2019-07-20 16:39 ` Andrew Cooper
  2019-07-24 17:42 ` Rich Persaud
  2 siblings, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-19 20:02 UTC (permalink / raw)
  To: xen-devel; +Cc: jgross, andrew.cooper3, boris.ostrovsky, paul.durrant, jbeulich

CCing relevant maintainers as well (sorry for not doing it first time around)

On Fri, Jul 19, 2019 at 12:31 PM Roman Shaposhnik <roman@zededa.com> wrote:
>
> Hi!
>
> we're using Xen on Advantech ARK-2250 Embedded Box PC:
>     https://www.elmark.com.pl/web/uploaded/karty_produktow/advantech/ark-2250l/ark-2250l_instrukcja-uzytkownika.pdf
>
> After upgrading to Xen 4.12.0 from 4.11.0 we now have to utilize  iommu=no-igfx
> workaround as per:
>      https://xenbits.xen.org/docs/unstable/misc/xen-command-line.html#iommu
>
> Without the workaround the screen appears to be garbled with colored
> static noise and the following message keeps showing up:
> (XEN) printk: 26235 messages suppressed.
> (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
> 8e43c000, iommu reg = ffff82c00021d000
> (XEN) printk: 26303 messages suppressed.
> (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
> 8e2c6000, iommu reg = ffff82c00021d000
>
> Once iommu=no-igfx is applied the box can boot fine.
>
> At the end of this email, you can see a full log of the box booting
> all the way into Dom0 with iommu=no-igfx applied. I am also attaching
> similar log without no-igfx
>
> Please let me know if you need any more information to help us diagnose this.
>
> Thanks,
> Roman.
>
> 0x0000:0x00:0x02.0x0: ROM: 0x10000 bytes at 0x8968d018
> 0x0000:0x02:0x00.0x0: ROM: 0x10000 bytes at 0x89640018
> 0x0000:0x00:0x1f.0x6: ROM: 0x10c00 bytes at 0x8962f018
>  Xen 4.12.0
> (XEN) Xen version 4.12.0 (@) (gcc (Alpine 6.4.0) 6.4.0) debug=n  Mon
> Jun 17 18:50:07 UTC 2019
> (XEN) Latest ChangeSet:
> (XEN) Bootloader: GRUB 2.03
> (XEN) Command line: iommu=no-igfx com1=115200,8n1 console=com1,vga
> dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=false
> (XEN) Xen image load base address: 0x88600000
> (XEN) Video information:
> (XEN)  VGA is graphics mode 1680x1050, 32 bpp
> (XEN) Disc information:
> (XEN)  Found 0 MBR signatures
> (XEN)  Found 1 EDD information structures
> (XEN) EFI RAM map:
> (XEN)  0000000000000000 - 0000000000058000 (usable)
> (XEN)  0000000000058000 - 0000000000059000 (reserved)
> (XEN)  0000000000059000 - 000000000009f000 (usable)
> (XEN)  000000000009f000 - 00000000000a0000 (reserved)
> (XEN)  0000000000100000 - 000000008648a000 (usable)
> (XEN)  000000008648a000 - 000000008648b000 (ACPI NVS)
> (XEN)  000000008648b000 - 00000000864b5000 (reserved)
> (XEN)  00000000864b5000 - 000000008c224000 (usable)
> (XEN)  000000008c224000 - 000000008c528000 (reserved)
> (XEN)  000000008c528000 - 000000008c736000 (usable)
> (XEN)  000000008c736000 - 000000008cea7000 (ACPI NVS)
> (XEN)  000000008cea7000 - 000000008d2ff000 (reserved)
> (XEN)  000000008d2ff000 - 000000008d300000 (usable)
> (XEN)  000000008d300000 - 000000008d400000 (reserved)
> (XEN)  00000000e0000000 - 00000000f0000000 (reserved)
> (XEN)  00000000fe000000 - 00000000fe011000 (reserved)
> (XEN)  00000000fec00000 - 00000000fec01000 (reserved)
> (XEN)  00000000fee00000 - 00000000fee01000 (reserved)
> (XEN)  00000000ff000000 - 0000000100000000 (reserved)
> (XEN)  0000000100000000 - 000000016e000000 (usable)
> (XEN) ACPI: RSDP 8CE49000, 0024 (r2 ALASKA)
> (XEN) ACPI: XSDT 8CE490A8, 00CC (r1 ALASKA   A M I   1072009 AMI     10013)
> (XEN) ACPI: FACP 8CE6C370, 010C (r5 ALASKA   A M I   1072009 AMI     10013)
> (XEN) ACPI: DSDT 8CE49208, 23167 (r2 ALASKA   A M I   1072009 INTL 20120913)
> (XEN) ACPI: FACS 8CE8EF80, 0040
> (XEN) ACPI: APIC 8CE6C480, 0084 (r3 ALASKA   A M I   1072009 AMI     10013)
> (XEN) ACPI: FPDT 8CE6C508, 0044 (r1 ALASKA   A M I   1072009 AMI     10013)
> (XEN) ACPI: FIDT 8CE6C550, 009C (r1 ALASKA   A M I   1072009 AMI     10013)
> (XEN) ACPI: MCFG 8CE6C5F0, 003C (r1 ALASKA   A M I   1072009 MSFT       97)
> (XEN) ACPI: HPET 8CE6C630, 0038 (r1 ALASKA   A M I   1072009 AMI.    5000B)
> (XEN) ACPI: LPIT 8CE6C668, 0094 (r1 INTEL   SKL-ULT        0 MSFT       5F)
> (XEN) ACPI: SSDT 8CE6C700, 0248 (r2 INTEL  sensrhub        0 INTL 20120913)
> (XEN) ACPI: SSDT 8CE6C948, 2BAE (r2 INTEL  PtidDevc     1000 INTL 20120913)
> (XEN) ACPI: SSDT 8CE6F4F8, 0BE3 (r2 INTEL  Ther_Rvp     1000 INTL 20120913)
> (XEN) ACPI: SSDT 8CE700E0, 04A3 (r2 INTEL     zpodd     1000 INTL 20120913)
> (XEN) ACPI: DBGP 8CE70588, 0034 (r1 INTEL                  0 MSFT       5F)
> (XEN) ACPI: DBG2 8CE705C0, 0054 (r0 INTEL                  0 MSFT       5F)
> (XEN) ACPI: SSDT 8CE70618, 06E9 (r2  INTEL xh_rvp07        0 INTL 20120913)
> (XEN) ACPI: SSDT 8CE70D08, 547E (r2 SaSsdt  SaSsdt      3000 INTL 20120913)
> (XEN) ACPI: UEFI 8CE76188, 0042 (r1                        0             0)
> (XEN) ACPI: SSDT 8CE761D0, 0E73 (r2 CpuRef  CpuSsdt     3000 INTL 20120913)
> (XEN) ACPI: BGRT 8CE77048, 0038 (r1 ALASKA   A M I   1072009 AMI     10013)
> (XEN) ACPI: DMAR 8CE77080, 00A8 (r1 INTEL      SKL         1 INTL        1)
> (XEN) ACPI: TPM2 8CE77128, 0034 (r3        Tpm2Tabl        1 AMI         0)
> (XEN) ACPI: ASF! 8CE77160, 00A5 (r32 INTEL       HCG        1 TFSM    F4240)
> (XEN) System RAM: 4003MB (4099736kB)
> (XEN) Domain heap initialised
> (XEN) ACPI: 32/64X FACS address mismatch in FADT -
> 8ce8ef80/0000000000000000, using 32
> (XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
> (XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
> (XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved
> memory; need "iommu_inclusive_mapping=1"?
> (XEN) Switched to APIC driver x2apic_cluster.
> (XEN) xstate: size: 0x440 and states: 0x1f
> (XEN) Speculative mitigation facilities:
> (XEN)   Hardware features:
> (XEN)   Compiled-in support: SHADOW_PAGING
> (XEN)   Xen settings: BTI-Thunk N/A, SPEC_CTRL: No, Other:
> (XEN)   L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 39, Safe
> address 8000000000
> (XEN)   Support for HVM VMs: RSB EAGER_FPU
> (XEN)   Support for PV VMs: RSB EAGER_FPU
> (XEN)   XPTI (64-bit PV only): Dom0 enabled, DomU enabled (with PCID)
> (XEN)   PV L1TF shadowing: Dom0 disabled, DomU enabled
> (XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2)
> (XEN) Initializing Credit2 scheduler
> (XEN) Platform timer is 23.999MHz HPET
> (XEN) Detected 2496.011 MHz processor.
> (XEN) Initing memory sharing.
> (XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB.
> (XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB.
> (XEN) Intel VT-d Snoop Control not enabled.
> (XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
> (XEN) Intel VT-d Queued Invalidation enabled.
> (XEN) Intel VT-d Interrupt Remapping enabled.
> (XEN) Intel VT-d Posted Interrupt not enabled.
> (XEN) Intel VT-d Shared EPT tables enabled.
> (XEN) I/O virtualisation enabled
> (XEN)  - Dom0 mode: Relaxed
> (XEN) Interrupt remapping enabled
> (XEN) Enabled directed EOI with ioapic_ack_old on!
> (XEN) ENABLING IO-APIC IRQs
> (XEN)  -> Using old ACK method
> (XEN) TSC_DEADLINE disabled due to Errata; please update microcode to
> version 0xb2 (or later)
> (XEN) Allocated console ring of 16 KiB.
> (XEN) mwait-idle: max C-state count of 8 reached
> (XEN) VMX: Supported advanced features:
> (XEN)  - APIC MMIO access virtualisation
> (XEN)  - APIC TPR shadow
> (XEN)  - Extended Page Tables (EPT)
> (XEN)  - Virtual-Processor Identifiers (VPID)
> (XEN)  - Virtual NMI
> (XEN)  - MSR direct-access bitmap
> (XEN)  - Unrestricted Guest
> (XEN)  - VMCS shadowing
> (XEN)  - VM Functions
> (XEN)  - Virtualisation Exceptions
> (XEN)  - Page Modification Logging
> (XEN) HVM: ASIDs enabled.
> (XEN) HVM: VMX enabled
> (XEN) HVM: Hardware Assisted Paging (HAP) detected
> (XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB
> (XEN) mwait-idle: max C-state count of 8 reached
> (XEN) mwait-idle: max C-state count of 8 reached
> (XEN) mwait-idle: max C-state count of 8 reached
> (XEN) Brought up 2 CPUs
> (XEN) Dom0 has maximum 312 PIRQs
> (XEN)  Xen  kernel: 64-bit, lsb, compat32
> (XEN)  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x2a2c000
> (XEN) PHYSICAL MEMORY ARRANGEMENT:
> (XEN)  Dom0 alloc.:   0000000164000000->0000000168000000 (245760 pages
> to be allocated)
> (XEN) VIRTUAL MEMORY ARRANGEMENT:
> (XEN)  Loaded kernel: ffffffff81000000->ffffffff82a2c000
> (XEN)  Init. ramdisk: 0000000000000000->0000000000000000
> (XEN)  Phys-Mach map: 0000008000000000->0000008000200000
> (XEN)  Start info:    ffffffff82a2c000->ffffffff82a2c4b4
> (XEN)  Xenstore ring: 0000000000000000->0000000000000000
> (XEN)  Console ring:  0000000000000000->0000000000000000
> (XEN)  Page tables:   ffffffff82a2d000->ffffffff82a46000
> (XEN)  Boot stack:    ffffffff82a46000->ffffffff82a47000
> (XEN)  TOTAL:         ffffffff80000000->ffffffff82c00000
> (XEN)  ENTRY ADDRESS: ffffffff826aa180
> (XEN) Dom0 has maximum 1 VCPUs
> (XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
> (XEN) Initial low memory virq threshold set at 0x4000 pages.
> (XEN) Scrubbing Free RAM in background
> (XEN) Std. Loglevel: Errors and warnings
> (XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
> (XEN) Xen is relinquishing VGA console.
> (XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
> (XEN) Freed 480kB init memory
> mapping kernel into physical memory
> about to get started...
> [    0.000000] Linux version 4.19.5-linuxkit (root@48efbd0309a6) (gcc
> version 6.3.0 (Alpine 6.3.0)) #1 SMP Mon Jun 17 17:43:29 UTC 2019
> [    0.000000] Command line: console=hvc0 earlyprintk=xen rootdelay=3
> root=PARTUUID=61ff5ba4-aea3-4c21-a11c-b899a6a88def text
> [    0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating
> point registers'
> [    0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
> [    0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
> [    0.000000] x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
> [    0.000000] x86/fpu: Enabled xstate features 0x7, context size is
> 832 bytes, using 'standard' format.
> [    0.000000] Released 0 page(s)
> [    0.000000] BIOS-provided physical RAM map:
> [    0.000000] Xen: [mem 0x0000000000000000-0x0000000000057fff] usable
> [    0.000000] Xen: [mem 0x0000000000058000-0x0000000000058fff] reserved
> [    0.000000] Xen: [mem 0x0000000000059000-0x000000000009efff] usable
> [    0.000000] Xen: [mem 0x000000000009f000-0x00000000000fffff] reserved
> [    0.000000] Xen: [mem 0x0000000000100000-0x0000000040061fff] usable
> [    0.000000] Xen: [mem 0x0000000040062000-0x0000000086489fff] unusable
> [    0.000000] Xen: [mem 0x000000008648a000-0x000000008648afff] ACPI NVS
> [    0.000000] Xen: [mem 0x000000008648b000-0x00000000864b4fff] reserved
> [    0.000000] Xen: [mem 0x00000000864b5000-0x000000008c223fff] unusable
> [    0.000000] Xen: [mem 0x000000008c224000-0x000000008c527fff] reserved
> [    0.000000] Xen: [mem 0x000000008c528000-0x000000008c735fff] unusable
> [    0.000000] Xen: [mem 0x000000008c736000-0x000000008cea6fff] ACPI NVS
> [    0.000000] Xen: [mem 0x000000008cea7000-0x000000008d2fefff] reserved
> [    0.000000] Xen: [mem 0x000000008d2ff000-0x000000008d2fffff] unusable
> [    0.000000] Xen: [mem 0x000000008d300000-0x000000008d3fffff] reserved
> [    0.000000] Xen: [mem 0x00000000e0000000-0x00000000efffffff] reserved
> [    0.000000] Xen: [mem 0x00000000fe000000-0x00000000fe010fff] reserved
> [    0.000000] Xen: [mem 0x00000000fec00000-0x00000000fec00fff] reserved
> [    0.000000] Xen: [mem 0x00000000fed90000-0x00000000fed91fff] reserved
> [    0.000000] Xen: [mem 0x00000000fee00000-0x00000000feefffff] reserved
> [    0.000000] Xen: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
> [    0.000000] Xen: [mem 0x0000000100000000-0x000000016dffffff] unusable
> [    0.000000] NX (Execute Disable) protection: active
> [    0.000000] efi: EFI v2.40 by American Megatrends
> [    0.000000] efi:  ESRT=0x8d29c098  ACPI=0x8ce49000  ACPI
> 2.0=0x8ce49000  SMBIOS=0xf05e0  SMBIOS 3.0=0xf0600  MPS=0xfc9c0
> [    0.000000] SMBIOS 3.0.0 present.
> [    0.000000] DMI:  /, BIOS 5.11 06/12/2017
> [    0.000000] Hypervisor detected: Xen PV
> [    0.000689] tsc: Detected 2496.010 MHz processor
> [    0.010540] last_pfn = 0x40062 max_arch_pfn = 0x400000000
> [    0.010541] Disabled
> [    0.010543] x86/PAT: MTRRs disabled, skipping PAT initialization too.
> [    0.010546] x86/PAT: Configuration [0-7]: WB  WT  UC- UC  WC  WP  UC  UC
> [    0.010576] Kernel/User page tables isolation: disabled on XEN PV.
> [    0.176019] Secure boot disabled
> [    0.176033] ACPI: Early table checksum verification disabled
> [    0.176039] ACPI: RSDP 0x000000008CE49000 000024 (v02 ALASKA)
> [    0.176048] ACPI: XSDT 0x000000008CE490A8 0000CC (v01 ALASKA A M I
>   01072009 AMI  00010013)
> [    0.176078] ACPI: FACP 0x000000008CE6C370 00010C (v05 ALASKA A M I
>   01072009 AMI  00010013)
> [    0.176134] ACPI: DSDT 0x000000008CE49208 023167 (v02 ALASKA A M I
>   01072009 INTL 20120913)
> [    0.176145] ACPI: FACS 0x000000008CE8EF80 000040
> [    0.176157] ACPI: APIC 0x000000008CE6C480 000084 (v03 ALASKA A M I
>   01072009 AMI  00010013)
> [    0.176168] ACPI: FPDT 0x000000008CE6C508 000044 (v01 ALASKA A M I
>   01072009 AMI  00010013)
> [    0.176180] ACPI: FIDT 0x000000008CE6C550 00009C (v01 ALASKA A M I
>   01072009 AMI  00010013)
> [    0.176191] ACPI: MCFG 0x000000008CE6C5F0 00003C (v01 ALASKA A M I
>   01072009 MSFT 00000097)
> [    0.176203] ACPI: HPET 0x000000008CE6C630 000038 (v01 ALASKA A M I
>   01072009 AMI. 0005000B)
> [    0.176214] ACPI: LPIT 0x000000008CE6C668 000094 (v01 INTEL
> SKL-ULT  00000000 MSFT 0000005F)
> [    0.176226] ACPI: SSDT 0x000000008CE6C700 000248 (v02 INTEL
> sensrhub 00000000 INTL 20120913)
> [    0.176245] ACPI: SSDT 0x000000008CE6C948 002BAE (v02 INTEL
> PtidDevc 00001000 INTL 20120913)
> [    0.176257] ACPI: SSDT 0x000000008CE6F4F8 000BE3 (v02 INTEL
> Ther_Rvp 00001000 INTL 20120913)
> [    0.176268] ACPI: SSDT 0x000000008CE700E0 0004A3 (v02 INTEL  zpodd
>   00001000 INTL 20120913)
> [    0.176280] ACPI: DBGP 0x000000008CE70588 000034 (v01 INTEL
>   00000000 MSFT 0000005F)
> [    0.176291] ACPI: DBG2 0x000000008CE705C0 000054 (v00 INTEL
>   00000000 MSFT 0000005F)
> [    0.176303] ACPI: SSDT 0x000000008CE70618 0006E9 (v02 INTEL
> xh_rvp07 00000000 INTL 20120913)
> [    0.176315] ACPI: SSDT 0x000000008CE70D08 00547E (v02 SaSsdt SaSsdt
>   00003000 INTL 20120913)
> [    0.176327] ACPI: UEFI 0x000000008CE76188 000042 (v01
>   00000000      00000000)
> [    0.176338] ACPI: SSDT 0x000000008CE761D0 000E73 (v02 CpuRef
> CpuSsdt  00003000 INTL 20120913)
> [    0.176350] ACPI: BGRT 0x000000008CE77048 000038 (v01 ALASKA A M I
>   01072009 AMI  00010013)
> [    0.176362] ACPI: RMAD 0x000000008CE77080 0000A8 (v01 INTEL  SKL
>   00000001 INTL 00000001)
> [    0.176374] ACPI: TPM2 0x000000008CE77128 000034 (v03
> Tpm2Tabl 00000001 AMI  00000000)
> [    0.176385] ACPI: ASF! 0x000000008CE77160 0000A5 (v32 INTEL   HCG
>   00000001 TFSM 000F4240)
> [    0.176416] Setting APIC routing to Xen PV.
> [    0.179941] Zone ranges:
> [    0.179943]   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
> [    0.179945]   DMA32    [mem 0x0000000001000000-0x0000000040061fff]
> [    0.179947]   Normal   empty
> [    0.179948] Movable zone start for each node
> [    0.179949] Early memory node ranges
> [    0.179951]   node   0: [mem 0x0000000000001000-0x0000000000057fff]
> [    0.179952]   node   0: [mem 0x0000000000059000-0x000000000009efff]
> [    0.179954]   node   0: [mem 0x0000000000100000-0x0000000040061fff]
> [    0.180528] Reserved but unavailable: 32769 pages
> [    0.180530] Initmem setup node 0 [mem 0x0000000000001000-0x0000000040061fff]
> [    0.185470] p2m virtual area at (____ptrval____), size is 40000000
> [    0.285486] Remapped 98 page(s)
> [    0.285528] Reserving Intel graphics memory at [mem 0x8e000000-0x8fffffff]
> [    0.285848] ACPI: PM-Timer IO Port: 0x1808
> [    0.285881] ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
> [    0.285883] ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
> [    0.285885] ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
> [    0.285887] ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
> [    0.285929] IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
> [    0.285938] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
> [    0.285941] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
> [    0.285954] Using ACPI (MADT) for SMP configuration information
> [    0.285958] ACPI: HPET id: 0x8086a701 base: 0xfed00000
> [    0.285980] smpboot: Allowing 4 CPUs, 0 hotplug CPUs
> [    0.286001] [mem 0x90000000-0xdfffffff] available for PCI devices
> [    0.286005] Booting paravirtualized kernel on Xen
> [    0.286006] Xen version: 4.12.0 (preserve-AD)
> [    0.286009] clocksource: refined-jiffies: mask: 0xffffffff
> max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
> [    0.400398] random: get_random_bytes called from
> start_kernel+0x92/0x4be with crng_init=0
> [    0.400407] setup_percpu: NR_CPUS:128 nr_cpumask_bits:128
> nr_cpu_ids:4 nr_node_ids:1
> [    0.400651] percpu: Embedded 45 pages/cpu @(____ptrval____) s143768
> r8192 d32360 u524288
> [    0.400710] Built 1 zonelists, mobility grouping on.  Total pages: 258024
> [    0.400722] Kernel command line: console=hvc0 earlyprintk=xen
> rootdelay=3 root=PARTUUID=61ff5ba4-aea3-4c21-a11c-b899a6a88def text
> [    0.400935] Dentry cache hash table entries: 131072 (order: 8, 1048576 bytes)
> [    0.400976] Inode-cache hash table entries: 65536 (order: 7, 524288 bytes)
> [    0.401125] x2apic disabled
> [    0.430609] software IO TLB: mapped [mem 0x3a600000-0x3e600000] (64MB)
> [    0.441378] Memory: 930940K/1048572K available (12300K kernel code,
> 1595K rwdata, 3068K rodata, 1584K init, 1952K bss, 117632K reserved,
> 0K cma-reserved)
> [    0.441440] ftrace: allocating 43497 entries in 170 pages
> [    0.458530] rcu: Hierarchical RCU implementation.
> [    0.458533] rcu: RCU restricting CPUs from NR_CPUS=128 to nr_cpu_ids=1.
> [    0.458534] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1
> [    0.461631] Using NULL legacy PIC
> [    0.461633] NR_IRQS: 8448, nr_irqs: 256, preallocated irqs: 0
> [    0.461649] xen:events: Using FIFO-based ABI
> [    0.461818] Console: colour dummy device 80x25
> [    0.461995] console [tty0] enabled
> [    0.462487] console [hvc0] enabled
> [    0.462494] ACPI: Core revision 20180810
> [    0.477623] ACPI BIOS Warning (bug): Incorrect checksum in table
> [BGRT] - 0x99, should be 0xAF (20180810/tbprint-177)
> [    0.477695] clocksource: xen: mask: 0xffffffffffffffff max_cycles:
> 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
> [    0.477716] installing Xen timer for CPU 0
> [    0.477801] clocksource: tsc-early: mask: 0xffffffffffffffff
> max_cycles: 0x23fa80a809f, max_idle_ns: 440795273818 ns
> [    0.477865] Calibrating delay loop (skipped), value calculated
> using timer frequency.. 4992.02 BogoMIPS (lpj=24960100)
> [    0.477874] pid_max: default: 32768 minimum: 301
> [    0.477951] Security Framework initialized
> [    0.477956] Yama: becoming mindful.
> [    0.477981] Mount-cache hash table entries: 2048 (order: 2, 16384 bytes)
> [    0.477990] Mountpoint-cache hash table entries: 2048 (order: 2, 16384 bytes)
> [    0.478256] Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
> [    0.478262] Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
> [    0.478268] Spectre V2 : Vulnerable: Minimal generic ASM retpoline
> [    0.478273] Spectre V2 : Spectre v2 / SpectreRSB mitigation:
> Filling RSB on context switch
> [    0.478279] Speculative Store Bypass: Vulnerable
> [    0.527925] Freeing SMP alternatives memory: 24K
> [    0.529303] VPMU disabled by hypervisor.
> [    0.529471] Performance Events: unsupported p6 CPU model 78 no PMU
> driver, software events only.
> [    0.529545] rcu: Hierarchical SRCU implementation.
> [    0.529706] NMI watchdog: Perf NMI watchdog permanently disabled
> [    0.529768] smp: Bringing up secondary CPUs ...
> [    0.529773] smp: Brought up 1 node, 1 CPU
> [    0.529777] smpboot: Max logical packages: 1
> [    0.529942] devtmpfs: initialized
> [    0.529996] x86/mm: Memory block size: 128MB
> [    0.530398] clocksource: jiffies: mask: 0xffffffff max_cycles:
> 0xffffffff, max_idle_ns: 19112604462750000 ns
> [    0.530409] futex hash table entries: 256 (order: 2, 16384 bytes)
> [    0.530623] NET: Registered protocol family 16
> [    0.530644] xen:grant_table: Grant tables using version 1 layout
> [    0.530659] Grant table initialized
> [    0.530809] audit: initializing netlink subsys (disabled)
> [    0.530908] audit: type=2000 audit(1563563921.812:1):
> state=initialized audit_enabled=0 res=1
> [    0.531069] ACPI FADT declares the system doesn't support PCIe
> ASPM, so disable it
> [    0.531077] ACPI: bus type PCI registered
> [    0.531203] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem
> 0xe0000000-0xefffffff] (base 0xe0000000)
> [    0.531212] PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820
> [    0.585062] PCI: Using configuration type 1 for base access
> [    0.587021] cryptd: max_cpu_qlen set to 1000
> [    0.587137] ACPI: Added _OSI(Module Device)
> [    0.587142] ACPI: Added _OSI(Processor Device)
> [    0.587147] ACPI: Added _OSI(3.0 _SCP Extensions)
> [    0.587151] ACPI: Added _OSI(Processor Aggregator Device)
> [    0.587156] ACPI: Added _OSI(Linux-Dell-Video)
> [    0.587160] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
> [    0.634267] ACPI: 8 ACPI AML tables successfully acquired and loaded
> [    0.640637] ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored
> [    0.645652] ACPI: Dynamic OEM Table Load:
> [    0.645663] ACPI: SSDT 0xFFFF88803A316000 00037F (v02 PmRef
> Cpu0Cst  00003001 INTL 20120913)
> [    0.646212] ACPI: Dynamic OEM Table Load:
> [    0.646221] ACPI: SSDT 0xFFFF888039811800 00063F (v02 PmRef
> Cpu0Ist  00003000 INTL 20120913)
> [    0.648440] ACPI: EC: EC started
> [    0.648446] ACPI: EC: interrupt blocked
> [    0.648501] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as first EC
> [    0.648507] ACPI: \_SB_.PCI0.LPCB.EC0_: GPE=0x50,
> EC_CMD/EC_SC=0x66, EC_DATA=0x62
> [    0.648513] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as boot DSDT EC to
> handle transactions
> [    0.648519] ACPI: Interpreter enabled
> [    0.648531] ACPI: (supports S0 S5)
> [    0.648535] ACPI: Using IOAPIC for interrupt routing
> [    0.648582] PCI: Using host bridge windows from ACPI; if necessary,
> use "pci=nocrs" and report a bug
> [    0.649911] ACPI: Enabled 7 GPEs in block 00 to 7F
> [    0.653085] ACPI: Power Resource [PG00] (on)
> [    0.653513] ACPI: Power Resource [PG01] (on)
> [    0.653972] ACPI: Power Resource [PG02] (on)
> [    0.660615] ACPI: Power Resource [WRST] (on)
> [    0.661101] ACPI: Power Resource [WRST] (on)
> [    0.661544] ACPI: Power Resource [WRST] (on)
> [    0.661975] ACPI: Power Resource [WRST] (on)
> [    0.662467] ACPI: Power Resource [WRST] (on)
> [    0.662901] ACPI: Power Resource [WRST] (on)
> [    0.663328] ACPI: Power Resource [WRST] (on)
> [    0.663818] ACPI: Power Resource [WRST] (on)
> [    0.664249] ACPI: Power Resource [WRST] (on)
> [    0.664690] ACPI: Power Resource [WRST] (on)
> [    0.665203] ACPI: Power Resource [WRST] (on)
> [    0.665634] ACPI: Power Resource [WRST] (on)
> [    0.666070] ACPI: Power Resource [WRST] (on)
> [    0.666553] ACPI: Power Resource [WRST] (on)
> [    0.666979] ACPI: Power Resource [WRST] (on)
> [    0.667406] ACPI: Power Resource [WRST] (on)
> [    0.667897] ACPI: Power Resource [WRST] (on)
> [    0.668338] ACPI: Power Resource [WRST] (on)
> [    0.668780] ACPI: Power Resource [WRST] (on)
> [    0.669265] ACPI: Power Resource [WRST] (on)
> [    0.684236] ACPI: Power Resource [FN00] (off)
> [    0.684400] ACPI: Power Resource [FN01] (off)
> [    0.684510] ACPI: Power Resource [FN02] (off)
> [    0.684616] ACPI: Power Resource [FN03] (off)
> [    0.684730] ACPI: Power Resource [FN04] (off)
> [    0.686266] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe])
> [    0.686279] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM
> ClockPM Segments MSI]
> [    0.689484] acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug
> SHPCHotplug PME PCIeCapability LTR]
> [    0.689492] acpi PNP0A08:00: FADT indicates ASPM is unsupported,
> using BIOS configuration
> [    0.690190] PCI host bridge to bus 0000:00
> [    0.690197] pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
> [    0.690203] pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
> [    0.690208] pci_bus 0000:00: root bus resource [mem
> 0x000a0000-0x000bffff window]
> [    0.690215] pci_bus 0000:00: root bus resource [mem
> 0x90000000-0xdfffffff window]
> [    0.690221] pci_bus 0000:00: root bus resource [mem
> 0xfd000000-0xfe7fffff window]
> [    0.690227] pci_bus 0000:00: root bus resource [bus 00-fe]
> (XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
> [    0.691006] pci 0000:00:02.0: BAR 2: assigned to efifb
> [    0.694276] pci 0000:00:1c.0: Intel SPT PCH root port ACS workaround enabled
> [    0.694833] pci 0000:00:1c.5: Intel SPT PCH root port ACS workaround enabled
> [    0.698688] pci 0000:00:1c.0: PCI bridge to [bus 01]
> [    0.699418] pci 0000:02:00.0: 2.000 Gb/s available PCIe bandwidth,
> limited by 2.5 GT/s x1 link at 0000:00:1c.5 (capable of 7.876 Gb/s
> with 8 GT/s x1 link)
> [    0.699724] pci 0000:00:1c.5: PCI bridge to [bus 02]
> [    0.704143] ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 10 *11 12 14 15)
> [    0.704232] ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 *10 11 12 14 15)
> [    0.704322] ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 6 10 *11 12 14 15)
> [    0.704418] ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 6 10 *11 12 14 15)
> [    0.704507] ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 10 *11 12 14 15)
> [    0.704592] ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 10 *11 12 14 15)
> [    0.704680] ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 10 *11 12 14 15)
> [    0.704768] ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 5 6 10 *11 12 14 15)
> [    0.705534] ACPI: EC: interrupt unblocked
> [    0.705573] ACPI: EC: event unblocked
> [    0.705598] ACPI: \_SB_.PCI0.LPCB.EC0_: GPE=0x50,
> EC_CMD/EC_SC=0x66, EC_DATA=0x62
> [    0.705605] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as boot DSDT EC to
> handle transactions and events
> [    0.705655] xen:balloon: Initialising balloon driver
> [    0.705801] SCSI subsystem initialized
> [    0.705887] ACPI: bus type USB registered
> [    0.705909] usbcore: registered new interface driver usbfs
> [    0.705920] usbcore: registered new interface driver hub
> [    0.705940] usbcore: registered new device driver usb
> [    0.705956] pps_core: LinuxPPS API ver. 1 registered
> [    0.705961] pps_core: Software ver. 5.3.6 - Copyright 2005-2007
> Rodolfo Giometti <giometti@linux.it>
> [    0.705969] PTP clock support registered
> [    0.706008] Registered efivars operations
> [    0.710766] PCI: Using ACPI for IRQ routing
> [    0.748524] NetLabel: Initializing
> [    0.748529] NetLabel:  domain hash size = 128
> [    0.748533] NetLabel:  protocols = UNLABELED CIPSOv4 CALIPSO
> [    0.748553] NetLabel:  unlabeled traffic allowed by default
> [    0.748718] clocksource: Switched to clocksource tsc-early
> [    0.765269] VFS: Disk quotas dquot_6.6.0
> [    0.765291] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
> [    0.765339] FS-Cache: Loaded
> [    0.765343] hugetlbfs: disabling because there are no supported
> hugepage sizes
> [    0.765401] CacheFiles: Loaded
> [    0.765415] pnp: PnP ACPI init
> [    0.765704] system 00:00: [io  0x0a00-0x0a2f] has been reserved
> [    0.766250] Already setup the GSI :4
> [    0.768279] system 00:05: [io  0x0200-0x027f] has been reserved
> [    0.769079] system 00:06: [io  0x029c-0x029d] has been reserved
> [    0.769352] system 00:07: [io  0x0680-0x069f] has been reserved
> [    0.769359] system 00:07: [io  0xffff] has been reserved
> [    0.769364] system 00:07: [io  0xffff] has been reserved
> [    0.769369] system 00:07: [io  0xffff] has been reserved
> [    0.769374] system 00:07: [io  0x1800-0x18fe] has been reserved
> [    0.769380] system 00:07: [io  0x164e-0x164f] has been reserved
> [    0.769579] system 00:09: [io  0x1854-0x1857] has been reserved
> [    0.769879] system 00:0a: [mem 0xfed10000-0xfed17fff] has been reserved
> [    0.769886] system 00:0a: [mem 0xfed18000-0xfed18fff] has been reserved
> [    0.769892] system 00:0a: [mem 0xfed19000-0xfed19fff] has been reserved
> [    0.769898] system 00:0a: [mem 0xe0000000-0xefffffff] has been reserved
> [    0.769904] system 00:0a: [mem 0xfed20000-0xfed3ffff] has been reserved
> [    0.769909] system 00:0a: [mem 0xfed90000-0xfed93fff] could not be reserved
> [    0.769915] system 00:0a: [mem 0xfed45000-0xfed8ffff] has been reserved
> [    0.769921] system 00:0a: [mem 0xff000000-0xffffffff] has been reserved
> [    0.769927] system 00:0a: [mem 0xfee00000-0xfeefffff] has been reserved
> [    0.769933] system 00:0a: [mem 0xdffe0000-0xdfffffff] has been reserved
> [    0.769988] system 00:0b: [mem 0xfd000000-0xfdabffff] has been reserved
> [    0.769995] system 00:0b: [mem 0xfdad0000-0xfdadffff] has been reserved
> [    0.770001] system 00:0b: [mem 0xfdb00000-0xfdffffff] has been reserved
> [    0.7[    1.491547] Key type encrypted registered
> [    1.493473] rtc_cmos 00:08: setting system clock to 2019-07-19
> 19:18:43 UTC (1563563923)
> [    1.494433] Waiting 3 sec before mounting root device...
> [    1.700989] ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
> [    1.706737] ata1.00: ATA-9: SQF-S25M8-64G-SAC, SAFM02A3, max UDMA/133
> [    1.707867] ata1.00: 125045424 sectors, multi 16: LBA48 NCQ (depth 32), AA
> [    1.709118] ata1.00: configured for UDMA/133
> [    1.710321] scsi 0:0:0:0: Direct-Access     ATA
> SQF-S25M8-64G-SA 02A3 PQ: 0 ANSI: 5
> [    1.711647] sd 0:0:0:0: [sda] 125045424 512-byte logical blocks:
> (64.0 GB/59.6 GiB)
> [    1.712791] sd 0:0:0:0: [sda] Write Protect is off
> [    1.713976] sd 0:0:0:0: Attached scsi generic sg0 type 0
> [    1.715068] sd 0:0:0:0: [sda] Write cache: enabled, read cache:
> enabled, doesn't support DPO or FUA
> [    1.717800]  sda: sda1 sda2 sda3 sda4 sda9
> [    1.719269] sd 0:0:0:0: [sda] Attached SCSI disk
> [    1.721673] ata2: SATA link down (SStatus 4 SControl 300)
> [    1.737879] usb 1-1: new low-speed USB device number 2 using xhci_hcd
> [    1.837912] clocksource: tsc: mask: 0xffffffffffffffff max_cycles:
> 0x23fa80a809f, max_idle_ns: 440795273818 ns
> [    1.839077] clocksource: Switched to clocksource tsc
> [    1.928802] input: Logitech USB Keyboard as
> /devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.0/0003:046D:C31C.0001/input/input6
> [    1.997981] hid-generic 0003:046D:C31C.0001: input: USB HID v1.10
> Keyboard [Logitech USB Keyboard] on usb-0000:00:14.0-1/input0
> [    2.004853] input: Logitech USB Keyboard Consumer Control as
> /devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.1/0003:046D:C31C.0002/input/input7
> [    2.068052] input: Logitech USB Keyboard System Control as
> /devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.1/0003:046D:C31C.0002/input/input8
> [    2.069388] hid-generic 0003:046D:C31C.0002: input: USB HID v1.10
> Device [Logitech USB Keyboard] on usb-0000:00:14.0-1/input1
> [    2.217897] usb 1-7: new full-speed USB device number 3 using xhci_hcd
> [    2.399047] random: fast init done
> [    4.484487] VFS: Mounted root (squashfs filesystem) readonly on device 8:2.
> [    4.487173] Freeing unused kernel image memory: 1584K
> [    4.507975] Write protecting the kernel read-only data: 18432k
> [    4.516183] Freeing unused kernel image memory: 2020K
> [    4.517742] Freeing unused kernel image memory: 1028K
> [    4.518785] Run /sbin/init as init process
> [    5.129834] e1000e: Intel(R) PRO/1000 Network Driver - 3.2.6-k
> [    5.130918] e1000e: Copyright(c) 1999 - 2015 Intel Corporation.
> [    5.132125] Already setup the GSI :16
> [    5.133307] e1000e 0000:00:1f.6: Interrupt Throttling Rate
> (ints/sec) set to dynamic conservative mode
> [    5.234464] e1000e 0000:00:1f.6 0000:00:1f.6 (uninitialized):
> registered PHC clock
> [    5.326539] e1000e 0000:00:1f.6 eth0: (PCI Express:2.5GT/s:Width
> x1) 00:0b:ab:e4:d0:c5
> [    5.327674] e1000e 0000:00:1f.6 eth0: Intel(R) PRO/1000 Network Connection
> [    5.330518] e1000e 0000:00:1f.6 eth0: MAC: 12, PHY: 12, PBA No: FFFFFF-0FF
> [    5.362049] cfg80211: Loading compiled-in X.509 certificates for
> regulatory database
> [    5.371724] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
> [    5.372933] platform regulatory.0: Direct firmware load for
> regulatory.db failed with error -2
> [    5.374112] cfg80211: failed to load regulatory.db
> [    5.424847] rtl8723be 0000:01:00.0: enabling device (0000 -> 0003)
> [    5.426136] Already setup the GSI :18
> [    5.459064] rtl8723be: Using firmware rtlwifi/rtl8723befw_36.bin
> [    5.462917] rtlwifi: rtlwifi: wireless switch is on
> [    5.481131] igb: Intel(R) Gigabit Ethernet Network Driver - version 5.4.0-k
> [    5.482341] igb: Copyright (c) 2007-2014 Intel Corporation.
> [    5.483648] Already setup the GSI :17
> [    5.514869] pps pps0: new PPS source ptp1
> [    5.516458] igb 0000:02:00.0: added PHC on eth1
> [    5.517974] igb 0000:02:00.0: Intel(R) Gigabit Ethernet Network Connection
> [    5.519441] igb 0000:02:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:0b:ab:e4:d0:c6
> [    5.520701] igb 0000:02:00.0: eth1: PBA No: 000200-000
> [    5.521831] igb 0000:02:00.0: Using MSI-X interrupts. 1 rx
> queue(s), 1 tx queue(s)
> ................   ..............   ................
>  ................   ............   ................
>               ....    .........   ....
>     ................   .......   ................
>      ................   .....   ................
>                     ...   .   ....
>         ................     ................
>           ...............   ................
>
>               Edge Virtualization Engine
> Take a look around and don't forget to use eve(1).
> login[518]: root login on 'hvc0'
> linuxkit-000babe4d0c5:~#
> [    6.069552] IPVS: ftp: loaded support on port[0] = 21
> [    6.158121] FAT-fs (sda4): utf8 is not a recommended IO charset for
> FAT filesystems, filesystem will be case sensitive!
> [    6.163850] FAT-fs (sda4): Volume was not properly unmounted. Some
> data may be corrupt. Please run fsck.
> [    6.222733] IPVS: ftp: loaded support on port[0] = 21
> [    6.261491] random: crng init done
> 2019/07/19 19:18:48 Wrote 1000 bytes of entropy, exiting as oneshot
> [    8.572992] usbcore: registered new interface driver qcserial
> [    8.574283] usbserial: USB Serial support registered for Qualcomm USB modem
> [    8.586813] usbcore: registered new interface driver cdc_wdm
> [    8.593148] usbcore: registered new interface driver qmi_wwan
> [    8.823492] EXT4-fs (sda9): mounting ext3 file system using the
> ext4 subsystem
> [    8.834988] EXT4-fs (sda9): mounted filesystem with ordered data
> mode. Opts: (null)
>
> linuxkit-000babe4d0c5:~# eve enter
> / # xl info
> host                   : linuxkit-000babe4d0c5
> release                : 4.19.5-linuxkit
> version                : #1 SMP Mon Jun 17 17:43:29 UTC 2019
> machine                : x86_64
> nr_cpus                : 2
> max_cpu_id             : 3
> nr_nodes               : 1
> cores_per_socket       : 2
> threads_per_core       : 1
> cpu_mhz                : 2496.011
> hw_caps                :
> bfebfbff:76faf3ff:2c100800:00000121:0000000f:009c6fbf:00000000:00000100
> virt_caps              : pv hvm hvm_directio pv_directio
> total_memory           : 4003
> free_memory            : 2912
> sharing_freed_memory   : 0
> sharing_used_memory    : 0
> outstanding_claims     : 0
> free_cpus              : 0
> xen_major              : 4
> xen_minor              : 12
> xen_extra              : .0
> xen_version            : 4.12.0
> xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
> hvm-3.0-x86_32p hvm-3.0-x86_64
> xen_scheduler          : credit2
> xen_pagesize           : 4096
> platform_params        : virt_start=0xffff800000000000
> xen_changeset          :
> xen_commandline        : iommu=no-igfx com1=115200,8n1
> console=com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1
> dom0_vcpus_pin smt=false
> cc_compiler            : gcc (Alpine 6.4.0) 6.4.0
> cc_compile_by          :
> cc_compile_domain      :
> cc_compile_date        : Mon Jun 17 18:50:07 UTC 2019
> build_id               : 00f4459480dee2ae1aab93918bb20f4b9719364b
> xend_config_format     : 4

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-19 19:31 [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx Roman Shaposhnik
  2019-07-19 20:02 ` Roman Shaposhnik
@ 2019-07-20 16:39 ` Andrew Cooper
  2019-07-22  8:03   ` Paul Durrant
  2019-07-24 17:42 ` Rich Persaud
  2 siblings, 1 reply; 65+ messages in thread
From: Andrew Cooper @ 2019-07-20 16:39 UTC (permalink / raw)
  To: Roman Shaposhnik, xen-devel
  Cc: Paul Durrant, Wei Liu, Jan Beulich, Roger Pau Monne


[-- Attachment #1.1: Type: text/plain, Size: 4725 bytes --]

On 19/07/2019 20:31, Roman Shaposhnik wrote:
> Hi!
>
> we're using Xen on Advantech ARK-2250 Embedded Box PC:
>     https://www.elmark.com.pl/web/uploaded/karty_produktow/advantech/ark-2250l/ark-2250l_instrukcja-uzytkownika.pdf
>
> After upgrading to Xen 4.12.0 from 4.11.0 we now have to utilize  iommu=no-igfx
> workaround as per:
>      https://xenbits.xen.org/docs/unstable/misc/xen-command-line.html#iommu
>
> Without the workaround the screen appears to be garbled with colored
> static noise and the following message keeps showing up:
> (XEN) printk: 26235 messages suppressed.
> (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
> 8e43c000, iommu reg = ffff82c00021d000
> (XEN) printk: 26303 messages suppressed.
> (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
> 8e2c6000, iommu reg = ffff82c00021d000
>
> Once iommu=no-igfx is applied the box can boot fine.
>
> At the end of this email, you can see a full log of the box booting
> all the way into Dom0 with iommu=no-igfx applied. I am also attaching
> similar log without no-igfx
>
> Please let me know if you need any more information to help us diagnose this.

This will be a consequence of trying to remove various pieces of
stupidity with the preexisting IOMMU logic, in an attempt to unify the
PV and PVH paths.

As for the symptoms you're seeing, that is because the GPU is not being
given access to the RAM stolen for graphics purposes.

Picking the log apart:

(XEN) EFI RAM map:
(XEN)  0000000000000000 - 0000000000058000 (usable)
(XEN)  0000000000058000 - 0000000000059000 (reserved)
(XEN)  0000000000059000 - 000000000009f000 (usable)
(XEN)  000000000009f000 - 00000000000a0000 (reserved)
(XEN)  0000000000100000 - 000000008648a000 (usable)
(XEN)  000000008648a000 - 000000008648b000 (ACPI NVS)
(XEN)  000000008648b000 - 00000000864b5000 (reserved)
(XEN)  00000000864b5000 - 000000008c224000 (usable)
(XEN)  000000008c224000 - 000000008c528000 (reserved)
(XEN)  000000008c528000 - 000000008c736000 (usable)
(XEN)  000000008c736000 - 000000008cea7000 (ACPI NVS)
(XEN)  000000008cea7000 - 000000008d2ff000 (reserved)
(XEN)  000000008d2ff000 - 000000008d300000 (usable)
(XEN)  000000008d300000 - 000000008d400000 (reserved)
(XEN)  00000000e0000000 - 00000000f0000000 (reserved)
(XEN)  00000000fe000000 - 00000000fe011000 (reserved)
(XEN)  00000000fec00000 - 00000000fec01000 (reserved)
(XEN)  00000000fee00000 - 00000000fee01000 (reserved)
(XEN)  00000000ff000000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 000000016e000000 (usable)
...
(XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
(XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved memory; need "iommu_inclusive_mapping=1"?
(XEN) Switched to APIC driver x2apic_cluster.
...
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr 8e480000, iommu reg = ffff82c00021d000
(XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
(XEN) [VT-D]INTR-REMAP: Request device [0000:f0:1f.0] fault index 0, iommu reg = ffff82c00021f000
(XEN) [VT-D]INTR-REMAP: reason 22 - Present field in the IRTE entry is clear


The RMRR identified is a hole in the e820, and the range which is
causing IOMMU faults.  Clearly it isn't being set up correctly.

First of all, can you check what effect booting with
iommu_inclusive_mapping=1 has please?  While at it, iommu=debug would
also be helpful.

Back to the log.  Strictly speaking, this is a violation of the VT-d
spec.  Section 8.4 Reserved Memory Region Reporting Structure says:

"BIOS must report the RMRR reported memory addresses as reserved (or as
EFI runtime) in the system memory map returned through methods such as
INT15, EFI GetMemoryMap etc."

However, Xen's logic here is very broken, and in need of fixing.

For that message, it only checks the first and last address for being
reserved, not the entire region, which will give it plenty of false
negatives.

For RMRRs themselves, system firmware is well known for abiding by the
spec [citation needed], but an RMRR must be honoured, because the entire
purpose of them is to state "this device won't function without access
to this area".

An RMRR in a hole, while a violation of the spec, is obviously fine to
use in practice, so we should just accept it and stop complaining.

OTOH, RMRRs which hit other memory (particularly RAM) need more care,
and probably want to force override the e820 to reserved.  Nothing good
will come from trusting the e820 over the DMAR table here, seeing as
there is clearly an error somewhere in the firmware-provided information.

However - I'm struggling to locate anywhere which actually walks dom0's
RMRR list and inserts them into the IOMMU.  Anyone got any hints?

~Andrew

[-- Attachment #1.2: Type: text/html, Size: 5671 bytes --]

[-- Attachment #2: Type: text/plain, Size: 157 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-20 16:39 ` Andrew Cooper
@ 2019-07-22  8:03   ` Paul Durrant
  0 siblings, 0 replies; 65+ messages in thread
From: Paul Durrant @ 2019-07-22  8:03 UTC (permalink / raw)
  To: Andrew Cooper, Roman Shaposhnik, xen-devel
  Cc: Wei Liu, Jan Beulich, Roger Pau Monne

De-htmling...

-----
[snip]
For RMRRs themselves, system firmware is well known for abiding by the spec [citation needed], but an RMRR must be honoured, because the entire purpose of them is to state "this device won't function without access to this area".

An RMRR in a hole, while a violation of the spec, is obviously fine to use in practice, so we should just accept it and stop complaining.

OTOH, RMRRs which hit other memory (particularly RAM) need more care, and probably want to force override the e820 to reserved.  Nothing good will come from trusting the e820 over the DMAR table here, seeing as there is clearly an error somewhere in the firmware-provided information.

However - I'm struggling to locate anywhere which actually walks dom0's RMRR list and inserts them into the IOMMU.  Anyone got any hints?
-----

I think you want setup_hwdom_rmrr() in passthrough/vtd/iommu.c

  Paul
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-19 20:02 ` Roman Shaposhnik
@ 2019-07-22  8:20   ` Paul Durrant
  2019-07-22 11:48     ` Roger Pau Monné
  0 siblings, 1 reply; 65+ messages in thread
From: Paul Durrant @ 2019-07-22  8:20 UTC (permalink / raw)
  To: 'Roman Shaposhnik', xen-devel
  Cc: jgross, Andrew Cooper, boris.ostrovsky, jbeulich

> -----Original Message-----
[snip]
> > (XEN) Domain heap initialised
> > (XEN) ACPI: 32/64X FACS address mismatch in FADT -
> > 8ce8ef80/0000000000000000, using 32
> > (XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
> > (XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
> > (XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved
> > memory; need "iommu_inclusive_mapping=1"?

This is your problem. In versions prior to 4.11 (I think, and certainly 4.12) iommu_inclusive_mapping used to default on, whereas now it appears to default off. In most circumstances this is fine because there is a new flag, iommu_hwdom_reserved, which defaults on and this makes sure that all e820 reserved regions are identity mapped (which usually covers undeclared RMRRs). You have the opposite problem... a declared RMRR which is not reserved, so you will need iommu_inclusive_mapping.

  Paul
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-22  8:20   ` Paul Durrant
@ 2019-07-22 11:48     ` Roger Pau Monné
  2019-07-22 11:54       ` Paul Durrant
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-07-22 11:48 UTC (permalink / raw)
  To: Paul Durrant, 'Roman Shaposhnik'
  Cc: jgross, xen-devel, boris.ostrovsky, jbeulich, Andrew Cooper

On Mon, Jul 22, 2019 at 08:20:36AM +0000, Paul Durrant wrote:
> > -----Original Message-----
> [snip]
> > > (XEN) Domain heap initialised
> > > (XEN) ACPI: 32/64X FACS address mismatch in FADT -
> > > 8ce8ef80/0000000000000000, using 32
> > > (XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
> > > (XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
> > > (XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved
> > > memory; need "iommu_inclusive_mapping=1"?
> 
> This is your problem. In versions prior to 4.11 (I think, and certainly 4.12) iommu_inclusive_mapping used to default on, whereas now it appears to default off. In most circumstances this is fine because there is a new flag, iommu_hwdom_reserved, which defaults on and this makes sure that all e820 reserved regions are identity mapped (which usually covers undeclared RMRRs). You have the opposite problem... a declared RMRR which is not reserved, so you will need iommu_inclusive_mapping.

I think there's a bug in the initialization of iommu for a PV dom0,
which leaves dom0 without rmrr entries. Can you try the patch below
and report whether it solves your issue?

Thanks, Roger.
---8<---
diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
index 79ec6719f5..9d91f0d633 100644
--- a/xen/drivers/passthrough/iommu.c
+++ b/xen/drivers/passthrough/iommu.c
@@ -185,7 +185,7 @@ void __hwdom_init iommu_hwdom_init(struct domain *d)
     register_keyhandler('o', &iommu_dump_p2m_table, "dump iommu p2m table", 0);
 
     hd->status = IOMMU_STATUS_initializing;
-    hd->need_sync = iommu_hwdom_strict && !iommu_use_hap_pt(d);
+    hd->need_sync = !iommu_use_hap_pt(d);
     if ( need_iommu_pt_sync(d) )
     {
         struct page_info *page;


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply related	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-22 11:48     ` Roger Pau Monné
@ 2019-07-22 11:54       ` Paul Durrant
  2019-07-22 13:48         ` Roger Pau Monné
  0 siblings, 1 reply; 65+ messages in thread
From: Paul Durrant @ 2019-07-22 11:54 UTC (permalink / raw)
  To: Roger Pau Monne, 'Roman Shaposhnik'
  Cc: jgross, xen-devel, boris.ostrovsky, jbeulich, Andrew Cooper

> -----Original Message-----
> From: Roger Pau Monne <roger.pau@citrix.com>
> Sent: 22 July 2019 12:49
> To: Paul Durrant <Paul.Durrant@citrix.com>; 'Roman Shaposhnik' <roman@zededa.com>
> Cc: xen-devel@lists.xenproject.org; jgross@suse.com; Andrew Cooper <Andrew.Cooper3@citrix.com>;
> boris.ostrovsky@oracle.com; jbeulich@suse.com
> Subject: Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
> 
> On Mon, Jul 22, 2019 at 08:20:36AM +0000, Paul Durrant wrote:
> > > -----Original Message-----
> > [snip]
> > > > (XEN) Domain heap initialised
> > > > (XEN) ACPI: 32/64X FACS address mismatch in FADT -
> > > > 8ce8ef80/0000000000000000, using 32
> > > > (XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
> > > > (XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
> > > > (XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved
> > > > memory; need "iommu_inclusive_mapping=1"?
> >
> > This is your problem. In versions prior to 4.11 (I think, and certainly 4.12)
> iommu_inclusive_mapping used to default on, whereas now it appears to default off. In most
> circumstances this is fine because there is a new flag, iommu_hwdom_reserved, which defaults on and
> this makes sure that all e820 reserved regions are identity mapped (which usually covers undeclared
> RMRRs). You have the opposite problem... a declared RMRR which is not reserved, so you will need
> iommu_inclusive_mapping.
> 
> I think there's a bug in the initialization of iommu for a PV dom0,
> which leaves dom0 without rmrr entries. Can you try the patch below
> and report whether it solves your issue?
> 
> Thanks, Roger.
> ---8<---
> diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> index 79ec6719f5..9d91f0d633 100644
> --- a/xen/drivers/passthrough/iommu.c
> +++ b/xen/drivers/passthrough/iommu.c
> @@ -185,7 +185,7 @@ void __hwdom_init iommu_hwdom_init(struct domain *d)
>      register_keyhandler('o', &iommu_dump_p2m_table, "dump iommu p2m table", 0);
> 
>      hd->status = IOMMU_STATUS_initializing;
> -    hd->need_sync = iommu_hwdom_strict && !iommu_use_hap_pt(d);
> +    hd->need_sync = !iommu_use_hap_pt(d);

But this is going to mean the if() below is true for non-strict dom0, which means it pointlessly maps the dom0 page list when hwdom_iommu_map() should have already mapped all conventional RAM.

  Paul

>      if ( need_iommu_pt_sync(d) )
>      {
>          struct page_info *page;


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-22 11:54       ` Paul Durrant
@ 2019-07-22 13:48         ` Roger Pau Monné
  2019-07-22 14:03           ` Paul Durrant
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-07-22 13:48 UTC (permalink / raw)
  To: Paul Durrant
  Cc: jgross, Andrew Cooper, 'Roman Shaposhnik',
	jbeulich, xen-devel, boris.ostrovsky

On Mon, Jul 22, 2019 at 01:54:00PM +0200, Paul Durrant wrote:
> > -----Original Message-----
> > From: Roger Pau Monne <roger.pau@citrix.com>
> > Sent: 22 July 2019 12:49
> > To: Paul Durrant <Paul.Durrant@citrix.com>; 'Roman Shaposhnik' <roman@zededa.com>
> > Cc: xen-devel@lists.xenproject.org; jgross@suse.com; Andrew Cooper <Andrew.Cooper3@citrix.com>;
> > boris.ostrovsky@oracle.com; jbeulich@suse.com
> > Subject: Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
> > 
> > On Mon, Jul 22, 2019 at 08:20:36AM +0000, Paul Durrant wrote:
> > > > -----Original Message-----
> > > [snip]
> > > > > (XEN) Domain heap initialised
> > > > > (XEN) ACPI: 32/64X FACS address mismatch in FADT -
> > > > > 8ce8ef80/0000000000000000, using 32
> > > > > (XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
> > > > > (XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
> > > > > (XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved
> > > > > memory; need "iommu_inclusive_mapping=1"?
> > >
> > > This is your problem. In versions prior to 4.11 (I think, and certainly 4.12)
> > iommu_inclusive_mapping used to default on, whereas now it appears to default off. In most
> > circumstances this is fine because there is a new flag, iommu_hwdom_reserved, which defaults on and
> > this makes sure that all e820 reserved regions are identity mapped (which usually covers undeclared
> > RMRRs). You have the opposite problem... a declared RMRR which is not reserved, so you will need
> > iommu_inclusive_mapping.
> > 
> > I think there's a bug in the initialization of iommu for a PV dom0,
> > which leaves dom0 without rmrr entries. Can you try the patch below
> > and report whether it solves your issue?
> > 
> > Thanks, Roger.
> > ---8<---
> > diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> > index 79ec6719f5..9d91f0d633 100644
> > --- a/xen/drivers/passthrough/iommu.c
> > +++ b/xen/drivers/passthrough/iommu.c
> > @@ -185,7 +185,7 @@ void __hwdom_init iommu_hwdom_init(struct domain *d)
> >      register_keyhandler('o', &iommu_dump_p2m_table, "dump iommu p2m table", 0);
> > 
> >      hd->status = IOMMU_STATUS_initializing;
> > -    hd->need_sync = iommu_hwdom_strict && !iommu_use_hap_pt(d);
> > +    hd->need_sync = !iommu_use_hap_pt(d);
> 
> But this is going to mean the if() below is true for non-strict dom0, which means it pointlessly maps the dom0 page list when hwdom_iommu_map() should have already mapped all conventional RAM.

Right, this all seems quite broken. Non-translated guests (ie: PV)
would always need iommu page-table sync, but set_identity_p2m_entry
contains the following:

if ( !paging_mode_translate(p2m->domain) )
{
    if ( !need_iommu_pt_sync(d) )
        return 0;
    return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
                            IOMMUF_readable | IOMMUF_writable);
}

I wonder whether the usage of need_iommu_pt_sync is wrong there, and
should instead be !has_iommu_pt(d), since non-translated domains would
never share the iommu page-tables anyway.

In any case, I think need_sync must be set when the iommu page tables
are not shared, and gating it on iommu_hwdom_strict seems wrong to me,
the strictness of the iommu doesn't affect whether a sync is need or
not.

I've updated the patch to avoid the pointless mapping of dom0 page
list, but I haven't included the change to set_identity_p2m_entry.

Thanks, Roger.
---8<---
diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
index 79ec6719f5..abf9e38607 100644
--- a/xen/drivers/passthrough/iommu.c
+++ b/xen/drivers/passthrough/iommu.c
@@ -185,8 +185,8 @@ void __hwdom_init iommu_hwdom_init(struct domain *d)
     register_keyhandler('o', &iommu_dump_p2m_table, "dump iommu p2m table", 0);
 
     hd->status = IOMMU_STATUS_initializing;
-    hd->need_sync = iommu_hwdom_strict && !iommu_use_hap_pt(d);
-    if ( need_iommu_pt_sync(d) )
+    hd->need_sync = !iommu_use_hap_pt(d);
+    if ( iommu_hwdom_strict && need_iommu_pt_sync(d) )
     {
         struct page_info *page;
         unsigned int i = 0, flush_flags = 0;


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply related	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-22 13:48         ` Roger Pau Monné
@ 2019-07-22 14:03           ` Paul Durrant
  2019-07-22 14:39             ` Roger Pau Monné
  0 siblings, 1 reply; 65+ messages in thread
From: Paul Durrant @ 2019-07-22 14:03 UTC (permalink / raw)
  To: Roger Pau Monne
  Cc: jgross, Andrew Cooper, 'Roman Shaposhnik',
	jbeulich, xen-devel, boris.ostrovsky

> -----Original Message-----
[snip]
> > > diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> > > index 79ec6719f5..9d91f0d633 100644
> > > --- a/xen/drivers/passthrough/iommu.c
> > > +++ b/xen/drivers/passthrough/iommu.c
> > > @@ -185,7 +185,7 @@ void __hwdom_init iommu_hwdom_init(struct domain *d)
> > >      register_keyhandler('o', &iommu_dump_p2m_table, "dump iommu p2m table", 0);
> > >
> > >      hd->status = IOMMU_STATUS_initializing;
> > > -    hd->need_sync = iommu_hwdom_strict && !iommu_use_hap_pt(d);
> > > +    hd->need_sync = !iommu_use_hap_pt(d);
> >
> > But this is going to mean the if() below is true for non-strict dom0, which means it pointlessly
> maps the dom0 page list when hwdom_iommu_map() should have already mapped all conventional RAM.
> 
> Right, this all seems quite broken. Non-translated guests (ie: PV)
> would always need iommu page-table sync, but set_identity_p2m_entry
> contains the following:
> 
> if ( !paging_mode_translate(p2m->domain) )
> {
>     if ( !need_iommu_pt_sync(d) )
>         return 0;
>     return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
>                             IOMMUF_readable | IOMMUF_writable);
> }
> 
> I wonder whether the usage of need_iommu_pt_sync is wrong there, and
> should instead be !has_iommu_pt(d), since non-translated domains would
> never share the iommu page-tables anyway.

You want syncing if the domain has IOMMU page tables and shared EPT is not in use, so this logic just seems wrong.

> 
> In any case, I think need_sync must be set when the iommu page tables
> are not shared, and gating it on iommu_hwdom_strict seems wrong to me,
> the strictness of the iommu doesn't affect whether a sync is need or
> not.

I think need_sync is gated on strict mode because, in 'relaxed' mode, the mappings that are set up when dom0 is started are supposed to be static (modulo hotplug RAM)... so modifications to the domain's page list are not supposed to have any effect, and so no synchronization need be done.

> 
> I've updated the patch to avoid the pointless mapping of dom0 page
> list, but I haven't included the change to set_identity_p2m_entry.
> 

So, I think the albeit odd looking logic in iommu_hwdom_init() was actually correct, but the code in set_identity_p2m_entry() is wrong.

  Paul

> Thanks, Roger.
> ---8<---
> diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> index 79ec6719f5..abf9e38607 100644
> --- a/xen/drivers/passthrough/iommu.c
> +++ b/xen/drivers/passthrough/iommu.c
> @@ -185,8 +185,8 @@ void __hwdom_init iommu_hwdom_init(struct domain *d)
>      register_keyhandler('o', &iommu_dump_p2m_table, "dump iommu p2m table", 0);
> 
>      hd->status = IOMMU_STATUS_initializing;
> -    hd->need_sync = iommu_hwdom_strict && !iommu_use_hap_pt(d);
> -    if ( need_iommu_pt_sync(d) )
> +    hd->need_sync = !iommu_use_hap_pt(d);
> +    if ( iommu_hwdom_strict && need_iommu_pt_sync(d) )
>      {
>          struct page_info *page;
>          unsigned int i = 0, flush_flags = 0;


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-22 14:03           ` Paul Durrant
@ 2019-07-22 14:39             ` Roger Pau Monné
  2019-07-22 15:02               ` Paul Durrant
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-07-22 14:39 UTC (permalink / raw)
  To: Paul Durrant
  Cc: jgross, Andrew Cooper, 'Roman Shaposhnik',
	jbeulich, xen-devel, boris.ostrovsky

On Mon, Jul 22, 2019 at 04:03:44PM +0200, Paul Durrant wrote:
> > -----Original Message-----
> [snip]
> > > > diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> > > > index 79ec6719f5..9d91f0d633 100644
> > > > --- a/xen/drivers/passthrough/iommu.c
> > > > +++ b/xen/drivers/passthrough/iommu.c
> > > > @@ -185,7 +185,7 @@ void __hwdom_init iommu_hwdom_init(struct domain *d)
> > > >      register_keyhandler('o', &iommu_dump_p2m_table, "dump iommu p2m table", 0);
> > > >
> > > >      hd->status = IOMMU_STATUS_initializing;
> > > > -    hd->need_sync = iommu_hwdom_strict && !iommu_use_hap_pt(d);
> > > > +    hd->need_sync = !iommu_use_hap_pt(d);
> > >
> > > But this is going to mean the if() below is true for non-strict dom0, which means it pointlessly
> > maps the dom0 page list when hwdom_iommu_map() should have already mapped all conventional RAM.
> > 
> > Right, this all seems quite broken. Non-translated guests (ie: PV)
> > would always need iommu page-table sync, but set_identity_p2m_entry
> > contains the following:
> > 
> > if ( !paging_mode_translate(p2m->domain) )
> > {
> >     if ( !need_iommu_pt_sync(d) )
> >         return 0;
> >     return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
> >                             IOMMUF_readable | IOMMUF_writable);
> > }
> > 
> > I wonder whether the usage of need_iommu_pt_sync is wrong there, and
> > should instead be !has_iommu_pt(d), since non-translated domains would
> > never share the iommu page-tables anyway.
> 
> You want syncing if the domain has IOMMU page tables and shared EPT is not in use, so this logic just seems wrong.

Right, so for a PV domain this would mean syncing if the iommu is in
used, because there's no sharing at all.

> > 
> > In any case, I think need_sync must be set when the iommu page tables
> > are not shared, and gating it on iommu_hwdom_strict seems wrong to me,
> > the strictness of the iommu doesn't affect whether a sync is need or
> > not.
> 
> I think need_sync is gated on strict mode because, in 'relaxed' mode, the mappings that are set up when dom0 is started are supposed to be static (modulo hotplug RAM)... so modifications to the domain's page list are not supposed to have any effect, and so no synchronization need be done.

Hm, right, in relaxed mode dom0 is supposed to have all RAM regions
mapped in the iommu page-tables, so there's no need to modify the
iommu page tables at run time.

This approach seems slightly broken if dma operations agains mmio
regions are attempted by dom0, but anyway, this seems to have worked
fine so far.

> > 
> > I've updated the patch to avoid the pointless mapping of dom0 page
> > list, but I haven't included the change to set_identity_p2m_entry.
> > 
> 
> So, I think the albeit odd looking logic in iommu_hwdom_init() was actually correct, but the code in set_identity_p2m_entry() is wrong.

Ack, see the patch below. I think it might also be helpful to add a
comment to the setting of need_sync in iommu_hwdom_init in order to
mention that relaxed domains don't need sync because all ram is
already mapped in the iommu page tables.

Thanks, Roger.
---8<---
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index fef97c82f6..88a2430c8c 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -836,7 +836,7 @@ guest_physmap_add_page(struct domain *d, gfn_t gfn, mfn_t mfn,
          */
         for ( i = 0; i < (1UL << page_order); ++i, ++page )
         {
-            if ( !need_iommu_pt_sync(d) )
+            if ( !has_iommu_pt(d) )
                 /* nothing */;
             else if ( get_page_and_type(page, d, PGT_writable_page) )
                 put_page_and_type(page);
@@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
 
     if ( !paging_mode_translate(p2m->domain) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
                                 IOMMUF_readable | IOMMUF_writable);
@@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
 
     if ( !paging_mode_translate(d) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
     }


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply related	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-22 14:39             ` Roger Pau Monné
@ 2019-07-22 15:02               ` Paul Durrant
  2019-07-22 15:21                 ` Roger Pau Monné
  0 siblings, 1 reply; 65+ messages in thread
From: Paul Durrant @ 2019-07-22 15:02 UTC (permalink / raw)
  To: Roger Pau Monne
  Cc: jgross, Andrew Cooper, 'Roman Shaposhnik',
	jbeulich, xen-devel, boris.ostrovsky



> -----Original Message-----
> From: Roger Pau Monne <roger.pau@citrix.com>
> Sent: 22 July 2019 15:40
> To: Paul Durrant <Paul.Durrant@citrix.com>
> Cc: 'Roman Shaposhnik' <roman@zededa.com>; xen-devel@lists.xenproject.org; jgross@suse.com; Andrew
> Cooper <Andrew.Cooper3@citrix.com>; boris.ostrovsky@oracle.com; jbeulich@suse.com
> Subject: Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
> 
> On Mon, Jul 22, 2019 at 04:03:44PM +0200, Paul Durrant wrote:
> > > -----Original Message-----
> > [snip]
> > > > > diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> > > > > index 79ec6719f5..9d91f0d633 100644
> > > > > --- a/xen/drivers/passthrough/iommu.c
> > > > > +++ b/xen/drivers/passthrough/iommu.c
> > > > > @@ -185,7 +185,7 @@ void __hwdom_init iommu_hwdom_init(struct domain *d)
> > > > >      register_keyhandler('o', &iommu_dump_p2m_table, "dump iommu p2m table", 0);
> > > > >
> > > > >      hd->status = IOMMU_STATUS_initializing;
> > > > > -    hd->need_sync = iommu_hwdom_strict && !iommu_use_hap_pt(d);
> > > > > +    hd->need_sync = !iommu_use_hap_pt(d);
> > > >
> > > > But this is going to mean the if() below is true for non-strict dom0, which means it pointlessly
> > > maps the dom0 page list when hwdom_iommu_map() should have already mapped all conventional RAM.
> > >
> > > Right, this all seems quite broken. Non-translated guests (ie: PV)
> > > would always need iommu page-table sync, but set_identity_p2m_entry
> > > contains the following:
> > >
> > > if ( !paging_mode_translate(p2m->domain) )
> > > {
> > >     if ( !need_iommu_pt_sync(d) )
> > >         return 0;
> > >     return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
> > >                             IOMMUF_readable | IOMMUF_writable);
> > > }
> > >
> > > I wonder whether the usage of need_iommu_pt_sync is wrong there, and
> > > should instead be !has_iommu_pt(d), since non-translated domains would
> > > never share the iommu page-tables anyway.
> >
> > You want syncing if the domain has IOMMU page tables and shared EPT is not in use, so this logic
> just seems wrong.
> 
> Right, so for a PV domain this would mean syncing if the iommu is in
> used, because there's no sharing at all.
> 
> > >
> > > In any case, I think need_sync must be set when the iommu page tables
> > > are not shared, and gating it on iommu_hwdom_strict seems wrong to me,
> > > the strictness of the iommu doesn't affect whether a sync is need or
> > > not.
> >
> > I think need_sync is gated on strict mode because, in 'relaxed' mode, the mappings that are set up
> when dom0 is started are supposed to be static (modulo hotplug RAM)... so modifications to the
> domain's page list are not supposed to have any effect, and so no synchronization need be done.
> 
> Hm, right, in relaxed mode dom0 is supposed to have all RAM regions
> mapped in the iommu page-tables, so there's no need to modify the
> iommu page tables at run time.
> 
> This approach seems slightly broken if dma operations agains mmio
> regions are attempted by dom0, but anyway, this seems to have worked
> fine so far.
> 
> > >
> > > I've updated the patch to avoid the pointless mapping of dom0 page
> > > list, but I haven't included the change to set_identity_p2m_entry.
> > >
> >
> > So, I think the albeit odd looking logic in iommu_hwdom_init() was actually correct, but the code in
> set_identity_p2m_entry() is wrong.
> 
> Ack, see the patch below. I think it might also be helpful to add a
> comment to the setting of need_sync in iommu_hwdom_init in order to
> mention that relaxed domains don't need sync because all ram is
> already mapped in the iommu page tables.

Agreed.

> 
> Thanks, Roger.
> ---8<---
> diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> index fef97c82f6..88a2430c8c 100644
> --- a/xen/arch/x86/mm/p2m.c
> +++ b/xen/arch/x86/mm/p2m.c
> @@ -836,7 +836,7 @@ guest_physmap_add_page(struct domain *d, gfn_t gfn, mfn_t mfn,
>           */
>          for ( i = 0; i < (1UL << page_order); ++i, ++page )
>          {
> -            if ( !need_iommu_pt_sync(d) )
> +            if ( !has_iommu_pt(d) )
>                  /* nothing */;
>              else if ( get_page_and_type(page, d, PGT_writable_page) )
>                  put_page_and_type(page);
> @@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
> 
>      if ( !paging_mode_translate(p2m->domain) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>              return 0;
>          return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
>                                  IOMMUF_readable | IOMMUF_writable);
> @@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
> 
>      if ( !paging_mode_translate(d) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>              return 0;
>          return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
>      }

Yes, this all looks ok to me... although I still find it counterintuitive that we make p2m calls for PV domains.

  Paul


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-22 15:02               ` Paul Durrant
@ 2019-07-22 15:21                 ` Roger Pau Monné
  2019-07-22 23:36                   ` Roman Shaposhnik
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-07-22 15:21 UTC (permalink / raw)
  To: Paul Durrant
  Cc: jgross, Andrew Cooper, 'Roman Shaposhnik',
	jbeulich, xen-devel, boris.ostrovsky

On Mon, Jul 22, 2019 at 05:02:35PM +0200, Paul Durrant wrote:
> > -----Original Message-----
> > From: Roger Pau Monne <roger.pau@citrix.com>
> > Sent: 22 July 2019 15:40
> > To: Paul Durrant <Paul.Durrant@citrix.com>
> > Cc: 'Roman Shaposhnik' <roman@zededa.com>; xen-devel@lists.xenproject.org; jgross@suse.com; Andrew
> > Cooper <Andrew.Cooper3@citrix.com>; boris.ostrovsky@oracle.com; jbeulich@suse.com
> > Subject: Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
> > diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> > index fef97c82f6..88a2430c8c 100644
> > --- a/xen/arch/x86/mm/p2m.c
> > +++ b/xen/arch/x86/mm/p2m.c
> > @@ -836,7 +836,7 @@ guest_physmap_add_page(struct domain *d, gfn_t gfn, mfn_t mfn,
> >           */
> >          for ( i = 0; i < (1UL << page_order); ++i, ++page )
> >          {
> > -            if ( !need_iommu_pt_sync(d) )
> > +            if ( !has_iommu_pt(d) )
> >                  /* nothing */;
> >              else if ( get_page_and_type(page, d, PGT_writable_page) )
> >                  put_page_and_type(page);
> > @@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
> > 
> >      if ( !paging_mode_translate(p2m->domain) )
> >      {
> > -        if ( !need_iommu_pt_sync(d) )
> > +        if ( !has_iommu_pt(d) )
> >              return 0;
> >          return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
> >                                  IOMMUF_readable | IOMMUF_writable);
> > @@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
> > 
> >      if ( !paging_mode_translate(d) )
> >      {
> > -        if ( !need_iommu_pt_sync(d) )
> > +        if ( !has_iommu_pt(d) )
> >              return 0;
> >          return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
> >      }
> 
> Yes, this all looks ok to me... although I still find it counterintuitive that we make p2m calls for PV domains.

I agree, albeit I'm not sure of how to get rid of those, will need to
look at the callers. For iommu callers we could likely just call
iommu_legacy_{map/unmap} for PV.

I'm going to formally submit this patch then.

Thanks, Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-22 15:21                 ` Roger Pau Monné
@ 2019-07-22 23:36                   ` Roman Shaposhnik
  2019-07-22 23:47                     ` Andrew Cooper
  0 siblings, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-22 23:36 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

Hi Everyone!

Thanks a million for an extremely quick turnaround. I am in my lab
again next to the box in question.

Should I go ahead and test the latest patch or wait for the official
one to be submitted?

Thanks,
Roman.

On Mon, Jul 22, 2019 at 8:22 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>
> On Mon, Jul 22, 2019 at 05:02:35PM +0200, Paul Durrant wrote:
> > > -----Original Message-----
> > > From: Roger Pau Monne <roger.pau@citrix.com>
> > > Sent: 22 July 2019 15:40
> > > To: Paul Durrant <Paul.Durrant@citrix.com>
> > > Cc: 'Roman Shaposhnik' <roman@zededa.com>; xen-devel@lists.xenproject.org; jgross@suse.com; Andrew
> > > Cooper <Andrew.Cooper3@citrix.com>; boris.ostrovsky@oracle.com; jbeulich@suse.com
> > > Subject: Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
> > > diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> > > index fef97c82f6..88a2430c8c 100644
> > > --- a/xen/arch/x86/mm/p2m.c
> > > +++ b/xen/arch/x86/mm/p2m.c
> > > @@ -836,7 +836,7 @@ guest_physmap_add_page(struct domain *d, gfn_t gfn, mfn_t mfn,
> > >           */
> > >          for ( i = 0; i < (1UL << page_order); ++i, ++page )
> > >          {
> > > -            if ( !need_iommu_pt_sync(d) )
> > > +            if ( !has_iommu_pt(d) )
> > >                  /* nothing */;
> > >              else if ( get_page_and_type(page, d, PGT_writable_page) )
> > >                  put_page_and_type(page);
> > > @@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
> > >
> > >      if ( !paging_mode_translate(p2m->domain) )
> > >      {
> > > -        if ( !need_iommu_pt_sync(d) )
> > > +        if ( !has_iommu_pt(d) )
> > >              return 0;
> > >          return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
> > >                                  IOMMUF_readable | IOMMUF_writable);
> > > @@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
> > >
> > >      if ( !paging_mode_translate(d) )
> > >      {
> > > -        if ( !need_iommu_pt_sync(d) )
> > > +        if ( !has_iommu_pt(d) )
> > >              return 0;
> > >          return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
> > >      }
> >
> > Yes, this all looks ok to me... although I still find it counterintuitive that we make p2m calls for PV domains.
>
> I agree, albeit I'm not sure of how to get rid of those, will need to
> look at the callers. For iommu callers we could likely just call
> iommu_legacy_{map/unmap} for PV.
>
> I'm going to formally submit this patch then.
>
> Thanks, Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-22 23:36                   ` Roman Shaposhnik
@ 2019-07-22 23:47                     ` Andrew Cooper
  2019-07-23 17:32                       ` Roman Shaposhnik
  0 siblings, 1 reply; 65+ messages in thread
From: Andrew Cooper @ 2019-07-22 23:47 UTC (permalink / raw)
  To: Roman Shaposhnik, Roger Pau Monné
  Cc: jgross, xen-devel, boris.ostrovsky, Paul Durrant, jbeulich

On 23/07/2019 00:36, Roman Shaposhnik wrote:
> Hi Everyone!
>
> Thanks a million for an extremely quick turnaround. I am in my lab
> again next to the box in question.
>
> Should I go ahead and test the latest patch or wait for the official
> one to be submitted?
>
> Thanks,
> Roman.

Use this patch to test with.  Roger forgot to CC you on the official
one, but the code changes are identical.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-22 23:47                     ` Andrew Cooper
@ 2019-07-23 17:32                       ` Roman Shaposhnik
  2019-07-23 17:35                         ` Andrew Cooper
                                           ` (2 more replies)
  0 siblings, 3 replies; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-23 17:32 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

[-- Attachment #1: Type: text/plain, Size: 918 bytes --]

Hi Roger!

I applied your patch, removed no-igfx and I still see the original
problem. Please let me know what other logs/debugs would you need at
this point.

Btw, just to make it clear what patch got applied I'm attaching it to
this email.

Oh, and it seems that that https://downloads.xenproject.org/ SSL
certificate expired yesterday -- perhaps somebody can take a look at
that.

Thanks,
Roman.

On Mon, Jul 22, 2019 at 4:47 PM Andrew Cooper <andrew.cooper3@citrix.com> wrote:
>
> On 23/07/2019 00:36, Roman Shaposhnik wrote:
> > Hi Everyone!
> >
> > Thanks a million for an extremely quick turnaround. I am in my lab
> > again next to the box in question.
> >
> > Should I go ahead and test the latest patch or wait for the official
> > one to be submitted?
> >
> > Thanks,
> > Roman.
>
> Use this patch to test with.  Roger forgot to CC you on the official
> one, but the code changes are identical.
>
> ~Andrew

[-- Attachment #2: 01-iommu-mappings.patch --]
[-- Type: application/octet-stream, Size: 1266 bytes --]

diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index fef97c82f6..88a2430c8c 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -836,7 +836,7 @@ guest_physmap_add_page(struct domain *d, gfn_t gfn, mfn_t 
mfn,
          */
         for ( i = 0; i < (1UL << page_order); ++i, ++page )
         {
-            if ( !need_iommu_pt_sync(d) )
+            if ( !has_iommu_pt(d) )
                 /* nothing */;
             else if ( get_page_and_type(page, d, PGT_writable_page) )
                 put_page_and_type(page);
@@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned 
long gfn_l,
 
     if ( !paging_mode_translate(p2m->domain) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
                                 IOMMUF_readable | IOMMUF_writable);
@@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned 
long gfn_l)
 
     if ( !paging_mode_translate(d) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
     }
-- 
2.20.1 (Apple Git-117)

[-- Attachment #3: Type: text/plain, Size: 157 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply related	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-23 17:32                       ` Roman Shaposhnik
@ 2019-07-23 17:35                         ` Andrew Cooper
  2019-07-23 17:48                           ` Roman Shaposhnik
  2019-07-24 11:23                         ` Andrew Cooper
  2019-07-24 14:11                         ` Roger Pau Monné
  2 siblings, 1 reply; 65+ messages in thread
From: Andrew Cooper @ 2019-07-23 17:35 UTC (permalink / raw)
  To: Roman Shaposhnik, Roger Pau Monné
  Cc: jgross, xen-devel, boris.ostrovsky, Paul Durrant, jbeulich

On 23/07/2019 18:32, Roman Shaposhnik wrote:
> Hi Roger!
>
> I applied your patch, removed no-igfx and I still see the original
> problem. Please let me know what other logs/debugs would you need at
> this point.

Please can you collect a full boot log with iommu=debug

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-23 17:35                         ` Andrew Cooper
@ 2019-07-23 17:48                           ` Roman Shaposhnik
  2019-07-23 17:50                             ` Andrew Cooper
  0 siblings, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-23 17:48 UTC (permalink / raw)
  To: Andrew Cooper
  Cc: jgross, Paul Durrant, jbeulich, xen-devel, boris.ostrovsky,
	Roger Pau Monné

[-- Attachment #1: Type: text/plain, Size: 767 bytes --]

On Tue, Jul 23, 2019 at 10:35 AM Andrew Cooper
<andrew.cooper3@citrix.com> wrote:
>
> On 23/07/2019 18:32, Roman Shaposhnik wrote:
> > Hi Roger!
> >
> > I applied your patch, removed no-igfx and I still see the original
> > problem. Please let me know what other logs/debugs would you need at
> > this point.
>
> Please can you collect a full boot log with iommu=debug

How long of an output should I expect when iommu=debug is enabled?
I've just enabled it and I'm looking at what appears to be an endless
scroll of debug info.

This is all I see for the good 5 minutes at this point. Culminating with:
(XEN)   (XEN) APIC error on CPU0: 40(00)

and a failure to boot.

Note that this is still without no-igfx

I'm attaching the tail end of this log.

Thanks,
Roman.

[-- Attachment #2: xen-log.txt --]
[-- Type: text/plain, Size: 353977 bytes --]

(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
((XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e224
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e290
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e300
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e368
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e402
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e409
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e475
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ab
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e552
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e516
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e544
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e582
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5e8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ee
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e623
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e690
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e02f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e475
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e696
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e475
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e49c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ab
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e516
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e582
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e582
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ee
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e623
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e659
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e690
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e117
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e183
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e225
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e225
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e293
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0df
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ec
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e42a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e562
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ec
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e404
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e689
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e49e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e580
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e692
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0a9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e178
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e625
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e693
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1c0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ec
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e42f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e61c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0dd
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1c0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e223
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e61d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
((XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e46e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e61c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e6c0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
((XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4da
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e689
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e036
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e180
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
((XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e117
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e183
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ad
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1eb
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e21d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e225
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e293
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e368
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d3
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e409
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e474
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e516
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e516
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e581
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e290
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e368
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e403
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e40a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e440
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e475
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e476
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ac
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ac
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e518
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e583
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e584
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e61a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e625
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e693
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e690
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e09e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 162(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e40a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e440
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e475
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e476
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ac
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e518
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e584
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e625
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e6db
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e693
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e09b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0dc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e117
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e183
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e225
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2ca
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e6c0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e180
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 162(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e18a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e257
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e405
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e61d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e406
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4d9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4dd
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e576
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e655
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e689
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e174
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e186
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 162(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e518
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e583
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e625
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e693
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e024
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e117
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e183
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e225
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e293
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2be
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e182
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1e2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ee
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e224
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e290
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e360
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e368
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e431
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d3
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e409
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e475
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ab
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e516
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e540
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e582
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e224
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e290
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2bb
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e323
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e368
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d3
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e409
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e46b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e475
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ab
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e516
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e582
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ee
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e624
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e659
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e686
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e690
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e58d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e036
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1c0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e171
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ec
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e6a2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e421
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
((XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ac
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4db
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e518
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e584
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ba
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5e2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5f0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e625
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e6a3
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e693
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e061
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0a2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e167
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e117
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e183
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e225
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2bf
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e290
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 162(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e690
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0a3
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e117
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e144
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e183
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e225
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e293
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e330
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e369
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d5
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e40b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e441
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e441
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e476
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e476
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ad
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e257
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e399
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e49f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e514
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5a7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b5
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5dc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5eb
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e621
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e657
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 162(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3fe
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e547
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e037
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e17b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 162(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1c0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e425
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
((XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e117
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e17d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e183
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e225
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e288
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e293
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e326
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e368
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e452
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e40b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e440
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e476
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ac
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e548
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e518
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e584
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ba
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5f0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5e6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e6c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e180
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e578
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e699
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e035
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ec
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e257
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e16f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e471
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4d9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e514
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e580
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 162(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e576
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e514
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b5
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5eb
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
((XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e516
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e581
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e622
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e622
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e658
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e147
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e286
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e182
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ee
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e224
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e290
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e368
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3ce
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e40a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e440
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e476
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ac
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ac
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e517
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e518
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e583
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e224
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2b6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2dc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e290
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e368
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e41e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e40a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e440
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e475
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ac
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e517
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e583
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e625
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e693
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5e6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0a7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e170
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e223
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e259
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c5
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e300
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2f9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e365
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e407
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e690
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
((XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ac
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e2
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e518
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e542
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e583
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ec
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e625
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e693
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e117
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e183
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1e1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ee
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e224
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e24a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e290
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e167
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e182
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ee
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e21f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e223
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2a6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2e6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e290
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e32a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e368
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d3
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e409
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e474
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e516
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e581
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e224
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e25a
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e290
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c6
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fc
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e368
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e39d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e3d3
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e409
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e475
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e475
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ab
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4ab
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e52d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4e1
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e517
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e54d
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e582
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b9
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5e7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ef
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e625
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e65b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e690
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e065
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e43c
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e472
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4a8
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e4de
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e579
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e513
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e549
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e57f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5b4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e5ea
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[072] = 0
(XEN)     l2[072] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e620
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e694
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e656
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e68b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[073] = 0
(XEN)     l2[073] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e03e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e074
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0aa
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e0e0
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e17f
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e116
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e14b
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e180
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e181
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1b7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e1ed
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[070] = 0
(XEN)     l2[070] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e222
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e258
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e28e
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c4
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)   (XEN) APIC error on CPU0: 40(00)

[-- Attachment #3: Type: text/plain, Size: 157 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-23 17:48                           ` Roman Shaposhnik
@ 2019-07-23 17:50                             ` Andrew Cooper
  2019-07-23 17:58                               ` Roman Shaposhnik
  0 siblings, 1 reply; 65+ messages in thread
From: Andrew Cooper @ 2019-07-23 17:50 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Paul Durrant, jbeulich, xen-devel, boris.ostrovsky,
	Roger Pau Monné

On 23/07/2019 18:48, Roman Shaposhnik wrote:
> On Tue, Jul 23, 2019 at 10:35 AM Andrew Cooper
> <andrew.cooper3@citrix.com> wrote:
>> On 23/07/2019 18:32, Roman Shaposhnik wrote:
>>> Hi Roger!
>>>
>>> I applied your patch, removed no-igfx and I still see the original
>>> problem. Please let me know what other logs/debugs would you need at
>>> this point.
>> Please can you collect a full boot log with iommu=debug
> How long of an output should I expect when iommu=debug is enabled?
> I've just enabled it and I'm looking at what appears to be an endless
> scroll of debug info.
>
> This is all I see for the good 5 minutes at this point. Culminating with:
> (XEN)   (XEN) APIC error on CPU0: 40(00)
>
> and a failure to boot.
>
> Note that this is still without no-igfx
>
> I'm attaching the tail end of this log.

Sadly, what is useful is the head of the log, before it starts
complaining loudly about every DMA fault.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-23 17:50                             ` Andrew Cooper
@ 2019-07-23 17:58                               ` Roman Shaposhnik
  2019-07-23 18:12                                 ` Andrew Cooper
  2019-07-24 12:00                                 ` Jan Beulich
  0 siblings, 2 replies; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-23 17:58 UTC (permalink / raw)
  To: Andrew Cooper
  Cc: jgross, Paul Durrant, jbeulich, xen-devel, boris.ostrovsky,
	Roger Pau Monné

[-- Attachment #1: Type: text/plain, Size: 1201 bytes --]

On Tue, Jul 23, 2019 at 10:50 AM Andrew Cooper
<andrew.cooper3@citrix.com> wrote:
>
> On 23/07/2019 18:48, Roman Shaposhnik wrote:
> > On Tue, Jul 23, 2019 at 10:35 AM Andrew Cooper
> > <andrew.cooper3@citrix.com> wrote:
> >> On 23/07/2019 18:32, Roman Shaposhnik wrote:
> >>> Hi Roger!
> >>>
> >>> I applied your patch, removed no-igfx and I still see the original
> >>> problem. Please let me know what other logs/debugs would you need at
> >>> this point.
> >> Please can you collect a full boot log with iommu=debug
> > How long of an output should I expect when iommu=debug is enabled?
> > I've just enabled it and I'm looking at what appears to be an endless
> > scroll of debug info.
> >
> > This is all I see for the good 5 minutes at this point. Culminating with:
> > (XEN)   (XEN) APIC error on CPU0: 40(00)
> >
> > and a failure to boot.
> >
> > Note that this is still without no-igfx
> >
> > I'm attaching the tail end of this log.
>
> Sadly, what is useful is the head of the log, before it starts
> complaining loudly about every DMA fault.

No worries. Take a look at the head of the log attached.

Btw, I'm kind of curious why iommu=debug would actually make it crash

Thanks,
Roman.

[-- Attachment #2: xen-log2.txt --]
[-- Type: text/plain, Size: 10596 bytes --]

0x0000:0x00:0x02.0x0: ROM: 0x10000 bytes at 0x8968d018
0x0000:0x02:0x00.0x0: ROM: 0x10000 bytes at 0x89640018
0x0000:0x00:0x1f.0x6: ROM: 0x10c00 bytes at 0x8962f018
 Xen 4.12.0
(XEN) Xen version 4.12.0 (@) (gcc (Alpine 6.4.0) 6.4.0) debug=n  Tue Jul 23 17:15:48 UTC 2019
(XEN) Latest ChangeSet:
(XEN) Bootloader: GRUB 2.03
(XEN) Command line: com1=115200,8n1 console=com1,vga iommu=debug dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=false
(XEN) Xen image load base address: 0x88000000
(XEN) Video information:
(XEN)  VGA is graphics mode 1680x1050, 32 bpp
(XEN) Disc information:
(XEN)  Found 0 MBR signatures
(XEN)  Found 1 EDD information structures
(XEN) EFI RAM map:
(XEN)  0000000000000000 - 0000000000058000 (usable)
(XEN)  0000000000058000 - 0000000000059000 (reserved)
(XEN)  0000000000059000 - 000000000009f000 (usable)
(XEN)  000000000009f000 - 00000000000a0000 (reserved)
(XEN)  0000000000100000 - 000000008648a000 (usable)
(XEN)  000000008648a000 - 000000008648b000 (ACPI NVS)
(XEN)  000000008648b000 - 00000000864b5000 (reserved)
(XEN)  00000000864b5000 - 000000008c224000 (usable)
(XEN)  000000008c224000 - 000000008c528000 (reserved)
(XEN)  000000008c528000 - 000000008c736000 (usable)
(XEN)  000000008c736000 - 000000008cea7000 (ACPI NVS)
(XEN)  000000008cea7000 - 000000008d2ff000 (reserved)
(XEN)  000000008d2ff000 - 000000008d300000 (usable)
(XEN)  000000008d300000 - 000000008d400000 (reserved)
(XEN)  00000000e0000000 - 00000000f0000000 (reserved)
(XEN)  00000000fe000000 - 00000000fe011000 (reserved)
(XEN)  00000000fec00000 - 00000000fec01000 (reserved)
(XEN)  00000000fee00000 - 00000000fee01000 (reserved)
(XEN)  00000000ff000000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 000000016e000000 (usable)
(XEN) ACPI: RSDP 8CE49000, 0024 (r2 ALASKA)
(XEN) ACPI: XSDT 8CE490A8, 00CC (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FACP 8CE6C370, 010C (r5 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DSDT 8CE49208, 23167 (r2 ALASKA   A M I   1072009 INTL 20120913)
(XEN) ACPI: FACS 8CE8EF80, 0040
(XEN) ACPI: APIC 8CE6C480, 0084 (r3 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FPDT 8CE6C508, 0044 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FIDT 8CE6C550, 009C (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: MCFG 8CE6C5F0, 003C (r1 ALASKA   A M I   1072009 MSFT       97)
(XEN) ACPI: HPET 8CE6C630, 0038 (r1 ALASKA   A M I   1072009 AMI.    5000B)
(XEN) ACPI: LPIT 8CE6C668, 0094 (r1 INTEL   SKL-ULT        0 MSFT       5F)
(XEN) ACPI: SSDT 8CE6C700, 0248 (r2 INTEL  sensrhub        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE6C948, 2BAE (r2 INTEL  PtidDevc     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE6F4F8, 0BE3 (r2 INTEL  Ther_Rvp     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE700E0, 04A3 (r2 INTEL     zpodd     1000 INTL 20120913)
(XEN) ACPI: DBGP 8CE70588, 0034 (r1 INTEL                  0 MSFT       5F)
(XEN) ACPI: DBG2 8CE705C0, 0054 (r0 INTEL                  0 MSFT       5F)
(XEN) ACPI: SSDT 8CE70618, 06E9 (r2  INTEL xh_rvp07        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE70D08, 547E (r2 SaSsdt  SaSsdt      3000 INTL 20120913)
(XEN) ACPI: UEFI 8CE76188, 0042 (r1                        0             0)
(XEN) ACPI: SSDT 8CE761D0, 0E73 (r2 CpuRef  CpuSsdt     3000 INTL 20120913)
(XEN) ACPI: BGRT 8CE77048, 0038 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DMAR 8CE77080, 00A8 (r1 INTEL      SKL         1 INTL        1)
(XEN) ACPI: TPM2 8CE77128, 0034 (r3        Tpm2Tabl        1 AMI         0)
(XEN) ACPI: ASF! 8CE77160, 00A5 (r32 INTEL       HCG        1 TFSM    F4240)
(XEN) System RAM: 4003MB (4099736kB)
(XEN) Domain heap initialised
(XEN) ACPI: 32/64X FACS address mismatch in FADT - 8ce8ef80/0000000000000000, using 32
(XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
(XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
(XEN) [VT-D]Host address width 39
(XEN) [VT-D]found ACPI_DMAR_DRHD:
(XEN) [VT-D]  dmaru->address = fed90000
(XEN) [VT-D]drhd->address = fed90000 iommu->reg = ffff82c0008de000
(XEN) [VT-D]cap = 1c0000c40660462 ecap = 7e3ff0505e
(XEN) [VT-D] endpoint: 0000:00:02.0
(XEN) [VT-D]found ACPI_DMAR_DRHD:
(XEN) [VT-D]  dmaru->address = fed91000
(XEN) [VT-D]drhd->address = fed91000 iommu->reg = ffff82c0008e0000
(XEN) [VT-D]cap = d2008c40660462 ecap = f050da
(XEN) [VT-D] IOAPIC: 0000:f0:1f.0
(XEN) [VT-D] MSI HPET: 0000:00:1f.0
(XEN) [VT-D]  flags: INCLUDE_ALL
(XEN) [VT-D]found ACPI_DMAR_RMRR:
(XEN) [VT-D] endpoint: 0000:00:14.0
(XEN) [VT-D]found ACPI_DMAR_RMRR:
(XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved memory; need "iommu_inclusive_mapping=1"?
(XEN) [VT-D] endpoint: 0000:00:02.0
(XEN) Switched to APIC driver x2apic_cluster.
(XEN) xstate: size: 0x440 and states: 0x1f
(XEN) Speculative mitigation facilities:
(XEN)   Hardware features:
(XEN)   Compiled-in support: SHADOW_PAGING
(XEN)   Xen settings: BTI-Thunk N/A, SPEC_CTRL: No, Other:
(XEN)   L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 39, Safe address 8000000000
(XEN)   Support for HVM VMs: RSB EAGER_FPU
(XEN)   Support for PV VMs: RSB EAGER_FPU
(XEN)   XPTI (64-bit PV only): Dom0 enabled, DomU enabled (with PCID)
(XEN)   PV L1TF shadowing: Dom0 disabled, DomU enabled
(XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) Initializing Credit2 scheduler
(XEN) Platform timer is 23.999MHz HPET
(XEN) Detected 2496.140 MHz processor.
(XEN) Initing memory sharing.
(XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d Snoop Control not enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) Intel VT-d Posted Interrupt not enabled.
(XEN) Intel VT-d Shared EPT tables enabled.
(XEN) I/O virtualisation enabled
(XEN)  - Dom0 mode: Relaxed
(XEN) Interrupt remapping enabled
(XEN) Enabled directed EOI with ioapic_ack_old on!
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using old ACK method
(XEN) TSC_DEADLINE disabled due to Errata; please update microcode to version 0xb2 (or later)
(XEN) Allocated console ring of 16 KiB.
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) VMX: Supported advanced features:
(XEN)  - APIC MMIO access virtualisation
(XEN)  - APIC TPR shadow
(XEN)  - Extended Page Tables (EPT)
(XEN)  - Virtual-Processor Identifiers (VPID)
(XEN)  - Virtual NMI
(XEN)  - MSR direct-access bitmap
(XEN)  - Unrestricted Guest
(XEN)  - VMCS shadowing
(XEN)  - VM Functions
(XEN)  - Virtualisation Exceptions
(XEN)  - Page Modification Logging
(XEN) HVM: ASIDs enabled.
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging (HAP) detected
(XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) Brought up 2 CPUs
(XEN) Dom0 has maximum 312 PIRQs
(XEN)  Xen  kernel: 64-bit, lsb, compat32
(XEN)  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x2a2c000
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000164000000->0000000168000000 (245760 pages to be allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: ffffffff81000000->ffffffff82a2c000
(XEN)  Init. ramdisk: 0000000000000000->0000000000000000
(XEN)  Phys-Mach map: 0000008000000000->0000008000200000
(XEN)  Start info:    ffffffff82a2c000->ffffffff82a2c4b4
(XEN)  Xenstore ring: 0000000000000000->0000000000000000
(XEN)  Console ring:  0000000000000000->0000000000000000
(XEN)  Page tables:   ffffffff82a2d000->ffffffff82a46000
(XEN)  Boot stack:    ffffffff82a46000->ffffffff82a47000
(XEN)  TOTAL:         ffffffff80000000->ffffffff82c00000
(XEN)  ENTRY ADDRESS: ffffffff826af180
(XEN) Dom0 has maximum 1 VCPUs
(XEN) [VT-D]d0:Hostbridge: skip 0000:00:00.0 map
(XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
(XEN) [VT-D]d0:PCIe: map 0000:00:02.0
(XEN) [VT-D]d0:PCI: map 0000:00:08.0
(XEN) [VT-D]d0:PCI: map 0000:00:14.0
(XEN) [VT-D]d0:PCI: map 0000:00:14.2
(XEN) [VT-D]d0:PCI: map 0000:00:16.0
(XEN) [VT-D]d0:PCI: map 0000:00:17.0
(XEN) [VT-D]d0:PCI: map 0000:00:1f.0
(XEN) [VT-D]d0:PCI: map 0000:00:1f.2
(XEN) [VT-D]d0:PCI: map 0000:00:1f.3
(XEN) [VT-D]d0:PCI: map 0000:00:1f.4
(XEN) [VT-D]d0:PCI: map 0000:00:1f.6
(XEN) [VT-D]d0:PCIe: map 0000:01:00.0
(XEN) [VT-D]d0:PCIe: map 0000:02:00.0
(XEN) [VT-D]iommu_enable_translation: iommu->reg = ffff82c0008de000
(XEN) [VT-D]iommu_enable_translation: iommu->reg = ffff82c0008e0000
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Scrubbing Free RAM in background
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) Xen is relinquishing VGA console.
(XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
(XEN) Freed 480kB init memory
(XEN) [VT-D]DMAR:[DMA Write] Request device [0000:00:02.0] fault addr 0, iommu reg = ffff82c0008de000
(XEN) [VT-D]DMAR: reason 01 - Present bit in root entry is clear
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 00000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[000] = 16bcd0003
(XEN)     l2[000] = 16bccf003
(XEN)     l1[000] = 3
(XEN) [VT-D]INTR-REMAP: Request device [0000:f0:1f.0] fault index 0, iommu reg = ffff82c0008e0000
(XEN) [VT-D]INTR-REMAP: reason 22 - Present field in the IRTE entry is clear
mapping kernel into physical memory
about to get started...
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr 8e2c7000, iommu reg = ffff82c0008de000
(XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2c7
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr 8e2fd000, iommu reg = ffff82c0008de000
(XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e2fd
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[002] = 1628cb003
(XEN)     l2[071] = 0
(XEN)     l2[071] not present
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr 8e332000, iommu reg = ffff82c0008de000
(XEN) [VT-D]DMAR: reason 06 - PTE Read access is not set
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 8e332
(XEN)     root_entry[00] = 16bcd3001

[-- Attachment #3: Type: text/plain, Size: 157 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-23 17:58                               ` Roman Shaposhnik
@ 2019-07-23 18:12                                 ` Andrew Cooper
  2019-07-23 18:25                                   ` Roman Shaposhnik
  2019-07-24 12:00                                 ` Jan Beulich
  1 sibling, 1 reply; 65+ messages in thread
From: Andrew Cooper @ 2019-07-23 18:12 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Paul Durrant, jbeulich, xen-devel, boris.ostrovsky,
	Roger Pau Monné


[-- Attachment #1.1: Type: text/plain, Size: 2079 bytes --]

On 23/07/2019 18:58, Roman Shaposhnik wrote:
> On Tue, Jul 23, 2019 at 10:50 AM Andrew Cooper
> <andrew.cooper3@citrix.com> wrote:
>> On 23/07/2019 18:48, Roman Shaposhnik wrote:
>>> On Tue, Jul 23, 2019 at 10:35 AM Andrew Cooper
>>> <andrew.cooper3@citrix.com> wrote:
>>>> On 23/07/2019 18:32, Roman Shaposhnik wrote:
>>>>> Hi Roger!
>>>>>
>>>>> I applied your patch, removed no-igfx and I still see the original
>>>>> problem. Please let me know what other logs/debugs would you need at
>>>>> this point.
>>>> Please can you collect a full boot log with iommu=debug
>>> How long of an output should I expect when iommu=debug is enabled?
>>> I've just enabled it and I'm looking at what appears to be an endless
>>> scroll of debug info.
>>>
>>> This is all I see for the good 5 minutes at this point. Culminating with:
>>> (XEN)   (XEN) APIC error on CPU0: 40(00)
>>>
>>> and a failure to boot.
>>>
>>> Note that this is still without no-igfx
>>>
>>> I'm attaching the tail end of this log.
>> Sadly, what is useful is the head of the log, before it starts
>> complaining loudly about every DMA fault.
> No worries. Take a look at the head of the log attached.
>
> Btw, I'm kind of curious why iommu=debug would actually make it crash

The system is rather sickly, and is debugging at a rate slower than
incoming faults, which is going to starve whichever CPU is taking the
IOMMU interrupt.

I wouldn't worry about the APIC error now.

Curiously, there is one single intremap error on boot, which is likely
unrelated.

(XEN) [VT-D]INTR-REMAP: Request device [0000:f0:1f.0] fault index 0, iommu reg = ffff82c0008e0000

(XEN) [VT-D]INTR-REMAP: reason 22 - Present field in the IRTE entry is clear


This will be irq0 from the IO-APIC.

Can you try booting following the guidance from

(XEN) [VT-D]found ACPI_DMAR_RMRR:

(XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved memory; need "iommu_inclusive_mapping=1"?

(XEN) [VT-D] endpoint: 0000:00:02.0


which I noted on my first reply?  Given that Rogers patch didn't help,
something else is going on.

~Andrew

[-- Attachment #1.2: Type: text/html, Size: 3378 bytes --]

[-- Attachment #2: Type: text/plain, Size: 157 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-23 18:12                                 ` Andrew Cooper
@ 2019-07-23 18:25                                   ` Roman Shaposhnik
  2019-07-26  7:58                                     ` Jan Beulich
  0 siblings, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-23 18:25 UTC (permalink / raw)
  To: Andrew Cooper
  Cc: jgross, Paul Durrant, jbeulich, xen-devel, boris.ostrovsky,
	Roger Pau Monné

[-- Attachment #1: Type: text/plain, Size: 2585 bytes --]

On Tue, Jul 23, 2019 at 11:12 AM Andrew Cooper
<andrew.cooper3@citrix.com> wrote:
>
> On 23/07/2019 18:58, Roman Shaposhnik wrote:
>
> On Tue, Jul 23, 2019 at 10:50 AM Andrew Cooper
> <andrew.cooper3@citrix.com> wrote:
>
> On 23/07/2019 18:48, Roman Shaposhnik wrote:
>
> On Tue, Jul 23, 2019 at 10:35 AM Andrew Cooper
> <andrew.cooper3@citrix.com> wrote:
>
> On 23/07/2019 18:32, Roman Shaposhnik wrote:
>
> Hi Roger!
>
> I applied your patch, removed no-igfx and I still see the original
> problem. Please let me know what other logs/debugs would you need at
> this point.
>
> Please can you collect a full boot log with iommu=debug
>
> How long of an output should I expect when iommu=debug is enabled?
> I've just enabled it and I'm looking at what appears to be an endless
> scroll of debug info.
>
> This is all I see for the good 5 minutes at this point. Culminating with:
> (XEN)   (XEN) APIC error on CPU0: 40(00)
>
> and a failure to boot.
>
> Note that this is still without no-igfx
>
> I'm attaching the tail end of this log.
>
> Sadly, what is useful is the head of the log, before it starts
> complaining loudly about every DMA fault.
>
> No worries. Take a look at the head of the log attached.
>
> Btw, I'm kind of curious why iommu=debug would actually make it crash
>
>
> The system is rather sickly, and is debugging at a rate slower than incoming faults, which is going to starve whichever CPU is taking the IOMMU interrupt.
>
> I wouldn't worry about the APIC error now.

Got it. Makes sense.

> Curiously, there is one single intremap error on boot, which is likely unrelated.
>
> (XEN) [VT-D]INTR-REMAP: Request device [0000:f0:1f.0] fault index 0, iommu reg = ffff82c0008e0000
>
> (XEN) [VT-D]INTR-REMAP: reason 22 - Present field in the IRTE entry is clear
>
>
> This will be irq0 from the IO-APIC.
>
> Can you try booting following the guidance from
>
> (XEN) [VT-D]found ACPI_DMAR_RMRR:
>
> (XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved memory; need "iommu_inclusive_mapping=1"?
>
> (XEN) [VT-D] endpoint: 0000:00:02.0
>
>
> which I noted on my first reply?  Given that Rogers patch didn't help, something else is going on.

Sorry -- missed that option the first time around.

Interestingly enough, adding iommu_inclusive_mapping=1 AND iommu=debug
booted the system just fine.

There are no issues with screen.

I am attaching a full log.

Btw, my understanding is that this may point to a BIOS issue. Which
would be fair conclusion, but I've got to wonder why Xen 4.11 didn't
seem to be susceptible to this BIOS issue.

Thanks,
Roman.

[-- Attachment #2: xen-log3.txt --]
[-- Type: text/plain, Size: 35818 bytes --]

0x0000:0x00:0x02.0x0: ROM: 0x10000 bytes at 0x8968d018
0x0000:0x02:0x00.0x0: ROM: 0x10000 bytes at 0x89640018
0x0000:0x00:0x1f.0x6: ROM: 0x10c00 bytes at 0x8962f018
 Xen 4.12.0
(XEN) Xen version 4.12.0 (@) (gcc (Alpine 6.4.0) 6.4.0) debug=n  Tue Jul 23 17:15:48 UTC 2019
(XEN) Latest ChangeSet:
(XEN) Bootloader: GRUB 2.03
(XEN) Command line: com1=115200,8n1 console=com1,vga iommu_inclusive_mapping=1 iommu=debug dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=false
(XEN) Xen image load base address: 0x88000000
(XEN) Video information:
(XEN)  VGA is graphics mode 1680x1050, 32 bpp
(XEN) Disc information:
(XEN)  Found 0 MBR signatures
(XEN)  Found 1 EDD information structures
(XEN) EFI RAM map:
(XEN)  0000000000000000 - 0000000000058000 (usable)
(XEN)  0000000000058000 - 0000000000059000 (reserved)
(XEN)  0000000000059000 - 000000000009f000 (usable)
(XEN)  000000000009f000 - 00000000000a0000 (reserved)
(XEN)  0000000000100000 - 000000008648a000 (usable)
(XEN)  000000008648a000 - 000000008648b000 (ACPI NVS)
(XEN)  000000008648b000 - 00000000864b5000 (reserved)
(XEN)  00000000864b5000 - 000000008c224000 (usable)
(XEN)  000000008c224000 - 000000008c528000 (reserved)
(XEN)  000000008c528000 - 000000008c736000 (usable)
(XEN)  000000008c736000 - 000000008cea7000 (ACPI NVS)
(XEN)  000000008cea7000 - 000000008d2ff000 (reserved)
(XEN)  000000008d2ff000 - 000000008d300000 (usable)
(XEN)  000000008d300000 - 000000008d400000 (reserved)
(XEN)  00000000e0000000 - 00000000f0000000 (reserved)
(XEN)  00000000fe000000 - 00000000fe011000 (reserved)
(XEN)  00000000fec00000 - 00000000fec01000 (reserved)
(XEN)  00000000fee00000 - 00000000fee01000 (reserved)
(XEN)  00000000ff000000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 000000016e000000 (usable)
(XEN) ACPI: RSDP 8CE49000, 0024 (r2 ALASKA)
(XEN) ACPI: XSDT 8CE490A8, 00CC (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FACP 8CE6C370, 010C (r5 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DSDT 8CE49208, 23167 (r2 ALASKA   A M I   1072009 INTL 20120913)
(XEN) ACPI: FACS 8CE8EF80, 0040
(XEN) ACPI: APIC 8CE6C480, 0084 (r3 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FPDT 8CE6C508, 0044 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FIDT 8CE6C550, 009C (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: MCFG 8CE6C5F0, 003C (r1 ALASKA   A M I   1072009 MSFT       97)
(XEN) ACPI: HPET 8CE6C630, 0038 (r1 ALASKA   A M I   1072009 AMI.    5000B)
(XEN) ACPI: LPIT 8CE6C668, 0094 (r1 INTEL   SKL-ULT        0 MSFT       5F)
(XEN) ACPI: SSDT 8CE6C700, 0248 (r2 INTEL  sensrhub        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE6C948, 2BAE (r2 INTEL  PtidDevc     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE6F4F8, 0BE3 (r2 INTEL  Ther_Rvp     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE700E0, 04A3 (r2 INTEL     zpodd     1000 INTL 20120913)
(XEN) ACPI: DBGP 8CE70588, 0034 (r1 INTEL                  0 MSFT       5F)
(XEN) ACPI: DBG2 8CE705C0, 0054 (r0 INTEL                  0 MSFT       5F)
(XEN) ACPI: SSDT 8CE70618, 06E9 (r2  INTEL xh_rvp07        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE70D08, 547E (r2 SaSsdt  SaSsdt      3000 INTL 20120913)
(XEN) ACPI: UEFI 8CE76188, 0042 (r1                        0             0)
(XEN) ACPI: SSDT 8CE761D0, 0E73 (r2 CpuRef  CpuSsdt     3000 INTL 20120913)
(XEN) ACPI: BGRT 8CE77048, 0038 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DMAR 8CE77080, 00A8 (r1 INTEL      SKL         1 INTL        1)
(XEN) ACPI: TPM2 8CE77128, 0034 (r3        Tpm2Tabl        1 AMI         0)
(XEN) ACPI: ASF! 8CE77160, 00A5 (r32 INTEL       HCG        1 TFSM    F4240)
(XEN) System RAM: 4003MB (4099736kB)
(XEN) Domain heap initialised
(XEN) ACPI: 32/64X FACS address mismatch in FADT - 8ce8ef80/0000000000000000, using 32
(XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
(XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
(XEN) [VT-D]Host address width 39
(XEN) [VT-D]found ACPI_DMAR_DRHD:
(XEN) [VT-D]  dmaru->address = fed90000
(XEN) [VT-D]drhd->address = fed90000 iommu->reg = ffff82c0008de000
(XEN) [VT-D]cap = 1c0000c40660462 ecap = 7e3ff0505e
(XEN) [VT-D] endpoint: 0000:00:02.0
(XEN) [VT-D]found ACPI_DMAR_DRHD:
(XEN) [VT-D]  dmaru->address = fed91000
(XEN) [VT-D]drhd->address = fed91000 iommu->reg = ffff82c0008e0000
(XEN) [VT-D]cap = d2008c40660462 ecap = f050da
(XEN) [VT-D] IOAPIC: 0000:f0:1f.0
(XEN) [VT-D] MSI HPET: 0000:00:1f.0
(XEN) [VT-D]  flags: INCLUDE_ALL
(XEN) [VT-D]found ACPI_DMAR_RMRR:
(XEN) [VT-D] endpoint: 0000:00:14.0
(XEN) [VT-D]found ACPI_DMAR_RMRR:
(XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved memory; need "iommu_inclusive_mapping=1"?
(XEN) [VT-D] endpoint: 0000:00:02.0
(XEN) Switched to APIC driver x2apic_cluster.
(XEN) xstate: size: 0x440 and states: 0x1f
(XEN) Speculative mitigation facilities:
(XEN)   Hardware features:
(XEN)   Compiled-in support: SHADOW_PAGING
(XEN)   Xen settings: BTI-Thunk N/A, SPEC_CTRL: No, Other:
(XEN)   L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 39, Safe address 8000000000
(XEN)   Support for HVM VMs: RSB EAGER_FPU
(XEN)   Support for PV VMs: RSB EAGER_FPU
(XEN)   XPTI (64-bit PV only): Dom0 enabled, DomU enabled (with PCID)
(XEN)   PV L1TF shadowing: Dom0 disabled, DomU enabled
(XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) Initializing Credit2 scheduler
(XEN) Platform timer is 23.999MHz HPET
(XEN) Detected 2496.153 MHz processor.
(XEN) Initing memory sharing.
(XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d Snoop Control not enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) Intel VT-d Posted Interrupt not enabled.
(XEN) Intel VT-d Shared EPT tables enabled.
(XEN) I/O virtualisation enabled
(XEN)  - Dom0 mode: Relaxed
(XEN) Interrupt remapping enabled
(XEN) Enabled directed EOI with ioapic_ack_old on!
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using old ACK method
(XEN) TSC_DEADLINE disabled due to Errata; please update microcode to version 0xb2 (or later)
(XEN) Allocated console ring of 16 KiB.
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) VMX: Supported advanced features:
(XEN)  - APIC MMIO access virtualisation
(XEN)  - APIC TPR shadow
(XEN)  - Extended Page Tables (EPT)
(XEN)  - Virtual-Processor Identifiers (VPID)
(XEN)  - Virtual NMI
(XEN)  - MSR direct-access bitmap
(XEN)  - Unrestricted Guest
(XEN)  - VMCS shadowing
(XEN)  - VM Functions
(XEN)  - Virtualisation Exceptions
(XEN)  - Page Modification Logging
(XEN) HVM: ASIDs enabled.
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging (HAP) detected
(XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) Brought up 2 CPUs
(XEN) Dom0 has maximum 312 PIRQs
(XEN)  Xen  kernel: 64-bit, lsb, compat32
(XEN)  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x2a2c000
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000164000000->0000000168000000 (245760 pages to be allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: ffffffff81000000->ffffffff82a2c000
(XEN)  Init. ramdisk: 0000000000000000->0000000000000000
(XEN)  Phys-Mach map: 0000008000000000->0000008000200000
(XEN)  Start info:    ffffffff82a2c000->ffffffff82a2c4b4
(XEN)  Xenstore ring: 0000000000000000->0000000000000000
(XEN)  Console ring:  0000000000000000->0000000000000000
(XEN)  Page tables:   ffffffff82a2d000->ffffffff82a46000
(XEN)  Boot stack:    ffffffff82a46000->ffffffff82a47000
(XEN)  TOTAL:         ffffffff80000000->ffffffff82c00000
(XEN)  ENTRY ADDRESS: ffffffff826af180
(XEN) Dom0 has maximum 1 VCPUs
(XEN) [VT-D]d0:Hostbridge: skip 0000:00:00.0 map
(XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
(XEN) [VT-D]d0:PCIe: map 0000:00:02.0
(XEN) [VT-D]d0:PCI: map 0000:00:08.0
(XEN) [VT-D]d0:PCI: map 0000:00:14.0
(XEN) [VT-D]d0:PCI: map 0000:00:14.2
(XEN) [VT-D]d0:PCI: map 0000:00:16.0
(XEN) [VT-D]d0:PCI: map 0000:00:17.0
(XEN) [VT-D]d0:PCI: map 0000:00:1f.0
(XEN) [VT-D]d0:PCI: map 0000:00:1f.2
(XEN) [VT-D]d0:PCI: map 0000:00:1f.3
(XEN) [VT-D]d0:PCI: map 0000:00:1f.4
(XEN) [VT-D]d0:PCI: map 0000:00:1f.6
(XEN) [VT-D]d0:PCIe: map 0000:01:00.0
(XEN) [VT-D]d0:PCIe: map 0000:02:00.0
(XEN) IOMMU inclusive mappings are deprecated and will be removed in future versions
(XEN) [VT-D]iommu_enable_translation: iommu->reg = ffff82c0008de000
(XEN) [VT-D]iommu_enable_translation: iommu->reg = ffff82c0008e0000
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Scrubbing Free RAM in background
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) Xen is relinquishing VGA console.
(XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
(XEN) Freed 480kB init memory
(XEN) [VT-D]DMAR:[DMA Write] Request device [0000:00:02.0] fault addr 0, iommu reg = ffff82c0008de000
(XEN) [VT-D]DMAR: reason 01 - Present bit in root entry is clear
(XEN) print_vtd_entries: iommu #0 dev 0000:00:02.0 gmfn 00000
(XEN)     root_entry[00] = 16bcd3001
(XEN)     context[10] = 2_16bcd2001
(XEN)     l4[000] = 16bcd1003
(XEN)     l3[000] = 16bcd0003
(XEN)     l2[000] = 16bccf003
(XEN)     l1[000] = 3
(XEN) [VT-D]INTR-REMAP: Request device [0000:f0:1f.0] fault index 0, iommu reg = ffff82c0008e0000
(XEN) [VT-D]INTR-REMAP: reason 22 - Present field in the IRTE entry is clear
mapping kernel into physical memory
about to get started...
[    0.000000] Linux version 4.19.5-linuxkit (root@6bc26393086c) (gcc version 6.3.0 (Alpine 6.3.0)) #1 SMP Fri Jul 19 22:50:41 UTC 2019
[    0.000000] Command line: console=hvc0 earlyprintk=xen rootdelay=3 root=PARTUUID=ed95538d-31d5-458e-8323-15983c782e4f text
[    0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
[    0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
[    0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
[    0.000000] x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
[    0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format.
[    0.000000] Released 0 page(s)
[    0.000000] BIOS-provided physical RAM map:
[    0.000000] Xen: [mem 0x0000000000000000-0x0000000000057fff] usable
[    0.000000] Xen: [mem 0x0000000000058000-0x0000000000058fff] reserved
[    0.000000] Xen: [mem 0x0000000000059000-0x000000000009efff] usable
[    0.000000] Xen: [mem 0x000000000009f000-0x00000000000fffff] reserved
[    0.000000] Xen: [mem 0x0000000000100000-0x0000000040061fff] usable
[    0.000000] Xen: [mem 0x0000000040062000-0x0000000086489fff] unusable
[    0.000000] Xen: [mem 0x000000008648a000-0x000000008648afff] ACPI NVS
[    0.000000] Xen: [mem 0x000000008648b000-0x00000000864b4fff] reserved
[    0.000000] Xen: [mem 0x00000000864b5000-0x000000008c223fff] unusable
[    0.000000] Xen: [mem 0x000000008c224000-0x000000008c527fff] reserved
[    0.000000] Xen: [mem 0x000000008c528000-0x000000008c735fff] unusable
[    0.000000] Xen: [mem 0x000000008c736000-0x000000008cea6fff] ACPI NVS
[    0.000000] Xen: [mem 0x000000008cea7000-0x000000008d2fefff] reserved
[    0.000000] Xen: [mem 0x000000008d2ff000-0x000000008d2fffff] unusable
[    0.000000] Xen: [mem 0x000000008d300000-0x000000008d3fffff] reserved
[    0.000000] Xen: [mem 0x00000000e0000000-0x00000000efffffff] reserved
[    0.000000] Xen: [mem 0x00000000fe000000-0x00000000fe010fff] reserved
[    0.000000] Xen: [mem 0x00000000fec00000-0x00000000fec00fff] reserved
[    0.000000] Xen: [mem 0x00000000fed90000-0x00000000fed91fff] reserved
[    0.000000] Xen: [mem 0x00000000fee00000-0x00000000feefffff] reserved
[    0.000000] Xen: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
[    0.000000] Xen: [mem 0x0000000100000000-0x000000016dffffff] unusable
[    0.000000] NX (Execute Disable) protection: active
[    0.000000] efi: EFI v2.40 by American Megatrends
[    0.000000] efi:  ESRT=0x8d29c098  ACPI=0x8ce49000  ACPI 2.0=0x8ce49000  SMBIOS=0xf05e0  SMBIOS 3.0=0xf0600  MPS=0xfc9c0
[    0.000000] SMBIOS 3.0.0 present.
[    0.000000] DMI:  /, BIOS 5.11 06/12/2017
[    0.000000] Hypervisor detected: Xen PV
[    0.000662] tsc: Detected 2496.152 MHz processor
[    0.010503] last_pfn = 0x40062 max_arch_pfn = 0x400000000
[    0.010504] Disabled
[    0.010506] x86/PAT: MTRRs disabled, skipping PAT initialization too.
[    0.010509] x86/PAT: Configuration [0-7]: WB  WT  UC- UC  WC  WP  UC  UC
[    0.010538] Kernel/User page tables isolation: disabled on XEN PV.
[    0.177531] Secure boot disabled
[    0.177545] ACPI: Early table checksum verification disabled
[    0.177552] ACPI: RSDP 0x000000008CE49000 000024 (v02 ALASKA)
[    0.177561] ACPI: XSDT 0x000000008CE490A8 0000CC (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.177591] ACPI: FACP 0x000000008CE6C370 00010C (v05 ALASKA A M I    01072009 AMI  00010013)
[    0.177647] ACPI: DSDT 0x000000008CE49208 023167 (v02 ALASKA A M I    01072009 INTL 20120913)
[    0.177658] ACPI: FACS 0x000000008CE8EF80 000040
[    0.177669] ACPI: APIC 0x000000008CE6C480 000084 (v03 ALASKA A M I    01072009 AMI  00010013)
[    0.177681] ACPI: FPDT 0x000000008CE6C508 000044 (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.177692] ACPI: FIDT 0x000000008CE6C550 00009C (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.177703] ACPI: MCFG 0x000000008CE6C5F0 00003C (v01 ALASKA A M I    01072009 MSFT 00000097)
[    0.177714] ACPI: HPET 0x000000008CE6C630 000038 (v01 ALASKA A M I    01072009 AMI. 0005000B)
[    0.177726] ACPI: LPIT 0x000000008CE6C668 000094 (v01 INTEL  SKL-ULT  00000000 MSFT 0000005F)
[    0.177737] ACPI: SSDT 0x000000008CE6C700 000248 (v02 INTEL  sensrhub 00000000 INTL 20120913)
[    0.177749] ACPI: SSDT 0x000000008CE6C948 002BAE (v02 INTEL  PtidDevc 00001000 INTL 20120913)
[    0.177760] ACPI: SSDT 0x000000008CE6F4F8 000BE3 (v02 INTEL  Ther_Rvp 00001000 INTL 20120913)
[    0.177771] ACPI: SSDT 0x000000008CE700E0 0004A3 (v02 INTEL  zpodd    00001000 INTL 20120913)
[    0.177783] ACPI: DBGP 0x000000008CE70588 000034 (v01 INTEL           00000000 MSFT 0000005F)
[    0.177794] ACPI: DBG2 0x000000008CE705C0 000054 (v00 INTEL           00000000 MSFT 0000005F)
[    0.177806] ACPI: SSDT 0x000000008CE70618 0006E9 (v02 INTEL  xh_rvp07 00000000 INTL 20120913)
[    0.177817] ACPI: SSDT 0x000000008CE70D08 00547E (v02 SaSsdt SaSsdt   00003000 INTL 20120913)
[    0.177829] ACPI: UEFI 0x000000008CE76188 000042 (v01                 00000000      00000000)
[    0.177841] ACPI: SSDT 0x000000008CE761D0 000E73 (v02 CpuRef CpuSsdt  00003000 INTL 20120913)
[    0.177852] ACPI: BGRT 0x000000008CE77048 000038 (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.177864] ACPI: RMAD 0x000000008CE77080 0000A8 (v01 INTEL  SKL      00000001 INTL 00000001)
[    0.177875] ACPI: TPM2 0x000000008CE77128 000034 (v03        Tpm2Tabl 00000001 AMI  00000000)
[    0.177890] ACPI: ASF! 0x000000008CE77160 0000A5 (v32 INTEL   HCG     00000001 TFSM 000F4240)
[    0.177921] Setting APIC routing to Xen PV.
[    0.181452] Zone ranges:
[    0.181454]   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
[    0.181456]   DMA32    [mem 0x0000000001000000-0x0000000040061fff]
[    0.181458]   Normal   empty
[    0.181460] Movable zone start for each node
[    0.181461] Early memory node ranges
[    0.181462]   node   0: [mem 0x0000000000001000-0x0000000000057fff]
[    0.181464]   node   0: [mem 0x0000000000059000-0x000000000009efff]
[    0.181465]   node   0: [mem 0x0000000000100000-0x0000000040061fff]
[    0.182043] Reserved but unavailable: 32769 pages
[    0.182045] Initmem setup node 0 [mem 0x0000000000001000-0x0000000040061fff]
[    0.187327] p2m virtual area at (____ptrval____), size is 40000000
[    0.287329] Remapped 98 page(s)
[    0.287371] Reserving Intel graphics memory at [mem 0x8e000000-0x8fffffff]
[    0.287693] ACPI: PM-Timer IO Port: 0x1808
[    0.287725] ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
[    0.287728] ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
[    0.287729] ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
[    0.287731] ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
[    0.287773] IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
[    0.287782] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
[    0.287785] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
[    0.287799] Using ACPI (MADT) for SMP configuration information
[    0.287803] ACPI: HPET id: 0x8086a701 base: 0xfed00000
[    0.287809] smpboot: Allowing 4 CPUs, 0 hotplug CPUs
[    0.287831] [mem 0x90000000-0xdfffffff] available for PCI devices
[    0.287834] Booting paravirtualized kernel on Xen
[    0.287836] Xen version: 4.12.0 (preserve-AD)
[    0.287838] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[    0.402817] random: get_random_bytes called from start_kernel+0x92/0x4be with crng_init=0
[    0.402826] setup_percpu: NR_CPUS:128 nr_cpumask_bits:128 nr_cpu_ids:4 nr_node_ids:1
[    0.403070] percpu: Embedded 45 pages/cpu @(____ptrval____) s143768 r8192 d32360 u524288
[    0.403128] Built 1 zonelists, mobility grouping on.  Total pages: 258024
[    0.403130] Kernel command line: console=hvc0 earlyprintk=xen rootdelay=3 root=PARTUUID=ed95538d-31d5-458e-8323-15983c782e4f text
[    0.403357] Dentry cache hash table entries: 131072 (order: 8, 1048576 bytes)
[    0.403399] Inode-cache hash table entries: 65536 (order: 7, 524288 bytes)
[    0.403549] x2apic disabled
[    0.433014] software IO TLB: mapped [mem 0x3a600000-0x3e600000] (64MB)
[    0.443792] Memory: 930940K/1048572K available (12300K kernel code, 1599K rwdata, 3084K rodata, 1592K init, 1924K bss, 117632K reserved, 0K cma-reserved)
[    0.443854] ftrace: allocating 43804 entries in 172 pages
[    0.461108] rcu: Hierarchical RCU implementation.
[    0.461111] rcu: 	RCU restricting CPUs from NR_CPUS=128 to nr_cpu_ids=1.
[    0.461112] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1
[    0.464283] Using NULL legacy PIC
[    0.464285] NR_IRQS: 8448, nr_irqs: 256, preallocated irqs: 0
[    0.464301] xen:events: Using FIFO-based ABI
[    0.464467] Console: colour dummy device 80x25
[    0.464647] console [tty0] enabled
[    0.465143] console [hvc0] enabled
[    0.465151] ACPI: Core revision 20180810
[    0.480314] ACPI BIOS Warning (bug): Incorrect checksum in table [BGRT] - 0x99, should be 0xAF (20180810/tbprint-177)
[    0.480385] clocksource: xen: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
[    0.480406] installing Xen timer for CPU 0
[    0.480491] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23fb06a9070, max_idle_ns: 440795271167 ns
[    0.480556] Calibrating delay loop (skipped), value calculated using timer frequency.. 4992.30 BogoMIPS (lpj=24961520)
[    0.480565] pid_max: default: 32768 minimum: 301
[    0.480652] Security Framework initialized
[    0.480657] Yama: becoming mindful.
[    0.480683] Mount-cache hash table entries: 2048 (order: 2, 16384 bytes)
[    0.480691] Mountpoint-cache hash table entries: 2048 (order: 2, 16384 bytes)
[    0.480948] Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
[    0.480953] Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
[    0.480960] Spectre V2 : Vulnerable: Minimal generic ASM retpoline
[    0.480965] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
[    0.480971] Speculative Store Bypass: Vulnerable
[    0.530984] Freeing SMP alternatives memory: 24K
[    0.532915] VPMU disabled by hypervisor.
[    0.533079] Performance Events: unsupported p6 CPU model 78 no PMU driver, software events only.
[    0.533150] rcu: Hierarchical SRCU implementation.
[    0.533313] NMI watchdog: Perf NMI watchdog permanently disabled
[    0.533375] smp: Bringing up secondary CPUs ...
[    0.533380] smp: Brought up 1 node, 1 CPU
[    0.533384] smpboot: Max logical packages: 1
[    0.533547] devtmpfs: initialized
[    0.533601] x86/mm: Memory block size: 128MB
[    0.534008] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[    0.534019] futex hash table entries: 256 (order: 2, 16384 bytes)
[    0.534070] pinctrl core: initialized pinctrl subsystem
[    0.534244] NET: Registered protocol family 16
[    0.534265] xen:grant_table: Grant tables using version 1 layout
[    0.534281] Grant table initialized
[    0.534433] audit: initializing netlink subsys (disabled)
[    0.534535] audit: type=2000 audit(1563905980.533:1): state=initialized audit_enabled=0 res=1
[    0.534697] ACPI FADT declares the system doesn't support PCIe ASPM, so disable it
[    0.534705] ACPI: bus type PCI registered
[    0.534831] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000)
[    0.534840] PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820
[    0.588400] PCI: Using configuration type 1 for base access
[    0.590326] cryptd: max_cpu_qlen set to 1000
[    0.590443] ACPI: Added _OSI(Module Device)
[    0.590448] ACPI: Added _OSI(Processor Device)
[    0.590453] ACPI: Added _OSI(3.0 _SCP Extensions)
[    0.590458] ACPI: Added _OSI(Processor Aggregator Device)
[    0.590462] ACPI: Added _OSI(Linux-Dell-Video)
[    0.590467] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
[    0.638258] ACPI: 8 ACPI AML tables successfully acquired and loaded
[    0.644579] ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored
[    0.649607] ACPI: Dynamic OEM Table Load:
[    0.649618] ACPI: SSDT 0xFFFF88803A319400 00037F (v02 PmRef  Cpu0Cst  00003001 INTL 20120913)
[    0.650150] ACPI: Dynamic OEM Table Load:
[    0.650158] ACPI: SSDT 0xFFFF888039813000 00063F (v02 PmRef  Cpu0Ist  00003000 INTL 20120913)
[    0.652408] ACPI: EC: EC started
[    0.652413] ACPI: EC: interrupt blocked
[    0.652468] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as first EC
[    0.652474] ACPI: \_SB_.PCI0.LPCB.EC0_: GPE=0x50, EC_CMD/EC_SC=0x66, EC_DATA=0x62
[    0.652481] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as boot DSDT EC to handle transactions
[    0.652487] ACPI: Interpreter enabled
[    0.652499] ACPI: (supports S0 S5)
[    0.652503] ACPI: Using IOAPIC for interrupt routing
[    0.652550] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
[    0.653879] ACPI: Enabled 7 GPEs in block 00 to 7F
[    0.657054] ACPI: Power Resource [PG00] (on)
[    0.657546] ACPI: Power Resource [PG01] (on)
[    0.657948] ACPI: Power Resource [PG02] (on)
[    0.664592] ACPI: Power Resource [WRST] (on)
[    0.665027] ACPI: Power Resource [WRST] (on)
[    0.665465] ACPI: Power Resource [WRST] (on)
[    0.665945] ACPI: Power Resource [WRST] (on)
[    0.666371] ACPI: Power Resource [WRST] (on)
[    0.666810] ACPI: Power Resource [WRST] (on)
[    0.667301] ACPI: Power Resource [WRST] (on)
[    0.667741] ACPI: Power Resource [WRST] (on)
[    0.668172] ACPI: Power Resource [WRST] (on)
[    0.668661] ACPI: Power Resource [WRST] (on)
[    0.669120] ACPI: Power Resource [WRST] (on)
[    0.669554] ACPI: Power Resource [WRST] (on)
[    0.670035] ACPI: Power Resource [WRST] (on)
[    0.670461] ACPI: Power Resource [WRST] (on)
[    0.670896] ACPI: Power Resource [WRST] (on)
[    0.671383] ACPI: Power Resource [WRST] (on)
[    0.671823] ACPI: Power Resource [WRST] (on)
[    0.672250] ACPI: Power Resource [WRST] (on)
[    0.672743] ACPI: Power Resource [WRST] (on)
[    0.673190] ACPI: Power Resource [WRST] (on)
[    0.688210] ACPI: Power Resource [FN00] (off)
[    0.688322] ACPI: Power Resource [FN01] (off)
[    0.688431] ACPI: Power Resource [FN02] (off)
[    0.688538] ACPI: Power Resource [FN03] (off)
[    0.688646] ACPI: Power Resource [FN04] (off)
[    0.690184] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe])
[    0.690196] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI]
[    0.693408] acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME PCIeCapability LTR]
[    0.693417] acpi PNP0A08:00: FADT indicates ASPM is unsupported, using BIOS configuration
[    0.694106] PCI host bridge to bus 0000:00
[    0.694113] pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
[    0.694119] pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
[    0.694124] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
[    0.694131] pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window]
[    0.694137] pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window]
[    0.694144] pci_bus 0000:00: root bus resource [bus 00-fe]
(XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
[    0.694967] pci 0000:00:02.0: BAR 2: assigned to efifb
[    0.698162] pci 0000:00:1c.0: Intel SPT PCH root port ACS workaround enabled
[    0.698739] pci 0000:00:1c.5: Intel SPT PCH root port ACS workaround enabled
[    0.702593] pci 0000:00:1c.0: PCI bridge to [bus 01]
[    0.703392] pci 0000:02:00.0: 2.000 Gb/s available PCIe bandwidth, limited by 2.5 GT/s x1 link at 0000:00:1c.5 (capable of 7.876 Gb/s with 8 GT/s x1 link)
[    0.703646] pci 0000:00:1c.5: PCI bridge to [bus 02]
[    0.708086] ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.708179] ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 *10 11 12 14 15)
[    0.708268] ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.708357] ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.708453] ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.708542] ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.708631] ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.708770] ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 5 6 10 *11 12 14 15)
[    0.709486] ACPI: EC: interrupt unblocked
[    0.709526] ACPI: EC: event unblocked
[    0.709550] ACPI: \_SB_.PCI0.LPCB.EC0_: GPE=0x50, EC_CMD/EC_SC=0x66, EC_DATA=0x62
[    0.709557] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as boot DSDT EC to handle transactions and events
[    0.709607] xen:balloon: Initialising balloon driver
[    0.709757] SCSI subsystem initialized
[    0.709825] ACPI: bus type USB registered
[    0.709848] usbcore: registered new interface driver usbfs
[    0.709860] usbcore: registered new interface driver hub
[    0.709880] usbcore: registered new device driver usb
[    0.709897] pps_core: LinuxPPS API ver. 1 registered
[    0.709901] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
[    0.709911] PTP clock support registered
[    0.709954] Registered efivars operations
[    0.715010] PCI: Using ACPI for IRQ routing
[    0.752909] NetLabel: Initializing
[    0.752914] NetLabel:  domain hash size = 128
[    0.752918] NetLabel:  protocols = UNLABELED CIPSOv4 CALIPSO
[    0.752938] NetLabel:  unlabeled traffic allowed by default
[    0.753155] clocksource: Switched to clocksource tsc-early
[    0.767862] VFS: Disk quotas dquot_6.6.0
[    0.767862] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
[    0.767862] FS-Cache: Loaded
[    0.767862] hugetlbfs: disabling because there are no supported hugepage sizes
[    0.767862] CacheFiles: Loaded
[    0.767862] pnp: PnP ACPI init
[    0.767862] system 00:00: [io  0x0a00-0x0a2f] has been reserved
[    0.767862] Already setup the GSI :4
[    0.771018] system 00:05: [io  0x0200-0x027f] has been reserved
[    0.771851] system 00:06: [io  0x029c-0x029d] has been reserved
[    0.772075] system 00:07: [io  0x0680-0x069f] has been reserved
[    0.772082] system 00:07: [io  0xffff] has been reserved
[    0.772087] system 00:07: [io  0xffff] has been reserved
[    0.772092] system 00:07: [io  0xffff] has been reserved
[    0.772097] system 00:07: [io  0x1800-0x18fe] has been reserved
[    0.772102] system 00:07: [io  0x164e-0x164f] has been reserved
[    0.772298] system 00:09: [io  0x1854-0x1857] has been reserved
[    0.772667] system 00:0a: [mem 0xfed10000-0xfed17fff] has been reserved
[    0.772674] system 00:0a: [mem 0xfed18000-0xfed18fff] has been reserved
[    0.772680] system 00:0a: [mem 0xfed19000-0xfed19fff] has been reserved
[    0.772686] system 00:0a: [mem 0xe0000000-0xefffffff] has been reserved
[    0.772692] system 00:0a: [mem 0xfed20000-0xfed3ffff] has been reserved
[    0.772698] system 00:0a: [mem 0xfed90000-0xfed93fff] could not be reserved
[    0.772703] system 00:0a: [mem 0xfed45000-0xfed8ffff] has been reserved
[    0.772709] system 00:0a: [mem 0xff000000-0xffffffff] has been reserved
[    0.772715] system 00:0a: [mem 0xfee00000-0xfeefffff] has been reserved
[    0.772721] system 00:0a: [mem 0xdffe0000-0xdfffffff] has been reserved
[    0.772778] system 00:0b: [mem 0xfd000000-0xfdabffff] has been reserved
[    0.772785] system 00:0b: [mem 0xfdad0000-0xfdadffff] has been reserved
[    0.772791] system 00:0b: [mem 0xfdb00000-0xfdffffff][    1.494863] IPVS: [sh] scheduler registered.
[    1.496021] IPVS: [sed] scheduler registered.
[    1.497133] IPVS: [nq] scheduler registered.
[    1.498274] IPVS: ftp: loaded support on port[0] = 21
[    1.499442] ipip: IPv4 and MPLS over IPv4 tunneling driver
[    1.500697] gre: GRE over IPv4 demultiplexor driver
[    1.501914] ipt_CLUSTERIP: ClusterIP Version 0.8 loaded successfully
[    1.503069] Initializing XFRM netlink socket
[    1.504236] NET: Registered protocol family 10
[    1.505469] Segment Routing with IPv6
[    1.506812] NET: Registered protocol family 17
[    1.507942] NET: Registered protocol family 15
[    1.509043] Bridge firewalling registered
[    1.510185] 8021q: 802.1Q VLAN Support v1.8
[    1.511327] 9pnet: Installing 9P2000 support
[    1.512377] Initialising Xen transport for 9pfs
[    1.513489] Key type dns_resolver registered
[    1.514684] AVX2 version of gcm_enc/dec engaged.
[    1.515765] AES CTR mode by8 optimization enabled
[    1.517435] sched_clock: Marking stable (1495177768, 16124226)->(1514238650, -2936656)
[    1.518668] registered taskstats version 1
[    1.519778] Loading compiled-in X.509 certificates
[    1.521210] Key type big_key registered
[    1.522411] Key type encrypted registered
[    1.524596] rtc_cmos 00:08: setting system clock to 2019-07-23 18:19:41 UTC (1563905981)
[    1.525834] Waiting 3 sec before mounting root device...
[    1.703547] ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
[    1.709629] ata1.00: ATA-9: SQF-S25M8-64G-SAC, SAFM02A3, max UDMA/133
[    1.711051] ata1.00: 125045424 sectors, multi 16: LBA48 NCQ (depth 32), AA
[    1.712615] ata1.00: configured for UDMA/133
[    1.714120] scsi 0:0:0:0: Direct-Access     ATA      SQF-S25M8-64G-SA 02A3 PQ: 0 ANSI: 5
[    1.715726] sd 0:0:0:0: [sda] 125045424 512-byte logical blocks: (64.0 GB/59.6 GiB)
[    1.717182] sd 0:0:0:0: [sda] Write Protect is off
[    1.718660] sd 0:0:0:0: Attached scsi generic sg0 type 0
[    1.720090] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
[    1.723148]  sda: sda1 sda2 sda3 sda4 sda9
[    1.724849] sd 0:0:0:0: [sda] Attached SCSI disk
[    1.725942] ata2: SATA link down (SStatus 4 SControl 300)
[    1.750568] usb 1-1: new low-speed USB device number 2 using xhci_hcd
[    1.840600] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23fb06a9070, max_idle_ns: 440795271167 ns
[    1.842112] clocksource: Switched to clocksource tsc
[    1.941689] input: Logitech USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.0/0003:046D:C31C.0001/input/input6
[    2.010719] hid-generic 0003:046D:C31C.0001: input: USB HID v1.10 Keyboard [Logitech USB Keyboard] on usb-0000:00:14.0-1/input0
[    2.017912] input: Logitech USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.1/0003:046D:C31C.0002/input/input7
[    2.080669] usb 2-4: new SuperSpeed Gen 1 USB device number 2 using xhci_hcd
[    2.082378] input: Logitech USB Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.1/0003:046D:C31C.0002/input/input8
[    2.084139] hid-generic 0003:046D:C31C.0002: input: USB HID v1.10 Device [Logitech USB Keyboard] on usb-0000:00:14.0-1/input1
[    2.116966] random: fast init done
[    2.119255] usb-storage 2-4:1.0: USB Mass Storage device detected
[    2.121141] scsi host2: usb-storage 2-4:1.0
[    2.260638] usb 1-7: new full-speed USB device number 3 using xhci_hcd
[    3.203345] scsi 2:0:0:0: Direct-Access              Patriot Memory   PMAP PQ: 0 ANSI: 6
[    3.205203] sd 2:0:0:0: Attached scsi generic sg1 type 0
[    3.207540] sd 2:0:0:0: [sdb] 61833216 512-byte logical blocks: (31.7 GB/29.5 GiB)
[    3.212294] sd 2:0:0:0: [sdb] Write Protect is off
[    3.216993] sd 2:0:0:0: [sdb] No Caching mode page found
[    3.218409] sd 2:0:0:0: [sdb] Assuming drive cache: write through
[    3.236175] GPT:Primary header thinks Alt. header is not at the end of the disk.
[    3.237978] GPT:716799 != 61833215
[    3.239828] GPT:Alternate GPT header not at the end of the disk.
[    3.241657] GPT:716799 != 61833215
[    3.243478] GPT: Use GNU Parted to correct GPT errors.
[    3.245386]  sdb: sdb1 sdb2 sdb4 sdb5
[    3.255555] sd 2:0:0:0: [sdb] Attached SCSI removable disk
[    4.567224] VFS: Mounted root (squashfs filesystem) readonly on device 8:2.
[    4.570496] Freeing unused kernel image memory: 1592K
[    4.590664] Write protecting the kernel read-only data: 18432k
[    4.599363] Freeing unused kernel image memory: 2020K
[    4.601413] Freeing unused kernel image memory: 1012K
[    4.602931] Run /sbin/init as init process
[    5.218176] e1000e: Intel(R) PRO/1000 Network Driver - 3.2.6-k
[    5.219774] e1000e: Copyright(c) 1999 - 2015 Intel Corporation.
[    5.222076] Already setup the GSI :16
[    5.223715] e1000e 0000:00:1f.6: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode
[    5.326943] e1000e 0000:00:1f.6 0000:00:1f.6 (uninitialized): registered PHC clock
[    5.418777] e1000e 0000:00:1f.6 eth0: (PCI Express:2.5GT/s:Width x1) 00:0b:ab:e4:d0:c5
[    5.420827] e1000e 0000:00:1f.6 eth0: Intel(R) PRO/1000 Network Connection
[    5.424915] e1000e 0000:00:1f.6 eth0: MAC: 12, PHY: 12, PBA No: FFFFFF-0FF
[    5.457677] cfg80211: Loading compiled-in X.509 certificates for regulatory database
[    5.467823] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
[    5.469583] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
[    5.471250] cfg80211: failed to load regulatory.db
[    5.522322] rtl8723be 0000:01:00.0: enabling device (0000 -> 0003)
[    5.524110] Already setup the GSI :18
[    5.557029] rtl8723be: Using firmware rtlwifi/rtl8723befw_36.bin
[    5.561397] rtlwifi: rtlwifi: wireless switch is on
[    5.579909] igb: Intel(R) Gigabit Ethernet Network Driver - version 5.4.0-k
[    5.581636] igb: Copyright (c) 2007-2014 Intel Corporation.
[    5.583459] Already setup the GSI :17
[    5.615765] pps pps0: new PPS source ptp1
[    5.617840] igb 0000:02:00.0: added PHC on eth1
[    5.619825] igb 0000:02:00.0: Intel(R) Gigabit Ethernet Network Connection
[    5.621918] igb 0000:02:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:0b:ab:e4:d0:c6
[    5.623964] igb 0000:02:00.0: eth1: PBA No: 000200-000
[    5.625700] igb 0000:02:00.0: Using MSI-X interrupts. 1 rx queue(s), 1 tx queue(s)
................   ..............   ................
 ................   ............   ................
              ....    .........   ....
    ................   .......   ................
     ................   .....   ................
                    ...   .   ....
        ................     ................
          ...............   ................

              Edge Virtualization Engine

[-- Attachment #3: Type: text/plain, Size: 157 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-23 17:32                       ` Roman Shaposhnik
  2019-07-23 17:35                         ` Andrew Cooper
@ 2019-07-24 11:23                         ` Andrew Cooper
  2019-07-24 11:40                           ` Andrew Cooper
  2019-07-24 14:11                         ` Roger Pau Monné
  2 siblings, 1 reply; 65+ messages in thread
From: Andrew Cooper @ 2019-07-24 11:23 UTC (permalink / raw)
  To: Roman Shaposhnik; +Cc: xen-devel, Lars Kurth

On 23/07/2019 18:32, Roman Shaposhnik wrote:
> Oh, and it seems that that https://downloads.xenproject.org/ SSL
> certificate expired yesterday -- perhaps somebody can take a look at
> that.

Thanks for reporting.  It should be being taken care of.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-24 11:23                         ` Andrew Cooper
@ 2019-07-24 11:40                           ` Andrew Cooper
  0 siblings, 0 replies; 65+ messages in thread
From: Andrew Cooper @ 2019-07-24 11:40 UTC (permalink / raw)
  To: Roman Shaposhnik; +Cc: xen-devel, Lars Kurth

On 24/07/2019 12:23, Andrew Cooper wrote:
> On 23/07/2019 18:32, Roman Shaposhnik wrote:
>> Oh, and it seems that that https://downloads.xenproject.org/ SSL
>> certificate expired yesterday -- perhaps somebody can take a look at
>> that.
> Thanks for reporting.  It should be being taken care of.

And it should be fixed now.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-23 17:58                               ` Roman Shaposhnik
  2019-07-23 18:12                                 ` Andrew Cooper
@ 2019-07-24 12:00                                 ` Jan Beulich
  2019-07-24 12:04                                   ` Jan Beulich
  1 sibling, 1 reply; 65+ messages in thread
From: Jan Beulich @ 2019-07-24 12:00 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: Juergen Gross, Andrew Cooper, Paul Durrant, xen-devel,
	boris.ostrovsky, Roger Pau Monné

On 23.07.2019 19:58, Roman Shaposhnik wrote:
> No worries. Take a look at the head of the log attached.

One more thing for you to tweak to make the log even more useful:
As per

(XEN) Xen version 4.12.0 (@) (gcc (Alpine 6.4.0) 6.4.0) debug=n  Tue Jul 23 17:15:48 UTC 2019

this is a non-debug build. If you used a debug one, there ought to
be another confirming message next to

(XEN) [VT-D]found ACPI_DMAR_RMRR:
(XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved memory; need "iommu_inclusive_mapping=1"?
(XEN) [VT-D] endpoint: 0000:00:02.0

plus others in case of errors beyond the memory map related one
(which, as was pointed out already, is a warning only). In case
you're interested, see register_one_rmrr() in particular.

Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-24 12:00                                 ` Jan Beulich
@ 2019-07-24 12:04                                   ` Jan Beulich
  0 siblings, 0 replies; 65+ messages in thread
From: Jan Beulich @ 2019-07-24 12:04 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: Juergen Gross, Andrew Cooper, Paul Durrant, xen-devel,
	boris.ostrovsky, Roger Pau Monné

On 24.07.2019 14:00, Jan Beulich wrote:
> On 23.07.2019 19:58, Roman Shaposhnik wrote:
>> No worries. Take a look at the head of the log attached.
> 
> One more thing for you to tweak to make the log even more useful:
> As per
> 
> (XEN) Xen version 4.12.0 (@) (gcc (Alpine 6.4.0) 6.4.0) debug=n  Tue Jul 23 17:15:48 UTC 2019
> 
> this is a non-debug build. If you used a debug one, there ought to
> be another confirming message next to
> 
> (XEN) [VT-D]found ACPI_DMAR_RMRR:
> (XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved memory; need "iommu_inclusive_mapping=1"?
> (XEN) [VT-D] endpoint: 0000:00:02.0
> 
> plus others in case of errors beyond the memory map related one
> (which, as was pointed out already, is a warning only). In case
> you're interested, see register_one_rmrr() in particular.

Oh, additionally you want to add "loglvl=all" to your hypervisor
command line.

Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-23 17:32                       ` Roman Shaposhnik
  2019-07-23 17:35                         ` Andrew Cooper
  2019-07-24 11:23                         ` Andrew Cooper
@ 2019-07-24 14:11                         ` Roger Pau Monné
  2019-07-26  0:47                           ` Roman Shaposhnik
  2 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-07-24 14:11 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Tue, Jul 23, 2019 at 10:32:26AM -0700, Roman Shaposhnik wrote:
> Hi Roger!
> 
> I applied your patch, removed no-igfx and I still see the original
> problem. Please let me know what other logs/debugs would you need at
> this point.

I'm not sure why you don't get the rmrrs added to the iommu page
tables, AFAICT it works on my test box.

I have a patch with extra debug messages and checks, could you give it
a test, I'm attaching it below. Note that you don't need the previous
patch, since it's already contained in the debug patch below.

Please paste the Xen bootlog with the patch applied when your reply.

Thank, Roger.
---8<---
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index fef97c82f6..3605614aaf 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
 
     if ( !paging_mode_translate(p2m->domain) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
                                 IOMMUF_readable | IOMMUF_writable);
@@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
 
     if ( !paging_mode_translate(d) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
     }
diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
index 8b27d7e775..ea303b5d45 100644
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -2009,12 +2009,19 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
     if ( !map )
         return -ENOENT;
 
+printk("<RMRR> mapping %#lx - %#lx\n", base_pfn, end_pfn);
     while ( base_pfn < end_pfn )
     {
         int err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag);
+        mfn_t mfn;
+        unsigned int f;
 
         if ( err )
             return err;
+BUG_ON(intel_iommu_lookup_page(d, _dfn(base_pfn), &mfn, &f));
+BUG_ON(base_pfn != mfn_x(mfn));
+BUG_ON(f != (IOMMUF_readable | IOMMUF_writable));
+
         base_pfn++;
     }
 
@@ -2263,6 +2270,7 @@ static void __hwdom_init setup_hwdom_rmrr(struct domain *d)
     u16 bdf;
     int ret, i;
 
+printk("<RMRR> setting up regions\n");
     pcidevs_lock();
     for_each_rmrr_device ( rmrr, bdf, i )
     {


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply related	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-19 19:31 [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx Roman Shaposhnik
  2019-07-19 20:02 ` Roman Shaposhnik
  2019-07-20 16:39 ` Andrew Cooper
@ 2019-07-24 17:42 ` Rich Persaud
  2019-07-26  1:13   ` Roman Shaposhnik
  2 siblings, 1 reply; 65+ messages in thread
From: Rich Persaud @ 2019-07-24 17:42 UTC (permalink / raw)
  To: Roman Shaposhnik; +Cc: Daniel Smith, xen-devel


[-- Attachment #1.1: Type: text/plain, Size: 937 bytes --]

> On Jul 19, 2019, at 15:31, Roman Shaposhnik <roman@zededa.com> wrote:
> 
> Hi!
> 
> we're using Xen on Advantech ARK-2250 Embedded Box PC:
>    https://www.elmark.com.pl/web/uploaded/karty_produktow/advantech/ark-2250l/ark-2250l_instrukcja-uzytkownika.pdf

Roman, 

Good to see Xen being used on fanless devices.  Does the AMI BIOS for the i7 6600U Skylake CPU [1] variant of ARK-2250 [2] support Intel TXT DRTM and discrete TPM, which would enable boot integrity [3] protection for Xen, read-only dom0 and stateless VMs?  Boot integrity is valuable on edge devices.

Rich


[1] CPU spec: https://ark.intel.com/content/www/us/en/ark/products/88192/intel-core-i7-6600u-processor-4m-cache-up-to-3-40-ghz.html

[2] PC spec: https://www.advantech.com/products/ark-2000_series_embedded_box_pcs/ark-2250l/mod_66ebc4e0-9a0c-489c-96a5-70a8054e9037

[3] TrenchBoot, Xen Summit 2019, https://youtube.com/watch?v=f0LZFSq4Ack


[-- Attachment #1.2: Type: text/html, Size: 2372 bytes --]

[-- Attachment #2: Type: text/plain, Size: 157 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-24 14:11                         ` Roger Pau Monné
@ 2019-07-26  0:47                           ` Roman Shaposhnik
  2019-07-26  9:35                             ` Roger Pau Monné
  0 siblings, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-26  0:47 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

[-- Attachment #1: Type: text/plain, Size: 2960 bytes --]

Hi Roger!

With your patch (and build as a debug build) Xen crashes on boot
(which I guess was the point of your BUG_ON statement).

The log is attached

Thanks,
Roman.

On Wed, Jul 24, 2019 at 7:11 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>
> On Tue, Jul 23, 2019 at 10:32:26AM -0700, Roman Shaposhnik wrote:
> > Hi Roger!
> >
> > I applied your patch, removed no-igfx and I still see the original
> > problem. Please let me know what other logs/debugs would you need at
> > this point.
>
> I'm not sure why you don't get the rmrrs added to the iommu page
> tables, AFAICT it works on my test box.
>
> I have a patch with extra debug messages and checks, could you give it
> a test, I'm attaching it below. Note that you don't need the previous
> patch, since it's already contained in the debug patch below.
>
> Please paste the Xen bootlog with the patch applied when your reply.
>
> Thank, Roger.
> ---8<---
> diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> index fef97c82f6..3605614aaf 100644
> --- a/xen/arch/x86/mm/p2m.c
> +++ b/xen/arch/x86/mm/p2m.c
> @@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
>
>      if ( !paging_mode_translate(p2m->domain) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>              return 0;
>          return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
>                                  IOMMUF_readable | IOMMUF_writable);
> @@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
>
>      if ( !paging_mode_translate(d) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>              return 0;
>          return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
>      }
> diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
> index 8b27d7e775..ea303b5d45 100644
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -2009,12 +2009,19 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
>      if ( !map )
>          return -ENOENT;
>
> +printk("<RMRR> mapping %#lx - %#lx\n", base_pfn, end_pfn);
>      while ( base_pfn < end_pfn )
>      {
>          int err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag);
> +        mfn_t mfn;
> +        unsigned int f;
>
>          if ( err )
>              return err;
> +BUG_ON(intel_iommu_lookup_page(d, _dfn(base_pfn), &mfn, &f));
> +BUG_ON(base_pfn != mfn_x(mfn));
> +BUG_ON(f != (IOMMUF_readable | IOMMUF_writable));
> +
>          base_pfn++;
>      }
>
> @@ -2263,6 +2270,7 @@ static void __hwdom_init setup_hwdom_rmrr(struct domain *d)
>      u16 bdf;
>      int ret, i;
>
> +printk("<RMRR> setting up regions\n");
>      pcidevs_lock();
>      for_each_rmrr_device ( rmrr, bdf, i )
>      {
>

[-- Attachment #2: xen-crash.txt --]
[-- Type: text/plain, Size: 18029 bytes --]

0x0000:0x00:0x02.0x0: ROM: 0x10000 bytes at 0x8968e018
0x0000:0x02:0x00.0x0: ROM: 0x10000 bytes at 0x89641018
0x0000:0x00:0x1f.0x6: ROM: 0x10c00 bytes at 0x89630018
 Xen 4.12.0
(XEN) Xen version 4.12.0 (@) (gcc (Alpine 6.4.0) 6.4.0) debug=y  Fri Jul 26 00:32:25 UTC 2019
(XEN) Latest ChangeSet:
(XEN) Bootloader: GRUB 2.03
(XEN) Command line: loglvl=all com1=115200,8n1 console=com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=false
(XEN) Xen image load base address: 0x88000000
(XEN) Video information:
(XEN)  VGA is graphics mode 1680x1050, 32 bpp
(XEN) Disc information:
(XEN)  Found 0 MBR signatures
(XEN)  Found 1 EDD information structures
(XEN) EFI RAM map:
(XEN)  0000000000000000 - 0000000000058000 (usable)
(XEN)  0000000000058000 - 0000000000059000 (reserved)
(XEN)  0000000000059000 - 000000000009f000 (usable)
(XEN)  000000000009f000 - 00000000000a0000 (reserved)
(XEN)  0000000000100000 - 000000008648a000 (usable)
(XEN)  000000008648a000 - 000000008648b000 (ACPI NVS)
(XEN)  000000008648b000 - 00000000864b5000 (reserved)
(XEN)  00000000864b5000 - 000000008c224000 (usable)
(XEN)  000000008c224000 - 000000008c528000 (reserved)
(XEN)  000000008c528000 - 000000008c736000 (usable)
(XEN)  000000008c736000 - 000000008cea7000 (ACPI NVS)
(XEN)  000000008cea7000 - 000000008d2ff000 (reserved)
(XEN)  000000008d2ff000 - 000000008d300000 (usable)
(XEN)  000000008d300000 - 000000008d400000 (reserved)
(XEN)  00000000e0000000 - 00000000f0000000 (reserved)
(XEN)  00000000fe000000 - 00000000fe011000 (reserved)
(XEN)  00000000fec00000 - 00000000fec01000 (reserved)
(XEN)  00000000fee00000 - 00000000fee01000 (reserved)
(XEN)  00000000ff000000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 000000016e000000 (usable)
(XEN) ACPI: RSDP 8CE49000, 0024 (r2 ALASKA)
(XEN) ACPI: XSDT 8CE490A8, 00CC (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FACP 8CE6C370, 010C (r5 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DSDT 8CE49208, 23167 (r2 ALASKA   A M I   1072009 INTL 20120913)
(XEN) ACPI: FACS 8CE8EF80, 0040
(XEN) ACPI: APIC 8CE6C480, 0084 (r3 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FPDT 8CE6C508, 0044 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FIDT 8CE6C550, 009C (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: MCFG 8CE6C5F0, 003C (r1 ALASKA   A M I   1072009 MSFT       97)
(XEN) ACPI: HPET 8CE6C630, 0038 (r1 ALASKA   A M I   1072009 AMI.    5000B)
(XEN) ACPI: LPIT 8CE6C668, 0094 (r1 INTEL   SKL-ULT        0 MSFT       5F)
(XEN) ACPI: SSDT 8CE6C700, 0248 (r2 INTEL  sensrhub        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE6C948, 2BAE (r2 INTEL  PtidDevc     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE6F4F8, 0BE3 (r2 INTEL  Ther_Rvp     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE700E0, 04A3 (r2 INTEL     zpodd     1000 INTL 20120913)
(XEN) ACPI: DBGP 8CE70588, 0034 (r1 INTEL                  0 MSFT       5F)
(XEN) ACPI: DBG2 8CE705C0, 0054 (r0 INTEL                  0 MSFT       5F)
(XEN) ACPI: SSDT 8CE70618, 06E9 (r2  INTEL xh_rvp07        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE70D08, 547E (r2 SaSsdt  SaSsdt      3000 INTL 20120913)
(XEN) ACPI: UEFI 8CE76188, 0042 (r1                        0             0)
(XEN) ACPI: SSDT 8CE761D0, 0E73 (r2 CpuRef  CpuSsdt     3000 INTL 20120913)
(XEN) ACPI: BGRT 8CE77048, 0038 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DMAR 8CE77080, 00A8 (r1 INTEL      SKL         1 INTL        1)
(XEN) ACPI: TPM2 8CE77128, 0034 (r3        Tpm2Tabl        1 AMI         0)
(XEN) ACPI: ASF! 8CE77160, 00A5 (r32 INTEL       HCG        1 TFSM    F4240)
(XEN) System RAM: 4003MB (4099736kB)
(XEN) No NUMA configuration found
(XEN) Faking a node at 0000000000000000-000000016e000000
(XEN) Domain heap initialised
(XEN) vesafb: framebuffer at 0xc0000000, mapped to 0xffff82c000201000, using 6912k, total 6912k
(XEN) vesafb: mode is 1680x1050x32, linelength=6720, font 8x16
(XEN) vesafb: Truecolor: size=8:8:8:8, shift=24:16:8:0
(XEN) CPU Vendor: Intel, Family 6 (0x6), Model 78 (0x4e), Stepping 3 (raw 000406e3)
(XEN) SMBIOS 3.0 present.
(XEN) Using APIC driver default
(XEN) ACPI: PM-Timer IO Port: 0x1808 (32 bits)
(XEN) ACPI: v5 SLEEP INFO: control[0:0], status[0:0]
(XEN) ACPI: SLEEP INFO: pm1x_cnt[1:1804,1:0], pm1x_evt[1:1800,1:0]
(XEN) ACPI: 32/64X FACS address mismatch in FADT - 8ce8ef80/0000000000000000, using 32
(XEN) ACPI:             wakeup_vec[8ce8ef8c], vec_size[20]
(XEN) ACPI: Local APIC address 0xfee00000
(XEN) ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled)
(XEN) ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled)
(XEN) ACPI: LAPIC (acpi_id[0x03] lapic_id[0x01] enabled)
(XEN) ACPI: LAPIC (acpi_id[0x04] lapic_id[0x03] enabled)
(XEN) ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
(XEN) ACPI: IOAPIC (id[0x02] address[0xfec00000] gsi_base[0])
(XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
(XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
(XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
(XEN) ACPI: IRQ0 used by override.
(XEN) ACPI: IRQ2 used by override.
(XEN) ACPI: IRQ9 used by override.
(XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
(XEN) ACPI: HPET id: 0x8086a701 base: 0xfed00000
(XEN) PCI: MCFG configuration 0: base e0000000 segment 0000 buses 00 - ff
(XEN) PCI: MCFG area at e0000000 reserved in E820
(XEN) PCI: Using MCFG for segment 0000 bus 00-ff
(XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved memory; need "iommu_inclusive_mapping=1"?
(XEN) ERST table was not found
(XEN) ACPI: BGRT: invalidating v1 image at 0x88e5a018
(XEN) Using ACPI (MADT) for SMP configuration information
(XEN) SMP: Allowing 4 CPUs (0 hotplug CPUs)
(XEN) IRQ limits: 120 GSI, 840 MSI/MSI-X
(XEN) Switched to APIC driver x2apic_cluster.
(XEN) xstate: size: 0x440 and states: 0x1f
(XEN) mce_intel.c:780: MCA Capability: firstbank 0, extended MCE MSR 0, BCAST, CMCI
(XEN) CPU0: Intel machine check reporting enabled
(XEN) Speculative mitigation facilities:
(XEN)   Hardware features:
(XEN)   Compiled-in support: SHADOW_PAGING
(XEN)   Xen settings: BTI-Thunk N/A, SPEC_CTRL: No, Other:
(XEN)   L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 39, Safe address 8000000000
(XEN)   Support for HVM VMs: RSB EAGER_FPU
(XEN)   Support for PV VMs: RSB EAGER_FPU
(XEN)   XPTI (64-bit PV only): Dom0 enabled, DomU enabled (with PCID)
(XEN)   PV L1TF shadowing: Dom0 disabled, DomU enabled
(XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) Initializing Credit2 scheduler
(XEN)  load_precision_shift: 18
(XEN)  load_window_shift: 30
(XEN)  underload_balance_tolerance: 0
(XEN)  overload_balance_tolerance: -3
(XEN)  runqueues arrangement: socket
(XEN)  cap enforcement granularity: 10ms
(XEN) load tracking window length 1073741824 ns
(XEN) Adding cpu 0 to runqueue 0
(XEN)  First cpu on runqueue, activating
(XEN) Platform timer is 23.999MHz HPET
(XEN) Detected 2496.111 MHz processor.
(XEN) EFI memory map:
(XEN)  0000000000000-0000000007fff type=3 attr=000000000000000f
(XEN)  0000000008000-000000000bfff type=2 attr=000000000000000f
(XEN)  000000000c000-0000000047fff type=7 attr=000000000000000f
(XEN)  0000000048000-0000000057fff type=2 attr=000000000000000f
(XEN)  0000000058000-0000000058fff type=0 attr=000000000000000f
(XEN)  0000000059000-000000005efff type=7 attr=000000000000000f
(XEN)  000000005f000-000000005ffff type=4 attr=000000000000000f
(XEN)  0000000060000-000000009efff type=3 attr=000000000000000f
(XEN)  000000009f000-000000009ffff type=0 attr=000000000000000f
(XEN)  0000000100000-0000000907fff type=2 attr=000000000000000f
(XEN)  0000000908000-0000043fd9fff type=7 attr=000000000000000f
(XEN)  0000043fda000-000007e51ffff type=1 attr=000000000000000f
(XEN)  000007e520000-000007e55ffff type=4 attr=000000000000000f
(XEN)  000007e560000-0000085101fff type=7 attr=000000000000000f
(XEN)  0000085102000-000008539efff type=1 attr=000000000000000f
(XEN)  000008539f000-0000086489fff type=4 attr=000000000000000f
(XEN)  000008648a000-000008648afff type=10 attr=000000000000000f
(XEN)  000008648b000-00000864b4fff type=6 attr=800000000000000f
(XEN)  00000864b5000-000008650ffff type=4 attr=000000000000000f
(XEN)  0000086510000-0000086517fff type=7 attr=000000000000000f
(XEN)  0000086518000-0000086518fff type=2 attr=000000000000000f
(XEN)  0000086519000-00000881fffff type=7 attr=000000000000000f
(XEN)  0000088200000-00000885c8fff type=2 attr=000000000000000f
(XEN)  00000885c9000-000008bc23fff type=4 attr=000000000000000f
(XEN)  000008bc24000-000008bec0fff type=7 attr=000000000000000f
(XEN)  000008bec1000-000008c223fff type=3 attr=000000000000000f
(XEN)  000008c224000-000008c527fff type=0 attr=000000000000000f
(XEN)  000008c528000-000008c735fff type=7 attr=000000000000000f
(XEN)  000008c736000-000008cea6fff type=10 attr=000000000000000f
(XEN)  000008cea7000-000008d29ffff type=6 attr=800000000000000f
(XEN)  000008d2a0000-000008d2fefff type=5 attr=800000000000000f
(XEN)  000008d2ff000-000008d2fffff type=4 attr=000000000000000f
(XEN)  0000100000000-000016dffffff type=7 attr=000000000000000f
(XEN)  000008d300000-000008d3fffff type=0 attr=0000000000000000
(XEN)  00000e0000000-00000efffffff type=11 attr=8000000000000001
(XEN)  00000fe000000-00000fe010fff type=11 attr=8000000000000001
(XEN)  00000fec00000-00000fec00fff type=11 attr=8000000000000001
(XEN)  00000fee00000-00000fee00fff type=11 attr=8000000000000001
(XEN)  00000ff000000-00000ffffffff type=11 attr=8000000000000001
(XEN) Initing memory sharing.
(XEN) alt table ffff82d080466c70 -> ffff82d0804688ee
(XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d Snoop Control not enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) Intel VT-d Posted Interrupt not enabled.
(XEN) Intel VT-d Shared EPT tables enabled.
(XEN) I/O virtualisation enabled
(XEN)  - Dom0 mode: Relaxed
(XEN) Interrupt remapping enabled
(XEN) nr_sockets: 1
(XEN) Enabled directed EOI with ioapic_ack_old on!
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using old ACK method
(XEN) ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=0 pin2=0
(XEN) TSC_DEADLINE disabled due to Errata; please update microcode to version 0xb2 (or later)
(XEN) Allocated console ring of 32 KiB.
(XEN) mwait-idle: MWAIT substates: 0x11142120
(XEN) mwait-idle: v0.4.1 model 0x4e
(XEN) mwait-idle: lapic_timer_reliable_states 0xffffffff
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) VMX: Supported advanced features:
(XEN)  - APIC MMIO access virtualisation
(XEN)  - APIC TPR shadow
(XEN)  - Extended Page Tables (EPT)
(XEN)  - Virtual-Processor Identifiers (VPID)
(XEN)  - Virtual NMI
(XEN)  - MSR direct-access bitmap
(XEN)  - Unrestricted Guest
(XEN)  - VMCS shadowing
(XEN)  - VM Functions
(XEN)  - Virtualisation Exceptions
(XEN)  - Page Modification Logging
(XEN) HVM: ASIDs enabled.
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging (HAP) detected
(XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB
(XEN) Adding cpu 1 to runqueue 0
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) Removing cpu 1 from runqueue 0
(XEN) Adding cpu 2 to runqueue 0
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) Adding cpu 3 to runqueue 0
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) Removing cpu 3 from runqueue 0
(XEN) Brought up 2 CPUs
(XEN) Parked 2 CPUs
(XEN) build-id: bd040b836145d2bcde168a5dcc0ade2d6a89c2a7
(XEN) Running stub recovery selftests...
(XEN) traps.c:1574: GPF (0000): ffff82d0bffff041 [ffff82d0bffff041] -> ffff82d08037d412
(XEN) traps.c:755: Trap 12: ffff82d0bffff040 [ffff82d0bffff040] -> ffff82d08037d412
(XEN) traps.c:1094: Trap 3: ffff82d0bffff041 [ffff82d0bffff041] -> ffff82d08037d412
(XEN) ACPI sleep modes: S3
(XEN) VPMU: disabled
(XEN) mcheck_poll: Machine check polling timer started.
(XEN) Dom0 has maximum 312 PIRQs
(XEN) NX (Execute Disable) protection active
(XEN) *** Building a PV Dom0 ***
(XEN) ELF: phdr: paddr=0x1000000 memsz=0x111f000
(XEN) ELF: phdr: paddr=0x2200000 memsz=0x498000
(XEN) ELF: phdr: paddr=0x2698000 memsz=0x2b4d8
(XEN) ELF: phdr: paddr=0x26c4000 memsz=0x368000
(XEN) ELF: memory: 0x1000000 -> 0x2a2c000
(XEN) ELF: note: GUEST_OS = "linux"
(XEN) ELF: note: GUEST_VERSION = "2.6"
(XEN) ELF: note: XEN_VERSION = "xen-3.0"
(XEN) ELF: note: VIRT_BASE = 0xffffffff80000000
(XEN) ELF: note: INIT_P2M = 0x8000000000
(XEN) ELF: note: ENTRY = 0xffffffff826c4180
(XEN) ELF: note: HYPERCALL_PAGE = 0xffffffff81001000
(XEN) ELF: note: FEATURES = "!writable_page_tables|pae_pgdir_above_4gb"
(XEN) ELF: note: SUPPORTED_FEATURES = 0x8801
(XEN) ELF: note: PAE_MODE = "yes"
(XEN) ELF: note: LOADER = "generic"
(XEN) ELF: note: unknown (0xd)
(XEN) ELF: note: SUSPEND_CANCEL = 0x1
(XEN) ELF: note: MOD_START_PFN = 0x1
(XEN) ELF: note: HV_START_LOW = 0xffff800000000000
(XEN) ELF: note: PADDR_OFFSET = 0
(XEN) ELF: note: PHYS32_ENTRY = 0x1000390
(XEN) ELF: Found PVH image
(XEN) ELF: addresses:
(XEN)     virt_base        = 0xffffffff80000000
(XEN)     elf_paddr_offset = 0x0
(XEN)     virt_offset      = 0xffffffff80000000
(XEN)     virt_kstart      = 0xffffffff81000000
(XEN)     virt_kend        = 0xffffffff82a2c000
(XEN)     virt_entry       = 0xffffffff826c4180
(XEN)     p2m_base         = 0x8000000000
(XEN)  Xen  kernel: 64-bit, lsb, compat32
(XEN)  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x2a2c000
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000164000000->0000000168000000 (245760 pages to be allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: ffffffff81000000->ffffffff82a2c000
(XEN)  Init. ramdisk: 0000000000000000->0000000000000000
(XEN)  Phys-Mach map: 0000008000000000->0000008000200000
(XEN)  Start info:    ffffffff82a2c000->ffffffff82a2c4b4
(XEN)  Xenstore ring: 0000000000000000->0000000000000000
(XEN)  Console ring:  0000000000000000->0000000000000000
(XEN)  Page tables:   ffffffff82a2d000->ffffffff82a46000
(XEN)  Boot stack:    ffffffff82a46000->ffffffff82a47000
(XEN)  TOTAL:         ffffffff80000000->ffffffff82c00000
(XEN)  ENTRY ADDRESS: ffffffff826c4180
(XEN) Dom0 has maximum 1 VCPUs
(XEN) ELF: phdr 0 at 0xffffffff81000000 -> 0xffffffff8211f000
(XEN) ELF: phdr 1 at 0xffffffff82200000 -> 0xffffffff82698000
(XEN) ELF: phdr 2 at 0xffffffff82698000 -> 0xffffffff826c34d8
(XEN) ELF: phdr 3 at 0xffffffff826c4000 -> 0xffffffff8283a000
(XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
(XEN) <RMRR> setting up regions
(XEN) <RMRR> mapping 0x8d800 - 0x90000
(XEN) Xen BUG at iommu.c:2021
(XEN) ----[ Xen-4.12.0  x86_64  debug=y   Not tainted ]----
(XEN) CPU:    0
(XEN) RIP:    e008:[<ffff82d08025aea8>] iommu.c#rmrr_identity_mapping+0x209/0x230
(XEN) RFLAGS: 0000000000010282   CONTEXT: hypervisor
(XEN) rax: 00000000fffffff4   rbx: ffff82d08048f7ec   rcx: 000000000000001e
(XEN) rdx: ffff82d08048ffff   rsi: 000000016baf7000   rdi: ffff8301687d4138
(XEN) rbp: ffff82d08048f828   rsp: ffff82d08048f7c8   r8:  ffff830169a08000
(XEN) r9:  0000000000000030   r10: 0000000000090000   r11: 0000000000000005
(XEN) r12: 000000000008d800   r13: ffff8301687d4000   r14: 0000000000000000
(XEN) r15: ffff830169b08670   cr0: 000000008005003b   cr4: 00000000001526e0
(XEN) cr3: 000000008847f000   cr2: 0000000000000000
(XEN) fsb: 0000000000000000   gsb: 0000000000000000   gss: 0000000000000000
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: e008
(XEN) Xen code around <ffff82d08025aea8> (iommu.c#rmrr_identity_mapping+0x209/0x230):
(XEN)  00 00 00 e9 1a ff ff ff <0f> 0b 0f 0b 0f 0b 41 be 00 00 00 00 e9 09 ff ff
(XEN) Xen stack trace from rsp=ffff82d08048f7c8:
(XEN)    ffff82d08048f7f0 000000008024c776 0000000000090000 ffff8301687d4150
(XEN)    ffff82d08048f838 ffff82d0804809a8 ffff82d08048f818 0000000000000000
(XEN)    ffff830169b08670 ffff8301687d4000 ffff82d0803d1060 ffff82d0803e9da8
(XEN)    ffff82d08048f868 ffff82d08040bb63 ffff82d0805ab7b4 0000000000000000
(XEN)    ffff8301687d4000 0000000000040000 ffff8301687d4000 0000000000044201
(XEN)    ffff82d08048f8c8 ffff82d08040b168 ffff82d08048f8c8 000000008847f000
(XEN)    ffff82d0804669c0 0000000000088595 ffff82d08048f8c8 0000000000000000
(XEN)    0000000000004201 0000000000040000 ffff8301687d4000 0000000000044201
(XEN)    ffff82d08048fd58 ffff82d08042ca87 ffffffff82c00000 0000000000000019
(XEN)    0000000000000ff0 0000000000000000 0000000166a2f000 ffff830166a2e000
(XEN)    ffffffff82a2c000 0000000000000000 ffff830166a2f000 ffff830166a30ff8
(XEN)    0000000166a45000 ffffffffffffffff ffff830166a30000 ffffffff82a47000
(XEN)    ffffffff81000000 0000000000168000 ffffffff82a2d000 ffffffff82a2c000
(XEN)    ffff830166a2f0b0 0000000166a46000 0000000000164000 ffffffff82a2c000
(XEN)    0000000000000000 0000000000002c00 0000000000002c00 0000008000200000
(XEN)    ffff830100004000 0000008000000000 ffff820040000000 0000000000164000
(XEN)    0000000000040000 0000000000000000 0000000000000000 ffffffffffffffff
(XEN)    ffffffffffffffff ffff82d08045ebc0 ffff8301687b8000 0000000000000000
(XEN)    0000000000000000 ffff83016c8e7c14 ffff83016c8e7e00 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000001 ffff82d0803e8dfd
(XEN) Xen call trace:
(XEN)    [<ffff82d08025aea8>] iommu.c#rmrr_identity_mapping+0x209/0x230
(XEN)    [<ffff82d08040bb63>] iommu.c#intel_iommu_hwdom_init+0x7a/0x150
(XEN)    [<ffff82d08040b168>] iommu_hwdom_init+0x20e/0x22e
(XEN)    [<ffff82d08042ca87>] dom0_construct_pv+0x2692/0x2adb
(XEN)    [<ffff82d08042fda2>] construct_dom0+0x82/0xa92
(XEN)    [<ffff82d080420258>] __start_xen+0x27c9/0x28dd
(XEN)    [<ffff82d0802000f3>] __high_start+0x53/0x55
(XEN)
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) Xen BUG at iommu.c:2021
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...
(XEN) APIC error on CPU0: 40(00)

[-- Attachment #3: Type: text/plain, Size: 157 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-24 17:42 ` Rich Persaud
@ 2019-07-26  1:13   ` Roman Shaposhnik
  0 siblings, 0 replies; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-26  1:13 UTC (permalink / raw)
  To: Rich Persaud; +Cc: Daniel Smith, xen-devel

On Wed, Jul 24, 2019 at 10:42 AM Rich Persaud <persaur@gmail.com> wrote:
>
> On Jul 19, 2019, at 15:31, Roman Shaposhnik <roman@zededa.com> wrote:
>
> Hi!
>
> we're using Xen on Advantech ARK-2250 Embedded Box PC:
>    https://www.elmark.com.pl/web/uploaded/karty_produktow/advantech/ark-2250l/ark-2250l_instrukcja-uzytkownika.pdf
>
>
> Roman,
>
> Good to see Xen being used on fanless devices.

Oh, there's WAY more of those in EVE under Xen management ;-)
     https://wiki.lfedge.org/display/EVE/Hardware+Platforms+Supporting+EVE

> Does the AMI BIOS for the i7 6600U Skylake CPU [1] variant of ARK-2250 [2]
> support Intel TXT DRTM and discrete TPM, which would enable boot integrity [3] protection for Xen, read-only dom0 and stateless VMs?
> Boot integrity is valuable on edge devices.

Funny you should mention this -- that's exactly what we're playing
with right now in LF Edge Project EVE. Do you want to pop up on the
mailing list or slack channel there? (not sure this is the right topic
for Xen-devel).

And just so that we're on the same page, here's what we are after when
it comes to root of trust in EVE (I really need to do a write up on
this soon):
   * measured boot (we're really not interested secure boot that much)
   * measured boot of the DomUs
   * proxy TPM to the DomUs

> [1] CPU spec: https://ark.intel.com/content/www/us/en/ark/products/88192/intel-core-i7-6600u-processor-4m-cache-up-to-3-40-ghz.html
>
> [2] PC spec: https://www.advantech.com/products/ark-2000_series_embedded_box_pcs/ark-2250l/mod_66ebc4e0-9a0c-489c-96a5-70a8054e9037
>
> [3] TrenchBoot, Xen Summit 2019, https://youtube.com/watch?v=f0LZFSq4Ack

Thanks for the notes! Much appreciated!

Thanks,
Roman.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-23 18:25                                   ` Roman Shaposhnik
@ 2019-07-26  7:58                                     ` Jan Beulich
  2019-07-30 17:56                                       ` Roman Shaposhnik
  0 siblings, 1 reply; 65+ messages in thread
From: Jan Beulich @ 2019-07-26  7:58 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: Juergen Gross, Andrew Cooper, Paul Durrant, xen-devel,
	boris.ostrovsky, Roger Pau Monné

On 23.07.2019 20:25, Roman Shaposhnik wrote:
> Interestingly enough, adding iommu_inclusive_mapping=1 AND iommu=debug
> booted the system just fine.

Btw (I've noticed this only now) - are you saying without "iommu=debug"
the box does _not_ boot fine, despite the other option?

Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-26  0:47                           ` Roman Shaposhnik
@ 2019-07-26  9:35                             ` Roger Pau Monné
  2019-07-30  9:21                               ` Roger Pau Monné
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-07-26  9:35 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Thu, Jul 25, 2019 at 05:47:19PM -0700, Roman Shaposhnik wrote:
> Hi Roger!
> 
> With your patch (and build as a debug build) Xen crashes on boot
> (which I guess was the point of your BUG_ON statement).

Yes, that's very weird, seems like entries are not added to the iommu
page tables but I have no idea why, AFAICT this works fine on my
system.

Do you have any patches on top of RELEASE-4.12.0?

I have another patch with more verbose output, could you give it a
try? It's maybe going to be more chatty than the previous one.

I'm sorry to keep you testing stuff, but since I cannot reproduce this
locally I have to rely on you to provide the debug output.

Thanks, Roger.
---8<---
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index b9bbb8f485..75f8359a99 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -1331,7 +1331,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
 
     if ( !paging_mode_translate(p2m->domain) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
                                 IOMMUF_readable | IOMMUF_writable);
@@ -1422,7 +1422,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
 
     if ( !paging_mode_translate(d) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
     }
diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
index 117b869b0c..214c5d515f 100644
--- a/xen/drivers/passthrough/iommu.c
+++ b/xen/drivers/passthrough/iommu.c
@@ -291,8 +291,18 @@ int iommu_map(struct domain *d, dfn_t dfn, mfn_t mfn,
     unsigned long i;
     int rc = 0;
 
+if (dfn_x(dfn) >= 0x8d800 && dfn_x(dfn) < 0x90000 )
+{
+    printk("<RMRR> iommu_map %#lx\n", dfn_x(dfn));
+    process_pending_softirqs();
+}
+
     if ( !iommu_enabled || !hd->platform_ops )
+{
+    printk("iommu_enabled: %d platform_ops %p\n",
+           iommu_enabled, hd->platform_ops);
         return 0;
+}
 
     ASSERT(IS_ALIGNED(dfn_x(dfn), (1ul << page_order)));
     ASSERT(IS_ALIGNED(mfn_x(mfn), (1ul << page_order)));
diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
index 50a0e25224..8c3fcb50ae 100644
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -2009,12 +2009,33 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
     if ( !map )
         return -ENOENT;
 
+printk("<RMRR> mapping %#lx - %#lx\n", base_pfn, end_pfn);
     while ( base_pfn < end_pfn )
     {
         int err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag);
+        mfn_t mfn;
+        unsigned int f;
 
         if ( err )
             return err;
+
+err = intel_iommu_lookup_page(d, _dfn(base_pfn), &mfn, &f);
+if ( err )
+{
+    printk("intel_iommu_lookup_page err: %d\n", err);
+    BUG();
+}
+if ( base_pfn != mfn_x(mfn) )
+{
+    printk("base_pfn: %#lx mfn: %#lx\n", base_pfn, mfn_x(mfn));
+    BUG();
+}
+if ( f != (IOMMUF_readable | IOMMUF_writable) )
+{
+    printk("flags: %#x\n", f);
+    BUG();
+}
+
         base_pfn++;
     }
 
@@ -2263,6 +2284,7 @@ static void __hwdom_init setup_hwdom_rmrr(struct domain *d)
     u16 bdf;
     int ret, i;
 
+printk("<RMRR> setting up regions\n");
     pcidevs_lock();
     for_each_rmrr_device ( rmrr, bdf, i )
     {

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply related	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-26  9:35                             ` Roger Pau Monné
@ 2019-07-30  9:21                               ` Roger Pau Monné
  2019-07-30 17:55                                 ` Roman Shaposhnik
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-07-30  9:21 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

Ping?

It would be very helpful for us in order to get this sorted out if you
could answer the questions below and try the new debug patch :).

On Fri, Jul 26, 2019 at 11:35:45AM +0200, Roger Pau Monné wrote:
> On Thu, Jul 25, 2019 at 05:47:19PM -0700, Roman Shaposhnik wrote:
> > Hi Roger!
> > 
> > With your patch (and build as a debug build) Xen crashes on boot
> > (which I guess was the point of your BUG_ON statement).
> 
> Yes, that's very weird, seems like entries are not added to the iommu
> page tables but I have no idea why, AFAICT this works fine on my
> system.
> 
> Do you have any patches on top of RELEASE-4.12.0?
> 
> I have another patch with more verbose output, could you give it a
> try? It's maybe going to be more chatty than the previous one.
> 
> I'm sorry to keep you testing stuff, but since I cannot reproduce this
> locally I have to rely on you to provide the debug output.
> 
> Thanks, Roger.
> ---8<---
> diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> index b9bbb8f485..75f8359a99 100644
> --- a/xen/arch/x86/mm/p2m.c
> +++ b/xen/arch/x86/mm/p2m.c
> @@ -1331,7 +1331,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
>  
>      if ( !paging_mode_translate(p2m->domain) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>              return 0;
>          return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
>                                  IOMMUF_readable | IOMMUF_writable);
> @@ -1422,7 +1422,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
>  
>      if ( !paging_mode_translate(d) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>              return 0;
>          return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
>      }
> diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> index 117b869b0c..214c5d515f 100644
> --- a/xen/drivers/passthrough/iommu.c
> +++ b/xen/drivers/passthrough/iommu.c
> @@ -291,8 +291,18 @@ int iommu_map(struct domain *d, dfn_t dfn, mfn_t mfn,
>      unsigned long i;
>      int rc = 0;
>  
> +if (dfn_x(dfn) >= 0x8d800 && dfn_x(dfn) < 0x90000 )
> +{
> +    printk("<RMRR> iommu_map %#lx\n", dfn_x(dfn));
> +    process_pending_softirqs();
> +}
> +
>      if ( !iommu_enabled || !hd->platform_ops )
> +{
> +    printk("iommu_enabled: %d platform_ops %p\n",
> +           iommu_enabled, hd->platform_ops);
>          return 0;
> +}
>  
>      ASSERT(IS_ALIGNED(dfn_x(dfn), (1ul << page_order)));
>      ASSERT(IS_ALIGNED(mfn_x(mfn), (1ul << page_order)));
> diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
> index 50a0e25224..8c3fcb50ae 100644
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -2009,12 +2009,33 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
>      if ( !map )
>          return -ENOENT;
>  
> +printk("<RMRR> mapping %#lx - %#lx\n", base_pfn, end_pfn);
>      while ( base_pfn < end_pfn )
>      {
>          int err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag);
> +        mfn_t mfn;
> +        unsigned int f;
>  
>          if ( err )
>              return err;
> +
> +err = intel_iommu_lookup_page(d, _dfn(base_pfn), &mfn, &f);
> +if ( err )
> +{
> +    printk("intel_iommu_lookup_page err: %d\n", err);
> +    BUG();
> +}
> +if ( base_pfn != mfn_x(mfn) )
> +{
> +    printk("base_pfn: %#lx mfn: %#lx\n", base_pfn, mfn_x(mfn));
> +    BUG();
> +}
> +if ( f != (IOMMUF_readable | IOMMUF_writable) )
> +{
> +    printk("flags: %#x\n", f);
> +    BUG();
> +}
> +
>          base_pfn++;
>      }
>  
> @@ -2263,6 +2284,7 @@ static void __hwdom_init setup_hwdom_rmrr(struct domain *d)
>      u16 bdf;
>      int ret, i;
>  
> +printk("<RMRR> setting up regions\n");
>      pcidevs_lock();
>      for_each_rmrr_device ( rmrr, bdf, i )
>      {
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-devel

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-30  9:21                               ` Roger Pau Monné
@ 2019-07-30 17:55                                 ` Roman Shaposhnik
  2019-07-31  8:31                                   ` Jan Beulich
  2019-07-31  8:36                                   ` Roger Pau Monné
  0 siblings, 2 replies; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-30 17:55 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

[-- Attachment #1: Type: text/plain, Size: 4777 bytes --]

Sorry -- got a bit distracted yesterday. Attached is the log with only
your latest patch attached. Interestingly enough the box booted fine
without screen artifacts. So I guess we're getting closer...

Thanks for all the help!

Thanks,
Roman.

On Tue, Jul 30, 2019 at 2:21 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>
> Ping?
>
> It would be very helpful for us in order to get this sorted out if you
> could answer the questions below and try the new debug patch :).
>
> On Fri, Jul 26, 2019 at 11:35:45AM +0200, Roger Pau Monné wrote:
> > On Thu, Jul 25, 2019 at 05:47:19PM -0700, Roman Shaposhnik wrote:
> > > Hi Roger!
> > >
> > > With your patch (and build as a debug build) Xen crashes on boot
> > > (which I guess was the point of your BUG_ON statement).
> >
> > Yes, that's very weird, seems like entries are not added to the iommu
> > page tables but I have no idea why, AFAICT this works fine on my
> > system.
> >
> > Do you have any patches on top of RELEASE-4.12.0?
> >
> > I have another patch with more verbose output, could you give it a
> > try? It's maybe going to be more chatty than the previous one.
> >
> > I'm sorry to keep you testing stuff, but since I cannot reproduce this
> > locally I have to rely on you to provide the debug output.
> >
> > Thanks, Roger.
> > ---8<---
> > diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> > index b9bbb8f485..75f8359a99 100644
> > --- a/xen/arch/x86/mm/p2m.c
> > +++ b/xen/arch/x86/mm/p2m.c
> > @@ -1331,7 +1331,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
> >
> >      if ( !paging_mode_translate(p2m->domain) )
> >      {
> > -        if ( !need_iommu_pt_sync(d) )
> > +        if ( !has_iommu_pt(d) )
> >              return 0;
> >          return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
> >                                  IOMMUF_readable | IOMMUF_writable);
> > @@ -1422,7 +1422,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
> >
> >      if ( !paging_mode_translate(d) )
> >      {
> > -        if ( !need_iommu_pt_sync(d) )
> > +        if ( !has_iommu_pt(d) )
> >              return 0;
> >          return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
> >      }
> > diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> > index 117b869b0c..214c5d515f 100644
> > --- a/xen/drivers/passthrough/iommu.c
> > +++ b/xen/drivers/passthrough/iommu.c
> > @@ -291,8 +291,18 @@ int iommu_map(struct domain *d, dfn_t dfn, mfn_t mfn,
> >      unsigned long i;
> >      int rc = 0;
> >
> > +if (dfn_x(dfn) >= 0x8d800 && dfn_x(dfn) < 0x90000 )
> > +{
> > +    printk("<RMRR> iommu_map %#lx\n", dfn_x(dfn));
> > +    process_pending_softirqs();
> > +}
> > +
> >      if ( !iommu_enabled || !hd->platform_ops )
> > +{
> > +    printk("iommu_enabled: %d platform_ops %p\n",
> > +           iommu_enabled, hd->platform_ops);
> >          return 0;
> > +}
> >
> >      ASSERT(IS_ALIGNED(dfn_x(dfn), (1ul << page_order)));
> >      ASSERT(IS_ALIGNED(mfn_x(mfn), (1ul << page_order)));
> > diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
> > index 50a0e25224..8c3fcb50ae 100644
> > --- a/xen/drivers/passthrough/vtd/iommu.c
> > +++ b/xen/drivers/passthrough/vtd/iommu.c
> > @@ -2009,12 +2009,33 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
> >      if ( !map )
> >          return -ENOENT;
> >
> > +printk("<RMRR> mapping %#lx - %#lx\n", base_pfn, end_pfn);
> >      while ( base_pfn < end_pfn )
> >      {
> >          int err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag);
> > +        mfn_t mfn;
> > +        unsigned int f;
> >
> >          if ( err )
> >              return err;
> > +
> > +err = intel_iommu_lookup_page(d, _dfn(base_pfn), &mfn, &f);
> > +if ( err )
> > +{
> > +    printk("intel_iommu_lookup_page err: %d\n", err);
> > +    BUG();
> > +}
> > +if ( base_pfn != mfn_x(mfn) )
> > +{
> > +    printk("base_pfn: %#lx mfn: %#lx\n", base_pfn, mfn_x(mfn));
> > +    BUG();
> > +}
> > +if ( f != (IOMMUF_readable | IOMMUF_writable) )
> > +{
> > +    printk("flags: %#x\n", f);
> > +    BUG();
> > +}
> > +
> >          base_pfn++;
> >      }
> >
> > @@ -2263,6 +2284,7 @@ static void __hwdom_init setup_hwdom_rmrr(struct domain *d)
> >      u16 bdf;
> >      int ret, i;
> >
> > +printk("<RMRR> setting up regions\n");
> >      pcidevs_lock();
> >      for_each_rmrr_device ( rmrr, bdf, i )
> >      {
> >
> > _______________________________________________
> > Xen-devel mailing list
> > Xen-devel@lists.xenproject.org
> > https://lists.xenproject.org/mailman/listinfo/xen-devel

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: xen.txt --]
[-- Type: text/plain; charset="GB18030"; name="xen.txt", Size: 240537 bytes --]

Welcome to GRUB!

/EndEntire
file path: /ACPI(a0341d0,0)/PCI(0,17)/Sata(0,ffff,0)
/HD(2,1800,96000,71b195c673a79945,2,2)/File(\EFI\BOOT)/File(BOOTX64.EFI)
/EndEntire
Welcome to GRUB!

error: two arguments expected.
GNU GRUB  version 2.03

ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿³³³³³³³³³³³³³³³³³³³³³³³³³³ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ     Use the \x1e and \x1f keys to select which entry is highlighted.          
      Press enter to boot the selected OS, `e' to edit the commands       
      before booting or `c' for a command-line.                            *Boot 0.0.0-45505acf-dirty-2019-07-24.23.57-amd64                            Set Boot Options                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   The highlighted entry will be executed automatically in 5s.                                                                                                                                                                               GNU GRUB  version 2.03

ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿³³³³³³³³³³³³³³³³³³³³³³³³³³ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ     Minimum Emacs-like screen editing is supported. TAB lists           
      completions. Press Ctrl-x or F10 to boot, Ctrl-c or F2 for a        
      command-line or ESC to discard edits and return to the GRUB menu.   setparams 'Boot 0.0.0-45505acf-dirty-2019-07-24.23.57-amd64'                                                                                                    $boot_xen_cmd  $xen $xen_console $xen_platform_tweaks $dom0_setting\
s                                                                                   $boot_dom0_cmd $linux $linux_console $linux_qemu_tweaks $linuxkit_c\
mdline root=$rootfs_root text                                                       if regexp '/' "$devicetree" ; then                                             devicetree $devicetree                                                   fi                                                                                                                                                                                                                                                                                                                                                                                            $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $dom0_settings         $boot_dom0_cmd $linux $linux_console $linux_qemu_tweaks $linuxkit_c\
mdline root=$rootfs_root text                                                       if regexp '/' "$devicetree" ; then                                             devicetree $devicetree                                                   fi                                                                                                                                                                                                                                                                                                                                                                                                                                                                      $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $dom0_setting          $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $dom0_settin           $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $dom0_setti            $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $dom0_sett             $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $dom0_set              $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $dom0_se               $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $dom0_s                $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $dom0_                 $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $dom0                  $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $dom                   $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $do                    $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $d                     $boot_xen_cmd $xen $xen_console $xen_platform_tweaks $                      $boot_xen_cmd $xen $xen_console $xen_platform_tweaks                        $boot_xen_cmd $xen $xen_console $xen_platform_tweaks                        $boot_xen_cmd $xen $xen_console $xen_platform_tweak                         $boot_xen_cmd $xen $xen_console $xen_platform_twea                          $boot_xen_cmd $xen $xen_console $xen_platform_twe                           $boot_xen_cmd $xen $xen_console $xen_platform_tw                            $boot_xen_cmd $xen $xen_console $xen_platform_t                             $boot_xen_cmd $xen $xen_console $xen_platform_                              $boot_xen_cmd $xen $xen_console $xen_platform                               $boot_xen_cmd $xen $xen_console $xen_platfor                                $boot_xen_cmd $xen $xen_console $xen_platfo                                 $boot_xen_cmd $xen $xen_console $xen_platf                                  $boot_xen_cmd $xen $xen_console $xen_plat                                   $boot_xen_cmd $xen $xen_console $xen_pla                                    $boot_xen_cmd $xen $xen_console $xen_pl                                     $boot_xen_cmd $xen $xen_console $xen_p                                      $boot_xen_cmd $xen $xen_console $xen_                                       $boot_xen_cmd $xen $xen_console $xen                                        $boot_xen_cmd $xen $xen_console $xe                                         $boot_xen_cmd $xen $xen_console $x                                          $boot_xen_cmd $xen $xen_console $                                           $boot_xen_cmd $xen $xen_console                                             $boot_xen_cmd $xen $xen_console                                             $boot_xen_cmd $xen $xen_consol                                              $boot_xen_cmd $xen $xen_conso                                               $boot_xen_cmd $xen $xen_cons                                                $boot_xen_cmd $xen $xen_con                                                 $boot_xen_cmd $xen $xen_co                                                  $boot_xen_cmd $xen $xen_c                                                   $boot_xen_cmd $xen $xen_                                                    $boot_xen_cmd $xen $xen                                                     $boot_xen_cmd $xen $xe                                                      $boot_xen_cmd $xen $x                                                       $boot_xen_cmd $xen $                                                        $boot_xen_cmd $xen                                                          $boot_xen_cmd $xen                                                          $boot_xen_cmd $xe                                                           $boot_xen_cmd $x                                                            $boot_xen_cmd $                                                             $boot_xen_cmd                                                               $boot_xen_cmd (                                                             $boot_xen_cmd (h                                                            $boot_xen_cmd (hd                                                           $boot_xen_cmd (hd0                                                          $boot_xen_cmd (hd0,                                                         $boot_xen_cmd (hd0,g                                                        $boot_xen_cmd (hd0,gp                                                       $boot_xen_cmd (hd0,gpt                                                      $boot_xen_cmd (hd0,gpt5                                                     $boot_xen_cmd (hd0,gpt5)                                                    $boot_xen_cmd (hd0,gpt5)/                                                   $boot_xen_cmd (hd0,gpt5)/x                                                  $boot_xen_cmd (hd0,gpt5)/xe                                                 $boot_xen_cmd (hd0,gpt5)/xen                                                $boot_xen_cmd (hd0,gpt5)/xen.                                               $boot_xen_cmd (hd0,gpt5)/xen.g                                              $boot_xen_cmd (hd0,gpt5)/xen.gz                                             $boot_xen_cmd (hd0,gpt5)/xen.gz                                             $boot_xen_cmd (hd0,gpt5)/xen.gz l                                           $boot_xen_cmd (hd0,gpt5)/xen.gz lo                                          $boot_xen_cmd (hd0,gpt5)/xen.gz log                                         $boot_xen_cmd (hd0,gpt5)/xen.gz logl                                        $boot_xen_cmd (hd0,gpt5)/xen.gz loglv                                       $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl                                      $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=                                     $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=a                                    $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=al                                   $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all                                  $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all                                  $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all c                                $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all co                               $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com                              $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1                             $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=                            $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=1                           $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=11                          $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115                         $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=1152                        $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=11520                       $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200                      $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,                     $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8                    $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n                   $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1                  $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1                  $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 c                $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 co               $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 con              $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 cons             $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 conso            $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 consol           $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console          $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=         $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
c                                                                                   $boot_dom0_cmd $linux $linux_console $linux_qemu_tweaks $linuxkit_c\
mdline root=$rootfs_root text                                                       if regexp '/' "$devicetree" ; then                                             devicetree $devicetree                                                   fi                                                                                                                                                                                                                                                                                                                                                                                           $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
co                                                                                  $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com                                                                                 $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1                                                                                $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,                                                                               $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,v                                                                              $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vg                                                                             $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga                                                                            $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga                                                                            $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga d                                                                          $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga do                                                                         $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom                                                                        $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0                                                                       $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_                                                                      $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_m                                                                     $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_me                                                                    $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem                                                                   $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=                                                                  $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1                                                                 $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=10                                                                $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=102                                                               $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024                                                              $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M                                                             $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,                                                            $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,m                                                           $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,ma                                                          $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max                                                         $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:                                                        $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1                                                       $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:10                                                      $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:102                                                     $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024                                                    $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M                                                   $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M                                                   $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M d                                                 $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M do                                                $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom                                               $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0                                              $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_                                             $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_m                                            $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_ma                                           $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max                                          $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_                                         $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_v                                        $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vc                                       $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcp                                      $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpu                                     $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus                                    $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=                                   $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1                                  $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1                                  $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 d                                $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 do                               $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom                              $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0                             $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_                            $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_v                           $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vc                          $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcp                         $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpu                        $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus                       $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_                      $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_p                     $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pi                    $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin                   $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin                   $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin s                 $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin sm                $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt               $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=              $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=f             $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=fa            $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=fal           $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=fals          $boot_xen_cmd (hd0,gpt5)/xen.gz loglvl=all com1=115200,8n1 console=\
com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=false   Booting a command list

0x0000:0x00:0x02.0x0: ROM: 0x10000 bytes at 0x8968e018
0x0000:0x02:0x00.0x0: ROM: 0x10000 bytes at 0x89641018
0x0000:0x00:0x1f.0x6: ROM: 0x10c00 bytes at 0x89630018
 Xen 4.12.0
(XEN) Xen version 4.12.0 (@) (gcc (Alpine 6.4.0) 6.4.0) debug=n  Tue Jul 30 17:32:01 UTC 2019
(XEN) Latest ChangeSet: 
(XEN) Bootloader: GRUB 2.03
(XEN) Command line: loglvl=all com1=115200,8n1 console=com1,vga dom0_mem=1024M,max:1024M dom0_max_vcpus=1 dom0_vcpus_pin smt=false
(XEN) Xen image load base address: 0x88000000
(XEN) Video information:
(XEN)  VGA is graphics mode 1680x1050, 32 bpp
(XEN) Disc information:
(XEN)  Found 0 MBR signatures
(XEN)  Found 1 EDD information structures
(XEN) EFI RAM map:
(XEN)  0000000000000000 - 0000000000058000 (usable)
(XEN)  0000000000058000 - 0000000000059000 (reserved)
(XEN)  0000000000059000 - 000000000009f000 (usable)
(XEN)  000000000009f000 - 00000000000a0000 (reserved)
(XEN)  0000000000100000 - 000000008648a000 (usable)
(XEN)  000000008648a000 - 000000008648b000 (ACPI NVS)
(XEN)  000000008648b000 - 00000000864b5000 (reserved)
(XEN)  00000000864b5000 - 000000008c224000 (usable)
(XEN)  000000008c224000 - 000000008c528000 (reserved)
(XEN)  000000008c528000 - 000000008c736000 (usable)
(XEN)  000000008c736000 - 000000008cea7000 (ACPI NVS)
(XEN)  000000008cea7000 - 000000008d2ff000 (reserved)
(XEN)  000000008d2ff000 - 000000008d300000 (usable)
(XEN)  000000008d300000 - 000000008d400000 (reserved)
(XEN)  00000000e0000000 - 00000000f0000000 (reserved)
(XEN)  00000000fe000000 - 00000000fe011000 (reserved)
(XEN)  00000000fec00000 - 00000000fec01000 (reserved)
(XEN)  00000000fee00000 - 00000000fee01000 (reserved)
(XEN)  00000000ff000000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 000000016e000000 (usable)
(XEN) ACPI: RSDP 8CE49000, 0024 (r2 ALASKA)
(XEN) ACPI: XSDT 8CE490A8, 00CC (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FACP 8CE6C370, 010C (r5 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DSDT 8CE49208, 23167 (r2 ALASKA   A M I   1072009 INTL 20120913)
(XEN) ACPI: FACS 8CE8EF80, 0040
(XEN) ACPI: APIC 8CE6C480, 0084 (r3 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FPDT 8CE6C508, 0044 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: FIDT 8CE6C550, 009C (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: MCFG 8CE6C5F0, 003C (r1 ALASKA   A M I   1072009 MSFT       97)
(XEN) ACPI: HPET 8CE6C630, 0038 (r1 ALASKA   A M I   1072009 AMI.    5000B)
(XEN) ACPI: LPIT 8CE6C668, 0094 (r1 INTEL   SKL-ULT        0 MSFT       5F)
(XEN) ACPI: SSDT 8CE6C700, 0248 (r2 INTEL  sensrhub        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE6C948, 2BAE (r2 INTEL  PtidDevc     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE6F4F8, 0BE3 (r2 INTEL  Ther_Rvp     1000 INTL 20120913)
(XEN) ACPI: SSDT 8CE700E0, 04A3 (r2 INTEL     zpodd     1000 INTL 20120913)
(XEN) ACPI: DBGP 8CE70588, 0034 (r1 INTEL                  0 MSFT       5F)
(XEN) ACPI: DBG2 8CE705C0, 0054 (r0 INTEL                  0 MSFT       5F)
(XEN) ACPI: SSDT 8CE70618, 06E9 (r2  INTEL xh_rvp07        0 INTL 20120913)
(XEN) ACPI: SSDT 8CE70D08, 547E (r2 SaSsdt  SaSsdt      3000 INTL 20120913)
(XEN) ACPI: UEFI 8CE76188, 0042 (r1                        0             0)
(XEN) ACPI: SSDT 8CE761D0, 0E73 (r2 CpuRef  CpuSsdt     3000 INTL 20120913)
(XEN) ACPI: BGRT 8CE77048, 0038 (r1 ALASKA   A M I   1072009 AMI     10013)
(XEN) ACPI: DMAR 8CE77080, 00A8 (r1 INTEL      SKL         1 INTL        1)
(XEN) ACPI: TPM2 8CE77128, 0034 (r3        Tpm2Tabl        1 AMI         0)
(XEN) ACPI: ASF! 8CE77160, 00A5 (r32 INTEL       HCG        1 TFSM    F4240)
(XEN) System RAM: 4003MB (4099736kB)
(XEN) No NUMA configuration found
(XEN) Faking a node at 0000000000000000-000000016e000000
(XEN) Domain heap initialised
(XEN) vesafb: framebuffer at 0xc0000000, mapped to 0xffff82c000201000, using 6912k, total 6912k
(XEN) vesafb: mode is 1680x1050x32, linelength=6720, font 8x16
(XEN) vesafb: Truecolor: size=8:8:8:8, shift=24:16:8:0
(XEN) CPU Vendor: Intel, Family 6 (0x6), Model 78 (0x4e), Stepping 3 (raw 000406e3)
(XEN) SMBIOS 3.0 present.
(XEN) Using APIC driver default
(XEN) ACPI: PM-Timer IO Port: 0x1808 (32 bits)
(XEN) ACPI: v5 SLEEP INFO: control[0:0], status[0:0]
(XEN) ACPI: SLEEP INFO: pm1x_cnt[1:1804,1:0], pm1x_evt[1:1800,1:0]
(XEN) ACPI: 32/64X FACS address mismatch in FADT - 8ce8ef80/0000000000000000, using 32
(XEN) ACPI:             wakeup_vec[8ce8ef8c], vec_size[20]
(XEN) ACPI: Local APIC address 0xfee00000
(XEN) ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled)
(XEN) ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled)
(XEN) ACPI: LAPIC (acpi_id[0x03] lapic_id[0x01] enabled)
(XEN) ACPI: LAPIC (acpi_id[0x04] lapic_id[0x03] enabled)
(XEN) ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
(XEN) ACPI: IOAPIC (id[0x02] address[0xfec00000] gsi_base[0])
(XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
(XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
(XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
(XEN) ACPI: IRQ0 used by override.
(XEN) ACPI: IRQ2 used by override.
(XEN) ACPI: IRQ9 used by override.
(XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
(XEN) ACPI: HPET id: 0x8086a701 base: 0xfed00000
(XEN) PCI: MCFG configuration 0: base e0000000 segment 0000 buses 00 - ff
(XEN) PCI: MCFG area at e0000000 reserved in E820
(XEN) PCI: Using MCFG for segment 0000 bus 00-ff
(XEN) [VT-D]  RMRR address range 8d800000..8fffffff not in reserved memory; need "iommu_inclusive_mapping=1"?
(XEN) ERST table was not found
(XEN) ACPI: BGRT: invalidating v1 image at 0x88e5a018
(XEN) Using ACPI (MADT) for SMP configuration information
(XEN) SMP: Allowing 4 CPUs (0 hotplug CPUs)
(XEN) IRQ limits: 120 GSI, 840 MSI/MSI-X
(XEN) Switched to APIC driver x2apic_cluster.
(XEN) xstate: size: 0x440 and states: 0x1f
(XEN) CPU0: Intel machine check reporting enabled
(XEN) Speculative mitigation facilities:
(XEN)   Hardware features:
(XEN)   Compiled-in support: SHADOW_PAGING
(XEN)   Xen settings: BTI-Thunk N/A, SPEC_CTRL: No, Other:
(XEN)   L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 39, Safe address 8000000000
(XEN)   Support for HVM VMs: RSB EAGER_FPU
(XEN)   Support for PV VMs: RSB EAGER_FPU
(XEN)   XPTI (64-bit PV only): Dom0 enabled, DomU enabled (with PCID)
(XEN)   PV L1TF shadowing: Dom0 disabled, DomU enabled
(XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) Initializing Credit2 scheduler
(XEN)  load_precision_shift: 18
(XEN)  load_window_shift: 30
(XEN)  underload_balance_tolerance: 0
(XEN)  overload_balance_tolerance: -3
(XEN)  runqueues arrangement: socket
(XEN)  cap enforcement granularity: 10ms
(XEN) load tracking window length 1073741824 ns
(XEN) Adding cpu 0 to runqueue 0
(XEN)  First cpu on runqueue, activating
(XEN) Platform timer is 23.999MHz HPET
(XEN) Detected 2496.125 MHz processor.
(XEN) EFI memory map:
(XEN)  0000000000000-0000000007fff type=3 attr=000000000000000f
(XEN)  0000000008000-000000000bfff type=2 attr=000000000000000f
(XEN)  000000000c000-0000000047fff type=7 attr=000000000000000f
(XEN)  0000000048000-0000000057fff type=2 attr=000000000000000f
(XEN)  0000000058000-0000000058fff type=0 attr=000000000000000f
(XEN)  0000000059000-000000005efff type=7 attr=000000000000000f
(XEN)  000000005f000-000000005ffff type=4 attr=000000000000000f
(XEN)  0000000060000-000000009efff type=3 attr=000000000000000f
(XEN)  000000009f000-000000009ffff type=0 attr=000000000000000f
(XEN)  0000000100000-0000000907fff type=2 attr=000000000000000f
(XEN)  0000000908000-0000043fd9fff type=7 attr=000000000000000f
(XEN)  0000043fda000-000007e51ffff type=1 attr=000000000000000f
(XEN)  000007e520000-000007e55ffff type=4 attr=000000000000000f
(XEN)  000007e560000-0000085101fff type=7 attr=000000000000000f
(XEN)  0000085102000-000008539efff type=1 attr=000000000000000f
(XEN)  000008539f000-0000086489fff type=4 attr=000000000000000f
(XEN)  000008648a000-000008648afff type=10 attr=000000000000000f
(XEN)  000008648b000-00000864b4fff type=6 attr=800000000000000f
(XEN)  00000864b5000-000008650ffff type=4 attr=000000000000000f
(XEN)  0000086510000-0000086517fff type=7 attr=000000000000000f
(XEN)  0000086518000-0000086518fff type=2 attr=000000000000000f
(XEN)  0000086519000-00000881fffff type=7 attr=000000000000000f
(XEN)  0000088200000-0000088588fff type=2 attr=000000000000000f
(XEN)  0000088589000-000008bc23fff type=4 attr=000000000000000f
(XEN)  000008bc24000-000008bec0fff type=7 attr=000000000000000f
(XEN)  000008bec1000-000008c223fff type=3 attr=000000000000000f
(XEN)  000008c224000-000008c527fff type=0 attr=000000000000000f
(XEN)  000008c528000-000008c735fff type=7 attr=000000000000000f
(XEN)  000008c736000-000008cea6fff type=10 attr=000000000000000f
(XEN)  000008cea7000-000008d29ffff type=6 attr=800000000000000f
(XEN)  000008d2a0000-000008d2fefff type=5 attr=800000000000000f
(XEN)  000008d2ff000-000008d2fffff type=4 attr=000000000000000f
(XEN)  0000100000000-000016dffffff type=7 attr=000000000000000f
(XEN)  000008d300000-000008d3fffff type=0 attr=0000000000000000
(XEN)  00000e0000000-00000efffffff type=11 attr=8000000000000001
(XEN)  00000fe000000-00000fe010fff type=11 attr=8000000000000001
(XEN)  00000fec00000-00000fec00fff type=11 attr=8000000000000001
(XEN)  00000fee00000-00000fee00fff type=11 attr=8000000000000001
(XEN)  00000ff000000-00000ffffffff type=11 attr=8000000000000001
(XEN) Initing memory sharing.
(XEN) alt table ffff82d08042bc70 -> ffff82d08042d97a
(XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB.
(XEN) Intel VT-d Snoop Control not enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) Intel VT-d Posted Interrupt not enabled.
(XEN) Intel VT-d Shared EPT tables enabled.
(XEN) I/O virtualisation enabled
(XEN)  - Dom0 mode: Relaxed
(XEN) Interrupt remapping enabled
(XEN) nr_sockets: 1
(XEN) Enabled directed EOI with ioapic_ack_old on!
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using old ACK method
(XEN) ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=0 pin2=0
(XEN) TSC_DEADLINE disabled due to Errata; please update microcode to version 0xb2 (or later)
(XEN) Allocated console ring of 32 KiB.
(XEN) mwait-idle: MWAIT substates: 0x11142120
(XEN) mwait-idle: v0.4.1 model 0x4e
(XEN) mwait-idle: lapic_timer_reliable_states 0xffffffff
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) VMX: Supported advanced features:
(XEN)  - APIC MMIO access virtualisation
(XEN)  - APIC TPR shadow
(XEN)  - Extended Page Tables (EPT)
(XEN)  - Virtual-Processor Identifiers (VPID)
(XEN)  - Virtual NMI
(XEN)  - MSR direct-access bitmap
(XEN)  - Unrestricted Guest
(XEN)  - VMCS shadowing
(XEN)  - VM Functions
(XEN)  - Virtualisation Exceptions
(XEN)  - Page Modification Logging
(XEN) HVM: ASIDs enabled.
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging (HAP) detected
(XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB
(XEN) Adding cpu 1 to runqueue 0
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) Removing cpu 1 from runqueue 0
(XEN) Adding cpu 2 to runqueue 0
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) Adding cpu 3 to runqueue 0
(XEN) mwait-idle: max C-state count of 8 reached
(XEN) Removing cpu 3 from runqueue 0
(XEN) Brought up 2 CPUs
(XEN) Parked 2 CPUs
(XEN) build-id: 1e7bb80352edf0f6da1a1cfc15f1b2c927358a1b
(XEN) ACPI sleep modes: S3
(XEN) VPMU: disabled
(XEN) mcheck_poll: Machine check polling timer started.
(XEN) Dom0 has maximum 312 PIRQs
(XEN) NX (Execute Disable) protection active
(XEN) *** Building a PV Dom0 ***
(XEN)  Xen  kernel: 64-bit, lsb, compat32
(XEN)  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x2a2c000
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000164000000->0000000168000000 (245760 pages to be allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: ffffffff81000000->ffffffff82a2c000
(XEN)  Init. ramdisk: 0000000000000000->0000000000000000
(XEN)  Phys-Mach map: 0000008000000000->0000008000200000
(XEN)  Start info:    ffffffff82a2c000->ffffffff82a2c4b4
(XEN)  Xenstore ring: 0000000000000000->0000000000000000
(XEN)  Console ring:  0000000000000000->0000000000000000
(XEN)  Page tables:   ffffffff82a2d000->ffffffff82a46000
(XEN)  Boot stack:    ffffffff82a46000->ffffffff82a47000
(XEN)  TOTAL:         ffffffff80000000->ffffffff82c00000
(XEN)  ENTRY ADDRESS: ffffffff826c4180
(XEN) Dom0 has maximum 1 VCPUs
(XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
(XEN) <RMRR> setting up regions
(XEN) <RMRR> mapping 0x8d800 - 0x90000
(XEN) <RMRR> iommu_map 0x8d800
(XEN) <RMRR> iommu_map 0x8d801
(XEN) <RMRR> iommu_map 0x8d802
(XEN) <RMRR> iommu_map 0x8d803
(XEN) <RMRR> iommu_map 0x8d804
(XEN) <RMRR> iommu_map 0x8d805
(XEN) <RMRR> iommu_map 0x8d806
(XEN) <RMRR> iommu_map 0x8d807
(XEN) <RMRR> iommu_map 0x8d808
(XEN) <RMRR> iommu_map 0x8d809
(XEN) <RMRR> iommu_map 0x8d80a
(XEN) <RMRR> iommu_map 0x8d80b
(XEN) <RMRR> iommu_map 0x8d80c
(XEN) <RMRR> iommu_map 0x8d80d
(XEN) <RMRR> iommu_map 0x8d80e
(XEN) <RMRR> iommu_map 0x8d80f
(XEN) <RMRR> iommu_map 0x8d810
(XEN) <RMRR> iommu_map 0x8d811
(XEN) <RMRR> iommu_map 0x8d812
(XEN) <RMRR> iommu_map 0x8d813
(XEN) <RMRR> iommu_map 0x8d814
(XEN) <RMRR> iommu_map 0x8d815
(XEN) <RMRR> iommu_map 0x8d816
(XEN) <RMRR> iommu_map 0x8d817
(XEN) <RMRR> iommu_map 0x8d818
(XEN) <RMRR> iommu_map 0x8d819
(XEN) <RMRR> iommu_map 0x8d81a
(XEN) <RMRR> iommu_map 0x8d81b
(XEN) <RMRR> iommu_map 0x8d81c
(XEN) <RMRR> iommu_map 0x8d81d
(XEN) <RMRR> iommu_map 0x8d81e
(XEN) <RMRR> iommu_map 0x8d81f
(XEN) <RMRR> iommu_map 0x8d820
(XEN) <RMRR> iommu_map 0x8d821
(XEN) <RMRR> iommu_map 0x8d822
(XEN) <RMRR> iommu_map 0x8d823
(XEN) <RMRR> iommu_map 0x8d824
(XEN) <RMRR> iommu_map 0x8d825
(XEN) <RMRR> iommu_map 0x8d826
(XEN) <RMRR> iommu_map 0x8d827
(XEN) <RMRR> iommu_map 0x8d828
(XEN) <RMRR> iommu_map 0x8d829
(XEN) <RMRR> iommu_map 0x8d82a
(XEN) <RMRR> iommu_map 0x8d82b
(XEN) <RMRR> iommu_map 0x8d82c
(XEN) <RMRR> iommu_map 0x8d82d
(XEN) <RMRR> iommu_map 0x8d82e
(XEN) <RMRR> iommu_map 0x8d82f
(XEN) <RMRR> iommu_map 0x8d830
(XEN) <RMRR> iommu_map 0x8d831
(XEN) <RMRR> iommu_map 0x8d832
(XEN) <RMRR> iommu_map 0x8d833
(XEN) <RMRR> iommu_map 0x8d834
(XEN) <RMRR> iommu_map 0x8d835
(XEN) <RMRR> iommu_map 0x8d836
(XEN) <RMRR> iommu_map 0x8d837
(XEN) <RMRR> iommu_map 0x8d838
(XEN) <RMRR> iommu_map 0x8d839
(XEN) <RMRR> iommu_map 0x8d83a
(XEN) <RMRR> iommu_map 0x8d83b
(XEN) <RMRR> iommu_map 0x8d83c
(XEN) <RMRR> iommu_map 0x8d83d
(XEN) <RMRR> iommu_map 0x8d83e
(XEN) <RMRR> iommu_map 0x8d83f
(XEN) <RMRR> iommu_map 0x8d840
(XEN) <RMRR> iommu_map 0x8d841
(XEN) <RMRR> iommu_map 0x8d842
(XEN) <RMRR> iommu_map 0x8d843
(XEN) <RMRR> iommu_map 0x8d844
(XEN) <RMRR> iommu_map 0x8d845
(XEN) <RMRR> iommu_map 0x8d846
(XEN) <RMRR> iommu_map 0x8d847
(XEN) <RMRR> iommu_map 0x8d848
(XEN) <RMRR> iommu_map 0x8d849
(XEN) <RMRR> iommu_map 0x8d84a
(XEN) <RMRR> iommu_map 0x8d84b
(XEN) <RMRR> iommu_map 0x8d84c
(XEN) <RMRR> iommu_map 0x8d84d
(XEN) <RMRR> iommu_map 0x8d84e
(XEN) <RMRR> iommu_map 0x8d84f
(XEN) <RMRR> iommu_map 0x8d850
(XEN) <RMRR> iommu_map 0x8d851
(XEN) <RMRR> iommu_map 0x8d852
(XEN) <RMRR> iommu_map 0x8d853
(XEN) <RMRR> iommu_map 0x8d854
(XEN) <RMRR> iommu_map 0x8d855
(XEN) <RMRR> iommu_map 0x8d856
(XEN) <RMRR> iommu_map 0x8d857
(XEN) <RMRR> iommu_map 0x8d858
(XEN) <RMRR> iommu_map 0x8d859
(XEN) <RMRR> iommu_map 0x8d85a
(XEN) <RMRR> iommu_map 0x8d85b
(XEN) <RMRR> iommu_map 0x8d85c
(XEN) <RMRR> iommu_map 0x8d85d
(XEN) <RMRR> iommu_map 0x8d85e
(XEN) <RMRR> iommu_map 0x8d85f
(XEN) <RMRR> iommu_map 0x8d860
(XEN) <RMRR> iommu_map 0x8d861
(XEN) <RMRR> iommu_map 0x8d862
(XEN) <RMRR> iommu_map 0x8d863
(XEN) <RMRR> iommu_map 0x8d864
(XEN) <RMRR> iommu_map 0x8d865
(XEN) <RMRR> iommu_map 0x8d866
(XEN) <RMRR> iommu_map 0x8d867
(XEN) <RMRR> iommu_map 0x8d868
(XEN) <RMRR> iommu_map 0x8d869
(XEN) <RMRR> iommu_map 0x8d86a
(XEN) <RMRR> iommu_map 0x8d86b
(XEN) <RMRR> iommu_map 0x8d86c
(XEN) <RMRR> iommu_map 0x8d86d
(XEN) <RMRR> iommu_map 0x8d86e
(XEN) <RMRR> iommu_map 0x8d86f
(XEN) <RMRR> iommu_map 0x8d870
(XEN) <RMRR> iommu_map 0x8d871
(XEN) <RMRR> iommu_map 0x8d872
(XEN) <RMRR> iommu_map 0x8d873
(XEN) <RMRR> iommu_map 0x8d874
(XEN) <RMRR> iommu_map 0x8d875
(XEN) <RMRR> iommu_map 0x8d876
(XEN) <RMRR> iommu_map 0x8d877
(XEN) <RMRR> iommu_map 0x8d878
(XEN) <RMRR> iommu_map 0x8d879
(XEN) <RMRR> iommu_map 0x8d87a
(XEN) <RMRR> iommu_map 0x8d87b
(XEN) <RMRR> iommu_map 0x8d87c
(XEN) <RMRR> iommu_map 0x8d87d
(XEN) <RMRR> iommu_map 0x8d87e
(XEN) <RMRR> iommu_map 0x8d87f
(XEN) <RMRR> iommu_map 0x8d880
(XEN) <RMRR> iommu_map 0x8d881
(XEN) <RMRR> iommu_map 0x8d882
(XEN) <RMRR> iommu_map 0x8d883
(XEN) <RMRR> iommu_map 0x8d884
(XEN) <RMRR> iommu_map 0x8d885
(XEN) <RMRR> iommu_map 0x8d886
(XEN) <RMRR> iommu_map 0x8d887
(XEN) <RMRR> iommu_map 0x8d888
(XEN) <RMRR> iommu_map 0x8d889
(XEN) <RMRR> iommu_map 0x8d88a
(XEN) <RMRR> iommu_map 0x8d88b
(XEN) <RMRR> iommu_map 0x8d88c
(XEN) <RMRR> iommu_map 0x8d88d
(XEN) <RMRR> iommu_map 0x8d88e
(XEN) <RMRR> iommu_map 0x8d88f
(XEN) <RMRR> iommu_map 0x8d890
(XEN) <RMRR> iommu_map 0x8d891
(XEN) <RMRR> iommu_map 0x8d892
(XEN) <RMRR> iommu_map 0x8d893
(XEN) <RMRR> iommu_map 0x8d894
(XEN) <RMRR> iommu_map 0x8d895
(XEN) <RMRR> iommu_map 0x8d896
(XEN) <RMRR> iommu_map 0x8d897
(XEN) <RMRR> iommu_map 0x8d898
(XEN) <RMRR> iommu_map 0x8d899
(XEN) <RMRR> iommu_map 0x8d89a
(XEN) <RMRR> iommu_map 0x8d89b
(XEN) <RMRR> iommu_map 0x8d89c
(XEN) <RMRR> iommu_map 0x8d89d
(XEN) <RMRR> iommu_map 0x8d89e
(XEN) <RMRR> iommu_map 0x8d89f
(XEN) <RMRR> iommu_map 0x8d8a0
(XEN) <RMRR> iommu_map 0x8d8a1
(XEN) <RMRR> iommu_map 0x8d8a2
(XEN) <RMRR> iommu_map 0x8d8a3
(XEN) <RMRR> iommu_map 0x8d8a4
(XEN) <RMRR> iommu_map 0x8d8a5
(XEN) <RMRR> iommu_map 0x8d8a6
(XEN) <RMRR> iommu_map 0x8d8a7
(XEN) <RMRR> iommu_map 0x8d8a8
(XEN) <RMRR> iommu_map 0x8d8a9
(XEN) <RMRR> iommu_map 0x8d8aa
(XEN) <RMRR> iommu_map 0x8d8ab
(XEN) <RMRR> iommu_map 0x8d8ac
(XEN) <RMRR> iommu_map 0x8d8ad
(XEN) <RMRR> iommu_map 0x8d8ae
(XEN) <RMRR> iommu_map 0x8d8af
(XEN) <RMRR> iommu_map 0x8d8b0
(XEN) <RMRR> iommu_map 0x8d8b1
(XEN) <RMRR> iommu_map 0x8d8b2
(XEN) <RMRR> iommu_map 0x8d8b3
(XEN) <RMRR> iommu_map 0x8d8b4
(XEN) <RMRR> iommu_map 0x8d8b5
(XEN) <RMRR> iommu_map 0x8d8b6
(XEN) <RMRR> iommu_map 0x8d8b7
(XEN) <RMRR> iommu_map 0x8d8b8
(XEN) <RMRR> iommu_map 0x8d8b9
(XEN) <RMRR> iommu_map 0x8d8ba
(XEN) <RMRR> iommu_map 0x8d8bb
(XEN) <RMRR> iommu_map 0x8d8bc
(XEN) <RMRR> iommu_map 0x8d8bd
(XEN) <RMRR> iommu_map 0x8d8be
(XEN) <RMRR> iommu_map 0x8d8bf
(XEN) <RMRR> iommu_map 0x8d8c0
(XEN) <RMRR> iommu_map 0x8d8c1
(XEN) <RMRR> iommu_map 0x8d8c2
(XEN) <RMRR> iommu_map 0x8d8c3
(XEN) <RMRR> iommu_map 0x8d8c4
(XEN) <RMRR> iommu_map 0x8d8c5
(XEN) <RMRR> iommu_map 0x8d8c6
(XEN) <RMRR> iommu_map 0x8d8c7
(XEN) <RMRR> iommu_map 0x8d8c8
(XEN) <RMRR> iommu_map 0x8d8c9
(XEN) <RMRR> iommu_map 0x8d8ca
(XEN) <RMRR> iommu_map 0x8d8cb
(XEN) <RMRR> iommu_map 0x8d8cc
(XEN) <RMRR> iommu_map 0x8d8cd
(XEN) <RMRR> iommu_map 0x8d8ce
(XEN) <RMRR> iommu_map 0x8d8cf
(XEN) <RMRR> iommu_map 0x8d8d0
(XEN) <RMRR> iommu_map 0x8d8d1
(XEN) <RMRR> iommu_map 0x8d8d2
(XEN) <RMRR> iommu_map 0x8d8d3
(XEN) <RMRR> iommu_map 0x8d8d4
(XEN) <RMRR> iommu_map 0x8d8d5
(XEN) <RMRR> iommu_map 0x8d8d6
(XEN) <RMRR> iommu_map 0x8d8d7
(XEN) <RMRR> iommu_map 0x8d8d8
(XEN) <RMRR> iommu_map 0x8d8d9
(XEN) <RMRR> iommu_map 0x8d8da
(XEN) <RMRR> iommu_map 0x8d8db
(XEN) <RMRR> iommu_map 0x8d8dc
(XEN) <RMRR> iommu_map 0x8d8dd
(XEN) <RMRR> iommu_map 0x8d8de
(XEN) <RMRR> iommu_map 0x8d8df
(XEN) <RMRR> iommu_map 0x8d8e0
(XEN) <RMRR> iommu_map 0x8d8e1
(XEN) <RMRR> iommu_map 0x8d8e2
(XEN) <RMRR> iommu_map 0x8d8e3
(XEN) <RMRR> iommu_map 0x8d8e4
(XEN) <RMRR> iommu_map 0x8d8e5
(XEN) <RMRR> iommu_map 0x8d8e6
(XEN) <RMRR> iommu_map 0x8d8e7
(XEN) <RMRR> iommu_map 0x8d8e8
(XEN) <RMRR> iommu_map 0x8d8e9
(XEN) <RMRR> iommu_map 0x8d8ea
(XEN) <RMRR> iommu_map 0x8d8eb
(XEN) <RMRR> iommu_map 0x8d8ec
(XEN) <RMRR> iommu_map 0x8d8ed
(XEN) <RMRR> iommu_map 0x8d8ee
(XEN) <RMRR> iommu_map 0x8d8ef
(XEN) <RMRR> iommu_map 0x8d8f0
(XEN) <RMRR> iommu_map 0x8d8f1
(XEN) <RMRR> iommu_map 0x8d8f2
(XEN) <RMRR> iommu_map 0x8d8f3
(XEN) <RMRR> iommu_map 0x8d8f4
(XEN) <RMRR> iommu_map 0x8d8f5
(XEN) <RMRR> iommu_map 0x8d8f6
(XEN) <RMRR> iommu_map 0x8d8f7
(XEN) <RMRR> iommu_map 0x8d8f8
(XEN) <RMRR> iommu_map 0x8d8f9
(XEN) <RMRR> iommu_map 0x8d8fa
(XEN) <RMRR> iommu_map 0x8d8fb
(XEN) <RMRR> iommu_map 0x8d8fc
(XEN) <RMRR> iommu_map 0x8d8fd
(XEN) <RMRR> iommu_map 0x8d8fe
(XEN) <RMRR> iommu_map 0x8d8ff
(XEN) <RMRR> iommu_map 0x8d900
(XEN) <RMRR> iommu_map 0x8d901
(XEN) <RMRR> iommu_map 0x8d902
(XEN) <RMRR> iommu_map 0x8d903
(XEN) <RMRR> iommu_map 0x8d904
(XEN) <RMRR> iommu_map 0x8d905
(XEN) <RMRR> iommu_map 0x8d906
(XEN) <RMRR> iommu_map 0x8d907
(XEN) <RMRR> iommu_map 0x8d908
(XEN) <RMRR> iommu_map 0x8d909
(XEN) <RMRR> iommu_map 0x8d90a
(XEN) <RMRR> iommu_map 0x8d90b
(XEN) <RMRR> iommu_map 0x8d90c
(XEN) <RMRR> iommu_map 0x8d90d
(XEN) <RMRR> iommu_map 0x8d90e
(XEN) <RMRR> iommu_map 0x8d90f
(XEN) <RMRR> iommu_map 0x8d910
(XEN) <RMRR> iommu_map 0x8d911
(XEN) <RMRR> iommu_map 0x8d912
(XEN) <RMRR> iommu_map 0x8d913
(XEN) <RMRR> iommu_map 0x8d914
(XEN) <RMRR> iommu_map 0x8d915
(XEN) <RMRR> iommu_map 0x8d916
(XEN) <RMRR> iommu_map 0x8d917
(XEN) <RMRR> iommu_map 0x8d918
(XEN) <RMRR> iommu_map 0x8d919
(XEN) <RMRR> iommu_map 0x8d91a
(XEN) <RMRR> iommu_map 0x8d91b
(XEN) <RMRR> iommu_map 0x8d91c
(XEN) <RMRR> iommu_map 0x8d91d
(XEN) <RMRR> iommu_map 0x8d91e
(XEN) <RMRR> iommu_map 0x8d91f
(XEN) <RMRR> iommu_map 0x8d920
(XEN) <RMRR> iommu_map 0x8d921
(XEN) <RMRR> iommu_map 0x8d922
(XEN) <RMRR> iommu_map 0x8d923
(XEN) <RMRR> iommu_map 0x8d924
(XEN) <RMRR> iommu_map 0x8d925
(XEN) <RMRR> iommu_map 0x8d926
(XEN) <RMRR> iommu_map 0x8d927
(XEN) <RMRR> iommu_map 0x8d928
(XEN) <RMRR> iommu_map 0x8d929
(XEN) <RMRR> iommu_map 0x8d92a
(XEN) <RMRR> iommu_map 0x8d92b
(XEN) <RMRR> iommu_map 0x8d92c
(XEN) <RMRR> iommu_map 0x8d92d
(XEN) <RMRR> iommu_map 0x8d92e
(XEN) <RMRR> iommu_map 0x8d92f
(XEN) <RMRR> iommu_map 0x8d930
(XEN) <RMRR> iommu_map 0x8d931
(XEN) <RMRR> iommu_map 0x8d932
(XEN) <RMRR> iommu_map 0x8d933
(XEN) <RMRR> iommu_map 0x8d934
(XEN) <RMRR> iommu_map 0x8d935
(XEN) <RMRR> iommu_map 0x8d936
(XEN) <RMRR> iommu_map 0x8d937
(XEN) <RMRR> iommu_map 0x8d938
(XEN) <RMRR> iommu_map 0x8d939
(XEN) <RMRR> iommu_map 0x8d93a
(XEN) <RMRR> iommu_map 0x8d93b
(XEN) <RMRR> iommu_map 0x8d93c
(XEN) <RMRR> iommu_map 0x8d93d
(XEN) <RMRR> iommu_map 0x8d93e
(XEN) <RMRR> iommu_map 0x8d93f
(XEN) <RMRR> iommu_map 0x8d940
(XEN) <RMRR> iommu_map 0x8d941
(XEN) <RMRR> iommu_map 0x8d942
(XEN) <RMRR> iommu_map 0x8d943
(XEN) <RMRR> iommu_map 0x8d944
(XEN) <RMRR> iommu_map 0x8d945
(XEN) <RMRR> iommu_map 0x8d946
(XEN) <RMRR> iommu_map 0x8d947
(XEN) <RMRR> iommu_map 0x8d948
(XEN) <RMRR> iommu_map 0x8d949
(XEN) <RMRR> iommu_map 0x8d94a
(XEN) <RMRR> iommu_map 0x8d94b
(XEN) <RMRR> iommu_map 0x8d94c
(XEN) <RMRR> iommu_map 0x8d94d
(XEN) <RMRR> iommu_map 0x8d94e
(XEN) <RMRR> iommu_map 0x8d94f
(XEN) <RMRR> iommu_map 0x8d950
(XEN) <RMRR> iommu_map 0x8d951
(XEN) <RMRR> iommu_map 0x8d952
(XEN) <RMRR> iommu_map 0x8d953
(XEN) <RMRR> iommu_map 0x8d954
(XEN) <RMRR> iommu_map 0x8d955
(XEN) <RMRR> iommu_map 0x8d956
(XEN) <RMRR> iommu_map 0x8d957
(XEN) <RMRR> iommu_map 0x8d958
(XEN) <RMRR> iommu_map 0x8d959
(XEN) <RMRR> iommu_map 0x8d95a
(XEN) <RMRR> iommu_map 0x8d95b
(XEN) <RMRR> iommu_map 0x8d95c
(XEN) <RMRR> iommu_map 0x8d95d
(XEN) <RMRR> iommu_map 0x8d95e
(XEN) <RMRR> iommu_map 0x8d95f
(XEN) <RMRR> iommu_map 0x8d960
(XEN) <RMRR> iommu_map 0x8d961
(XEN) <RMRR> iommu_map 0x8d962
(XEN) <RMRR> iommu_map 0x8d963
(XEN) <RMRR> iommu_map 0x8d964
(XEN) <RMRR> iommu_map 0x8d965
(XEN) <RMRR> iommu_map 0x8d966
(XEN) <RMRR> iommu_map 0x8d967
(XEN) <RMRR> iommu_map 0x8d968
(XEN) <RMRR> iommu_map 0x8d969
(XEN) <RMRR> iommu_map 0x8d96a
(XEN) <RMRR> iommu_map 0x8d96b
(XEN) <RMRR> iommu_map 0x8d96c
(XEN) <RMRR> iommu_map 0x8d96d
(XEN) <RMRR> iommu_map 0x8d96e
(XEN) <RMRR> iommu_map 0x8d96f
(XEN) <RMRR> iommu_map 0x8d970
(XEN) <RMRR> iommu_map 0x8d971
(XEN) <RMRR> iommu_map 0x8d972
(XEN) <RMRR> iommu_map 0x8d973
(XEN) <RMRR> iommu_map 0x8d974
(XEN) <RMRR> iommu_map 0x8d975
(XEN) <RMRR> iommu_map 0x8d976
(XEN) <RMRR> iommu_map 0x8d977
(XEN) <RMRR> iommu_map 0x8d978
(XEN) <RMRR> iommu_map 0x8d979
(XEN) <RMRR> iommu_map 0x8d97a
(XEN) <RMRR> iommu_map 0x8d97b
(XEN) <RMRR> iommu_map 0x8d97c
(XEN) <RMRR> iommu_map 0x8d97d
(XEN) <RMRR> iommu_map 0x8d97e
(XEN) <RMRR> iommu_map 0x8d97f
(XEN) <RMRR> iommu_map 0x8d980
(XEN) <RMRR> iommu_map 0x8d981
(XEN) <RMRR> iommu_map 0x8d982
(XEN) <RMRR> iommu_map 0x8d983
(XEN) <RMRR> iommu_map 0x8d984
(XEN) <RMRR> iommu_map 0x8d985
(XEN) <RMRR> iommu_map 0x8d986
(XEN) <RMRR> iommu_map 0x8d987
(XEN) <RMRR> iommu_map 0x8d988
(XEN) <RMRR> iommu_map 0x8d989
(XEN) <RMRR> iommu_map 0x8d98a
(XEN) <RMRR> iommu_map 0x8d98b
(XEN) <RMRR> iommu_map 0x8d98c
(XEN) <RMRR> iommu_map 0x8d98d
(XEN) <RMRR> iommu_map 0x8d98e
(XEN) <RMRR> iommu_map 0x8d98f
(XEN) <RMRR> iommu_map 0x8d990
(XEN) <RMRR> iommu_map 0x8d991
(XEN) <RMRR> iommu_map 0x8d992
(XEN) <RMRR> iommu_map 0x8d993
(XEN) <RMRR> iommu_map 0x8d994
(XEN) <RMRR> iommu_map 0x8d995
(XEN) <RMRR> iommu_map 0x8d996
(XEN) <RMRR> iommu_map 0x8d997
(XEN) <RMRR> iommu_map 0x8d998
(XEN) <RMRR> iommu_map 0x8d999
(XEN) <RMRR> iommu_map 0x8d99a
(XEN) <RMRR> iommu_map 0x8d99b
(XEN) <RMRR> iommu_map 0x8d99c
(XEN) <RMRR> iommu_map 0x8d99d
(XEN) <RMRR> iommu_map 0x8d99e
(XEN) <RMRR> iommu_map 0x8d99f
(XEN) <RMRR> iommu_map 0x8d9a0
(XEN) <RMRR> iommu_map 0x8d9a1
(XEN) <RMRR> iommu_map 0x8d9a2
(XEN) <RMRR> iommu_map 0x8d9a3
(XEN) <RMRR> iommu_map 0x8d9a4
(XEN) <RMRR> iommu_map 0x8d9a5
(XEN) <RMRR> iommu_map 0x8d9a6
(XEN) <RMRR> iommu_map 0x8d9a7
(XEN) <RMRR> iommu_map 0x8d9a8
(XEN) <RMRR> iommu_map 0x8d9a9
(XEN) <RMRR> iommu_map 0x8d9aa
(XEN) <RMRR> iommu_map 0x8d9ab
(XEN) <RMRR> iommu_map 0x8d9ac
(XEN) <RMRR> iommu_map 0x8d9ad
(XEN) <RMRR> iommu_map 0x8d9ae
(XEN) <RMRR> iommu_map 0x8d9af
(XEN) <RMRR> iommu_map 0x8d9b0
(XEN) <RMRR> iommu_map 0x8d9b1
(XEN) <RMRR> iommu_map 0x8d9b2
(XEN) <RMRR> iommu_map 0x8d9b3
(XEN) <RMRR> iommu_map 0x8d9b4
(XEN) <RMRR> iommu_map 0x8d9b5
(XEN) <RMRR> iommu_map 0x8d9b6
(XEN) <RMRR> iommu_map 0x8d9b7
(XEN) <RMRR> iommu_map 0x8d9b8
(XEN) <RMRR> iommu_map 0x8d9b9
(XEN) <RMRR> iommu_map 0x8d9ba
(XEN) <RMRR> iommu_map 0x8d9bb
(XEN) <RMRR> iommu_map 0x8d9bc
(XEN) <RMRR> iommu_map 0x8d9bd
(XEN) <RMRR> iommu_map 0x8d9be
(XEN) <RMRR> iommu_map 0x8d9bf
(XEN) <RMRR> iommu_map 0x8d9c0
(XEN) <RMRR> iommu_map 0x8d9c1
(XEN) <RMRR> iommu_map 0x8d9c2
(XEN) <RMRR> iommu_map 0x8d9c3
(XEN) <RMRR> iommu_map 0x8d9c4
(XEN) <RMRR> iommu_map 0x8d9c5
(XEN) <RMRR> iommu_map 0x8d9c6
(XEN) <RMRR> iommu_map 0x8d9c7
(XEN) <RMRR> iommu_map 0x8d9c8
(XEN) <RMRR> iommu_map 0x8d9c9
(XEN) <RMRR> iommu_map 0x8d9ca
(XEN) <RMRR> iommu_map 0x8d9cb
(XEN) <RMRR> iommu_map 0x8d9cc
(XEN) <RMRR> iommu_map 0x8d9cd
(XEN) <RMRR> iommu_map 0x8d9ce
(XEN) <RMRR> iommu_map 0x8d9cf
(XEN) <RMRR> iommu_map 0x8d9d0
(XEN) <RMRR> iommu_map 0x8d9d1
(XEN) <RMRR> iommu_map 0x8d9d2
(XEN) <RMRR> iommu_map 0x8d9d3
(XEN) <RMRR> iommu_map 0x8d9d4
(XEN) <RMRR> iommu_map 0x8d9d5
(XEN) <RMRR> iommu_map 0x8d9d6
(XEN) <RMRR> iommu_map 0x8d9d7
(XEN) <RMRR> iommu_map 0x8d9d8
(XEN) <RMRR> iommu_map 0x8d9d9
(XEN) <RMRR> iommu_map 0x8d9da
(XEN) <RMRR> iommu_map 0x8d9db
(XEN) <RMRR> iommu_map 0x8d9dc
(XEN) <RMRR> iommu_map 0x8d9dd
(XEN) <RMRR> iommu_map 0x8d9de
(XEN) <RMRR> iommu_map 0x8d9df
(XEN) <RMRR> iommu_map 0x8d9e0
(XEN) <RMRR> iommu_map 0x8d9e1
(XEN) <RMRR> iommu_map 0x8d9e2
(XEN) <RMRR> iommu_map 0x8d9e3
(XEN) <RMRR> iommu_map 0x8d9e4
(XEN) <RMRR> iommu_map 0x8d9e5
(XEN) <RMRR> iommu_map 0x8d9e6
(XEN) <RMRR> iommu_map 0x8d9e7
(XEN) <RMRR> iommu_map 0x8d9e8
(XEN) <RMRR> iommu_map 0x8d9e9
(XEN) <RMRR> iommu_map 0x8d9ea
(XEN) <RMRR> iommu_map 0x8d9eb
(XEN) <RMRR> iommu_map 0x8d9ec
(XEN) <RMRR> iommu_map 0x8d9ed
(XEN) <RMRR> iommu_map 0x8d9ee
(XEN) <RMRR> iommu_map 0x8d9ef
(XEN) <RMRR> iommu_map 0x8d9f0
(XEN) <RMRR> iommu_map 0x8d9f1
(XEN) <RMRR> iommu_map 0x8d9f2
(XEN) <RMRR> iommu_map 0x8d9f3
(XEN) <RMRR> iommu_map 0x8d9f4
(XEN) <RMRR> iommu_map 0x8d9f5
(XEN) <RMRR> iommu_map 0x8d9f6
(XEN) <RMRR> iommu_map 0x8d9f7
(XEN) <RMRR> iommu_map 0x8d9f8
(XEN) <RMRR> iommu_map 0x8d9f9
(XEN) <RMRR> iommu_map 0x8d9fa
(XEN) <RMRR> iommu_map 0x8d9fb
(XEN) <RMRR> iommu_map 0x8d9fc
(XEN) <RMRR> iommu_map 0x8d9fd
(XEN) <RMRR> iommu_map 0x8d9fe
(XEN) <RMRR> iommu_map 0x8d9ff
(XEN) <RMRR> iommu_map 0x8da00
(XEN) <RMRR> iommu_map 0x8da01
(XEN) <RMRR> iommu_map 0x8da02
(XEN) <RMRR> iommu_map 0x8da03
(XEN) <RMRR> iommu_map 0x8da04
(XEN) <RMRR> iommu_map 0x8da05
(XEN) <RMRR> iommu_map 0x8da06
(XEN) <RMRR> iommu_map 0x8da07
(XEN) <RMRR> iommu_map 0x8da08
(XEN) <RMRR> iommu_map 0x8da09
(XEN) <RMRR> iommu_map 0x8da0a
(XEN) <RMRR> iommu_map 0x8da0b
(XEN) <RMRR> iommu_map 0x8da0c
(XEN) <RMRR> iommu_map 0x8da0d
(XEN) <RMRR> iommu_map 0x8da0e
(XEN) <RMRR> iommu_map 0x8da0f
(XEN) <RMRR> iommu_map 0x8da10
(XEN) <RMRR> iommu_map 0x8da11
(XEN) <RMRR> iommu_map 0x8da12
(XEN) <RMRR> iommu_map 0x8da13
(XEN) <RMRR> iommu_map 0x8da14
(XEN) <RMRR> iommu_map 0x8da15
(XEN) <RMRR> iommu_map 0x8da16
(XEN) <RMRR> iommu_map 0x8da17
(XEN) <RMRR> iommu_map 0x8da18
(XEN) <RMRR> iommu_map 0x8da19
(XEN) <RMRR> iommu_map 0x8da1a
(XEN) <RMRR> iommu_map 0x8da1b
(XEN) <RMRR> iommu_map 0x8da1c
(XEN) <RMRR> iommu_map 0x8da1d
(XEN) <RMRR> iommu_map 0x8da1e
(XEN) <RMRR> iommu_map 0x8da1f
(XEN) <RMRR> iommu_map 0x8da20
(XEN) <RMRR> iommu_map 0x8da21
(XEN) <RMRR> iommu_map 0x8da22
(XEN) <RMRR> iommu_map 0x8da23
(XEN) <RMRR> iommu_map 0x8da24
(XEN) <RMRR> iommu_map 0x8da25
(XEN) <RMRR> iommu_map 0x8da26
(XEN) <RMRR> iommu_map 0x8da27
(XEN) <RMRR> iommu_map 0x8da28
(XEN) <RMRR> iommu_map 0x8da29
(XEN) <RMRR> iommu_map 0x8da2a
(XEN) <RMRR> iommu_map 0x8da2b
(XEN) <RMRR> iommu_map 0x8da2c
(XEN) <RMRR> iommu_map 0x8da2d
(XEN) <RMRR> iommu_map 0x8da2e
(XEN) <RMRR> iommu_map 0x8da2f
(XEN) <RMRR> iommu_map 0x8da30
(XEN) <RMRR> iommu_map 0x8da31
(XEN) <RMRR> iommu_map 0x8da32
(XEN) <RMRR> iommu_map 0x8da33
(XEN) <RMRR> iommu_map 0x8da34
(XEN) <RMRR> iommu_map 0x8da35
(XEN) <RMRR> iommu_map 0x8da36
(XEN) <RMRR> iommu_map 0x8da37
(XEN) <RMRR> iommu_map 0x8da38
(XEN) <RMRR> iommu_map 0x8da39
(XEN) <RMRR> iommu_map 0x8da3a
(XEN) <RMRR> iommu_map 0x8da3b
(XEN) <RMRR> iommu_map 0x8da3c
(XEN) <RMRR> iommu_map 0x8da3d
(XEN) <RMRR> iommu_map 0x8da3e
(XEN) <RMRR> iommu_map 0x8da3f
(XEN) <RMRR> iommu_map 0x8da40
(XEN) <RMRR> iommu_map 0x8da41
(XEN) <RMRR> iommu_map 0x8da42
(XEN) <RMRR> iommu_map 0x8da43
(XEN) <RMRR> iommu_map 0x8da44
(XEN) <RMRR> iommu_map 0x8da45
(XEN) <RMRR> iommu_map 0x8da46
(XEN) <RMRR> iommu_map 0x8da47
(XEN) <RMRR> iommu_map 0x8da48
(XEN) <RMRR> iommu_map 0x8da49
(XEN) <RMRR> iommu_map 0x8da4a
(XEN) <RMRR> iommu_map 0x8da4b
(XEN) <RMRR> iommu_map 0x8da4c
(XEN) <RMRR> iommu_map 0x8da4d
(XEN) <RMRR> iommu_map 0x8da4e
(XEN) <RMRR> iommu_map 0x8da4f
(XEN) <RMRR> iommu_map 0x8da50
(XEN) <RMRR> iommu_map 0x8da51
(XEN) <RMRR> iommu_map 0x8da52
(XEN) <RMRR> iommu_map 0x8da53
(XEN) <RMRR> iommu_map 0x8da54
(XEN) <RMRR> iommu_map 0x8da55
(XEN) <RMRR> iommu_map 0x8da56
(XEN) <RMRR> iommu_map 0x8da57
(XEN) <RMRR> iommu_map 0x8da58
(XEN) <RMRR> iommu_map 0x8da59
(XEN) <RMRR> iommu_map 0x8da5a
(XEN) <RMRR> iommu_map 0x8da5b
(XEN) <RMRR> iommu_map 0x8da5c
(XEN) <RMRR> iommu_map 0x8da5d
(XEN) <RMRR> iommu_map 0x8da5e
(XEN) <RMRR> iommu_map 0x8da5f
(XEN) <RMRR> iommu_map 0x8da60
(XEN) <RMRR> iommu_map 0x8da61
(XEN) <RMRR> iommu_map 0x8da62
(XEN) <RMRR> iommu_map 0x8da63
(XEN) <RMRR> iommu_map 0x8da64
(XEN) <RMRR> iommu_map 0x8da65
(XEN) <RMRR> iommu_map 0x8da66
(XEN) <RMRR> iommu_map 0x8da67
(XEN) <RMRR> iommu_map 0x8da68
(XEN) <RMRR> iommu_map 0x8da69
(XEN) <RMRR> iommu_map 0x8da6a
(XEN) <RMRR> iommu_map 0x8da6b
(XEN) <RMRR> iommu_map 0x8da6c
(XEN) <RMRR> iommu_map 0x8da6d
(XEN) <RMRR> iommu_map 0x8da6e
(XEN) <RMRR> iommu_map 0x8da6f
(XEN) <RMRR> iommu_map 0x8da70
(XEN) <RMRR> iommu_map 0x8da71
(XEN) <RMRR> iommu_map 0x8da72
(XEN) <RMRR> iommu_map 0x8da73
(XEN) <RMRR> iommu_map 0x8da74
(XEN) <RMRR> iommu_map 0x8da75
(XEN) <RMRR> iommu_map 0x8da76
(XEN) <RMRR> iommu_map 0x8da77
(XEN) <RMRR> iommu_map 0x8da78
(XEN) <RMRR> iommu_map 0x8da79
(XEN) <RMRR> iommu_map 0x8da7a
(XEN) <RMRR> iommu_map 0x8da7b
(XEN) <RMRR> iommu_map 0x8da7c
(XEN) <RMRR> iommu_map 0x8da7d
(XEN) <RMRR> iommu_map 0x8da7e
(XEN) <RMRR> iommu_map 0x8da7f
(XEN) <RMRR> iommu_map 0x8da80
(XEN) <RMRR> iommu_map 0x8da81
(XEN) <RMRR> iommu_map 0x8da82
(XEN) <RMRR> iommu_map 0x8da83
(XEN) <RMRR> iommu_map 0x8da84
(XEN) <RMRR> iommu_map 0x8da85
(XEN) <RMRR> iommu_map 0x8da86
(XEN) <RMRR> iommu_map 0x8da87
(XEN) <RMRR> iommu_map 0x8da88
(XEN) <RMRR> iommu_map 0x8da89
(XEN) <RMRR> iommu_map 0x8da8a
(XEN) <RMRR> iommu_map 0x8da8b
(XEN) <RMRR> iommu_map 0x8da8c
(XEN) <RMRR> iommu_map 0x8da8d
(XEN) <RMRR> iommu_map 0x8da8e
(XEN) <RMRR> iommu_map 0x8da8f
(XEN) <RMRR> iommu_map 0x8da90
(XEN) <RMRR> iommu_map 0x8da91
(XEN) <RMRR> iommu_map 0x8da92
(XEN) <RMRR> iommu_map 0x8da93
(XEN) <RMRR> iommu_map 0x8da94
(XEN) <RMRR> iommu_map 0x8da95
(XEN) <RMRR> iommu_map 0x8da96
(XEN) <RMRR> iommu_map 0x8da97
(XEN) <RMRR> iommu_map 0x8da98
(XEN) <RMRR> iommu_map 0x8da99
(XEN) <RMRR> iommu_map 0x8da9a
(XEN) <RMRR> iommu_map 0x8da9b
(XEN) <RMRR> iommu_map 0x8da9c
(XEN) <RMRR> iommu_map 0x8da9d
(XEN) <RMRR> iommu_map 0x8da9e
(XEN) <RMRR> iommu_map 0x8da9f
(XEN) <RMRR> iommu_map 0x8daa0
(XEN) <RMRR> iommu_map 0x8daa1
(XEN) <RMRR> iommu_map 0x8daa2
(XEN) <RMRR> iommu_map 0x8daa3
(XEN) <RMRR> iommu_map 0x8daa4
(XEN) <RMRR> iommu_map 0x8daa5
(XEN) <RMRR> iommu_map 0x8daa6
(XEN) <RMRR> iommu_map 0x8daa7
(XEN) <RMRR> iommu_map 0x8daa8
(XEN) <RMRR> iommu_map 0x8daa9
(XEN) <RMRR> iommu_map 0x8daaa
(XEN) <RMRR> iommu_map 0x8daab
(XEN) <RMRR> iommu_map 0x8daac
(XEN) <RMRR> iommu_map 0x8daad
(XEN) <RMRR> iommu_map 0x8daae
(XEN) <RMRR> iommu_map 0x8daaf
(XEN) <RMRR> iommu_map 0x8dab0
(XEN) <RMRR> iommu_map 0x8dab1
(XEN) <RMRR> iommu_map 0x8dab2
(XEN) <RMRR> iommu_map 0x8dab3
(XEN) <RMRR> iommu_map 0x8dab4
(XEN) <RMRR> iommu_map 0x8dab5
(XEN) <RMRR> iommu_map 0x8dab6
(XEN) <RMRR> iommu_map 0x8dab7
(XEN) <RMRR> iommu_map 0x8dab8
(XEN) <RMRR> iommu_map 0x8dab9
(XEN) <RMRR> iommu_map 0x8daba
(XEN) <RMRR> iommu_map 0x8dabb
(XEN) <RMRR> iommu_map 0x8dabc
(XEN) <RMRR> iommu_map 0x8dabd
(XEN) <RMRR> iommu_map 0x8dabe
(XEN) <RMRR> iommu_map 0x8dabf
(XEN) <RMRR> iommu_map 0x8dac0
(XEN) <RMRR> iommu_map 0x8dac1
(XEN) <RMRR> iommu_map 0x8dac2
(XEN) <RMRR> iommu_map 0x8dac3
(XEN) <RMRR> iommu_map 0x8dac4
(XEN) <RMRR> iommu_map 0x8dac5
(XEN) <RMRR> iommu_map 0x8dac6
(XEN) <RMRR> iommu_map 0x8dac7
(XEN) <RMRR> iommu_map 0x8dac8
(XEN) <RMRR> iommu_map 0x8dac9
(XEN) <RMRR> iommu_map 0x8daca
(XEN) <RMRR> iommu_map 0x8dacb
(XEN) <RMRR> iommu_map 0x8dacc
(XEN) <RMRR> iommu_map 0x8dacd
(XEN) <RMRR> iommu_map 0x8dace
(XEN) <RMRR> iommu_map 0x8dacf
(XEN) <RMRR> iommu_map 0x8dad0
(XEN) <RMRR> iommu_map 0x8dad1
(XEN) <RMRR> iommu_map 0x8dad2
(XEN) <RMRR> iommu_map 0x8dad3
(XEN) <RMRR> iommu_map 0x8dad4
(XEN) <RMRR> iommu_map 0x8dad5
(XEN) <RMRR> iommu_map 0x8dad6
(XEN) <RMRR> iommu_map 0x8dad7
(XEN) <RMRR> iommu_map 0x8dad8
(XEN) <RMRR> iommu_map 0x8dad9
(XEN) <RMRR> iommu_map 0x8dada
(XEN) <RMRR> iommu_map 0x8dadb
(XEN) <RMRR> iommu_map 0x8dadc
(XEN) <RMRR> iommu_map 0x8dadd
(XEN) <RMRR> iommu_map 0x8dade
(XEN) <RMRR> iommu_map 0x8dadf
(XEN) <RMRR> iommu_map 0x8dae0
(XEN) <RMRR> iommu_map 0x8dae1
(XEN) <RMRR> iommu_map 0x8dae2
(XEN) <RMRR> iommu_map 0x8dae3
(XEN) <RMRR> iommu_map 0x8dae4
(XEN) <RMRR> iommu_map 0x8dae5
(XEN) <RMRR> iommu_map 0x8dae6
(XEN) <RMRR> iommu_map 0x8dae7
(XEN) <RMRR> iommu_map 0x8dae8
(XEN) <RMRR> iommu_map 0x8dae9
(XEN) <RMRR> iommu_map 0x8daea
(XEN) <RMRR> iommu_map 0x8daeb
(XEN) <RMRR> iommu_map 0x8daec
(XEN) <RMRR> iommu_map 0x8daed
(XEN) <RMRR> iommu_map 0x8daee
(XEN) <RMRR> iommu_map 0x8daef
(XEN) <RMRR> iommu_map 0x8daf0
(XEN) <RMRR> iommu_map 0x8daf1
(XEN) <RMRR> iommu_map 0x8daf2
(XEN) <RMRR> iommu_map 0x8daf3
(XEN) <RMRR> iommu_map 0x8daf4
(XEN) <RMRR> iommu_map 0x8daf5
(XEN) <RMRR> iommu_map 0x8daf6
(XEN) <RMRR> iommu_map 0x8daf7
(XEN) <RMRR> iommu_map 0x8daf8
(XEN) <RMRR> iommu_map 0x8daf9
(XEN) <RMRR> iommu_map 0x8dafa
(XEN) <RMRR> iommu_map 0x8dafb
(XEN) <RMRR> iommu_map 0x8dafc
(XEN) <RMRR> iommu_map 0x8dafd
(XEN) <RMRR> iommu_map 0x8dafe
(XEN) <RMRR> iommu_map 0x8daff
(XEN) <RMRR> iommu_map 0x8db00
(XEN) <RMRR> iommu_map 0x8db01
(XEN) <RMRR> iommu_map 0x8db02
(XEN) <RMRR> iommu_map 0x8db03
(XEN) <RMRR> iommu_map 0x8db04
(XEN) <RMRR> iommu_map 0x8db05
(XEN) <RMRR> iommu_map 0x8db06
(XEN) <RMRR> iommu_map 0x8db07
(XEN) <RMRR> iommu_map 0x8db08
(XEN) <RMRR> iommu_map 0x8db09
(XEN) <RMRR> iommu_map 0x8db0a
(XEN) <RMRR> iommu_map 0x8db0b
(XEN) <RMRR> iommu_map 0x8db0c
(XEN) <RMRR> iommu_map 0x8db0d
(XEN) <RMRR> iommu_map 0x8db0e
(XEN) <RMRR> iommu_map 0x8db0f
(XEN) <RMRR> iommu_map 0x8db10
(XEN) <RMRR> iommu_map 0x8db11
(XEN) <RMRR> iommu_map 0x8db12
(XEN) <RMRR> iommu_map 0x8db13
(XEN) <RMRR> iommu_map 0x8db14
(XEN) <RMRR> iommu_map 0x8db15
(XEN) <RMRR> iommu_map 0x8db16
(XEN) <RMRR> iommu_map 0x8db17
(XEN) <RMRR> iommu_map 0x8db18
(XEN) <RMRR> iommu_map 0x8db19
(XEN) <RMRR> iommu_map 0x8db1a
(XEN) <RMRR> iommu_map 0x8db1b
(XEN) <RMRR> iommu_map 0x8db1c
(XEN) <RMRR> iommu_map 0x8db1d
(XEN) <RMRR> iommu_map 0x8db1e
(XEN) <RMRR> iommu_map 0x8db1f
(XEN) <RMRR> iommu_map 0x8db20
(XEN) <RMRR> iommu_map 0x8db21
(XEN) <RMRR> iommu_map 0x8db22
(XEN) <RMRR> iommu_map 0x8db23
(XEN) <RMRR> iommu_map 0x8db24
(XEN) <RMRR> iommu_map 0x8db25
(XEN) <RMRR> iommu_map 0x8db26
(XEN) <RMRR> iommu_map 0x8db27
(XEN) <RMRR> iommu_map 0x8db28
(XEN) <RMRR> iommu_map 0x8db29
(XEN) <RMRR> iommu_map 0x8db2a
(XEN) <RMRR> iommu_map 0x8db2b
(XEN) <RMRR> iommu_map 0x8db2c
(XEN) <RMRR> iommu_map 0x8db2d
(XEN) <RMRR> iommu_map 0x8db2e
(XEN) <RMRR> iommu_map 0x8db2f
(XEN) <RMRR> iommu_map 0x8db30
(XEN) <RMRR> iommu_map 0x8db31
(XEN) <RMRR> iommu_map 0x8db32
(XEN) <RMRR> iommu_map 0x8db33
(XEN) <RMRR> iommu_map 0x8db34
(XEN) <RMRR> iommu_map 0x8db35
(XEN) <RMRR> iommu_map 0x8db36
(XEN) <RMRR> iommu_map 0x8db37
(XEN) <RMRR> iommu_map 0x8db38
(XEN) <RMRR> iommu_map 0x8db39
(XEN) <RMRR> iommu_map 0x8db3a
(XEN) <RMRR> iommu_map 0x8db3b
(XEN) <RMRR> iommu_map 0x8db3c
(XEN) <RMRR> iommu_map 0x8db3d
(XEN) <RMRR> iommu_map 0x8db3e
(XEN) <RMRR> iommu_map 0x8db3f
(XEN) <RMRR> iommu_map 0x8db40
(XEN) <RMRR> iommu_map 0x8db41
(XEN) <RMRR> iommu_map 0x8db42
(XEN) <RMRR> iommu_map 0x8db43
(XEN) <RMRR> iommu_map 0x8db44
(XEN) <RMRR> iommu_map 0x8db45
(XEN) <RMRR> iommu_map 0x8db46
(XEN) <RMRR> iommu_map 0x8db47
(XEN) <RMRR> iommu_map 0x8db48
(XEN) <RMRR> iommu_map 0x8db49
(XEN) <RMRR> iommu_map 0x8db4a
(XEN) <RMRR> iommu_map 0x8db4b
(XEN) <RMRR> iommu_map 0x8db4c
(XEN) <RMRR> iommu_map 0x8db4d
(XEN) <RMRR> iommu_map 0x8db4e
(XEN) <RMRR> iommu_map 0x8db4f
(XEN) <RMRR> iommu_map 0x8db50
(XEN) <RMRR> iommu_map 0x8db51
(XEN) <RMRR> iommu_map 0x8db52
(XEN) <RMRR> iommu_map 0x8db53
(XEN) <RMRR> iommu_map 0x8db54
(XEN) <RMRR> iommu_map 0x8db55
(XEN) <RMRR> iommu_map 0x8db56
(XEN) <RMRR> iommu_map 0x8db57
(XEN) <RMRR> iommu_map 0x8db58
(XEN) <RMRR> iommu_map 0x8db59
(XEN) <RMRR> iommu_map 0x8db5a
(XEN) <RMRR> iommu_map 0x8db5b
(XEN) <RMRR> iommu_map 0x8db5c
(XEN) <RMRR> iommu_map 0x8db5d
(XEN) <RMRR> iommu_map 0x8db5e
(XEN) <RMRR> iommu_map 0x8db5f
(XEN) <RMRR> iommu_map 0x8db60
(XEN) <RMRR> iommu_map 0x8db61
(XEN) <RMRR> iommu_map 0x8db62
(XEN) <RMRR> iommu_map 0x8db63
(XEN) <RMRR> iommu_map 0x8db64
(XEN) <RMRR> iommu_map 0x8db65
(XEN) <RMRR> iommu_map 0x8db66
(XEN) <RMRR> iommu_map 0x8db67
(XEN) <RMRR> iommu_map 0x8db68
(XEN) <RMRR> iommu_map 0x8db69
(XEN) <RMRR> iommu_map 0x8db6a
(XEN) <RMRR> iommu_map 0x8db6b
(XEN) <RMRR> iommu_map 0x8db6c
(XEN) <RMRR> iommu_map 0x8db6d
(XEN) <RMRR> iommu_map 0x8db6e
(XEN) <RMRR> iommu_map 0x8db6f
(XEN) <RMRR> iommu_map 0x8db70
(XEN) <RMRR> iommu_map 0x8db71
(XEN) <RMRR> iommu_map 0x8db72
(XEN) <RMRR> iommu_map 0x8db73
(XEN) <RMRR> iommu_map 0x8db74
(XEN) <RMRR> iommu_map 0x8db75
(XEN) <RMRR> iommu_map 0x8db76
(XEN) <RMRR> iommu_map 0x8db77
(XEN) <RMRR> iommu_map 0x8db78
(XEN) <RMRR> iommu_map 0x8db79
(XEN) <RMRR> iommu_map 0x8db7a
(XEN) <RMRR> iommu_map 0x8db7b
(XEN) <RMRR> iommu_map 0x8db7c
(XEN) <RMRR> iommu_map 0x8db7d
(XEN) <RMRR> iommu_map 0x8db7e
(XEN) <RMRR> iommu_map 0x8db7f
(XEN) <RMRR> iommu_map 0x8db80
(XEN) <RMRR> iommu_map 0x8db81
(XEN) <RMRR> iommu_map 0x8db82
(XEN) <RMRR> iommu_map 0x8db83
(XEN) <RMRR> iommu_map 0x8db84
(XEN) <RMRR> iommu_map 0x8db85
(XEN) <RMRR> iommu_map 0x8db86
(XEN) <RMRR> iommu_map 0x8db87
(XEN) <RMRR> iommu_map 0x8db88
(XEN) <RMRR> iommu_map 0x8db89
(XEN) <RMRR> iommu_map 0x8db8a
(XEN) <RMRR> iommu_map 0x8db8b
(XEN) <RMRR> iommu_map 0x8db8c
(XEN) <RMRR> iommu_map 0x8db8d
(XEN) <RMRR> iommu_map 0x8db8e
(XEN) <RMRR> iommu_map 0x8db8f
(XEN) <RMRR> iommu_map 0x8db90
(XEN) <RMRR> iommu_map 0x8db91
(XEN) <RMRR> iommu_map 0x8db92
(XEN) <RMRR> iommu_map 0x8db93
(XEN) <RMRR> iommu_map 0x8db94
(XEN) <RMRR> iommu_map 0x8db95
(XEN) <RMRR> iommu_map 0x8db96
(XEN) <RMRR> iommu_map 0x8db97
(XEN) <RMRR> iommu_map 0x8db98
(XEN) <RMRR> iommu_map 0x8db99
(XEN) <RMRR> iommu_map 0x8db9a
(XEN) <RMRR> iommu_map 0x8db9b
(XEN) <RMRR> iommu_map 0x8db9c
(XEN) <RMRR> iommu_map 0x8db9d
(XEN) <RMRR> iommu_map 0x8db9e
(XEN) <RMRR> iommu_map 0x8db9f
(XEN) <RMRR> iommu_map 0x8dba0
(XEN) <RMRR> iommu_map 0x8dba1
(XEN) <RMRR> iommu_map 0x8dba2
(XEN) <RMRR> iommu_map 0x8dba3
(XEN) <RMRR> iommu_map 0x8dba4
(XEN) <RMRR> iommu_map 0x8dba5
(XEN) <RMRR> iommu_map 0x8dba6
(XEN) <RMRR> iommu_map 0x8dba7
(XEN) <RMRR> iommu_map 0x8dba8
(XEN) <RMRR> iommu_map 0x8dba9
(XEN) <RMRR> iommu_map 0x8dbaa
(XEN) <RMRR> iommu_map 0x8dbab
(XEN) <RMRR> iommu_map 0x8dbac
(XEN) <RMRR> iommu_map 0x8dbad
(XEN) <RMRR> iommu_map 0x8dbae
(XEN) <RMRR> iommu_map 0x8dbaf
(XEN) <RMRR> iommu_map 0x8dbb0
(XEN) <RMRR> iommu_map 0x8dbb1
(XEN) <RMRR> iommu_map 0x8dbb2
(XEN) <RMRR> iommu_map 0x8dbb3
(XEN) <RMRR> iommu_map 0x8dbb4
(XEN) <RMRR> iommu_map 0x8dbb5
(XEN) <RMRR> iommu_map 0x8dbb6
(XEN) <RMRR> iommu_map 0x8dbb7
(XEN) <RMRR> iommu_map 0x8dbb8
(XEN) <RMRR> iommu_map 0x8dbb9
(XEN) <RMRR> iommu_map 0x8dbba
(XEN) <RMRR> iommu_map 0x8dbbb
(XEN) <RMRR> iommu_map 0x8dbbc
(XEN) <RMRR> iommu_map 0x8dbbd
(XEN) <RMRR> iommu_map 0x8dbbe
(XEN) <RMRR> iommu_map 0x8dbbf
(XEN) <RMRR> iommu_map 0x8dbc0
(XEN) <RMRR> iommu_map 0x8dbc1
(XEN) <RMRR> iommu_map 0x8dbc2
(XEN) <RMRR> iommu_map 0x8dbc3
(XEN) <RMRR> iommu_map 0x8dbc4
(XEN) <RMRR> iommu_map 0x8dbc5
(XEN) <RMRR> iommu_map 0x8dbc6
(XEN) <RMRR> iommu_map 0x8dbc7
(XEN) <RMRR> iommu_map 0x8dbc8
(XEN) <RMRR> iommu_map 0x8dbc9
(XEN) <RMRR> iommu_map 0x8dbca
(XEN) <RMRR> iommu_map 0x8dbcb
(XEN) <RMRR> iommu_map 0x8dbcc
(XEN) <RMRR> iommu_map 0x8dbcd
(XEN) <RMRR> iommu_map 0x8dbce
(XEN) <RMRR> iommu_map 0x8dbcf
(XEN) <RMRR> iommu_map 0x8dbd0
(XEN) <RMRR> iommu_map 0x8dbd1
(XEN) <RMRR> iommu_map 0x8dbd2
(XEN) <RMRR> iommu_map 0(XEN) <RMRR> iommu_map 0x8ddd3
(XEN) <RMRR> iommu_map 0x8ddd4
(XEN) <RMRR> iommu_map 0x8ddd5
(XEN) <RMRR> iommu_map 0x8ddd6
(XEN) <RMRR> iommu_map 0x8ddd7
(XEN) <RMRR> iommu_map 0x8ddd8
(XEN) <RMRR> iommu_map 0x8ddd9
(XEN) <RMRR> iommu_map 0x8ddda
(XEN) <RMRR> iommu_map 0x8dddb
(XEN) <RMRR> iommu_map 0x8dddc
(XEN) <RMRR> iommu_map 0x8dddd
(XEN) <RMRR> iommu_map 0x8ddde
(XEN) <RMRR> iommu_map 0x8dddf
(XEN) <RMRR> iommu_map 0x8dde0
(XEN) <RMRR> iommu_map 0x8dde1
(XEN) <RMRR> iommu_map 0x8dde2
(XEN) <RMRR> iommu_map 0x8dde3
(XEN) <RMRR> iommu_map 0x8dde4
(XEN) <RMRR> iommu_map 0x8dde5
(XEN) <RMRR> iommu_map 0x8dde6
(XEN) <RMRR> iommu_map 0x8dde7
(XEN) <RMRR> iommu_map 0x8dde8
(XEN) <RMRR> iommu_map 0x8dde9
(XEN) <RMRR> iommu_map 0x8ddea
(XEN) <RMRR> iommu_map 0x8ddeb
(XEN) <RMRR> iommu_map 0x8ddec
(XEN) <RMRR> iommu_map 0x8dded
(XEN) <RMRR> iommu_map 0x8ddee
(XEN) <RMRR> iommu_map 0x8ddef
(XEN) <RMRR> iommu_map 0x8ddf0
(XEN) <RMRR> iommu_map 0x8ddf1
(XEN) <RMRR> iommu_map 0x8ddf2
(XEN) <RMRR> iommu_map 0x8ddf3
(XEN) <RMRR> iommu_map 0x8ddf4
(XEN) <RMRR> iommu_map 0x8ddf5
(XEN) <RMRR> iommu_map 0x8ddf6
(XEN) <RMRR> iommu_map 0x8ddf7
(XEN) <RMRR> iommu_map 0x8ddf8
(XEN) <RMRR> iommu_map 0x8ddf9
(XEN) <RMRR> iommu_map 0x8ddfa
(XEN) <RMRR> iommu_map 0x8ddfb
(XEN) <RMRR> iommu_map 0x8ddfc
(XEN) <RMRR> iommu_map 0x8ddfd
(XEN) <RMRR> iommu_map 0x8ddfe
(XEN) <RMRR> iommu_map 0x8ddff
(XEN) <RMRR> iommu_map 0x8de00
(XEN) <RMRR> iommu_map 0x8de01
(XEN) <RMRR> iommu_map 0x8de02
(XEN) <RMRR> iommu_map 0x8de03
(XEN) <RMRR> iommu_map 0x8de04
(XEN) <RMRR> iommu_map 0x8de05
(XEN) <RMRR> iommu_map 0x8de06
(XEN) <RMRR> iommu_map 0x8de07
(XEN) <RMRR> iommu_map 0x8de08
(XEN) <RMRR> iommu_map 0x8de09
(XEN) <RMRR> iommu_map 0x8de0a
(XEN) <RMRR> iommu_map 0x8de0b
(XEN) <RMRR> iommu_map 0x8de0c
(XEN) <RMRR> iommu_map 0x8de0d
(XEN) <RMRR> iommu_map 0x8de0e
(XEN) <RMRR> iommu_map 0x8de0f
(XEN) <RMRR> iommu_map 0x8de10
(XEN) <RMRR> iommu_map 0x8de11
(XEN) <RMRR> iommu_map 0x8de12
(XEN) <RMRR> iommu_map 0x8de13
(XEN) <RMRR> iommu_map 0x8de14
(XEN) <RMRR> iommu_map 0x8de15
(XEN) <RMRR> iommu_map 0x8de16
(XEN) <RMRR> iommu_map 0x8de17
(XEN) <RMRR> iommu_map 0x8de18
(XEN) <RMRR> iommu_map 0x8de19
(XEN) <RMRR> iommu_map 0x8de1a
(XEN) <RMRR> iommu_map 0x8de1b
(XEN) <RMRR> iommu_map 0x8de1c
(XEN) <RMRR> iommu_map 0x8de1d
(XEN) <RMRR> iommu_map 0x8de1e
(XEN) <RMRR> iommu_map 0x8de1f
(XEN) <RMRR> iommu_map 0x8de20
(XEN) <RMRR> iommu_map 0x8de21
(XEN) <RMRR> iommu_map 0x8de22
(XEN) <RMRR> iommu_map 0x8de23
(XEN) <RMRR> iommu_map 0x8de24
(XEN) <RMRR> iommu_map 0x8de25
(XEN) <RMRR> iommu_map 0x8de26
(XEN) <RMRR> iommu_map 0x8de27
(XEN) <RMRR> iommu_map 0x8de28
(XEN) <RMRR> iommu_map 0x8de29
(XEN) <RMRR> iommu_map 0x8de2a
(XEN) <RMRR> iommu_map 0x8de2b
(XEN) <RMRR> iommu_map 0x8de2c
(XEN) <RMRR> iommu_map 0x8de2d
(XEN) <RMRR> iommu_map 0x8de2e
(XEN) <RMRR> iommu_map 0x8de2f
(XEN) <RMRR> iommu_map 0x8de30
(XEN) <RMRR> iommu_map 0x8de31
(XEN) <RMRR> iommu_map 0x8de32
(XEN) <RMRR> iommu_map 0x8de33
(XEN) <RMRR> iommu_map 0x8de34
(XEN) <RMRR> iommu_map 0x8de35
(XEN) <RMRR> iommu_map 0x8de36
(XEN) <RMRR> iommu_map 0x8de37
(XEN) <RMRR> iommu_map 0x8de38
(XEN) <RMRR> iommu_map 0x8de39
(XEN) <RMRR> iommu_map 0x8de3a
(XEN) <RMRR> iommu_map 0x8de3b
(XEN) <RMRR> iommu_map 0x8de3c
(XEN) <RMRR> iommu_map 0x8de3d
(XEN) <RMRR> iommu_map 0x8de3e
(XEN) <RMRR> iommu_map 0x8de3f
(XEN) <RMRR> iommu_map 0x8de40
(XEN) <RMRR> iommu_map 0x8de41
(XEN) <RMRR> iommu_map 0x8de42
(XEN) <RMRR> iommu_map 0x8de43
(XEN) <RMRR> iommu_map 0x8de44
(XEN) <RMRR> iommu_map 0x8de45
(XEN) <RMRR> iommu_map 0x8de46
(XEN) <RMRR> iommu_map 0x8de47
(XEN) <RMRR> iommu_map 0x8de48
(XEN) <RMRR> iommu_map 0x8de49
(XEN) <RMRR> iommu_map 0x8de4a
(XEN) <RMRR> iommu_map 0x8de4b
(XEN) <RMRR> iommu_map 0x8de4c
(XEN) <RMRR> iommu_map 0x8de4d
(XEN) <RMRR> iommu_map 0x8de4e
(XEN) <RMRR> iommu_map 0x8de4f
(XEN) <RMRR> iommu_map 0x8de50
(XEN) <RMRR> iommu_map 0x8de51
(XEN) <RMRR> iommu_map 0x8de52
(XEN) <RMRR> iommu_map 0x8de53
(XEN) <RMRR> iommu_map 0x8de54
(XEN) <RMRR> iommu_map 0x8de55
(XEN) <RMRR> iommu_map 0x8de56
(XEN) <RMRR> iommu_map 0x8de57
(XEN) <RMRR> iommu_map 0x8de58
(XEN) <RMRR> iommu_map 0x8de59
(XEN) <RMRR> iommu_map 0x8de5a
(XEN) <RMRR> iommu_map 0x8de5b
(XEN) <RMRR> iommu_map 0x8de5c
(XEN) <RMRR> iommu_map 0x8de5d
(XEN) <RMRR> iommu_map 0x8de5e
(XEN) <RMRR> iommu_map 0x8de5f
(XEN) <RMRR> iommu_map 0x8de60
(XEN) <RMRR> iommu_map 0x8de61
(XEN) <RMRR> iommu_map 0x8de62
(XEN) <RMRR> iommu_map 0x8de63
(XEN) <RMRR> iommu_map 0x8de64
(XEN) <RMRR> iommu_map 0x8de65
(XEN) <RMRR> iommu_map 0x8de66
(XEN) <RMRR> iommu_map 0x8de67
(XEN) <RMRR> iommu_map 0x8de68
(XEN) <RMRR> iommu_map 0x8de69
(XEN) <RMRR> iommu_map 0x8de6a
(XEN) <RMRR> iommu_map 0x8de6b
(XEN) <RMRR> iommu_map 0x8de6c
(XEN) <RMRR> iommu_map 0x8de6d
(XEN) <RMRR> iommu_map 0x8de6e
(XEN) <RMRR> iommu_map 0x8de6f
(XEN) <RMRR> iommu_map 0x8de70
(XEN) <RMRR> iommu_map 0x8de71
(XEN) <RMRR> iommu_map 0x8de72
(XEN) <RMRR> iommu_map 0x8de73
(XEN) <RMRR> iommu_map 0x8de74
(XEN) <RMRR> iommu_map 0x8de75
(XEN) <RMRR> iommu_map 0x8de76
(XEN) <RMRR> iommu_map 0x8de77
(XEN) <RMRR> iommu_map 0x8de78
(XEN) <RMRR> iommu_map 0x8de79
(XEN) <RMRR> iommu_map 0x8de7a
(XEN) <RMRR> iommu_map 0x8de7b
(XEN) <RMRR> iommu_map 0x8de7c
(XEN) <RMRR> iommu_map 0x8de7d
(XEN) <RMRR> iommu_map 0x8de7e
(XEN) <RMRR> iommu_map 0x8de7f
(XEN) <RMRR> iommu_map 0x8de80
(XEN) <RMRR> iommu_map 0x8de81
(XEN) <RMRR> iommu_map 0x8de82
(XEN) <RMRR> iommu_map 0x8de83
(XEN) <RMRR> iommu_map 0x8de84
(XEN) <RMRR> iommu_map 0x8de85
(XEN) <RMRR> iommu_map 0x8de86
(XEN) <RMRR> iommu_map 0x8de87
(XEN) <RMRR> iommu_map 0x8de88
(XEN) <RMRR> iommu_map 0x8de89
(XEN) <RMRR> iommu_map 0x8de8a
(XEN) <RMRR> iommu_map 0x8de8b
(XEN) <RMRR> iommu_map 0x8de8c
(XEN) <RMRR> iommu_map 0x8de8d
(XEN) <RMRR> iommu_map 0x8de8e
(XEN) <RMRR> iommu_map 0x8de8f
(XEN) <RMRR> iommu_map 0x8de90
(XEN) <RMRR> iommu_map 0x8de91
(XEN) <RMRR> iommu_map 0x8de92
(XEN) <RMRR> iommu_map 0x8de93
(XEN) <RMRR> iommu_map 0x8de94
(XEN) <RMRR> iommu_map 0x8de95
(XEN) <RMRR> iommu_map 0x8de96
(XEN) <RMRR> iommu_map 0x8de97
(XEN) <RMRR> iommu_map 0x8de98
(XEN) <RMRR> iommu_map 0x8de99
(XEN) <RMRR> iommu_map 0x8de9a
(XEN) <RMRR> iommu_map 0x8de9b
(XEN) <RMRR> iommu_map 0x8de9c
(XEN) <RMRR> iommu_map 0x8de9d
(XEN) <RMRR> iommu_map 0x8de9e
(XEN) <RMRR> iommu_map 0x8de9f
(XEN) <RMRR> iommu_map 0x8dea0
(XEN) <RMRR> iommu_map 0x8dea1
(XEN) <RMRR> iommu_map 0x8dea2
(XEN) <RMRR> iommu_map 0x8dea3
(XEN) <RMRR> iommu_map 0x8dea4
(XEN) <RMRR> iommu_map 0x8dea5
(XEN) <RMRR> iommu_map 0x8dea6
(XEN) <RMRR> iommu_map 0x8dea7
(XEN) <RMRR> iommu_map 0x8dea8
(XEN) <RMRR> iommu_map 0x8dea9
(XEN) <RMRR> iommu_map 0x8deaa
(XEN) <RMRR> iommu_map 0x8deab
(XEN) <RMRR> iommu_map 0x8deac
(XEN) <RMRR> iommu_map 0x8dead
(XEN) <RMRR> iommu_map 0x8deae
(XEN) <RMRR> iommu_map 0x8deaf
(XEN) <RMRR> iommu_map 0x8deb0
(XEN) <RMRR> iommu_map 0x8deb1
(XEN) <RMRR> iommu_map 0x8deb2
(XEN) <RMRR> iommu_map 0x8deb3
(XEN) <RMRR> iommu_map 0x8deb4
(XEN) <RMRR> iommu_map 0x8deb5
(XEN) <RMRR> iommu_map 0x8deb6
(XEN) <RMRR> iommu_map 0x8deb7
(XEN) <RMRR> iommu_map 0x8deb8
(XEN) <RMRR> iommu_map 0x8deb9
(XEN) <RMRR> iommu_map 0x8deba
(XEN) <RMRR> iommu_map 0x8debb
(XEN) <RMRR> iommu_map 0x8debc
(XEN) <RMRR> iommu_map 0x8debd
(XEN) <RMRR> iommu_map 0x8debe
(XEN) <RMRR> iommu_map 0x8debf
(XEN) <RMRR> iommu_map 0x8dec0
(XEN) <RMRR> iommu_map 0x8dec1
(XEN) <RMRR> iommu_map 0x8dec2
(XEN) <RMRR> iommu_map 0x8dec3
(XEN) <RMRR> iommu_map 0x8dec4
(XEN) <RMRR> iommu_map 0x8dec5
(XEN) <RMRR> iommu_map 0x8dec6
(XEN) <RMRR> iommu_map 0x8dec7
(XEN) <RMRR> iommu_map 0x8dec8
(XEN) <RMRR> iommu_map 0x8dec9
(XEN) <RMRR> iommu_map 0x8deca
(XEN) <RMRR> iommu_map 0x8decb
(XEN) <RMRR> iommu_map 0x8decc
(XEN) <RMRR> iommu_map 0x8decd
(XEN) <RMRR> iommu_map 0x8dece
(XEN) <RMRR> iommu_map 0x8decf
(XEN) <RMRR> iommu_map 0x8ded0
(XEN) <RMRR> iommu_map 0x8ded1
(XEN) <RMRR> iommu_map 0x8ded2
(XEN) <RMRR> iommu_map 0x8ded3
(XEN) <RMRR> iommu_map 0x8ded4
(XEN) <RMRR> iommu_map 0x8ded5
(XEN) <RMRR> iommu_map 0x8ded6
(XEN) <RMRR> iommu_map 0x8ded7
(XEN) <RMRR> iommu_map 0x8ded8
(XEN) <RMRR> iommu_map 0x8ded9
(XEN) <RMRR> iommu_map 0x8deda
(XEN) <RMRR> iommu_map 0x8dedb
(XEN) <RMRR> iommu_map 0x8dedc
(XEN) <RMRR> iommu_map 0x8dedd
(XEN) <RMRR> iommu_map 0x8dede
(XEN) <RMRR> iommu_map 0x8dedf
(XEN) <RMRR> iommu_map 0x8dee0
(XEN) <RMRR> iommu_map 0x8dee1
(XEN) <RMRR> iommu_map 0x8dee2
(XEN) <RMRR> iommu_map 0x8dee3
(XEN) <RMRR> iommu_map 0x8dee4
(XEN) <RMRR> iommu_map 0x8dee5
(XEN) <RMRR> iommu_map 0x8dee6
(XEN) <RMRR> iommu_map 0x8dee7
(XEN) <RMRR> iommu_map 0x8dee8
(XEN) <RMRR> iommu_map 0x8dee9
(XEN) <RMRR> iommu_map 0x8deea
(XEN) <RMRR> iommu_map 0x8deeb
(XEN) <RMRR> iommu_map 0x8deec
(XEN) <RMRR> iommu_map 0x8deed
(XEN) <RMRR> iommu_map 0x8deee
(XEN) <RMRR> iommu_map 0x8deef
(XEN) <RMRR> iommu_map 0x8def0
(XEN) <RMRR> iommu_map 0x8def1
(XEN) <RMRR> iommu_map 0x8def2
(XEN) <RMRR> iommu_map 0x8def3
(XEN) <RMRR> iommu_map 0x8def4
(XEN) <RMRR> iommu_map 0x8def5
(XEN) <RMRR> iommu_map 0x8def6
(XEN) <RMRR> iommu_map 0x8def7
(XEN) <RMRR> iommu_map 0x8def8
(XEN) <RMRR> iommu_map 0x8def9
(XEN) <RMRR> iommu_map 0x8defa
(XEN) <RMRR> iommu_map 0x8defb
(XEN) <RMRR> iommu_map 0x8defc
(XEN) <RMRR> iommu_map 0x8defd
(XEN) <RMRR> iommu_map 0x8defe
(XEN) <RMRR> iommu_map 0x8deff
(XEN) <RMRR> iommu_map 0x8df00
(XEN) <RMRR> iommu_map 0x8df01
(XEN) <RMRR> iommu_map 0x8df02
(XEN) <RMRR> iommu_map 0x8df03
(XEN) <RMRR> iommu_map 0x8df04
(XEN) <RMRR> iommu_map 0x8df05
(XEN) <RMRR> iommu_map 0x8df06
(XEN) <RMRR> iommu_map 0x8df07
(XEN) <RMRR> iommu_map 0x8df08
(XEN) <RMRR> iommu_map 0x8df09
(XEN) <RMRR> iommu_map 0x8df0a
(XEN) <RMRR> iommu_map 0x8df0b
(XEN) <RMRR> iommu_map 0x8df0c
(XEN) <RMRR> iommu_map 0x8df0d
(XEN) <RMRR> iommu_map 0x8df0e
(XEN) <RMRR> iommu_map 0x8df0f
(XEN) <RMRR> iommu_map 0x8df10
(XEN) <RMRR> iommu_map 0x8df11
(XEN) <RMRR> iommu_map 0x8df12
(XEN) <RMRR> iommu_map 0x8df13
(XEN) <RMRR> iommu_map 0x8df14
(XEN) <RMRR> iommu_map 0x8df15
(XEN) <RMRR> iommu_map 0x8df16
(XEN) <RMRR> iommu_map 0x8df17
(XEN) <RMRR> iommu_map 0x8df18
(XEN) <RMRR> iommu_map 0x8df19
(XEN) <RMRR> iommu_map 0x8df1a
(XEN) <RMRR> iommu_map 0x8df1b
(XEN) <RMRR> iommu_map 0x8df1c
(XEN) <RMRR> iommu_map 0x8df1d
(XEN) <RMRR> iommu_map 0x8df1e
(XEN) <RMRR> iommu_map 0x8df1f
(XEN) <RMRR> iommu_map 0x8df20
(XEN) <RMRR> iommu_map 0x8df21
(XEN) <RMRR> iommu_map 0x8df22
(XEN) <RMRR> iommu_map 0x8df23
(XEN) <RMRR> iommu_map 0x8df24
(XEN) <RMRR> iommu_map 0x8df25
(XEN) <RMRR> iommu_map 0x8df26
(XEN) <RMRR> iommu_map 0x8df27
(XEN) <RMRR> iommu_map 0x8df28
(XEN) <RMRR> iommu_map 0x8df29
(XEN) <RMRR> iommu_map 0x8df2a
(XEN) <RMRR> iommu_map 0x8df2b
(XEN) <RMRR> iommu_map 0x8df2c
(XEN) <RMRR> iommu_map 0x8df2d
(XEN) <RMRR> iommu_map 0x8df2e
(XEN) <RMRR> iommu_map 0x8df2f
(XEN) <RMRR> iommu_map 0x8df30
(XEN) <RMRR> iommu_map 0x8df31
(XEN) <RMRR> iommu_map 0x8df32
(XEN) <RMRR> iommu_map 0x8df33
(XEN) <RMRR> iommu_map 0x8df34
(XEN) <RMRR> iommu_map 0x8df35
(XEN) <RMRR> iommu_map 0x8df36
(XEN) <RMRR> iommu_map 0x8df37
(XEN) <RMRR> iommu_map 0x8df38
(XEN) <RMRR> iommu_map 0x8df39
(XEN) <RMRR> iommu_map 0x8df3a
(XEN) <RMRR> iommu_map 0x8df3b
(XEN) <RMRR> iommu_map 0x8df3c
(XEN) <RMRR> iommu_map 0x8df3d
(XEN) <RMRR> iommu_map 0x8df3e
(XEN) <RMRR> iommu_map 0x8df3f
(XEN) <RMRR> iommu_map 0x8df40
(XEN) <RMRR> iommu_map 0x8df41
(XEN) <RMRR> iommu_map 0x8df42
(XEN) <RMRR> iommu_map 0x8df43
(XEN) <RMRR> iommu_map 0x8df44
(XEN) <RMRR> iommu_map 0x8df45
(XEN) <RMRR> iommu_map 0x8df46
(XEN) <RMRR> iommu_map 0x8df47
(XEN) <RMRR> iommu_map 0x8df48
(XEN) <RMRR> iommu_map 0x8df49
(XEN) <RMRR> iommu_map 0x8df4a
(XEN) <RMRR> iommu_map 0x8df4b
(XEN) <RMRR> iommu_map 0x8df4c
(XEN) <RMRR> iommu_map 0x8df4d
(XEN) <RMRR> iommu_map 0x8df4e
(XEN) <RMRR> iommu_map 0x8df4f
(XEN) <RMRR> iommu_map 0x8df50
(XEN) <RMRR> iommu_map 0x8df51
(XEN) <RMRR> iommu_map 0x8df52
(XEN) <RMRR> iommu_map 0x8df53
(XEN) <RMRR> iommu_map 0x8df54
(XEN) <RMRR> iommu_map 0x8df55
(XEN) <RMRR> iommu_map 0x8df56
(XEN) <RMRR> iommu_map 0x8df57
(XEN) <RMRR> iommu_map 0x8df58
(XEN) <RMRR> iommu_map 0x8df59
(XEN) <RMRR> iommu_map 0x8df5a
(XEN) <RMRR> iommu_map 0x8df5b
(XEN) <RMRR> iommu_map 0x8df5c
(XEN) <RMRR> iommu_map 0x8df5d
(XEN) <RMRR> iommu_map 0x8df5e
(XEN) <RMRR> iommu_map 0x8df5f
(XEN) <RMRR> iommu_map 0x8df60
(XEN) <RMRR> iommu_map 0x8df61
(XEN) <RMRR> iommu_map 0x8df62
(XEN) <RMRR> iommu_map 0x8df63
(XEN) <RMRR> iommu_map 0x8df64
(XEN) <RMRR> iommu_map 0x8df65
(XEN) <RMRR> iommu_map 0x8df66
(XEN) <RMRR> iommu_map 0x8df67
(XEN) <RMRR> iommu_map 0x8df68
(XEN) <RMRR> iommu_map 0x8df69
(XEN) <RMRR> iommu_map 0x8df6a
(XEN) <RMRR> iommu_map 0x8df6b
(XEN) <RMRR> iommu_map 0x8df6c
(XEN) <RMRR> iommu_map 0x8df6d
(XEN) <RMRR> iommu_map 0x8df6e
(XEN) <RMRR> iommu_map 0x8df6f
(XEN) <RMRR> iommu_map 0x8df70
(XEN) <RMRR> iommu_map 0x8df71
(XEN) <RMRR> iommu_map 0x8df72
(XEN) <RMRR> iommu_map 0x8df73
(XEN) <RMRR> iommu_map 0x8df74
(XEN) <RMRR> iommu_map 0x8df75
(XEN) <RMRR> iommu_map 0x8df76
(XEN) <RMRR> iommu_map 0x8df77
(XEN) <RMRR> iommu_map 0x8df78
(XEN) <RMRR> iommu_map 0x8df79
(XEN) <RMRR> iommu_map 0x8df7a
(XEN) <RMRR> iommu_map 0x8df7b
(XEN) <RMRR> iommu_map 0x8df7c
(XEN) <RMRR> iommu_map 0x8df7d
(XEN) <RMRR> iommu_map 0x8df7e
(XEN) <RMRR> iommu_map 0x8df7f
(XEN) <RMRR> iommu_map 0x8df80
(XEN) <RMRR> iommu_map 0x8df81
(XEN) <RMRR> iommu_map 0x8df82
(XEN) <RMRR> iommu_map 0x8df83
(XEN) <RMRR> iommu_map 0x8df84
(XEN) <RMRR> iommu_map 0x8df85
(XEN) <RMRR> iommu_map 0x8df86
(XEN) <RMRR> iommu_map 0x8df87
(XEN) <RMRR> iommu_map 0x8df88
(XEN) <RMRR> iommu_map 0x8df89
(XEN) <RMRR> iommu_map 0x8df8a
(XEN) <RMRR> iommu_map 0x8df8b
(XEN) <RMRR> iommu_map 0x8df8c
(XEN) <RMRR> iommu_map 0x8df8d
(XEN) <RMRR> iommu_map 0x8df8e
(XEN) <RMRR> iommu_map 0x8df8f
(XEN) <RMRR> iommu_map 0x8df90
(XEN) <RMRR> iommu_map 0x8df91
(XEN) <RMRR> iommu_map 0x8df92
(XEN) <RMRR> iommu_map 0x8df93
(XEN) <RMRR> iommu_map 0x8df94
(XEN) <RMRR> iommu_map 0x8df95
(XEN) <RMRR> iommu_map 0x8df96
(XEN) <RMRR> iommu_map 0x8df97
(XEN) <RMRR> iommu_map 0x8df98
(XEN) <RMRR> iommu_map 0x8df99
(XEN) <RMRR> iommu_map 0x8df9a
(XEN) <RMRR> iommu_map 0x8df9b
(XEN) <RMRR> iommu_map 0x8df9c
(XEN) <RMRR> iommu_map 0x8df9d
(XEN) <RMRR> iommu_map 0x8df9e
(XEN) <RMRR> iommu_map 0x8df9f
(XEN) <RMRR> iommu_map 0x8dfa0
(XEN) <RMRR> iommu_map 0x8dfa1
(XEN) <RMRR> iommu_map 0x8dfa2
(XEN) <RMRR> iommu_map 0x8dfa3
(XEN) <RMRR> iommu_map 0x8dfa4
(XEN) <RMRR> iommu_map 0x8dfa5
(XEN) <RMRR> iommu_map 0x8dfa6
(XEN) <RMRR> iommu_map 0x8dfa7
(XEN) <RMRR> iommu_map 0x8dfa8
(XEN) <RMRR> iommu_map 0x8dfa9
(XEN) <RMRR> iommu_map 0x8dfaa
(XEN) <RMRR> iommu_map 0x8dfab
(XEN) <RMRR> iommu_map 0x8dfac
(XEN) <RMRR> iommu_map 0x8dfad
(XEN) <RMRR> iommu_map 0x8dfae
(XEN) <RMRR> iommu_map 0x8dfaf
(XEN) <RMRR> iommu_map 0x8dfb0
(XEN) <RMRR> iommu_map 0x8dfb1
(XEN) <RMRR> iommu_map 0x8dfb2
(XEN) <RMRR> iommu_map 0x8dfb3
(XEN) <RMRR> iommu_map 0x8dfb4
(XEN) <RMRR> iommu_map 0x8dfb5
(XEN) <RMRR> iommu_map 0x8dfb6
(XEN) <RMRR> iommu_map 0x8dfb7
(XEN) <RMRR> iommu_map 0x8dfb8
(XEN) <RMRR> iommu_map 0x8dfb9
(XEN) <RMRR> iommu_map 0x8dfba
(XEN) <RMRR> iommu_map 0x8dfbb
(XEN) <RMRR> iommu_map 0x8dfbc
(XEN) <RMRR> iommu_map 0x8dfbd
(XEN) <RMRR> iommu_map 0x8dfbe
(XEN) <RMRR> iommu_map 0x8dfbf
(XEN) <RMRR> iommu_map 0x8dfc0
(XEN) <RMRR> iommu_map 0x8dfc1
(XEN) <RMRR> iommu_map 0x8dfc2
(XEN) <RMRR> iommu_map 0x8dfc3
(XEN) <RMRR> iommu_map 0x8dfc4
(XEN) <RMRR> iommu_map 0x8dfc5
(XEN) <RMRR> iommu_map 0x8dfc6
(XEN) <RMRR> iommu_map 0x8dfc7
(XEN) <RMRR> iommu_map 0x8dfc8
(XEN) <RMRR> iommu_map 0x8dfc9
(XEN) <RMRR> iommu_map 0x8dfca
(XEN) <RMRR> iommu_map 0x8dfcb
(XEN) <RMRR> iommu_map 0x8dfcc
(XEN) <RMRR> iommu_map 0x8dfcd
(XEN) <RMRR> iommu_map 0x8dfce
(XEN) <RMRR> iommu_map 0x8dfcf
(XEN) <RMRR> iommu_map 0x8dfd0
(XEN) <RMRR> iommu_map 0x8dfd1
(XEN) <RMRR> iom(XEN) <RMRR> iommu_map 0x8e1d2
(XEN) <RMRR> iommu_map 0x8e1d3
(XEN) <RMRR> iommu_map 0x8e1d4
(XEN) <RMRR> iommu_map 0x8e1d5
(XEN) <RMRR> iommu_map 0x8e1d6
(XEN) <RMRR> iommu_map 0x8e1d7
(XEN) <RMRR> iommu_map 0x8e1d8
(XEN) <RMRR> iommu_map 0x8e1d9
(XEN) <RMRR> iommu_map 0x8e1da
(XEN) <RMRR> iommu_map 0x8e1db
(XEN) <RMRR> iommu_map 0x8e1dc
(XEN) <RMRR> iommu_map 0x8e1dd
(XEN) <RMRR> iommu_map 0x8e1de
(XEN) <RMRR> iommu_map 0x8e1df
(XEN) <RMRR> iommu_map 0x8e1e0
(XEN) <RMRR> iommu_map 0x8e1e1
(XEN) <RMRR> iommu_map 0x8e1e2
(XEN) <RMRR> iommu_map 0x8e1e3
(XEN) <RMRR> iommu_map 0x8e1e4
(XEN) <RMRR> iommu_map 0x8e1e5
(XEN) <RMRR> iommu_map 0x8e1e6
(XEN) <RMRR> iommu_map 0x8e1e7
(XEN) <RMRR> iommu_map 0x8e1e8
(XEN) <RMRR> iommu_map 0x8e1e9
(XEN) <RMRR> iommu_map 0x8e1ea
(XEN) <RMRR> iommu_map 0x8e1eb
(XEN) <RMRR> iommu_map 0x8e1ec
(XEN) <RMRR> iommu_map 0x8e1ed
(XEN) <RMRR> iommu_map 0x8e1ee
(XEN) <RMRR> iommu_map 0x8e1ef
(XEN) <RMRR> iommu_map 0x8e1f0
(XEN) <RMRR> iommu_map 0x8e1f1
(XEN) <RMRR> iommu_map 0x8e1f2
(XEN) <RMRR> iommu_map 0x8e1f3
(XEN) <RMRR> iommu_map 0x8e1f4
(XEN) <RMRR> iommu_map 0x8e1f5
(XEN) <RMRR> iommu_map 0x8e1f6
(XEN) <RMRR> iommu_map 0x8e1f7
(XEN) <RMRR> iommu_map 0x8e1f8
(XEN) <RMRR> iommu_map 0x8e1f9
(XEN) <RMRR> iommu_map 0x8e1fa
(XEN) <RMRR> iommu_map 0x8e1fb
(XEN) <RMRR> iommu_map 0x8e1fc
(XEN) <RMRR> iommu_map 0x8e1fd
(XEN) <RMRR> iommu_map 0x8e1fe
(XEN) <RMRR> iommu_map 0x8e1ff
(XEN) <RMRR> iommu_map 0x8e200
(XEN) <RMRR> iommu_map 0x8e201
(XEN) <RMRR> iommu_map 0x8e202
(XEN) <RMRR> iommu_map 0x8e203
(XEN) <RMRR> iommu_map 0x8e204
(XEN) <RMRR> iommu_map 0x8e205
(XEN) <RMRR> iommu_map 0x8e206
(XEN) <RMRR> iommu_map 0x8e207
(XEN) <RMRR> iommu_map 0x8e208
(XEN) <RMRR> iommu_map 0x8e209
(XEN) <RMRR> iommu_map 0x8e20a
(XEN) <RMRR> iommu_map 0x8e20b
(XEN) <RMRR> iommu_map 0x8e20c
(XEN) <RMRR> iommu_map 0x8e20d
(XEN) <RMRR> iommu_map 0x8e20e
(XEN) <RMRR> iommu_map 0x8e20f
(XEN) <RMRR> iommu_map 0x8e210
(XEN) <RMRR> iommu_map 0x8e211
(XEN) <RMRR> iommu_map 0x8e212
(XEN) <RMRR> iommu_map 0x8e213
(XEN) <RMRR> iommu_map 0x8e214
(XEN) <RMRR> iommu_map 0x8e215
(XEN) <RMRR> iommu_map 0x8e216
(XEN) <RMRR> iommu_map 0x8e217
(XEN) <RMRR> iommu_map 0x8e218
(XEN) <RMRR> iommu_map 0x8e219
(XEN) <RMRR> iommu_map 0x8e21a
(XEN) <RMRR> iommu_map 0x8e21b
(XEN) <RMRR> iommu_map 0x8e21c
(XEN) <RMRR> iommu_map 0x8e21d
(XEN) <RMRR> iommu_map 0x8e21e
(XEN) <RMRR> iommu_map 0x8e21f
(XEN) <RMRR> iommu_map 0x8e220
(XEN) <RMRR> iommu_map 0x8e221
(XEN) <RMRR> iommu_map 0x8e222
(XEN) <RMRR> iommu_map 0x8e223
(XEN) <RMRR> iommu_map 0x8e224
(XEN) <RMRR> iommu_map 0x8e225
(XEN) <RMRR> iommu_map 0x8e226
(XEN) <RMRR> iommu_map 0x8e227
(XEN) <RMRR> iommu_map 0x8e228
(XEN) <RMRR> iommu_map 0x8e229
(XEN) <RMRR> iommu_map 0x8e22a
(XEN) <RMRR> iommu_map 0x8e22b
(XEN) <RMRR> iommu_map 0x8e22c
(XEN) <RMRR> iommu_map 0x8e22d
(XEN) <RMRR> iommu_map 0x8e22e
(XEN) <RMRR> iommu_map 0x8e22f
(XEN) <RMRR> iommu_map 0x8e230
(XEN) <RMRR> iommu_map 0x8e231
(XEN) <RMRR> iommu_map 0x8e232
(XEN) <RMRR> iommu_map 0x8e233
(XEN) <RMRR> iommu_map 0x8e234
(XEN) <RMRR> iommu_map 0x8e235
(XEN) <RMRR> iommu_map 0x8e236
(XEN) <RMRR> iommu_map 0x8e237
(XEN) <RMRR> iommu_map 0x8e238
(XEN) <RMRR> iommu_map 0x8e239
(XEN) <RMRR> iommu_map 0x8e23a
(XEN) <RMRR> iommu_map 0x8e23b
(XEN) <RMRR> iommu_map 0x8e23c
(XEN) <RMRR> iommu_map 0x8e23d
(XEN) <RMRR> iommu_map 0x8e23e
(XEN) <RMRR> iommu_map 0x8e23f
(XEN) <RMRR> iommu_map 0x8e240
(XEN) <RMRR> iommu_map 0x8e241
(XEN) <RMRR> iommu_map 0x8e242
(XEN) <RMRR> iommu_map 0x8e243
(XEN) <RMRR> iommu_map 0x8e244
(XEN) <RMRR> iommu_map 0x8e245
(XEN) <RMRR> iommu_map 0x8e246
(XEN) <RMRR> iommu_map 0x8e247
(XEN) <RMRR> iommu_map 0x8e248
(XEN) <RMRR> iommu_map 0x8e249
(XEN) <RMRR> iommu_map 0x8e24a
(XEN) <RMRR> iommu_map 0x8e24b
(XEN) <RMRR> iommu_map 0x8e24c
(XEN) <RMRR> iommu_map 0x8e24d
(XEN) <RMRR> iommu_map 0x8e24e
(XEN) <RMRR> iommu_map 0x8e24f
(XEN) <RMRR> iommu_map 0x8e250
(XEN) <RMRR> iommu_map 0x8e251
(XEN) <RMRR> iommu_map 0x8e252
(XEN) <RMRR> iommu_map 0x8e253
(XEN) <RMRR> iommu_map 0x8e254
(XEN) <RMRR> iommu_map 0x8e255
(XEN) <RMRR> iommu_map 0x8e256
(XEN) <RMRR> iommu_map 0x8e257
(XEN) <RMRR> iommu_map 0x8e258
(XEN) <RMRR> iommu_map 0x8e259
(XEN) <RMRR> iommu_map 0x8e25a
(XEN) <RMRR> iommu_map 0x8e25b
(XEN) <RMRR> iommu_map 0x8e25c
(XEN) <RMRR> iommu_map 0x8e25d
(XEN) <RMRR> iommu_map 0x8e25e
(XEN) <RMRR> iommu_map 0x8e25f
(XEN) <RMRR> iommu_map 0x8e260
(XEN) <RMRR> iommu_map 0x8e261
(XEN) <RMRR> iommu_map 0x8e262
(XEN) <RMRR> iommu_map 0x8e263
(XEN) <RMRR> iommu_map 0x8e264
(XEN) <RMRR> iommu_map 0x8e265
(XEN) <RMRR> iommu_map 0x8e266
(XEN) <RMRR> iommu_map 0x8e267
(XEN) <RMRR> iommu_map 0x8e268
(XEN) <RMRR> iommu_map 0x8e269
(XEN) <RMRR> iommu_map 0x8e26a
(XEN) <RMRR> iommu_map 0x8e26b
(XEN) <RMRR> iommu_map 0x8e26c
(XEN) <RMRR> iommu_map 0x8e26d
(XEN) <RMRR> iommu_map 0x8e26e
(XEN) <RMRR> iommu_map 0x8e26f
(XEN) <RMRR> iommu_map 0x8e270
(XEN) <RMRR> iommu_map 0x8e271
(XEN) <RMRR> iommu_map 0x8e272
(XEN) <RMRR> iommu_map 0x8e273
(XEN) <RMRR> iommu_map 0x8e274
(XEN) <RMRR> iommu_map 0x8e275
(XEN) <RMRR> iommu_map 0x8e276
(XEN) <RMRR> iommu_map 0x8e277
(XEN) <RMRR> iommu_map 0x8e278
(XEN) <RMRR> iommu_map 0x8e279
(XEN) <RMRR> iommu_map 0x8e27a
(XEN) <RMRR> iommu_map 0x8e27b
(XEN) <RMRR> iommu_map 0x8e27c
(XEN) <RMRR> iommu_map 0x8e27d
(XEN) <RMRR> iommu_map 0x8e27e
(XEN) <RMRR> iommu_map 0x8e27f
(XEN) <RMRR> iommu_map 0x8e280
(XEN) <RMRR> iommu_map 0x8e281
(XEN) <RMRR> iommu_map 0x8e282
(XEN) <RMRR> iommu_map 0x8e283
(XEN) <RMRR> iommu_map 0x8e284
(XEN) <RMRR> iommu_map 0x8e285
(XEN) <RMRR> iommu_map 0x8e286
(XEN) <RMRR> iommu_map 0x8e287
(XEN) <RMRR> iommu_map 0x8e288
(XEN) <RMRR> iommu_map 0x8e289
(XEN) <RMRR> iommu_map 0x8e28a
(XEN) <RMRR> iommu_map 0x8e28b
(XEN) <RMRR> iommu_map 0x8e28c
(XEN) <RMRR> iommu_map 0x8e28d
(XEN) <RMRR> iommu_map 0x8e28e
(XEN) <RMRR> iommu_map 0x8e28f
(XEN) <RMRR> iommu_map 0x8e290
(XEN) <RMRR> iommu_map 0x8e291
(XEN) <RMRR> iommu_map 0x8e292
(XEN) <RMRR> iommu_map 0x8e293
(XEN) <RMRR> iommu_map 0x8e294
(XEN) <RMRR> iommu_map 0x8e295
(XEN) <RMRR> iommu_map 0x8e296
(XEN) <RMRR> iommu_map 0x8e297
(XEN) <RMRR> iommu_map 0x8e298
(XEN) <RMRR> iommu_map 0x8e299
(XEN) <RMRR> iommu_map 0x8e29a
(XEN) <RMRR> iommu_map 0x8e29b
(XEN) <RMRR> iommu_map 0x8e29c
(XEN) <RMRR> iommu_map 0x8e29d
(XEN) <RMRR> iommu_map 0x8e29e
(XEN) <RMRR> iommu_map 0x8e29f
(XEN) <RMRR> iommu_map 0x8e2a0
(XEN) <RMRR> iommu_map 0x8e2a1
(XEN) <RMRR> iommu_map 0x8e2a2
(XEN) <RMRR> iommu_map 0x8e2a3
(XEN) <RMRR> iommu_map 0x8e2a4
(XEN) <RMRR> iommu_map 0x8e2a5
(XEN) <RMRR> iommu_map 0x8e2a6
(XEN) <RMRR> iommu_map 0x8e2a7
(XEN) <RMRR> iommu_map 0x8e2a8
(XEN) <RMRR> iommu_map 0x8e2a9
(XEN) <RMRR> iommu_map 0x8e2aa
(XEN) <RMRR> iommu_map 0x8e2ab
(XEN) <RMRR> iommu_map 0x8e2ac
(XEN) <RMRR> iommu_map 0x8e2ad
(XEN) <RMRR> iommu_map 0x8e2ae
(XEN) <RMRR> iommu_map 0x8e2af
(XEN) <RMRR> iommu_map 0x8e2b0
(XEN) <RMRR> iommu_map 0x8e2b1
(XEN) <RMRR> iommu_map 0x8e2b2
(XEN) <RMRR> iommu_map 0x8e2b3
(XEN) <RMRR> iommu_map 0x8e2b4
(XEN) <RMRR> iommu_map 0x8e2b5
(XEN) <RMRR> iommu_map 0x8e2b6
(XEN) <RMRR> iommu_map 0x8e2b7
(XEN) <RMRR> iommu_map 0x8e2b8
(XEN) <RMRR> iommu_map 0x8e2b9
(XEN) <RMRR> iommu_map 0x8e2ba
(XEN) <RMRR> iommu_map 0x8e2bb
(XEN) <RMRR> iommu_map 0x8e2bc
(XEN) <RMRR> iommu_map 0x8e2bd
(XEN) <RMRR> iommu_map 0x8e2be
(XEN) <RMRR> iommu_map 0x8e2bf
(XEN) <RMRR> iommu_map 0x8e2c0
(XEN) <RMRR> iommu_map 0x8e2c1
(XEN) <RMRR> iommu_map 0x8e2c2
(XEN) <RMRR> iommu_map 0x8e2c3
(XEN) <RMRR> iommu_map 0x8e2c4
(XEN) <RMRR> iommu_map 0x8e2c5
(XEN) <RMRR> iommu_map 0x8e2c6
(XEN) <RMRR> iommu_map 0x8e2c7
(XEN) <RMRR> iommu_map 0x8e2c8
(XEN) <RMRR> iommu_map 0x8e2c9
(XEN) <RMRR> iommu_map 0x8e2ca
(XEN) <RMRR> iommu_map 0x8e2cb
(XEN) <RMRR> iommu_map 0x8e2cc
(XEN) <RMRR> iommu_map 0x8e2cd
(XEN) <RMRR> iommu_map 0x8e2ce
(XEN) <RMRR> iommu_map 0x8e2cf
(XEN) <RMRR> iommu_map 0x8e2d0
(XEN) <RMRR> iommu_map 0x8e2d1
(XEN) <RMRR> iommu_map 0x8e2d2
(XEN) <RMRR> iommu_map 0x8e2d3
(XEN) <RMRR> iommu_map 0x8e2d4
(XEN) <RMRR> iommu_map 0x8e2d5
(XEN) <RMRR> iommu_map 0x8e2d6
(XEN) <RMRR> iommu_map 0x8e2d7
(XEN) <RMRR> iommu_map 0x8e2d8
(XEN) <RMRR> iommu_map 0x8e2d9
(XEN) <RMRR> iommu_map 0x8e2da
(XEN) <RMRR> iommu_map 0x8e2db
(XEN) <RMRR> iommu_map 0x8e2dc
(XEN) <RMRR> iommu_map 0x8e2dd
(XEN) <RMRR> iommu_map 0x8e2de
(XEN) <RMRR> iommu_map 0x8e2df
(XEN) <RMRR> iommu_map 0x8e2e0
(XEN) <RMRR> iommu_map 0x8e2e1
(XEN) <RMRR> iommu_map 0x8e2e2
(XEN) <RMRR> iommu_map 0x8e2e3
(XEN) <RMRR> iommu_map 0x8e2e4
(XEN) <RMRR> iommu_map 0x8e2e5
(XEN) <RMRR> iommu_map 0x8e2e6
(XEN) <RMRR> iommu_map 0x8e2e7
(XEN) <RMRR> iommu_map 0x8e2e8
(XEN) <RMRR> iommu_map 0x8e2e9
(XEN) <RMRR> iommu_map 0x8e2ea
(XEN) <RMRR> iommu_map 0x8e2eb
(XEN) <RMRR> iommu_map 0x8e2ec
(XEN) <RMRR> iommu_map 0x8e2ed
(XEN) <RMRR> iommu_map 0x8e2ee
(XEN) <RMRR> iommu_map 0x8e2ef
(XEN) <RMRR> iommu_map 0x8e2f0
(XEN) <RMRR> iommu_map 0x8e2f1
(XEN) <RMRR> iommu_map 0x8e2f2
(XEN) <RMRR> iommu_map 0x8e2f3
(XEN) <RMRR> iommu_map 0x8e2f4
(XEN) <RMRR> iommu_map 0x8e2f5
(XEN) <RMRR> iommu_map 0x8e2f6
(XEN) <RMRR> iommu_map 0x8e2f7
(XEN) <RMRR> iommu_map 0x8e2f8
(XEN) <RMRR> iommu_map 0x8e2f9
(XEN) <RMRR> iommu_map 0x8e2fa
(XEN) <RMRR> iommu_map 0x8e2fb
(XEN) <RMRR> iommu_map 0x8e2fc
(XEN) <RMRR> iommu_map 0x8e2fd
(XEN) <RMRR> iommu_map 0x8e2fe
(XEN) <RMRR> iommu_map 0x8e2ff
(XEN) <RMRR> iommu_map 0x8e300
(XEN) <RMRR> iommu_map 0x8e301
(XEN) <RMRR> iommu_map 0x8e302
(XEN) <RMRR> iommu_map 0x8e303
(XEN) <RMRR> iommu_map 0x8e304
(XEN) <RMRR> iommu_map 0x8e305
(XEN) <RMRR> iommu_map 0x8e306
(XEN) <RMRR> iommu_map 0x8e307
(XEN) <RMRR> iommu_map 0x8e308
(XEN) <RMRR> iommu_map 0x8e309
(XEN) <RMRR> iommu_map 0x8e30a
(XEN) <RMRR> iommu_map 0x8e30b
(XEN) <RMRR> iommu_map 0x8e30c
(XEN) <RMRR> iommu_map 0x8e30d
(XEN) <RMRR> iommu_map 0x8e30e
(XEN) <RMRR> iommu_map 0x8e30f
(XEN) <RMRR> iommu_map 0x8e310
(XEN) <RMRR> iommu_map 0x8e311
(XEN) <RMRR> iommu_map 0x8e312
(XEN) <RMRR> iommu_map 0x8e313
(XEN) <RMRR> iommu_map 0x8e314
(XEN) <RMRR> iommu_map 0x8e315
(XEN) <RMRR> iommu_map 0x8e316
(XEN) <RMRR> iommu_map 0x8e317
(XEN) <RMRR> iommu_map 0x8e318
(XEN) <RMRR> iommu_map 0x8e319
(XEN) <RMRR> iommu_map 0x8e31a
(XEN) <RMRR> iommu_map 0x8e31b
(XEN) <RMRR> iommu_map 0x8e31c
(XEN) <RMRR> iommu_map 0x8e31d
(XEN) <RMRR> iommu_map 0x8e31e
(XEN) <RMRR> iommu_map 0x8e31f
(XEN) <RMRR> iommu_map 0x8e320
(XEN) <RMRR> iommu_map 0x8e321
(XEN) <RMRR> iommu_map 0x8e322
(XEN) <RMRR> iommu_map 0x8e323
(XEN) <RMRR> iommu_map 0x8e324
(XEN) <RMRR> iommu_map 0x8e325
(XEN) <RMRR> iommu_map 0x8e326
(XEN) <RMRR> iommu_map 0x8e327
(XEN) <RMRR> iommu_map 0x8e328
(XEN) <RMRR> iommu_map 0x8e329
(XEN) <RMRR> iommu_map 0x8e32a
(XEN) <RMRR> iommu_map 0x8e32b
(XEN) <RMRR> iommu_map 0x8e32c
(XEN) <RMRR> iommu_map 0x8e32d
(XEN) <RMRR> iommu_map 0x8e32e
(XEN) <RMRR> iommu_map 0x8e32f
(XEN) <RMRR> iommu_map 0x8e330
(XEN) <RMRR> iommu_map 0x8e331
(XEN) <RMRR> iommu_map 0x8e332
(XEN) <RMRR> iommu_map 0x8e333
(XEN) <RMRR> iommu_map 0x8e334
(XEN) <RMRR> iommu_map 0x8e335
(XEN) <RMRR> iommu_map 0x8e336
(XEN) <RMRR> iommu_map 0x8e337
(XEN) <RMRR> iommu_map 0x8e338
(XEN) <RMRR> iommu_map 0x8e339
(XEN) <RMRR> iommu_map 0x8e33a
(XEN) <RMRR> iommu_map 0x8e33b
(XEN) <RMRR> iommu_map 0x8e33c
(XEN) <RMRR> iommu_map 0x8e33d
(XEN) <RMRR> iommu_map 0x8e33e
(XEN) <RMRR> iommu_map 0x8e33f
(XEN) <RMRR> iommu_map 0x8e340
(XEN) <RMRR> iommu_map 0x8e341
(XEN) <RMRR> iommu_map 0x8e342
(XEN) <RMRR> iommu_map 0x8e343
(XEN) <RMRR> iommu_map 0x8e344
(XEN) <RMRR> iommu_map 0x8e345
(XEN) <RMRR> iommu_map 0x8e346
(XEN) <RMRR> iommu_map 0x8e347
(XEN) <RMRR> iommu_map 0x8e348
(XEN) <RMRR> iommu_map 0x8e349
(XEN) <RMRR> iommu_map 0x8e34a
(XEN) <RMRR> iommu_map 0x8e34b
(XEN) <RMRR> iommu_map 0x8e34c
(XEN) <RMRR> iommu_map 0x8e34d
(XEN) <RMRR> iommu_map 0x8e34e
(XEN) <RMRR> iommu_map 0x8e34f
(XEN) <RMRR> iommu_map 0x8e350
(XEN) <RMRR> iommu_map 0x8e351
(XEN) <RMRR> iommu_map 0x8e352
(XEN) <RMRR> iommu_map 0x8e353
(XEN) <RMRR> iommu_map 0x8e354
(XEN) <RMRR> iommu_map 0x8e355
(XEN) <RMRR> iommu_map 0x8e356
(XEN) <RMRR> iommu_map 0x8e357
(XEN) <RMRR> iommu_map 0x8e358
(XEN) <RMRR> iommu_map 0x8e359
(XEN) <RMRR> iommu_map 0x8e35a
(XEN) <RMRR> iommu_map 0x8e35b
(XEN) <RMRR> iommu_map 0x8e35c
(XEN) <RMRR> iommu_map 0x8e35d
(XEN) <RMRR> iommu_map 0x8e35e
(XEN) <RMRR> iommu_map 0x8e35f
(XEN) <RMRR> iommu_map 0x8e360
(XEN) <RMRR> iommu_map 0x8e361
(XEN) <RMRR> iommu_map 0x8e362
(XEN) <RMRR> iommu_map 0x8e363
(XEN) <RMRR> iommu_map 0x8e364
(XEN) <RMRR> iommu_map 0x8e365
(XEN) <RMRR> iommu_map 0x8e366
(XEN) <RMRR> iommu_map 0x8e367
(XEN) <RMRR> iommu_map 0x8e368
(XEN) <RMRR> iommu_map 0x8e369
(XEN) <RMRR> iommu_map 0x8e36a
(XEN) <RMRR> iommu_map 0x8e36b
(XEN) <RMRR> iommu_map 0x8e36c
(XEN) <RMRR> iommu_map 0x8e36d
(XEN) <RMRR> iommu_map 0x8e36e
(XEN) <RMRR> iommu_map 0x8e36f
(XEN) <RMRR> iommu_map 0x8e370
(XEN) <RMRR> iommu_map 0x8e371
(XEN) <RMRR> iommu_map 0x8e372
(XEN) <RMRR> iommu_map 0x8e373
(XEN) <RMRR> iommu_map 0x8e374
(XEN) <RMRR> iommu_map 0x8e375
(XEN) <RMRR> iommu_map 0x8e376
(XEN) <RMRR> iommu_map 0x8e377
(XEN) <RMRR> iommu_map 0x8e378
(XEN) <RMRR> iommu_map 0x8e379
(XEN) <RMRR> iommu_map 0x8e37a
(XEN) <RMRR> iommu_map 0x8e37b
(XEN) <RMRR> iommu_map 0x8e37c
(XEN) <RMRR> iommu_map 0x8e37d
(XEN) <RMRR> iommu_map 0x8e37e
(XEN) <RMRR> iommu_map 0x8e37f
(XEN) <RMRR> iommu_map 0x8e380
(XEN) <RMRR> iommu_map 0x8e381
(XEN) <RMRR> iommu_map 0x8e382
(XEN) <RMRR> iommu_map 0x8e383
(XEN) <RMRR> iommu_map 0x8e384
(XEN) <RMRR> iommu_map 0x8e385
(XEN) <RMRR> iommu_map 0x8e386
(XEN) <RMRR> iommu_map 0x8e387
(XEN) <RMRR> iommu_map 0x8e388
(XEN) <RMRR> iommu_map 0x8e389
(XEN) <RMRR> iommu_map 0x8e38a
(XEN) <RMRR> iommu_map 0x8e38b
(XEN) <RMRR> iommu_map 0x8e38c
(XEN) <RMRR> iommu_map 0x8e38d
(XEN) <RMRR> iommu_map 0x8e38e
(XEN) <RMRR> iommu_map 0x8e38f
(XEN) <RMRR> iommu_map 0x8e390
(XEN) <RMRR> iommu_map 0x8e391
(XEN) <RMRR> iommu_map 0x8e392
(XEN) <RMRR> iommu_map 0x8e393
(XEN) <RMRR> iommu_map 0x8e394
(XEN) <RMRR> iommu_map 0x8e395
(XEN) <RMRR> iommu_map 0x8e396
(XEN) <RMRR> iommu_map 0x8e397
(XEN) <RMRR> iommu_map 0x8e398
(XEN) <RMRR> iommu_map 0x8e399
(XEN) <RMRR> iommu_map 0x8e39a
(XEN) <RMRR> iommu_map 0x8e39b
(XEN) <RMRR> iommu_map 0x8e39c
(XEN) <RMRR> iommu_map 0x8e39d
(XEN) <RMRR> iommu_map 0x8e39e
(XEN) <RMRR> iommu_map 0x8e39f
(XEN) <RMRR> iommu_map 0x8e3a0
(XEN) <RMRR> iommu_map 0x8e3a1
(XEN) <RMRR> iommu_map 0x8e3a2
(XEN) <RMRR> iommu_map 0x8e3a3
(XEN) <RMRR> iommu_map 0x8e3a4
(XEN) <RMRR> iommu_map 0x8e3a5
(XEN) <RMRR> iommu_map 0x8e3a6
(XEN) <RMRR> iommu_map 0x8e3a7
(XEN) <RMRR> iommu_map 0x8e3a8
(XEN) <RMRR> iommu_map 0x8e3a9
(XEN) <RMRR> iommu_map 0x8e3aa
(XEN) <RMRR> iommu_map 0x8e3ab
(XEN) <RMRR> iommu_map 0x8e3ac
(XEN) <RMRR> iommu_map 0x8e3ad
(XEN) <RMRR> iommu_map 0x8e3ae
(XEN) <RMRR> iommu_map 0x8e3af
(XEN) <RMRR> iommu_map 0x8e3b0
(XEN) <RMRR> iommu_map 0x8e3b1
(XEN) <RMRR> iommu_map 0x8e3b2
(XEN) <RMRR> iommu_map 0x8e3b3
(XEN) <RMRR> iommu_map 0x8e3b4
(XEN) <RMRR> iommu_map 0x8e3b5
(XEN) <RMRR> iommu_map 0x8e3b6
(XEN) <RMRR> iommu_map 0x8e3b7
(XEN) <RMRR> iommu_map 0x8e3b8
(XEN) <RMRR> iommu_map 0x8e3b9
(XEN) <RMRR> iommu_map 0x8e3ba
(XEN) <RMRR> iommu_map 0x8e3bb
(XEN) <RMRR> iommu_map 0x8e3bc
(XEN) <RMRR> iommu_map 0x8e3bd
(XEN) <RMRR> iommu_map 0x8e3be
(XEN) <RMRR> iommu_map 0x8e3bf
(XEN) <RMRR> iommu_map 0x8e3c0
(XEN) <RMRR> iommu_map 0x8e3c1
(XEN) <RMRR> iommu_map 0x8e3c2
(XEN) <RMRR> iommu_map 0x8e3c3
(XEN) <RMRR> iommu_map 0x8e3c4
(XEN) <RMRR> iommu_map 0x8e3c5
(XEN) <RMRR> iommu_map 0x8e3c6
(XEN) <RMRR> iommu_map 0x8e3c7
(XEN) <RMRR> iommu_map 0x8e3c8
(XEN) <RMRR> iommu_map 0x8e3c9
(XEN) <RMRR> iommu_map 0x8e3ca
(XEN) <RMRR> iommu_map 0x8e3cb
(XEN) <RMRR> iommu_map 0x8e3cc
(XEN) <RMRR> iommu_map 0x8e3cd
(XEN) <RMRR> iommu_map 0x8e3ce
(XEN) <RMRR> iommu_map 0x8e3cf
(XEN) <RMRR> iommu_map 0x8e3d0
(XEN) <RMRR> iom(XEN) <RMRR> iommu_map 0x8e5d1
(XEN) <RMRR> iommu_map 0x8e5d2
(XEN) <RMRR> iommu_map 0x8e5d3
(XEN) <RMRR> iommu_map 0x8e5d4
(XEN) <RMRR> iommu_map 0x8e5d5
(XEN) <RMRR> iommu_map 0x8e5d6
(XEN) <RMRR> iommu_map 0x8e5d7
(XEN) <RMRR> iommu_map 0x8e5d8
(XEN) <RMRR> iommu_map 0x8e5d9
(XEN) <RMRR> iommu_map 0x8e5da
(XEN) <RMRR> iommu_map 0x8e5db
(XEN) <RMRR> iommu_map 0x8e5dc
(XEN) <RMRR> iommu_map 0x8e5dd
(XEN) <RMRR> iommu_map 0x8e5de
(XEN) <RMRR> iommu_map 0x8e5df
(XEN) <RMRR> iommu_map 0x8e5e0
(XEN) <RMRR> iommu_map 0x8e5e1
(XEN) <RMRR> iommu_map 0x8e5e2
(XEN) <RMRR> iommu_map 0x8e5e3
(XEN) <RMRR> iommu_map 0x8e5e4
(XEN) <RMRR> iommu_map 0x8e5e5
(XEN) <RMRR> iommu_map 0x8e5e6
(XEN) <RMRR> iommu_map 0x8e5e7
(XEN) <RMRR> iommu_map 0x8e5e8
(XEN) <RMRR> iommu_map 0x8e5e9
(XEN) <RMRR> iommu_map 0x8e5ea
(XEN) <RMRR> iommu_map 0x8e5eb
(XEN) <RMRR> iommu_map 0x8e5ec
(XEN) <RMRR> iommu_map 0x8e5ed
(XEN) <RMRR> iommu_map 0x8e5ee
(XEN) <RMRR> iommu_map 0x8e5ef
(XEN) <RMRR> iommu_map 0x8e5f0
(XEN) <RMRR> iommu_map 0x8e5f1
(XEN) <RMRR> iommu_map 0x8e5f2
(XEN) <RMRR> iommu_map 0x8e5f3
(XEN) <RMRR> iommu_map 0x8e5f4
(XEN) <RMRR> iommu_map 0x8e5f5
(XEN) <RMRR> iommu_map 0x8e5f6
(XEN) <RMRR> iommu_map 0x8e5f7
(XEN) <RMRR> iommu_map 0x8e5f8
(XEN) <RMRR> iommu_map 0x8e5f9
(XEN) <RMRR> iommu_map 0x8e5fa
(XEN) <RMRR> iommu_map 0x8e5fb
(XEN) <RMRR> iommu_map 0x8e5fc
(XEN) <RMRR> iommu_map 0x8e5fd
(XEN) <RMRR> iommu_map 0x8e5fe
(XEN) <RMRR> iommu_map 0x8e5ff
(XEN) <RMRR> iommu_map 0x8e600
(XEN) <RMRR> iommu_map 0x8e601
(XEN) <RMRR> iommu_map 0x8e602
(XEN) <RMRR> iommu_map 0x8e603
(XEN) <RMRR> iommu_map 0x8e604
(XEN) <RMRR> iommu_map 0x8e605
(XEN) <RMRR> iommu_map 0x8e606
(XEN) <RMRR> iommu_map 0x8e607
(XEN) <RMRR> iommu_map 0x8e608
(XEN) <RMRR> iommu_map 0x8e609
(XEN) <RMRR> iommu_map 0x8e60a
(XEN) <RMRR> iommu_map 0x8e60b
(XEN) <RMRR> iommu_map 0x8e60c
(XEN) <RMRR> iommu_map 0x8e60d
(XEN) <RMRR> iommu_map 0x8e60e
(XEN) <RMRR> iommu_map 0x8e60f
(XEN) <RMRR> iommu_map 0x8e610
(XEN) <RMRR> iommu_map 0x8e611
(XEN) <RMRR> iommu_map 0x8e612
(XEN) <RMRR> iommu_map 0x8e613
(XEN) <RMRR> iommu_map 0x8e614
(XEN) <RMRR> iommu_map 0x8e615
(XEN) <RMRR> iommu_map 0x8e616
(XEN) <RMRR> iommu_map 0x8e617
(XEN) <RMRR> iommu_map 0x8e618
(XEN) <RMRR> iommu_map 0x8e619
(XEN) <RMRR> iommu_map 0x8e61a
(XEN) <RMRR> iommu_map 0x8e61b
(XEN) <RMRR> iommu_map 0x8e61c
(XEN) <RMRR> iommu_map 0x8e61d
(XEN) <RMRR> iommu_map 0x8e61e
(XEN) <RMRR> iommu_map 0x8e61f
(XEN) <RMRR> iommu_map 0x8e620
(XEN) <RMRR> iommu_map 0x8e621
(XEN) <RMRR> iommu_map 0x8e622
(XEN) <RMRR> iommu_map 0x8e623
(XEN) <RMRR> iommu_map 0x8e624
(XEN) <RMRR> iommu_map 0x8e625
(XEN) <RMRR> iommu_map 0x8e626
(XEN) <RMRR> iommu_map 0x8e627
(XEN) <RMRR> iommu_map 0x8e628
(XEN) <RMRR> iommu_map 0x8e629
(XEN) <RMRR> iommu_map 0x8e62a
(XEN) <RMRR> iommu_map 0x8e62b
(XEN) <RMRR> iommu_map 0x8e62c
(XEN) <RMRR> iommu_map 0x8e62d
(XEN) <RMRR> iommu_map 0x8e62e
(XEN) <RMRR> iommu_map 0x8e62f
(XEN) <RMRR> iommu_map 0x8e630
(XEN) <RMRR> iommu_map 0x8e631
(XEN) <RMRR> iommu_map 0x8e632
(XEN) <RMRR> iommu_map 0x8e633
(XEN) <RMRR> iommu_map 0x8e634
(XEN) <RMRR> iommu_map 0x8e635
(XEN) <RMRR> iommu_map 0x8e636
(XEN) <RMRR> iommu_map 0x8e637
(XEN) <RMRR> iommu_map 0x8e638
(XEN) <RMRR> iommu_map 0x8e639
(XEN) <RMRR> iommu_map 0x8e63a
(XEN) <RMRR> iommu_map 0x8e63b
(XEN) <RMRR> iommu_map 0x8e63c
(XEN) <RMRR> iommu_map 0x8e63d
(XEN) <RMRR> iommu_map 0x8e63e
(XEN) <RMRR> iommu_map 0x8e63f
(XEN) <RMRR> iommu_map 0x8e640
(XEN) <RMRR> iommu_map 0x8e641
(XEN) <RMRR> iommu_map 0x8e642
(XEN) <RMRR> iommu_map 0x8e643
(XEN) <RMRR> iommu_map 0x8e644
(XEN) <RMRR> iommu_map 0x8e645
(XEN) <RMRR> iommu_map 0x8e646
(XEN) <RMRR> iommu_map 0x8e647
(XEN) <RMRR> iommu_map 0x8e648
(XEN) <RMRR> iommu_map 0x8e649
(XEN) <RMRR> iommu_map 0x8e64a
(XEN) <RMRR> iommu_map 0x8e64b
(XEN) <RMRR> iommu_map 0x8e64c
(XEN) <RMRR> iommu_map 0x8e64d
(XEN) <RMRR> iommu_map 0x8e64e
(XEN) <RMRR> iommu_map 0x8e64f
(XEN) <RMRR> iommu_map 0x8e650
(XEN) <RMRR> iommu_map 0x8e651
(XEN) <RMRR> iommu_map 0x8e652
(XEN) <RMRR> iommu_map 0x8e653
(XEN) <RMRR> iommu_map 0x8e654
(XEN) <RMRR> iommu_map 0x8e655
(XEN) <RMRR> iommu_map 0x8e656
(XEN) <RMRR> iommu_map 0x8e657
(XEN) <RMRR> iommu_map 0x8e658
(XEN) <RMRR> iommu_map 0x8e659
(XEN) <RMRR> iommu_map 0x8e65a
(XEN) <RMRR> iommu_map 0x8e65b
(XEN) <RMRR> iommu_map 0x8e65c
(XEN) <RMRR> iommu_map 0x8e65d
(XEN) <RMRR> iommu_map 0x8e65e
(XEN) <RMRR> iommu_map 0x8e65f
(XEN) <RMRR> iommu_map 0x8e660
(XEN) <RMRR> iommu_map 0x8e661
(XEN) <RMRR> iommu_map 0x8e662
(XEN) <RMRR> iommu_map 0x8e663
(XEN) <RMRR> iommu_map 0x8e664
(XEN) <RMRR> iommu_map 0x8e665
(XEN) <RMRR> iommu_map 0x8e666
(XEN) <RMRR> iommu_map 0x8e667
(XEN) <RMRR> iommu_map 0x8e668
(XEN) <RMRR> iommu_map 0x8e669
(XEN) <RMRR> iommu_map 0x8e66a
(XEN) <RMRR> iommu_map 0x8e66b
(XEN) <RMRR> iommu_map 0x8e66c
(XEN) <RMRR> iommu_map 0x8e66d
(XEN) <RMRR> iommu_map 0x8e66e
(XEN) <RMRR> iommu_map 0x8e66f
(XEN) <RMRR> iommu_map 0x8e670
(XEN) <RMRR> iommu_map 0x8e671
(XEN) <RMRR> iommu_map 0x8e672
(XEN) <RMRR> iommu_map 0x8e673
(XEN) <RMRR> iommu_map 0x8e674
(XEN) <RMRR> iommu_map 0x8e675
(XEN) <RMRR> iommu_map 0x8e676
(XEN) <RMRR> iommu_map 0x8e677
(XEN) <RMRR> iommu_map 0x8e678
(XEN) <RMRR> iommu_map 0x8e679
(XEN) <RMRR> iommu_map 0x8e67a
(XEN) <RMRR> iommu_map 0x8e67b
(XEN) <RMRR> iommu_map 0x8e67c
(XEN) <RMRR> iommu_map 0x8e67d
(XEN) <RMRR> iommu_map 0x8e67e
(XEN) <RMRR> iommu_map 0x8e67f
(XEN) <RMRR> iommu_map 0x8e680
(XEN) <RMRR> iommu_map 0x8e681
(XEN) <RMRR> iommu_map 0x8e682
(XEN) <RMRR> iommu_map 0x8e683
(XEN) <RMRR> iommu_map 0x8e684
(XEN) <RMRR> iommu_map 0x8e685
(XEN) <RMRR> iommu_map 0x8e686
(XEN) <RMRR> iommu_map 0x8e687
(XEN) <RMRR> iommu_map 0x8e688
(XEN) <RMRR> iommu_map 0x8e689
(XEN) <RMRR> iommu_map 0x8e68a
(XEN) <RMRR> iommu_map 0x8e68b
(XEN) <RMRR> iommu_map 0x8e68c
(XEN) <RMRR> iommu_map 0x8e68d
(XEN) <RMRR> iommu_map 0x8e68e
(XEN) <RMRR> iommu_map 0x8e68f
(XEN) <RMRR> iommu_map 0x8e690
(XEN) <RMRR> iommu_map 0x8e691
(XEN) <RMRR> iommu_map 0x8e692
(XEN) <RMRR> iommu_map 0x8e693
(XEN) <RMRR> iommu_map 0x8e694
(XEN) <RMRR> iommu_map 0x8e695
(XEN) <RMRR> iommu_map 0x8e696
(XEN) <RMRR> iommu_map 0x8e697
(XEN) <RMRR> iommu_map 0x8e698
(XEN) <RMRR> iommu_map 0x8e699
(XEN) <RMRR> iommu_map 0x8e69a
(XEN) <RMRR> iommu_map 0x8e69b
(XEN) <RMRR> iommu_map 0x8e69c
(XEN) <RMRR> iommu_map 0x8e69d
(XEN) <RMRR> iommu_map 0x8e69e
(XEN) <RMRR> iommu_map 0x8e69f
(XEN) <RMRR> iommu_map 0x8e6a0
(XEN) <RMRR> iommu_map 0x8e6a1
(XEN) <RMRR> iommu_map 0x8e6a2
(XEN) <RMRR> iommu_map 0x8e6a3
(XEN) <RMRR> iommu_map 0x8e6a4
(XEN) <RMRR> iommu_map 0x8e6a5
(XEN) <RMRR> iommu_map 0x8e6a6
(XEN) <RMRR> iommu_map 0x8e6a7
(XEN) <RMRR> iommu_map 0x8e6a8
(XEN) <RMRR> iommu_map 0x8e6a9
(XEN) <RMRR> iommu_map 0x8e6aa
(XEN) <RMRR> iommu_map 0x8e6ab
(XEN) <RMRR> iommu_map 0x8e6ac
(XEN) <RMRR> iommu_map 0x8e6ad
(XEN) <RMRR> iommu_map 0x8e6ae
(XEN) <RMRR> iommu_map 0x8e6af
(XEN) <RMRR> iommu_map 0x8e6b0
(XEN) <RMRR> iommu_map 0x8e6b1
(XEN) <RMRR> iommu_map 0x8e6b2
(XEN) <RMRR> iommu_map 0x8e6b3
(XEN) <RMRR> iommu_map 0x8e6b4
(XEN) <RMRR> iommu_map 0x8e6b5
(XEN) <RMRR> iommu_map 0x8e6b6
(XEN) <RMRR> iommu_map 0x8e6b7
(XEN) <RMRR> iommu_map 0x8e6b8
(XEN) <RMRR> iommu_map 0x8e6b9
(XEN) <RMRR> iommu_map 0x8e6ba
(XEN) <RMRR> iommu_map 0x8e6bb
(XEN) <RMRR> iommu_map 0x8e6bc
(XEN) <RMRR> iommu_map 0x8e6bd
(XEN) <RMRR> iommu_map 0x8e6be
(XEN) <RMRR> iommu_map 0x8e6bf
(XEN) <RMRR> iommu_map 0x8e6c0
(XEN) <RMRR> iommu_map 0x8e6c1
(XEN) <RMRR> iommu_map 0x8e6c2
(XEN) <RMRR> iommu_map 0x8e6c3
(XEN) <RMRR> iommu_map 0x8e6c4
(XEN) <RMRR> iommu_map 0x8e6c5
(XEN) <RMRR> iommu_map 0x8e6c6
(XEN) <RMRR> iommu_map 0x8e6c7
(XEN) <RMRR> iommu_map 0x8e6c8
(XEN) <RMRR> iommu_map 0x8e6c9
(XEN) <RMRR> iommu_map 0x8e6ca
(XEN) <RMRR> iommu_map 0x8e6cb
(XEN) <RMRR> iommu_map 0x8e6cc
(XEN) <RMRR> iommu_map 0x8e6cd
(XEN) <RMRR> iommu_map 0x8e6ce
(XEN) <RMRR> iommu_map 0x8e6cf
(XEN) <RMRR> iommu_map 0x8e6d0
(XEN) <RMRR> iommu_map 0x8e6d1
(XEN) <RMRR> iommu_map 0x8e6d2
(XEN) <RMRR> iommu_map 0x8e6d3
(XEN) <RMRR> iommu_map 0x8e6d4
(XEN) <RMRR> iommu_map 0x8e6d5
(XEN) <RMRR> iommu_map 0x8e6d6
(XEN) <RMRR> iommu_map 0x8e6d7
(XEN) <RMRR> iommu_map 0x8e6d8
(XEN) <RMRR> iommu_map 0x8e6d9
(XEN) <RMRR> iommu_map 0x8e6da
(XEN) <RMRR> iommu_map 0x8e6db
(XEN) <RMRR> iommu_map 0x8e6dc
(XEN) <RMRR> iommu_map 0x8e6dd
(XEN) <RMRR> iommu_map 0x8e6de
(XEN) <RMRR> iommu_map 0x8e6df
(XEN) <RMRR> iommu_map 0x8e6e0
(XEN) <RMRR> iommu_map 0x8e6e1
(XEN) <RMRR> iommu_map 0x8e6e2
(XEN) <RMRR> iommu_map 0x8e6e3
(XEN) <RMRR> iommu_map 0x8e6e4
(XEN) <RMRR> iommu_map 0x8e6e5
(XEN) <RMRR> iommu_map 0x8e6e6
(XEN) <RMRR> iommu_map 0x8e6e7
(XEN) <RMRR> iommu_map 0x8e6e8
(XEN) <RMRR> iommu_map 0x8e6e9
(XEN) <RMRR> iommu_map 0x8e6ea
(XEN) <RMRR> iommu_map 0x8e6eb
(XEN) <RMRR> iommu_map 0x8e6ec
(XEN) <RMRR> iommu_map 0x8e6ed
(XEN) <RMRR> iommu_map 0x8e6ee
(XEN) <RMRR> iommu_map 0x8e6ef
(XEN) <RMRR> iommu_map 0x8e6f0
(XEN) <RMRR> iommu_map 0x8e6f1
(XEN) <RMRR> iommu_map 0x8e6f2
(XEN) <RMRR> iommu_map 0x8e6f3
(XEN) <RMRR> iommu_map 0x8e6f4
(XEN) <RMRR> iommu_map 0x8e6f5
(XEN) <RMRR> iommu_map 0x8e6f6
(XEN) <RMRR> iommu_map 0x8e6f7
(XEN) <RMRR> iommu_map 0x8e6f8
(XEN) <RMRR> iommu_map 0x8e6f9
(XEN) <RMRR> iommu_map 0x8e6fa
(XEN) <RMRR> iommu_map 0x8e6fb
(XEN) <RMRR> iommu_map 0x8e6fc
(XEN) <RMRR> iommu_map 0x8e6fd
(XEN) <RMRR> iommu_map 0x8e6fe
(XEN) <RMRR> iommu_map 0x8e6ff
(XEN) <RMRR> iommu_map 0x8e700
(XEN) <RMRR> iommu_map 0x8e701
(XEN) <RMRR> iommu_map 0x8e702
(XEN) <RMRR> iommu_map 0x8e703
(XEN) <RMRR> iommu_map 0x8e704
(XEN) <RMRR> iommu_map 0x8e705
(XEN) <RMRR> iommu_map 0x8e706
(XEN) <RMRR> iommu_map 0x8e707
(XEN) <RMRR> iommu_map 0x8e708
(XEN) <RMRR> iommu_map 0x8e709
(XEN) <RMRR> iommu_map 0x8e70a
(XEN) <RMRR> iommu_map 0x8e70b
(XEN) <RMRR> iommu_map 0x8e70c
(XEN) <RMRR> iommu_map 0x8e70d
(XEN) <RMRR> iommu_map 0x8e70e
(XEN) <RMRR> iommu_map 0x8e70f
(XEN) <RMRR> iommu_map 0x8e710
(XEN) <RMRR> iommu_map 0x8e711
(XEN) <RMRR> iommu_map 0x8e712
(XEN) <RMRR> iommu_map 0x8e713
(XEN) <RMRR> iommu_map 0x8e714
(XEN) <RMRR> iommu_map 0x8e715
(XEN) <RMRR> iommu_map 0x8e716
(XEN) <RMRR> iommu_map 0x8e717
(XEN) <RMRR> iommu_map 0x8e718
(XEN) <RMRR> iommu_map 0x8e719
(XEN) <RMRR> iommu_map 0x8e71a
(XEN) <RMRR> iommu_map 0x8e71b
(XEN) <RMRR> iommu_map 0x8e71c
(XEN) <RMRR> iommu_map 0x8e71d
(XEN) <RMRR> iommu_map 0x8e71e
(XEN) <RMRR> iommu_map 0x8e71f
(XEN) <RMRR> iommu_map 0x8e720
(XEN) <RMRR> iommu_map 0x8e721
(XEN) <RMRR> iommu_map 0x8e722
(XEN) <RMRR> iommu_map 0x8e723
(XEN) <RMRR> iommu_map 0x8e724
(XEN) <RMRR> iommu_map 0x8e725
(XEN) <RMRR> iommu_map 0x8e726
(XEN) <RMRR> iommu_map 0x8e727
(XEN) <RMRR> iommu_map 0x8e728
(XEN) <RMRR> iommu_map 0x8e729
(XEN) <RMRR> iommu_map 0x8e72a
(XEN) <RMRR> iommu_map 0x8e72b
(XEN) <RMRR> iommu_map 0x8e72c
(XEN) <RMRR> iommu_map 0x8e72d
(XEN) <RMRR> iommu_map 0x8e72e
(XEN) <RMRR> iommu_map 0x8e72f
(XEN) <RMRR> iommu_map 0x8e730
(XEN) <RMRR> iommu_map 0x8e731
(XEN) <RMRR> iommu_map 0x8e732
(XEN) <RMRR> iommu_map 0x8e733
(XEN) <RMRR> iommu_map 0x8e734
(XEN) <RMRR> iommu_map 0x8e735
(XEN) <RMRR> iommu_map 0x8e736
(XEN) <RMRR> iommu_map 0x8e737
(XEN) <RMRR> iommu_map 0x8e738
(XEN) <RMRR> iommu_map 0x8e739
(XEN) <RMRR> iommu_map 0x8e73a
(XEN) <RMRR> iommu_map 0x8e73b
(XEN) <RMRR> iommu_map 0x8e73c
(XEN) <RMRR> iommu_map 0x8e73d
(XEN) <RMRR> iommu_map 0x8e73e
(XEN) <RMRR> iommu_map 0x8e73f
(XEN) <RMRR> iommu_map 0x8e740
(XEN) <RMRR> iommu_map 0x8e741
(XEN) <RMRR> iommu_map 0x8e742
(XEN) <RMRR> iommu_map 0x8e743
(XEN) <RMRR> iommu_map 0x8e744
(XEN) <RMRR> iommu_map 0x8e745
(XEN) <RMRR> iommu_map 0x8e746
(XEN) <RMRR> iommu_map 0x8e747
(XEN) <RMRR> iommu_map 0x8e748
(XEN) <RMRR> iommu_map 0x8e749
(XEN) <RMRR> iommu_map 0x8e74a
(XEN) <RMRR> iommu_map 0x8e74b
(XEN) <RMRR> iommu_map 0x8e74c
(XEN) <RMRR> iommu_map 0x8e74d
(XEN) <RMRR> iommu_map 0x8e74e
(XEN) <RMRR> iommu_map 0x8e74f
(XEN) <RMRR> iommu_map 0x8e750
(XEN) <RMRR> iommu_map 0x8e751
(XEN) <RMRR> iommu_map 0x8e752
(XEN) <RMRR> iommu_map 0x8e753
(XEN) <RMRR> iommu_map 0x8e754
(XEN) <RMRR> iommu_map 0x8e755
(XEN) <RMRR> iommu_map 0x8e756
(XEN) <RMRR> iommu_map 0x8e757
(XEN) <RMRR> iommu_map 0x8e758
(XEN) <RMRR> iommu_map 0x8e759
(XEN) <RMRR> iommu_map 0x8e75a
(XEN) <RMRR> iommu_map 0x8e75b
(XEN) <RMRR> iommu_map 0x8e75c
(XEN) <RMRR> iommu_map 0x8e75d
(XEN) <RMRR> iommu_map 0x8e75e
(XEN) <RMRR> iommu_map 0x8e75f
(XEN) <RMRR> iommu_map 0x8e760
(XEN) <RMRR> iommu_map 0x8e761
(XEN) <RMRR> iommu_map 0x8e762
(XEN) <RMRR> iommu_map 0x8e763
(XEN) <RMRR> iommu_map 0x8e764
(XEN) <RMRR> iommu_map 0x8e765
(XEN) <RMRR> iommu_map 0x8e766
(XEN) <RMRR> iommu_map 0x8e767
(XEN) <RMRR> iommu_map 0x8e768
(XEN) <RMRR> iommu_map 0x8e769
(XEN) <RMRR> iommu_map 0x8e76a
(XEN) <RMRR> iommu_map 0x8e76b
(XEN) <RMRR> iommu_map 0x8e76c
(XEN) <RMRR> iommu_map 0x8e76d
(XEN) <RMRR> iommu_map 0x8e76e
(XEN) <RMRR> iommu_map 0x8e76f
(XEN) <RMRR> iommu_map 0x8e770
(XEN) <RMRR> iommu_map 0x8e771
(XEN) <RMRR> iommu_map 0x8e772
(XEN) <RMRR> iommu_map 0x8e773
(XEN) <RMRR> iommu_map 0x8e774
(XEN) <RMRR> iommu_map 0x8e775
(XEN) <RMRR> iommu_map 0x8e776
(XEN) <RMRR> iommu_map 0x8e777
(XEN) <RMRR> iommu_map 0x8e778
(XEN) <RMRR> iommu_map 0x8e779
(XEN) <RMRR> iommu_map 0x8e77a
(XEN) <RMRR> iommu_map 0x8e77b
(XEN) <RMRR> iommu_map 0x8e77c
(XEN) <RMRR> iommu_map 0x8e77d
(XEN) <RMRR> iommu_map 0x8e77e
(XEN) <RMRR> iommu_map 0x8e77f
(XEN) <RMRR> iommu_map 0x8e780
(XEN) <RMRR> iommu_map 0x8e781
(XEN) <RMRR> iommu_map 0x8e782
(XEN) <RMRR> iommu_map 0x8e783
(XEN) <RMRR> iommu_map 0x8e784
(XEN) <RMRR> iommu_map 0x8e785
(XEN) <RMRR> iommu_map 0x8e786
(XEN) <RMRR> iommu_map 0x8e787
(XEN) <RMRR> iommu_map 0x8e788
(XEN) <RMRR> iommu_map 0x8e789
(XEN) <RMRR> iommu_map 0x8e78a
(XEN) <RMRR> iommu_map 0x8e78b
(XEN) <RMRR> iommu_map 0x8e78c
(XEN) <RMRR> iommu_map 0x8e78d
(XEN) <RMRR> iommu_map 0x8e78e
(XEN) <RMRR> iommu_map 0x8e78f
(XEN) <RMRR> iommu_map 0x8e790
(XEN) <RMRR> iommu_map 0x8e791
(XEN) <RMRR> iommu_map 0x8e792
(XEN) <RMRR> iommu_map 0x8e793
(XEN) <RMRR> iommu_map 0x8e794
(XEN) <RMRR> iommu_map 0x8e795
(XEN) <RMRR> iommu_map 0x8e796
(XEN) <RMRR> iommu_map 0x8e797
(XEN) <RMRR> iommu_map 0x8e798
(XEN) <RMRR> iommu_map 0x8e799
(XEN) <RMRR> iommu_map 0x8e79a
(XEN) <RMRR> iommu_map 0x8e79b
(XEN) <RMRR> iommu_map 0x8e79c
(XEN) <RMRR> iommu_map 0x8e79d
(XEN) <RMRR> iommu_map 0x8e79e
(XEN) <RMRR> iommu_map 0x8e79f
(XEN) <RMRR> iommu_map 0x8e7a0
(XEN) <RMRR> iommu_map 0x8e7a1
(XEN) <RMRR> iommu_map 0x8e7a2
(XEN) <RMRR> iommu_map 0x8e7a3
(XEN) <RMRR> iommu_map 0x8e7a4
(XEN) <RMRR> iommu_map 0x8e7a5
(XEN) <RMRR> iommu_map 0x8e7a6
(XEN) <RMRR> iommu_map 0x8e7a7
(XEN) <RMRR> iommu_map 0x8e7a8
(XEN) <RMRR> iommu_map 0x8e7a9
(XEN) <RMRR> iommu_map 0x8e7aa
(XEN) <RMRR> iommu_map 0x8e7ab
(XEN) <RMRR> iommu_map 0x8e7ac
(XEN) <RMRR> iommu_map 0x8e7ad
(XEN) <RMRR> iommu_map 0x8e7ae
(XEN) <RMRR> iommu_map 0x8e7af
(XEN) <RMRR> iommu_map 0x8e7b0
(XEN) <RMRR> iommu_map 0x8e7b1
(XEN) <RMRR> iommu_map 0x8e7b2
(XEN) <RMRR> iommu_map 0x8e7b3
(XEN) <RMRR> iommu_map 0x8e7b4
(XEN) <RMRR> iommu_map 0x8e7b5
(XEN) <RMRR> iommu_map 0x8e7b6
(XEN) <RMRR> iommu_map 0x8e7b7
(XEN) <RMRR> iommu_map 0x8e7b8
(XEN) <RMRR> iommu_map 0x8e7b9
(XEN) <RMRR> iommu_map 0x8e7ba
(XEN) <RMRR> iommu_map 0x8e7bb
(XEN) <RMRR> iommu_map 0x8e7bc
(XEN) <RMRR> iommu_map 0x8e7bd
(XEN) <RMRR> iommu_map 0x8e7be
(XEN) <RMRR> iommu_map 0x8e7bf
(XEN) <RMRR> iommu_map 0x8e7c0
(XEN) <RMRR> iommu_map 0x8e7c1
(XEN) <RMRR> iommu_map 0x8e7c2
(XEN) <RMRR> iommu_map 0x8e7c3
(XEN) <RMRR> iommu_map 0x8e7c4
(XEN) <RMRR> iommu_map 0x8e7c5
(XEN) <RMRR> iommu_map 0x8e7c6
(XEN) <RMRR> iommu_map 0x8e7c7
(XEN) <RMRR> iommu_map 0x8e7c8
(XEN) <RMRR> iommu_map 0x8e7c9
(XEN) <RMRR> iommu_map 0x8e7ca
(XEN) <RMRR> iommu_map 0x8e7cb
(XEN) <RMRR> iommu_map 0x8e7cc
(XEN) <RMRR> iommu_map 0x8e7cd
(XEN) <RMRR> iommu_map 0x8e7ce
(XEN) <RMRR> iommu_map 0x8e7cf
(XEN) <RMRR> iom(XEN) <RMRR> iommu_map 0x8e9d0
(XEN) <RMRR> iommu_map 0x8e9d1
(XEN) <RMRR> iommu_map 0x8e9d2
(XEN) <RMRR> iommu_map 0x8e9d3
(XEN) <RMRR> iommu_map 0x8e9d4
(XEN) <RMRR> iommu_map 0x8e9d5
(XEN) <RMRR> iommu_map 0x8e9d6
(XEN) <RMRR> iommu_map 0x8e9d7
(XEN) <RMRR> iommu_map 0x8e9d8
(XEN) <RMRR> iommu_map 0x8e9d9
(XEN) <RMRR> iommu_map 0x8e9da
(XEN) <RMRR> iommu_map 0x8e9db
(XEN) <RMRR> iommu_map 0x8e9dc
(XEN) <RMRR> iommu_map 0x8e9dd
(XEN) <RMRR> iommu_map 0x8e9de
(XEN) <RMRR> iommu_map 0x8e9df
(XEN) <RMRR> iommu_map 0x8e9e0
(XEN) <RMRR> iommu_map 0x8e9e1
(XEN) <RMRR> iommu_map 0x8e9e2
(XEN) <RMRR> iommu_map 0x8e9e3
(XEN) <RMRR> iommu_map 0x8e9e4
(XEN) <RMRR> iommu_map 0x8e9e5
(XEN) <RMRR> iommu_map 0x8e9e6
(XEN) <RMRR> iommu_map 0x8e9e7
(XEN) <RMRR> iommu_map 0x8e9e8
(XEN) <RMRR> iommu_map 0x8e9e9
(XEN) <RMRR> iommu_map 0x8e9ea
(XEN) <RMRR> iommu_map 0x8e9eb
(XEN) <RMRR> iommu_map 0x8e9ec
(XEN) <RMRR> iommu_map 0x8e9ed
(XEN) <RMRR> iommu_map 0x8e9ee
(XEN) <RMRR> iommu_map 0x8e9ef
(XEN) <RMRR> iommu_map 0x8e9f0
(XEN) <RMRR> iommu_map 0x8e9f1
(XEN) <RMRR> iommu_map 0x8e9f2
(XEN) <RMRR> iommu_map 0x8e9f3
(XEN) <RMRR> iommu_map 0x8e9f4
(XEN) <RMRR> iommu_map 0x8e9f5
(XEN) <RMRR> iommu_map 0x8e9f6
(XEN) <RMRR> iommu_map 0x8e9f7
(XEN) <RMRR> iommu_map 0x8e9f8
(XEN) <RMRR> iommu_map 0x8e9f9
(XEN) <RMRR> iommu_map 0x8e9fa
(XEN) <RMRR> iommu_map 0x8e9fb
(XEN) <RMRR> iommu_map 0x8e9fc
(XEN) <RMRR> iommu_map 0x8e9fd
(XEN) <RMRR> iommu_map 0x8e9fe
(XEN) <RMRR> iommu_map 0x8e9ff
(XEN) <RMRR> iommu_map 0x8ea00
(XEN) <RMRR> iommu_map 0x8ea01
(XEN) <RMRR> iommu_map 0x8ea02
(XEN) <RMRR> iommu_map 0x8ea03
(XEN) <RMRR> iommu_map 0x8ea04
(XEN) <RMRR> iommu_map 0x8ea05
(XEN) <RMRR> iommu_map 0x8ea06
(XEN) <RMRR> iommu_map 0x8ea07
(XEN) <RMRR> iommu_map 0x8ea08
(XEN) <RMRR> iommu_map 0x8ea09
(XEN) <RMRR> iommu_map 0x8ea0a
(XEN) <RMRR> iommu_map 0x8ea0b
(XEN) <RMRR> iommu_map 0x8ea0c
(XEN) <RMRR> iommu_map 0x8ea0d
(XEN) <RMRR> iommu_map 0x8ea0e
(XEN) <RMRR> iommu_map 0x8ea0f
(XEN) <RMRR> iommu_map 0x8ea10
(XEN) <RMRR> iommu_map 0x8ea11
(XEN) <RMRR> iommu_map 0x8ea12
(XEN) <RMRR> iommu_map 0x8ea13
(XEN) <RMRR> iommu_map 0x8ea14
(XEN) <RMRR> iommu_map 0x8ea15
(XEN) <RMRR> iommu_map 0x8ea16
(XEN) <RMRR> iommu_map 0x8ea17
(XEN) <RMRR> iommu_map 0x8ea18
(XEN) <RMRR> iommu_map 0x8ea19
(XEN) <RMRR> iommu_map 0x8ea1a
(XEN) <RMRR> iommu_map 0x8ea1b
(XEN) <RMRR> iommu_map 0x8ea1c
(XEN) <RMRR> iommu_map 0x8ea1d
(XEN) <RMRR> iommu_map 0x8ea1e
(XEN) <RMRR> iommu_map 0x8ea1f
(XEN) <RMRR> iommu_map 0x8ea20
(XEN) <RMRR> iommu_map 0x8ea21
(XEN) <RMRR> iommu_map 0x8ea22
(XEN) <RMRR> iommu_map 0x8ea23
(XEN) <RMRR> iommu_map 0x8ea24
(XEN) <RMRR> iommu_map 0x8ea25
(XEN) <RMRR> iommu_map 0x8ea26
(XEN) <RMRR> iommu_map 0x8ea27
(XEN) <RMRR> iommu_map 0x8ea28
(XEN) <RMRR> iommu_map 0x8ea29
(XEN) <RMRR> iommu_map 0x8ea2a
(XEN) <RMRR> iommu_map 0x8ea2b
(XEN) <RMRR> iommu_map 0x8ea2c
(XEN) <RMRR> iommu_map 0x8ea2d
(XEN) <RMRR> iommu_map 0x8ea2e
(XEN) <RMRR> iommu_map 0x8ea2f
(XEN) <RMRR> iommu_map 0x8ea30
(XEN) <RMRR> iommu_map 0x8ea31
(XEN) <RMRR> iommu_map 0x8ea32
(XEN) <RMRR> iommu_map 0x8ea33
(XEN) <RMRR> iommu_map 0x8ea34
(XEN) <RMRR> iommu_map 0x8ea35
(XEN) <RMRR> iommu_map 0x8ea36
(XEN) <RMRR> iommu_map 0x8ea37
(XEN) <RMRR> iommu_map 0x8ea38
(XEN) <RMRR> iommu_map 0x8ea39
(XEN) <RMRR> iommu_map 0x8ea3a
(XEN) <RMRR> iommu_map 0x8ea3b
(XEN) <RMRR> iommu_map 0x8ea3c
(XEN) <RMRR> iommu_map 0x8ea3d
(XEN) <RMRR> iommu_map 0x8ea3e
(XEN) <RMRR> iommu_map 0x8ea3f
(XEN) <RMRR> iommu_map 0x8ea40
(XEN) <RMRR> iommu_map 0x8ea41
(XEN) <RMRR> iommu_map 0x8ea42
(XEN) <RMRR> iommu_map 0x8ea43
(XEN) <RMRR> iommu_map 0x8ea44
(XEN) <RMRR> iommu_map 0x8ea45
(XEN) <RMRR> iommu_map 0x8ea46
(XEN) <RMRR> iommu_map 0x8ea47
(XEN) <RMRR> iommu_map 0x8ea48
(XEN) <RMRR> iommu_map 0x8ea49
(XEN) <RMRR> iommu_map 0x8ea4a
(XEN) <RMRR> iommu_map 0x8ea4b
(XEN) <RMRR> iommu_map 0x8ea4c
(XEN) <RMRR> iommu_map 0x8ea4d
(XEN) <RMRR> iommu_map 0x8ea4e
(XEN) <RMRR> iommu_map 0x8ea4f
(XEN) <RMRR> iommu_map 0x8ea50
(XEN) <RMRR> iommu_map 0x8ea51
(XEN) <RMRR> iommu_map 0x8ea52
(XEN) <RMRR> iommu_map 0x8ea53
(XEN) <RMRR> iommu_map 0x8ea54
(XEN) <RMRR> iommu_map 0x8ea55
(XEN) <RMRR> iommu_map 0x8ea56
(XEN) <RMRR> iommu_map 0x8ea57
(XEN) <RMRR> iommu_map 0x8ea58
(XEN) <RMRR> iommu_map 0x8ea59
(XEN) <RMRR> iommu_map 0x8ea5a
(XEN) <RMRR> iommu_map 0x8ea5b
(XEN) <RMRR> iommu_map 0x8ea5c
(XEN) <RMRR> iommu_map 0x8ea5d
(XEN) <RMRR> iommu_map 0x8ea5e
(XEN) <RMRR> iommu_map 0x8ea5f
(XEN) <RMRR> iommu_map 0x8ea60
(XEN) <RMRR> iommu_map 0x8ea61
(XEN) <RMRR> iommu_map 0x8ea62
(XEN) <RMRR> iommu_map 0x8ea63
(XEN) <RMRR> iommu_map 0x8ea64
(XEN) <RMRR> iommu_map 0x8ea65
(XEN) <RMRR> iommu_map 0x8ea66
(XEN) <RMRR> iommu_map 0x8ea67
(XEN) <RMRR> iommu_map 0x8ea68
(XEN) <RMRR> iommu_map 0x8ea69
(XEN) <RMRR> iommu_map 0x8ea6a
(XEN) <RMRR> iommu_map 0x8ea6b
(XEN) <RMRR> iommu_map 0x8ea6c
(XEN) <RMRR> iommu_map 0x8ea6d
(XEN) <RMRR> iommu_map 0x8ea6e
(XEN) <RMRR> iommu_map 0x8ea6f
(XEN) <RMRR> iommu_map 0x8ea70
(XEN) <RMRR> iommu_map 0x8ea71
(XEN) <RMRR> iommu_map 0x8ea72
(XEN) <RMRR> iommu_map 0x8ea73
(XEN) <RMRR> iommu_map 0x8ea74
(XEN) <RMRR> iommu_map 0x8ea75
(XEN) <RMRR> iommu_map 0x8ea76
(XEN) <RMRR> iommu_map 0x8ea77
(XEN) <RMRR> iommu_map 0x8ea78
(XEN) <RMRR> iommu_map 0x8ea79
(XEN) <RMRR> iommu_map 0x8ea7a
(XEN) <RMRR> iommu_map 0x8ea7b
(XEN) <RMRR> iommu_map 0x8ea7c
(XEN) <RMRR> iommu_map 0x8ea7d
(XEN) <RMRR> iommu_map 0x8ea7e
(XEN) <RMRR> iommu_map 0x8ea7f
(XEN) <RMRR> iommu_map 0x8ea80
(XEN) <RMRR> iommu_map 0x8ea81
(XEN) <RMRR> iommu_map 0x8ea82
(XEN) <RMRR> iommu_map 0x8ea83
(XEN) <RMRR> iommu_map 0x8ea84
(XEN) <RMRR> iommu_map 0x8ea85
(XEN) <RMRR> iommu_map 0x8ea86
(XEN) <RMRR> iommu_map 0x8ea87
(XEN) <RMRR> iommu_map 0x8ea88
(XEN) <RMRR> iommu_map 0x8ea89
(XEN) <RMRR> iommu_map 0x8ea8a
(XEN) <RMRR> iommu_map 0x8ea8b
(XEN) <RMRR> iommu_map 0x8ea8c
(XEN) <RMRR> iommu_map 0x8ea8d
(XEN) <RMRR> iommu_map 0x8ea8e
(XEN) <RMRR> iommu_map 0x8ea8f
(XEN) <RMRR> iommu_map 0x8ea90
(XEN) <RMRR> iommu_map 0x8ea91
(XEN) <RMRR> iommu_map 0x8ea92
(XEN) <RMRR> iommu_map 0x8ea93
(XEN) <RMRR> iommu_map 0x8ea94
(XEN) <RMRR> iommu_map 0x8ea95
(XEN) <RMRR> iommu_map 0x8ea96
(XEN) <RMRR> iommu_map 0x8ea97
(XEN) <RMRR> iommu_map 0x8ea98
(XEN) <RMRR> iommu_map 0x8ea99
(XEN) <RMRR> iommu_map 0x8ea9a
(XEN) <RMRR> iommu_map 0x8ea9b
(XEN) <RMRR> iommu_map 0x8ea9c
(XEN) <RMRR> iommu_map 0x8ea9d
(XEN) <RMRR> iommu_map 0x8ea9e
(XEN) <RMRR> iommu_map 0x8ea9f
(XEN) <RMRR> iommu_map 0x8eaa0
(XEN) <RMRR> iommu_map 0x8eaa1
(XEN) <RMRR> iommu_map 0x8eaa2
(XEN) <RMRR> iommu_map 0x8eaa3
(XEN) <RMRR> iommu_map 0x8eaa4
(XEN) <RMRR> iommu_map 0x8eaa5
(XEN) <RMRR> iommu_map 0x8eaa6
(XEN) <RMRR> iommu_map 0x8eaa7
(XEN) <RMRR> iommu_map 0x8eaa8
(XEN) <RMRR> iommu_map 0x8eaa9
(XEN) <RMRR> iommu_map 0x8eaaa
(XEN) <RMRR> iommu_map 0x8eaab
(XEN) <RMRR> iommu_map 0x8eaac
(XEN) <RMRR> iommu_map 0x8eaad
(XEN) <RMRR> iommu_map 0x8eaae
(XEN) <RMRR> iommu_map 0x8eaaf
(XEN) <RMRR> iommu_map 0x8eab0
(XEN) <RMRR> iommu_map 0x8eab1
(XEN) <RMRR> iommu_map 0x8eab2
(XEN) <RMRR> iommu_map 0x8eab3
(XEN) <RMRR> iommu_map 0x8eab4
(XEN) <RMRR> iommu_map 0x8eab5
(XEN) <RMRR> iommu_map 0x8eab6
(XEN) <RMRR> iommu_map 0x8eab7
(XEN) <RMRR> iommu_map 0x8eab8
(XEN) <RMRR> iommu_map 0x8eab9
(XEN) <RMRR> iommu_map 0x8eaba
(XEN) <RMRR> iommu_map 0x8eabb
(XEN) <RMRR> iommu_map 0x8eabc
(XEN) <RMRR> iommu_map 0x8eabd
(XEN) <RMRR> iommu_map 0x8eabe
(XEN) <RMRR> iommu_map 0x8eabf
(XEN) <RMRR> iommu_map 0x8eac0
(XEN) <RMRR> iommu_map 0x8eac1
(XEN) <RMRR> iommu_map 0x8eac2
(XEN) <RMRR> iommu_map 0x8eac3
(XEN) <RMRR> iommu_map 0x8eac4
(XEN) <RMRR> iommu_map 0x8eac5
(XEN) <RMRR> iommu_map 0x8eac6
(XEN) <RMRR> iommu_map 0x8eac7
(XEN) <RMRR> iommu_map 0x8eac8
(XEN) <RMRR> iommu_map 0x8eac9
(XEN) <RMRR> iommu_map 0x8eaca
(XEN) <RMRR> iommu_map 0x8eacb
(XEN) <RMRR> iommu_map 0x8eacc
(XEN) <RMRR> iommu_map 0x8eacd
(XEN) <RMRR> iommu_map 0x8eace
(XEN) <RMRR> iommu_map 0x8eacf
(XEN) <RMRR> iommu_map 0x8ead0
(XEN) <RMRR> iommu_map 0x8ead1
(XEN) <RMRR> iommu_map 0x8ead2
(XEN) <RMRR> iommu_map 0x8ead3
(XEN) <RMRR> iommu_map 0x8ead4
(XEN) <RMRR> iommu_map 0x8ead5
(XEN) <RMRR> iommu_map 0x8ead6
(XEN) <RMRR> iommu_map 0x8ead7
(XEN) <RMRR> iommu_map 0x8ead8
(XEN) <RMRR> iommu_map 0x8ead9
(XEN) <RMRR> iommu_map 0x8eada
(XEN) <RMRR> iommu_map 0x8eadb
(XEN) <RMRR> iommu_map 0x8eadc
(XEN) <RMRR> iommu_map 0x8eadd
(XEN) <RMRR> iommu_map 0x8eade
(XEN) <RMRR> iommu_map 0x8eadf
(XEN) <RMRR> iommu_map 0x8eae0
(XEN) <RMRR> iommu_map 0x8eae1
(XEN) <RMRR> iommu_map 0x8eae2
(XEN) <RMRR> iommu_map 0x8eae3
(XEN) <RMRR> iommu_map 0x8eae4
(XEN) <RMRR> iommu_map 0x8eae5
(XEN) <RMRR> iommu_map 0x8eae6
(XEN) <RMRR> iommu_map 0x8eae7
(XEN) <RMRR> iommu_map 0x8eae8
(XEN) <RMRR> iommu_map 0x8eae9
(XEN) <RMRR> iommu_map 0x8eaea
(XEN) <RMRR> iommu_map 0x8eaeb
(XEN) <RMRR> iommu_map 0x8eaec
(XEN) <RMRR> iommu_map 0x8eaed
(XEN) <RMRR> iommu_map 0x8eaee
(XEN) <RMRR> iommu_map 0x8eaef
(XEN) <RMRR> iommu_map 0x8eaf0
(XEN) <RMRR> iommu_map 0x8eaf1
(XEN) <RMRR> iommu_map 0x8eaf2
(XEN) <RMRR> iommu_map 0x8eaf3
(XEN) <RMRR> iommu_map 0x8eaf4
(XEN) <RMRR> iommu_map 0x8eaf5
(XEN) <RMRR> iommu_map 0x8eaf6
(XEN) <RMRR> iommu_map 0x8eaf7
(XEN) <RMRR> iommu_map 0x8eaf8
(XEN) <RMRR> iommu_map 0x8eaf9
(XEN) <RMRR> iommu_map 0x8eafa
(XEN) <RMRR> iommu_map 0x8eafb
(XEN) <RMRR> iommu_map 0x8eafc
(XEN) <RMRR> iommu_map 0x8eafd
(XEN) <RMRR> iommu_map 0x8eafe
(XEN) <RMRR> iommu_map 0x8eaff
(XEN) <RMRR> iommu_map 0x8eb00
(XEN) <RMRR> iommu_map 0x8eb01
(XEN) <RMRR> iommu_map 0x8eb02
(XEN) <RMRR> iommu_map 0x8eb03
(XEN) <RMRR> iommu_map 0x8eb04
(XEN) <RMRR> iommu_map 0x8eb05
(XEN) <RMRR> iommu_map 0x8eb06
(XEN) <RMRR> iommu_map 0x8eb07
(XEN) <RMRR> iommu_map 0x8eb08
(XEN) <RMRR> iommu_map 0x8eb09
(XEN) <RMRR> iommu_map 0x8eb0a
(XEN) <RMRR> iommu_map 0x8eb0b
(XEN) <RMRR> iommu_map 0x8eb0c
(XEN) <RMRR> iommu_map 0x8eb0d
(XEN) <RMRR> iommu_map 0x8eb0e
(XEN) <RMRR> iommu_map 0x8eb0f
(XEN) <RMRR> iommu_map 0x8eb10
(XEN) <RMRR> iommu_map 0x8eb11
(XEN) <RMRR> iommu_map 0x8eb12
(XEN) <RMRR> iommu_map 0x8eb13
(XEN) <RMRR> iommu_map 0x8eb14
(XEN) <RMRR> iommu_map 0x8eb15
(XEN) <RMRR> iommu_map 0x8eb16
(XEN) <RMRR> iommu_map 0x8eb17
(XEN) <RMRR> iommu_map 0x8eb18
(XEN) <RMRR> iommu_map 0x8eb19
(XEN) <RMRR> iommu_map 0x8eb1a
(XEN) <RMRR> iommu_map 0x8eb1b
(XEN) <RMRR> iommu_map 0x8eb1c
(XEN) <RMRR> iommu_map 0x8eb1d
(XEN) <RMRR> iommu_map 0x8eb1e
(XEN) <RMRR> iommu_map 0x8eb1f
(XEN) <RMRR> iommu_map 0x8eb20
(XEN) <RMRR> iommu_map 0x8eb21
(XEN) <RMRR> iommu_map 0x8eb22
(XEN) <RMRR> iommu_map 0x8eb23
(XEN) <RMRR> iommu_map 0x8eb24
(XEN) <RMRR> iommu_map 0x8eb25
(XEN) <RMRR> iommu_map 0x8eb26
(XEN) <RMRR> iommu_map 0x8eb27
(XEN) <RMRR> iommu_map 0x8eb28
(XEN) <RMRR> iommu_map 0x8eb29
(XEN) <RMRR> iommu_map 0x8eb2a
(XEN) <RMRR> iommu_map 0x8eb2b
(XEN) <RMRR> iommu_map 0x8eb2c
(XEN) <RMRR> iommu_map 0x8eb2d
(XEN) <RMRR> iommu_map 0x8eb2e
(XEN) <RMRR> iommu_map 0x8eb2f
(XEN) <RMRR> iommu_map 0x8eb30
(XEN) <RMRR> iommu_map 0x8eb31
(XEN) <RMRR> iommu_map 0x8eb32
(XEN) <RMRR> iommu_map 0x8eb33
(XEN) <RMRR> iommu_map 0x8eb34
(XEN) <RMRR> iommu_map 0x8eb35
(XEN) <RMRR> iommu_map 0x8eb36
(XEN) <RMRR> iommu_map 0x8eb37
(XEN) <RMRR> iommu_map 0x8eb38
(XEN) <RMRR> iommu_map 0x8eb39
(XEN) <RMRR> iommu_map 0x8eb3a
(XEN) <RMRR> iommu_map 0x8eb3b
(XEN) <RMRR> iommu_map 0x8eb3c
(XEN) <RMRR> iommu_map 0x8eb3d
(XEN) <RMRR> iommu_map 0x8eb3e
(XEN) <RMRR> iommu_map 0x8eb3f
(XEN) <RMRR> iommu_map 0x8eb40
(XEN) <RMRR> iommu_map 0x8eb41
(XEN) <RMRR> iommu_map 0x8eb42
(XEN) <RMRR> iommu_map 0x8eb43
(XEN) <RMRR> iommu_map 0x8eb44
(XEN) <RMRR> iommu_map 0x8eb45
(XEN) <RMRR> iommu_map 0x8eb46
(XEN) <RMRR> iommu_map 0x8eb47
(XEN) <RMRR> iommu_map 0x8eb48
(XEN) <RMRR> iommu_map 0x8eb49
(XEN) <RMRR> iommu_map 0x8eb4a
(XEN) <RMRR> iommu_map 0x8eb4b
(XEN) <RMRR> iommu_map 0x8eb4c
(XEN) <RMRR> iommu_map 0x8eb4d
(XEN) <RMRR> iommu_map 0x8eb4e
(XEN) <RMRR> iommu_map 0x8eb4f
(XEN) <RMRR> iommu_map 0x8eb50
(XEN) <RMRR> iommu_map 0x8eb51
(XEN) <RMRR> iommu_map 0x8eb52
(XEN) <RMRR> iommu_map 0x8eb53
(XEN) <RMRR> iommu_map 0x8eb54
(XEN) <RMRR> iommu_map 0x8eb55
(XEN) <RMRR> iommu_map 0x8eb56
(XEN) <RMRR> iommu_map 0x8eb57
(XEN) <RMRR> iommu_map 0x8eb58
(XEN) <RMRR> iommu_map 0x8eb59
(XEN) <RMRR> iommu_map 0x8eb5a
(XEN) <RMRR> iommu_map 0x8eb5b
(XEN) <RMRR> iommu_map 0x8eb5c
(XEN) <RMRR> iommu_map 0x8eb5d
(XEN) <RMRR> iommu_map 0x8eb5e
(XEN) <RMRR> iommu_map 0x8eb5f
(XEN) <RMRR> iommu_map 0x8eb60
(XEN) <RMRR> iommu_map 0x8eb61
(XEN) <RMRR> iommu_map 0x8eb62
(XEN) <RMRR> iommu_map 0x8eb63
(XEN) <RMRR> iommu_map 0x8eb64
(XEN) <RMRR> iommu_map 0x8eb65
(XEN) <RMRR> iommu_map 0x8eb66
(XEN) <RMRR> iommu_map 0x8eb67
(XEN) <RMRR> iommu_map 0x8eb68
(XEN) <RMRR> iommu_map 0x8eb69
(XEN) <RMRR> iommu_map 0x8eb6a
(XEN) <RMRR> iommu_map 0x8eb6b
(XEN) <RMRR> iommu_map 0x8eb6c
(XEN) <RMRR> iommu_map 0x8eb6d
(XEN) <RMRR> iommu_map 0x8eb6e
(XEN) <RMRR> iommu_map 0x8eb6f
(XEN) <RMRR> iommu_map 0x8eb70
(XEN) <RMRR> iommu_map 0x8eb71
(XEN) <RMRR> iommu_map 0x8eb72
(XEN) <RMRR> iommu_map 0x8eb73
(XEN) <RMRR> iommu_map 0x8eb74
(XEN) <RMRR> iommu_map 0x8eb75
(XEN) <RMRR> iommu_map 0x8eb76
(XEN) <RMRR> iommu_map 0x8eb77
(XEN) <RMRR> iommu_map 0x8eb78
(XEN) <RMRR> iommu_map 0x8eb79
(XEN) <RMRR> iommu_map 0x8eb7a
(XEN) <RMRR> iommu_map 0x8eb7b
(XEN) <RMRR> iommu_map 0x8eb7c
(XEN) <RMRR> iommu_map 0x8eb7d
(XEN) <RMRR> iommu_map 0x8eb7e
(XEN) <RMRR> iommu_map 0x8eb7f
(XEN) <RMRR> iommu_map 0x8eb80
(XEN) <RMRR> iommu_map 0x8eb81
(XEN) <RMRR> iommu_map 0x8eb82
(XEN) <RMRR> iommu_map 0x8eb83
(XEN) <RMRR> iommu_map 0x8eb84
(XEN) <RMRR> iommu_map 0x8eb85
(XEN) <RMRR> iommu_map 0x8eb86
(XEN) <RMRR> iommu_map 0x8eb87
(XEN) <RMRR> iommu_map 0x8eb88
(XEN) <RMRR> iommu_map 0x8eb89
(XEN) <RMRR> iommu_map 0x8eb8a
(XEN) <RMRR> iommu_map 0x8eb8b
(XEN) <RMRR> iommu_map 0x8eb8c
(XEN) <RMRR> iommu_map 0x8eb8d
(XEN) <RMRR> iommu_map 0x8eb8e
(XEN) <RMRR> iommu_map 0x8eb8f
(XEN) <RMRR> iommu_map 0x8eb90
(XEN) <RMRR> iommu_map 0x8eb91
(XEN) <RMRR> iommu_map 0x8eb92
(XEN) <RMRR> iommu_map 0x8eb93
(XEN) <RMRR> iommu_map 0x8eb94
(XEN) <RMRR> iommu_map 0x8eb95
(XEN) <RMRR> iommu_map 0x8eb96
(XEN) <RMRR> iommu_map 0x8eb97
(XEN) <RMRR> iommu_map 0x8eb98
(XEN) <RMRR> iommu_map 0x8eb99
(XEN) <RMRR> iommu_map 0x8eb9a
(XEN) <RMRR> iommu_map 0x8eb9b
(XEN) <RMRR> iommu_map 0x8eb9c
(XEN) <RMRR> iommu_map 0x8eb9d
(XEN) <RMRR> iommu_map 0x8eb9e
(XEN) <RMRR> iommu_map 0x8eb9f
(XEN) <RMRR> iommu_map 0x8eba0
(XEN) <RMRR> iommu_map 0x8eba1
(XEN) <RMRR> iommu_map 0x8eba2
(XEN) <RMRR> iommu_map 0x8eba3
(XEN) <RMRR> iommu_map 0x8eba4
(XEN) <RMRR> iommu_map 0x8eba5
(XEN) <RMRR> iommu_map 0x8eba6
(XEN) <RMRR> iommu_map 0x8eba7
(XEN) <RMRR> iommu_map 0x8eba8
(XEN) <RMRR> iommu_map 0x8eba9
(XEN) <RMRR> iommu_map 0x8ebaa
(XEN) <RMRR> iommu_map 0x8ebab
(XEN) <RMRR> iommu_map 0x8ebac
(XEN) <RMRR> iommu_map 0x8ebad
(XEN) <RMRR> iommu_map 0x8ebae
(XEN) <RMRR> iommu_map 0x8ebaf
(XEN) <RMRR> iommu_map 0x8ebb0
(XEN) <RMRR> iommu_map 0x8ebb1
(XEN) <RMRR> iommu_map 0x8ebb2
(XEN) <RMRR> iommu_map 0x8ebb3
(XEN) <RMRR> iommu_map 0x8ebb4
(XEN) <RMRR> iommu_map 0x8ebb5
(XEN) <RMRR> iommu_map 0x8ebb6
(XEN) <RMRR> iommu_map 0x8ebb7
(XEN) <RMRR> iommu_map 0x8ebb8
(XEN) <RMRR> iommu_map 0x8ebb9
(XEN) <RMRR> iommu_map 0x8ebba
(XEN) <RMRR> iommu_map 0x8ebbb
(XEN) <RMRR> iommu_map 0x8ebbc
(XEN) <RMRR> iommu_map 0x8ebbd
(XEN) <RMRR> iommu_map 0x8ebbe
(XEN) <RMRR> iommu_map 0x8ebbf
(XEN) <RMRR> iommu_map 0x8ebc0
(XEN) <RMRR> iommu_map 0x8ebc1
(XEN) <RMRR> iommu_map 0x8ebc2
(XEN) <RMRR> iommu_map 0x8ebc3
(XEN) <RMRR> iommu_map 0x8ebc4
(XEN) <RMRR> iommu_map 0x8ebc5
(XEN) <RMRR> iommu_map 0x8ebc6
(XEN) <RMRR> iommu_map 0x8ebc7
(XEN) <RMRR> iommu_map 0x8ebc8
(XEN) <RMRR> iommu_map 0x8ebc9
(XEN) <RMRR> iommu_map 0x8ebca
(XEN) <RMRR> iommu_map 0x8ebcb
(XEN) <RMRR> iommu_map 0x8ebcc
(XEN) <RMRR> iommu_map 0x8ebcd
(XEN) <RMRR> iommu_map 0x8ebce
(XEN) <RMRR> iom(XEN) <RMRR> iommu_map 0x8edcf
(XEN) <RMRR> iommu_map 0x8edd0
(XEN) <RMRR> iommu_map 0x8edd1
(XEN) <RMRR> iommu_map 0x8edd2
(XEN) <RMRR> iommu_map 0x8edd3
(XEN) <RMRR> iommu_map 0x8edd4
(XEN) <RMRR> iommu_map 0x8edd5
(XEN) <RMRR> iommu_map 0x8edd6
(XEN) <RMRR> iommu_map 0x8edd7
(XEN) <RMRR> iommu_map 0x8edd8
(XEN) <RMRR> iommu_map 0x8edd9
(XEN) <RMRR> iommu_map 0x8edda
(XEN) <RMRR> iommu_map 0x8eddb
(XEN) <RMRR> iommu_map 0x8eddc
(XEN) <RMRR> iommu_map 0x8eddd
(XEN) <RMRR> iommu_map 0x8edde
(XEN) <RMRR> iommu_map 0x8eddf
(XEN) <RMRR> iommu_map 0x8ede0
(XEN) <RMRR> iommu_map 0x8ede1
(XEN) <RMRR> iommu_map 0x8ede2
(XEN) <RMRR> iommu_map 0x8ede3
(XEN) <RMRR> iommu_map 0x8ede4
(XEN) <RMRR> iommu_map 0x8ede5
(XEN) <RMRR> iommu_map 0x8ede6
(XEN) <RMRR> iommu_map 0x8ede7
(XEN) <RMRR> iommu_map 0x8ede8
(XEN) <RMRR> iommu_map 0x8ede9
(XEN) <RMRR> iommu_map 0x8edea
(XEN) <RMRR> iommu_map 0x8edeb
(XEN) <RMRR> iommu_map 0x8edec
(XEN) <RMRR> iommu_map 0x8eded
(XEN) <RMRR> iommu_map 0x8edee
(XEN) <RMRR> iommu_map 0x8edef
(XEN) <RMRR> iommu_map 0x8edf0
(XEN) <RMRR> iommu_map 0x8edf1
(XEN) <RMRR> iommu_map 0x8edf2
(XEN) <RMRR> iommu_map 0x8edf3
(XEN) <RMRR> iommu_map 0x8edf4
(XEN) <RMRR> iommu_map 0x8edf5
(XEN) <RMRR> iommu_map 0x8edf6
(XEN) <RMRR> iommu_map 0x8edf7
(XEN) <RMRR> iommu_map 0x8edf8
(XEN) <RMRR> iommu_map 0x8edf9
(XEN) <RMRR> iommu_map 0x8edfa
(XEN) <RMRR> iommu_map 0x8edfb
(XEN) <RMRR> iommu_map 0x8edfc
(XEN) <RMRR> iommu_map 0x8edfd
(XEN) <RMRR> iommu_map 0x8edfe
(XEN) <RMRR> iommu_map 0x8edff
(XEN) <RMRR> iommu_map 0x8ee00
(XEN) <RMRR> iommu_map 0x8ee01
(XEN) <RMRR> iommu_map 0x8ee02
(XEN) <RMRR> iommu_map 0x8ee03
(XEN) <RMRR> iommu_map 0x8ee04
(XEN) <RMRR> iommu_map 0x8ee05
(XEN) <RMRR> iommu_map 0x8ee06
(XEN) <RMRR> iommu_map 0x8ee07
(XEN) <RMRR> iommu_map 0x8ee08
(XEN) <RMRR> iommu_map 0x8ee09
(XEN) <RMRR> iommu_map 0x8ee0a
(XEN) <RMRR> iommu_map 0x8ee0b
(XEN) <RMRR> iommu_map 0x8ee0c
(XEN) <RMRR> iommu_map 0x8ee0d
(XEN) <RMRR> iommu_map 0x8ee0e
(XEN) <RMRR> iommu_map 0x8ee0f
(XEN) <RMRR> iommu_map 0x8ee10
(XEN) <RMRR> iommu_map 0x8ee11
(XEN) <RMRR> iommu_map 0x8ee12
(XEN) <RMRR> iommu_map 0x8ee13
(XEN) <RMRR> iommu_map 0x8ee14
(XEN) <RMRR> iommu_map 0x8ee15
(XEN) <RMRR> iommu_map 0x8ee16
(XEN) <RMRR> iommu_map 0x8ee17
(XEN) <RMRR> iommu_map 0x8ee18
(XEN) <RMRR> iommu_map 0x8ee19
(XEN) <RMRR> iommu_map 0x8ee1a
(XEN) <RMRR> iommu_map 0x8ee1b
(XEN) <RMRR> iommu_map 0x8ee1c
(XEN) <RMRR> iommu_map 0x8ee1d
(XEN) <RMRR> iommu_map 0x8ee1e
(XEN) <RMRR> iommu_map 0x8ee1f
(XEN) <RMRR> iommu_map 0x8ee20
(XEN) <RMRR> iommu_map 0x8ee21
(XEN) <RMRR> iommu_map 0x8ee22
(XEN) <RMRR> iommu_map 0x8ee23
(XEN) <RMRR> iommu_map 0x8ee24
(XEN) <RMRR> iommu_map 0x8ee25
(XEN) <RMRR> iommu_map 0x8ee26
(XEN) <RMRR> iommu_map 0x8ee27
(XEN) <RMRR> iommu_map 0x8ee28
(XEN) <RMRR> iommu_map 0x8ee29
(XEN) <RMRR> iommu_map 0x8ee2a
(XEN) <RMRR> iommu_map 0x8ee2b
(XEN) <RMRR> iommu_map 0x8ee2c
(XEN) <RMRR> iommu_map 0x8ee2d
(XEN) <RMRR> iommu_map 0x8ee2e
(XEN) <RMRR> iommu_map 0x8ee2f
(XEN) <RMRR> iommu_map 0x8ee30
(XEN) <RMRR> iommu_map 0x8ee31
(XEN) <RMRR> iommu_map 0x8ee32
(XEN) <RMRR> iommu_map 0x8ee33
(XEN) <RMRR> iommu_map 0x8ee34
(XEN) <RMRR> iommu_map 0x8ee35
(XEN) <RMRR> iommu_map 0x8ee36
(XEN) <RMRR> iommu_map 0x8ee37
(XEN) <RMRR> iommu_map 0x8ee38
(XEN) <RMRR> iommu_map 0x8ee39
(XEN) <RMRR> iommu_map 0x8ee3a
(XEN) <RMRR> iommu_map 0x8ee3b
(XEN) <RMRR> iommu_map 0x8ee3c
(XEN) <RMRR> iommu_map 0x8ee3d
(XEN) <RMRR> iommu_map 0x8ee3e
(XEN) <RMRR> iommu_map 0x8ee3f
(XEN) <RMRR> iommu_map 0x8ee40
(XEN) <RMRR> iommu_map 0x8ee41
(XEN) <RMRR> iommu_map 0x8ee42
(XEN) <RMRR> iommu_map 0x8ee43
(XEN) <RMRR> iommu_map 0x8ee44
(XEN) <RMRR> iommu_map 0x8ee45
(XEN) <RMRR> iommu_map 0x8ee46
(XEN) <RMRR> iommu_map 0x8ee47
(XEN) <RMRR> iommu_map 0x8ee48
(XEN) <RMRR> iommu_map 0x8ee49
(XEN) <RMRR> iommu_map 0x8ee4a
(XEN) <RMRR> iommu_map 0x8ee4b
(XEN) <RMRR> iommu_map 0x8ee4c
(XEN) <RMRR> iommu_map 0x8ee4d
(XEN) <RMRR> iommu_map 0x8ee4e
(XEN) <RMRR> iommu_map 0x8ee4f
(XEN) <RMRR> iommu_map 0x8ee50
(XEN) <RMRR> iommu_map 0x8ee51
(XEN) <RMRR> iommu_map 0x8ee52
(XEN) <RMRR> iommu_map 0x8ee53
(XEN) <RMRR> iommu_map 0x8ee54
(XEN) <RMRR> iommu_map 0x8ee55
(XEN) <RMRR> iommu_map 0x8ee56
(XEN) <RMRR> iommu_map 0x8ee57
(XEN) <RMRR> iommu_map 0x8ee58
(XEN) <RMRR> iommu_map 0x8ee59
(XEN) <RMRR> iommu_map 0x8ee5a
(XEN) <RMRR> iommu_map 0x8ee5b
(XEN) <RMRR> iommu_map 0x8ee5c
(XEN) <RMRR> iommu_map 0x8ee5d
(XEN) <RMRR> iommu_map 0x8ee5e
(XEN) <RMRR> iommu_map 0x8ee5f
(XEN) <RMRR> iommu_map 0x8ee60
(XEN) <RMRR> iommu_map 0x8ee61
(XEN) <RMRR> iommu_map 0x8ee62
(XEN) <RMRR> iommu_map 0x8ee63
(XEN) <RMRR> iommu_map 0x8ee64
(XEN) <RMRR> iommu_map 0x8ee65
(XEN) <RMRR> iommu_map 0x8ee66
(XEN) <RMRR> iommu_map 0x8ee67
(XEN) <RMRR> iommu_map 0x8ee68
(XEN) <RMRR> iommu_map 0x8ee69
(XEN) <RMRR> iommu_map 0x8ee6a
(XEN) <RMRR> iommu_map 0x8ee6b
(XEN) <RMRR> iommu_map 0x8ee6c
(XEN) <RMRR> iommu_map 0x8ee6d
(XEN) <RMRR> iommu_map 0x8ee6e
(XEN) <RMRR> iommu_map 0x8ee6f
(XEN) <RMRR> iommu_map 0x8ee70
(XEN) <RMRR> iommu_map 0x8ee71
(XEN) <RMRR> iommu_map 0x8ee72
(XEN) <RMRR> iommu_map 0x8ee73
(XEN) <RMRR> iommu_map 0x8ee74
(XEN) <RMRR> iommu_map 0x8ee75
(XEN) <RMRR> iommu_map 0x8ee76
(XEN) <RMRR> iommu_map 0x8ee77
(XEN) <RMRR> iommu_map 0x8ee78
(XEN) <RMRR> iommu_map 0x8ee79
(XEN) <RMRR> iommu_map 0x8ee7a
(XEN) <RMRR> iommu_map 0x8ee7b
(XEN) <RMRR> iommu_map 0x8ee7c
(XEN) <RMRR> iommu_map 0x8ee7d
(XEN) <RMRR> iommu_map 0x8ee7e
(XEN) <RMRR> iommu_map 0x8ee7f
(XEN) <RMRR> iommu_map 0x8ee80
(XEN) <RMRR> iommu_map 0x8ee81
(XEN) <RMRR> iommu_map 0x8ee82
(XEN) <RMRR> iommu_map 0x8ee83
(XEN) <RMRR> iommu_map 0x8ee84
(XEN) <RMRR> iommu_map 0x8ee85
(XEN) <RMRR> iommu_map 0x8ee86
(XEN) <RMRR> iommu_map 0x8ee87
(XEN) <RMRR> iommu_map 0x8ee88
(XEN) <RMRR> iommu_map 0x8ee89
(XEN) <RMRR> iommu_map 0x8ee8a
(XEN) <RMRR> iommu_map 0x8ee8b
(XEN) <RMRR> iommu_map 0x8ee8c
(XEN) <RMRR> iommu_map 0x8ee8d
(XEN) <RMRR> iommu_map 0x8ee8e
(XEN) <RMRR> iommu_map 0x8ee8f
(XEN) <RMRR> iommu_map 0x8ee90
(XEN) <RMRR> iommu_map 0x8ee91
(XEN) <RMRR> iommu_map 0x8ee92
(XEN) <RMRR> iommu_map 0x8ee93
(XEN) <RMRR> iommu_map 0x8ee94
(XEN) <RMRR> iommu_map 0x8ee95
(XEN) <RMRR> iommu_map 0x8ee96
(XEN) <RMRR> iommu_map 0x8ee97
(XEN) <RMRR> iommu_map 0x8ee98
(XEN) <RMRR> iommu_map 0x8ee99
(XEN) <RMRR> iommu_map 0x8ee9a
(XEN) <RMRR> iommu_map 0x8ee9b
(XEN) <RMRR> iommu_map 0x8ee9c
(XEN) <RMRR> iommu_map 0x8ee9d
(XEN) <RMRR> iommu_map 0x8ee9e
(XEN) <RMRR> iommu_map 0x8ee9f
(XEN) <RMRR> iommu_map 0x8eea0
(XEN) <RMRR> iommu_map 0x8eea1
(XEN) <RMRR> iommu_map 0x8eea2
(XEN) <RMRR> iommu_map 0x8eea3
(XEN) <RMRR> iommu_map 0x8eea4
(XEN) <RMRR> iommu_map 0x8eea5
(XEN) <RMRR> iommu_map 0x8eea6
(XEN) <RMRR> iommu_map 0x8eea7
(XEN) <RMRR> iommu_map 0x8eea8
(XEN) <RMRR> iommu_map 0x8eea9
(XEN) <RMRR> iommu_map 0x8eeaa
(XEN) <RMRR> iommu_map 0x8eeab
(XEN) <RMRR> iommu_map 0x8eeac
(XEN) <RMRR> iommu_map 0x8eead
(XEN) <RMRR> iommu_map 0x8eeae
(XEN) <RMRR> iommu_map 0x8eeaf
(XEN) <RMRR> iommu_map 0x8eeb0
(XEN) <RMRR> iommu_map 0x8eeb1
(XEN) <RMRR> iommu_map 0x8eeb2
(XEN) <RMRR> iommu_map 0x8eeb3
(XEN) <RMRR> iommu_map 0x8eeb4
(XEN) <RMRR> iommu_map 0x8eeb5
(XEN) <RMRR> iommu_map 0x8eeb6
(XEN) <RMRR> iommu_map 0x8eeb7
(XEN) <RMRR> iommu_map 0x8eeb8
(XEN) <RMRR> iommu_map 0x8eeb9
(XEN) <RMRR> iommu_map 0x8eeba
(XEN) <RMRR> iommu_map 0x8eebb
(XEN) <RMRR> iommu_map 0x8eebc
(XEN) <RMRR> iommu_map 0x8eebd
(XEN) <RMRR> iommu_map 0x8eebe
(XEN) <RMRR> iommu_map 0x8eebf
(XEN) <RMRR> iommu_map 0x8eec0
(XEN) <RMRR> iommu_map 0x8eec1
(XEN) <RMRR> iommu_map 0x8eec2
(XEN) <RMRR> iommu_map 0x8eec3
(XEN) <RMRR> iommu_map 0x8eec4
(XEN) <RMRR> iommu_map 0x8eec5
(XEN) <RMRR> iommu_map 0x8eec6
(XEN) <RMRR> iommu_map 0x8eec7
(XEN) <RMRR> iommu_map 0x8eec8
(XEN) <RMRR> iommu_map 0x8eec9
(XEN) <RMRR> iommu_map 0x8eeca
(XEN) <RMRR> iommu_map 0x8eecb
(XEN) <RMRR> iommu_map 0x8eecc
(XEN) <RMRR> iommu_map 0x8eecd
(XEN) <RMRR> iommu_map 0x8eece
(XEN) <RMRR> iommu_map 0x8eecf
(XEN) <RMRR> iommu_map 0x8eed0
(XEN) <RMRR> iommu_map 0x8eed1
(XEN) <RMRR> iommu_map 0x8eed2
(XEN) <RMRR> iommu_map 0x8eed3
(XEN) <RMRR> iommu_map 0x8eed4
(XEN) <RMRR> iommu_map 0x8eed5
(XEN) <RMRR> iommu_map 0x8eed6
(XEN) <RMRR> iommu_map 0x8eed7
(XEN) <RMRR> iommu_map 0x8eed8
(XEN) <RMRR> iommu_map 0x8eed9
(XEN) <RMRR> iommu_map 0x8eeda
(XEN) <RMRR> iommu_map 0x8eedb
(XEN) <RMRR> iommu_map 0x8eedc
(XEN) <RMRR> iommu_map 0x8eedd
(XEN) <RMRR> iommu_map 0x8eede
(XEN) <RMRR> iommu_map 0x8eedf
(XEN) <RMRR> iommu_map 0x8eee0
(XEN) <RMRR> iommu_map 0x8eee1
(XEN) <RMRR> iommu_map 0x8eee2
(XEN) <RMRR> iommu_map 0x8eee3
(XEN) <RMRR> iommu_map 0x8eee4
(XEN) <RMRR> iommu_map 0x8eee5
(XEN) <RMRR> iommu_map 0x8eee6
(XEN) <RMRR> iommu_map 0x8eee7
(XEN) <RMRR> iommu_map 0x8eee8
(XEN) <RMRR> iommu_map 0x8eee9
(XEN) <RMRR> iommu_map 0x8eeea
(XEN) <RMRR> iommu_map 0x8eeeb
(XEN) <RMRR> iommu_map 0x8eeec
(XEN) <RMRR> iommu_map 0x8eeed
(XEN) <RMRR> iommu_map 0x8eeee
(XEN) <RMRR> iommu_map 0x8eeef
(XEN) <RMRR> iommu_map 0x8eef0
(XEN) <RMRR> iommu_map 0x8eef1
(XEN) <RMRR> iommu_map 0x8eef2
(XEN) <RMRR> iommu_map 0x8eef3
(XEN) <RMRR> iommu_map 0x8eef4
(XEN) <RMRR> iommu_map 0x8eef5
(XEN) <RMRR> iommu_map 0x8eef6
(XEN) <RMRR> iommu_map 0x8eef7
(XEN) <RMRR> iommu_map 0x8eef8
(XEN) <RMRR> iommu_map 0x8eef9
(XEN) <RMRR> iommu_map 0x8eefa
(XEN) <RMRR> iommu_map 0x8eefb
(XEN) <RMRR> iommu_map 0x8eefc
(XEN) <RMRR> iommu_map 0x8eefd
(XEN) <RMRR> iommu_map 0x8eefe
(XEN) <RMRR> iommu_map 0x8eeff
(XEN) <RMRR> iommu_map 0x8ef00
(XEN) <RMRR> iommu_map 0x8ef01
(XEN) <RMRR> iommu_map 0x8ef02
(XEN) <RMRR> iommu_map 0x8ef03
(XEN) <RMRR> iommu_map 0x8ef04
(XEN) <RMRR> iommu_map 0x8ef05
(XEN) <RMRR> iommu_map 0x8ef06
(XEN) <RMRR> iommu_map 0x8ef07
(XEN) <RMRR> iommu_map 0x8ef08
(XEN) <RMRR> iommu_map 0x8ef09
(XEN) <RMRR> iommu_map 0x8ef0a
(XEN) <RMRR> iommu_map 0x8ef0b
(XEN) <RMRR> iommu_map 0x8ef0c
(XEN) <RMRR> iommu_map 0x8ef0d
(XEN) <RMRR> iommu_map 0x8ef0e
(XEN) <RMRR> iommu_map 0x8ef0f
(XEN) <RMRR> iommu_map 0x8ef10
(XEN) <RMRR> iommu_map 0x8ef11
(XEN) <RMRR> iommu_map 0x8ef12
(XEN) <RMRR> iommu_map 0x8ef13
(XEN) <RMRR> iommu_map 0x8ef14
(XEN) <RMRR> iommu_map 0x8ef15
(XEN) <RMRR> iommu_map 0x8ef16
(XEN) <RMRR> iommu_map 0x8ef17
(XEN) <RMRR> iommu_map 0x8ef18
(XEN) <RMRR> iommu_map 0x8ef19
(XEN) <RMRR> iommu_map 0x8ef1a
(XEN) <RMRR> iommu_map 0x8ef1b
(XEN) <RMRR> iommu_map 0x8ef1c
(XEN) <RMRR> iommu_map 0x8ef1d
(XEN) <RMRR> iommu_map 0x8ef1e
(XEN) <RMRR> iommu_map 0x8ef1f
(XEN) <RMRR> iommu_map 0x8ef20
(XEN) <RMRR> iommu_map 0x8ef21
(XEN) <RMRR> iommu_map 0x8ef22
(XEN) <RMRR> iommu_map 0x8ef23
(XEN) <RMRR> iommu_map 0x8ef24
(XEN) <RMRR> iommu_map 0x8ef25
(XEN) <RMRR> iommu_map 0x8ef26
(XEN) <RMRR> iommu_map 0x8ef27
(XEN) <RMRR> iommu_map 0x8ef28
(XEN) <RMRR> iommu_map 0x8ef29
(XEN) <RMRR> iommu_map 0x8ef2a
(XEN) <RMRR> iommu_map 0x8ef2b
(XEN) <RMRR> iommu_map 0x8ef2c
(XEN) <RMRR> iommu_map 0x8ef2d
(XEN) <RMRR> iommu_map 0x8ef2e
(XEN) <RMRR> iommu_map 0x8ef2f
(XEN) <RMRR> iommu_map 0x8ef30
(XEN) <RMRR> iommu_map 0x8ef31
(XEN) <RMRR> iommu_map 0x8ef32
(XEN) <RMRR> iommu_map 0x8ef33
(XEN) <RMRR> iommu_map 0x8ef34
(XEN) <RMRR> iommu_map 0x8ef35
(XEN) <RMRR> iommu_map 0x8ef36
(XEN) <RMRR> iommu_map 0x8ef37
(XEN) <RMRR> iommu_map 0x8ef38
(XEN) <RMRR> iommu_map 0x8ef39
(XEN) <RMRR> iommu_map 0x8ef3a
(XEN) <RMRR> iommu_map 0x8ef3b
(XEN) <RMRR> iommu_map 0x8ef3c
(XEN) <RMRR> iommu_map 0x8ef3d
(XEN) <RMRR> iommu_map 0x8ef3e
(XEN) <RMRR> iommu_map 0x8ef3f
(XEN) <RMRR> iommu_map 0x8ef40
(XEN) <RMRR> iommu_map 0x8ef41
(XEN) <RMRR> iommu_map 0x8ef42
(XEN) <RMRR> iommu_map 0x8ef43
(XEN) <RMRR> iommu_map 0x8ef44
(XEN) <RMRR> iommu_map 0x8ef45
(XEN) <RMRR> iommu_map 0x8ef46
(XEN) <RMRR> iommu_map 0x8ef47
(XEN) <RMRR> iommu_map 0x8ef48
(XEN) <RMRR> iommu_map 0x8ef49
(XEN) <RMRR> iommu_map 0x8ef4a
(XEN) <RMRR> iommu_map 0x8ef4b
(XEN) <RMRR> iommu_map 0x8ef4c
(XEN) <RMRR> iommu_map 0x8ef4d
(XEN) <RMRR> iommu_map 0x8ef4e
(XEN) <RMRR> iommu_map 0x8ef4f
(XEN) <RMRR> iommu_map 0x8ef50
(XEN) <RMRR> iommu_map 0x8ef51
(XEN) <RMRR> iommu_map 0x8ef52
(XEN) <RMRR> iommu_map 0x8ef53
(XEN) <RMRR> iommu_map 0x8ef54
(XEN) <RMRR> iommu_map 0x8ef55
(XEN) <RMRR> iommu_map 0x8ef56
(XEN) <RMRR> iommu_map 0x8ef57
(XEN) <RMRR> iommu_map 0x8ef58
(XEN) <RMRR> iommu_map 0x8ef59
(XEN) <RMRR> iommu_map 0x8ef5a
(XEN) <RMRR> iommu_map 0x8ef5b
(XEN) <RMRR> iommu_map 0x8ef5c
(XEN) <RMRR> iommu_map 0x8ef5d
(XEN) <RMRR> iommu_map 0x8ef5e
(XEN) <RMRR> iommu_map 0x8ef5f
(XEN) <RMRR> iommu_map 0x8ef60
(XEN) <RMRR> iommu_map 0x8ef61
(XEN) <RMRR> iommu_map 0x8ef62
(XEN) <RMRR> iommu_map 0x8ef63
(XEN) <RMRR> iommu_map 0x8ef64
(XEN) <RMRR> iommu_map 0x8ef65
(XEN) <RMRR> iommu_map 0x8ef66
(XEN) <RMRR> iommu_map 0x8ef67
(XEN) <RMRR> iommu_map 0x8ef68
(XEN) <RMRR> iommu_map 0x8ef69
(XEN) <RMRR> iommu_map 0x8ef6a
(XEN) <RMRR> iommu_map 0x8ef6b
(XEN) <RMRR> iommu_map 0x8ef6c
(XEN) <RMRR> iommu_map 0x8ef6d
(XEN) <RMRR> iommu_map 0x8ef6e
(XEN) <RMRR> iommu_map 0x8ef6f
(XEN) <RMRR> iommu_map 0x8ef70
(XEN) <RMRR> iommu_map 0x8ef71
(XEN) <RMRR> iommu_map 0x8ef72
(XEN) <RMRR> iommu_map 0x8ef73
(XEN) <RMRR> iommu_map 0x8ef74
(XEN) <RMRR> iommu_map 0x8ef75
(XEN) <RMRR> iommu_map 0x8ef76
(XEN) <RMRR> iommu_map 0x8ef77
(XEN) <RMRR> iommu_map 0x8ef78
(XEN) <RMRR> iommu_map 0x8ef79
(XEN) <RMRR> iommu_map 0x8ef7a
(XEN) <RMRR> iommu_map 0x8ef7b
(XEN) <RMRR> iommu_map 0x8ef7c
(XEN) <RMRR> iommu_map 0x8ef7d
(XEN) <RMRR> iommu_map 0x8ef7e
(XEN) <RMRR> iommu_map 0x8ef7f
(XEN) <RMRR> iommu_map 0x8ef80
(XEN) <RMRR> iommu_map 0x8ef81
(XEN) <RMRR> iommu_map 0x8ef82
(XEN) <RMRR> iommu_map 0x8ef83
(XEN) <RMRR> iommu_map 0x8ef84
(XEN) <RMRR> iommu_map 0x8ef85
(XEN) <RMRR> iommu_map 0x8ef86
(XEN) <RMRR> iommu_map 0x8ef87
(XEN) <RMRR> iommu_map 0x8ef88
(XEN) <RMRR> iommu_map 0x8ef89
(XEN) <RMRR> iommu_map 0x8ef8a
(XEN) <RMRR> iommu_map 0x8ef8b
(XEN) <RMRR> iommu_map 0x8ef8c
(XEN) <RMRR> iommu_map 0x8ef8d
(XEN) <RMRR> iommu_map 0x8ef8e
(XEN) <RMRR> iommu_map 0x8ef8f
(XEN) <RMRR> iommu_map 0x8ef90
(XEN) <RMRR> iommu_map 0x8ef91
(XEN) <RMRR> iommu_map 0x8ef92
(XEN) <RMRR> iommu_map 0x8ef93
(XEN) <RMRR> iommu_map 0x8ef94
(XEN) <RMRR> iommu_map 0x8ef95
(XEN) <RMRR> iommu_map 0x8ef96
(XEN) <RMRR> iommu_map 0x8ef97
(XEN) <RMRR> iommu_map 0x8ef98
(XEN) <RMRR> iommu_map 0x8ef99
(XEN) <RMRR> iommu_map 0x8ef9a
(XEN) <RMRR> iommu_map 0x8ef9b
(XEN) <RMRR> iommu_map 0x8ef9c
(XEN) <RMRR> iommu_map 0x8ef9d
(XEN) <RMRR> iommu_map 0x8ef9e
(XEN) <RMRR> iommu_map 0x8ef9f
(XEN) <RMRR> iommu_map 0x8efa0
(XEN) <RMRR> iommu_map 0x8efa1
(XEN) <RMRR> iommu_map 0x8efa2
(XEN) <RMRR> iommu_map 0x8efa3
(XEN) <RMRR> iommu_map 0x8efa4
(XEN) <RMRR> iommu_map 0x8efa5
(XEN) <RMRR> iommu_map 0x8efa6
(XEN) <RMRR> iommu_map 0x8efa7
(XEN) <RMRR> iommu_map 0x8efa8
(XEN) <RMRR> iommu_map 0x8efa9
(XEN) <RMRR> iommu_map 0x8efaa
(XEN) <RMRR> iommu_map 0x8efab
(XEN) <RMRR> iommu_map 0x8efac
(XEN) <RMRR> iommu_map 0x8efad
(XEN) <RMRR> iommu_map 0x8efae
(XEN) <RMRR> iommu_map 0x8efaf
(XEN) <RMRR> iommu_map 0x8efb0
(XEN) <RMRR> iommu_map 0x8efb1
(XEN) <RMRR> iommu_map 0x8efb2
(XEN) <RMRR> iommu_map 0x8efb3
(XEN) <RMRR> iommu_map 0x8efb4
(XEN) <RMRR> iommu_map 0x8efb5
(XEN) <RMRR> iommu_map 0x8efb6
(XEN) <RMRR> iommu_map 0x8efb7
(XEN) <RMRR> iommu_map 0x8efb8
(XEN) <RMRR> iommu_map 0x8efb9
(XEN) <RMRR> iommu_map 0x8efba
(XEN) <RMRR> iommu_map 0x8efbb
(XEN) <RMRR> iommu_map 0x8efbc
(XEN) <RMRR> iommu_map 0x8efbd
(XEN) <RMRR> iommu_map 0x8efbe
(XEN) <RMRR> iommu_map 0x8efbf
(XEN) <RMRR> iommu_map 0x8efc0
(XEN) <RMRR> iommu_map 0x8efc1
(XEN) <RMRR> iommu_map 0x8efc2
(XEN) <RMRR> iommu_map 0x8efc3
(XEN) <RMRR> iommu_map 0x8efc4
(XEN) <RMRR> iommu_map 0x8efc5
(XEN) <RMRR> iommu_map 0x8efc6
(XEN) <RMRR> iommu_map 0x8efc7
(XEN) <RMRR> iommu_map 0x8efc8
(XEN) <RMRR> iommu_map 0x8efc9
(XEN) <RMRR> iommu_map 0x8efca
(XEN) <RMRR> iommu_map 0x8efcb
(XEN) <RMRR> iommu_map 0x8efcc
(XEN) <RMRR> iommu_map 0x8efcd
(XEN) <RMRR> iom(XEN) <RMRR> iommu_map 0x8f1ce
(XEN) <RMRR> iommu_map 0x8f1cf
(XEN) <RMRR> iommu_map 0x8f1d0
(XEN) <RMRR> iommu_map 0x8f1d1
(XEN) <RMRR> iommu_map 0x8f1d2
(XEN) <RMRR> iommu_map 0x8f1d3
(XEN) <RMRR> iommu_map 0x8f1d4
(XEN) <RMRR> iommu_map 0x8f1d5
(XEN) <RMRR> iommu_map 0x8f1d6
(XEN) <RMRR> iommu_map 0x8f1d7
(XEN) <RMRR> iommu_map 0x8f1d8
(XEN) <RMRR> iommu_map 0x8f1d9
(XEN) <RMRR> iommu_map 0x8f1da
(XEN) <RMRR> iommu_map 0x8f1db
(XEN) <RMRR> iommu_map 0x8f1dc
(XEN) <RMRR> iommu_map 0x8f1dd
(XEN) <RMRR> iommu_map 0x8f1de
(XEN) <RMRR> iommu_map 0x8f1df
(XEN) <RMRR> iommu_map 0x8f1e0
(XEN) <RMRR> iommu_map 0x8f1e1
(XEN) <RMRR> iommu_map 0x8f1e2
(XEN) <RMRR> iommu_map 0x8f1e3
(XEN) <RMRR> iommu_map 0x8f1e4
(XEN) <RMRR> iommu_map 0x8f1e5
(XEN) <RMRR> iommu_map 0x8f1e6
(XEN) <RMRR> iommu_map 0x8f1e7
(XEN) <RMRR> iommu_map 0x8f1e8
(XEN) <RMRR> iommu_map 0x8f1e9
(XEN) <RMRR> iommu_map 0x8f1ea
(XEN) <RMRR> iommu_map 0x8f1eb
(XEN) <RMRR> iommu_map 0x8f1ec
(XEN) <RMRR> iommu_map 0x8f1ed
(XEN) <RMRR> iommu_map 0x8f1ee
(XEN) <RMRR> iommu_map 0x8f1ef
(XEN) <RMRR> iommu_map 0x8f1f0
(XEN) <RMRR> iommu_map 0x8f1f1
(XEN) <RMRR> iommu_map 0x8f1f2
(XEN) <RMRR> iommu_map 0x8f1f3
(XEN) <RMRR> iommu_map 0x8f1f4
(XEN) <RMRR> iommu_map 0x8f1f5
(XEN) <RMRR> iommu_map 0x8f1f6
(XEN) <RMRR> iommu_map 0x8f1f7
(XEN) <RMRR> iommu_map 0x8f1f8
(XEN) <RMRR> iommu_map 0x8f1f9
(XEN) <RMRR> iommu_map 0x8f1fa
(XEN) <RMRR> iommu_map 0x8f1fb
(XEN) <RMRR> iommu_map 0x8f1fc
(XEN) <RMRR> iommu_map 0x8f1fd
(XEN) <RMRR> iommu_map 0x8f1fe
(XEN) <RMRR> iommu_map 0x8f1ff
(XEN) <RMRR> iommu_map 0x8f200
(XEN) <RMRR> iommu_map 0x8f201
(XEN) <RMRR> iommu_map 0x8f202
(XEN) <RMRR> iommu_map 0x8f203
(XEN) <RMRR> iommu_map 0x8f204
(XEN) <RMRR> iommu_map 0x8f205
(XEN) <RMRR> iommu_map 0x8f206
(XEN) <RMRR> iommu_map 0x8f207
(XEN) <RMRR> iommu_map 0x8f208
(XEN) <RMRR> iommu_map 0x8f209
(XEN) <RMRR> iommu_map 0x8f20a
(XEN) <RMRR> iommu_map 0x8f20b
(XEN) <RMRR> iommu_map 0x8f20c
(XEN) <RMRR> iommu_map 0x8f20d
(XEN) <RMRR> iommu_map 0x8f20e
(XEN) <RMRR> iommu_map 0x8f20f
(XEN) <RMRR> iommu_map 0x8f210
(XEN) <RMRR> iommu_map 0x8f211
(XEN) <RMRR> iommu_map 0x8f212
(XEN) <RMRR> iommu_map 0x8f213
(XEN) <RMRR> iommu_map 0x8f214
(XEN) <RMRR> iommu_map 0x8f215
(XEN) <RMRR> iommu_map 0x8f216
(XEN) <RMRR> iommu_map 0x8f217
(XEN) <RMRR> iommu_map 0x8f218
(XEN) <RMRR> iommu_map 0x8f219
(XEN) <RMRR> iommu_map 0x8f21a
(XEN) <RMRR> iommu_map 0x8f21b
(XEN) <RMRR> iommu_map 0x8f21c
(XEN) <RMRR> iommu_map 0x8f21d
(XEN) <RMRR> iommu_map 0x8f21e
(XEN) <RMRR> iommu_map 0x8f21f
(XEN) <RMRR> iommu_map 0x8f220
(XEN) <RMRR> iommu_map 0x8f221
(XEN) <RMRR> iommu_map 0x8f222
(XEN) <RMRR> iommu_map 0x8f223
(XEN) <RMRR> iommu_map 0x8f224
(XEN) <RMRR> iommu_map 0x8f225
(XEN) <RMRR> iommu_map 0x8f226
(XEN) <RMRR> iommu_map 0x8f227
(XEN) <RMRR> iommu_map 0x8f228
(XEN) <RMRR> iommu_map 0x8f229
(XEN) <RMRR> iommu_map 0x8f22a
(XEN) <RMRR> iommu_map 0x8f22b
(XEN) <RMRR> iommu_map 0x8f22c
(XEN) <RMRR> iommu_map 0x8f22d
(XEN) <RMRR> iommu_map 0x8f22e
(XEN) <RMRR> iommu_map 0x8f22f
(XEN) <RMRR> iommu_map 0x8f230
(XEN) <RMRR> iommu_map 0x8f231
(XEN) <RMRR> iommu_map 0x8f232
(XEN) <RMRR> iommu_map 0x8f233
(XEN) <RMRR> iommu_map 0x8f234
(XEN) <RMRR> iommu_map 0x8f235
(XEN) <RMRR> iommu_map 0x8f236
(XEN) <RMRR> iommu_map 0x8f237
(XEN) <RMRR> iommu_map 0x8f238
(XEN) <RMRR> iommu_map 0x8f239
(XEN) <RMRR> iommu_map 0x8f23a
(XEN) <RMRR> iommu_map 0x8f23b
(XEN) <RMRR> iommu_map 0x8f23c
(XEN) <RMRR> iommu_map 0x8f23d
(XEN) <RMRR> iommu_map 0x8f23e
(XEN) <RMRR> iommu_map 0x8f23f
(XEN) <RMRR> iommu_map 0x8f240
(XEN) <RMRR> iommu_map 0x8f241
(XEN) <RMRR> iommu_map 0x8f242
(XEN) <RMRR> iommu_map 0x8f243
(XEN) <RMRR> iommu_map 0x8f244
(XEN) <RMRR> iommu_map 0x8f245
(XEN) <RMRR> iommu_map 0x8f246
(XEN) <RMRR> iommu_map 0x8f247
(XEN) <RMRR> iommu_map 0x8f248
(XEN) <RMRR> iommu_map 0x8f249
(XEN) <RMRR> iommu_map 0x8f24a
(XEN) <RMRR> iommu_map 0x8f24b
(XEN) <RMRR> iommu_map 0x8f24c
(XEN) <RMRR> iommu_map 0x8f24d
(XEN) <RMRR> iommu_map 0x8f24e
(XEN) <RMRR> iommu_map 0x8f24f
(XEN) <RMRR> iommu_map 0x8f250
(XEN) <RMRR> iommu_map 0x8f251
(XEN) <RMRR> iommu_map 0x8f252
(XEN) <RMRR> iommu_map 0x8f253
(XEN) <RMRR> iommu_map 0x8f254
(XEN) <RMRR> iommu_map 0x8f255
(XEN) <RMRR> iommu_map 0x8f256
(XEN) <RMRR> iommu_map 0x8f257
(XEN) <RMRR> iommu_map 0x8f258
(XEN) <RMRR> iommu_map 0x8f259
(XEN) <RMRR> iommu_map 0x8f25a
(XEN) <RMRR> iommu_map 0x8f25b
(XEN) <RMRR> iommu_map 0x8f25c
(XEN) <RMRR> iommu_map 0x8f25d
(XEN) <RMRR> iommu_map 0x8f25e
(XEN) <RMRR> iommu_map 0x8f25f
(XEN) <RMRR> iommu_map 0x8f260
(XEN) <RMRR> iommu_map 0x8f261
(XEN) <RMRR> iommu_map 0x8f262
(XEN) <RMRR> iommu_map 0x8f263
(XEN) <RMRR> iommu_map 0x8f264
(XEN) <RMRR> iommu_map 0x8f265
(XEN) <RMRR> iommu_map 0x8f266
(XEN) <RMRR> iommu_map 0x8f267
(XEN) <RMRR> iommu_map 0x8f268
(XEN) <RMRR> iommu_map 0x8f269
(XEN) <RMRR> iommu_map 0x8f26a
(XEN) <RMRR> iommu_map 0x8f26b
(XEN) <RMRR> iommu_map 0x8f26c
(XEN) <RMRR> iommu_map 0x8f26d
(XEN) <RMRR> iommu_map 0x8f26e
(XEN) <RMRR> iommu_map 0x8f26f
(XEN) <RMRR> iommu_map 0x8f270
(XEN) <RMRR> iommu_map 0x8f271
(XEN) <RMRR> iommu_map 0x8f272
(XEN) <RMRR> iommu_map 0x8f273
(XEN) <RMRR> iommu_map 0x8f274
(XEN) <RMRR> iommu_map 0x8f275
(XEN) <RMRR> iommu_map 0x8f276
(XEN) <RMRR> iommu_map 0x8f277
(XEN) <RMRR> iommu_map 0x8f278
(XEN) <RMRR> iommu_map 0x8f279
(XEN) <RMRR> iommu_map 0x8f27a
(XEN) <RMRR> iommu_map 0x8f27b
(XEN) <RMRR> iommu_map 0x8f27c
(XEN) <RMRR> iommu_map 0x8f27d
(XEN) <RMRR> iommu_map 0x8f27e
(XEN) <RMRR> iommu_map 0x8f27f
(XEN) <RMRR> iommu_map 0x8f280
(XEN) <RMRR> iommu_map 0x8f281
(XEN) <RMRR> iommu_map 0x8f282
(XEN) <RMRR> iommu_map 0x8f283
(XEN) <RMRR> iommu_map 0x8f284
(XEN) <RMRR> iommu_map 0x8f285
(XEN) <RMRR> iommu_map 0x8f286
(XEN) <RMRR> iommu_map 0x8f287
(XEN) <RMRR> iommu_map 0x8f288
(XEN) <RMRR> iommu_map 0x8f289
(XEN) <RMRR> iommu_map 0x8f28a
(XEN) <RMRR> iommu_map 0x8f28b
(XEN) <RMRR> iommu_map 0x8f28c
(XEN) <RMRR> iommu_map 0x8f28d
(XEN) <RMRR> iommu_map 0x8f28e
(XEN) <RMRR> iommu_map 0x8f28f
(XEN) <RMRR> iommu_map 0x8f290
(XEN) <RMRR> iommu_map 0x8f291
(XEN) <RMRR> iommu_map 0x8f292
(XEN) <RMRR> iommu_map 0x8f293
(XEN) <RMRR> iommu_map 0x8f294
(XEN) <RMRR> iommu_map 0x8f295
(XEN) <RMRR> iommu_map 0x8f296
(XEN) <RMRR> iommu_map 0x8f297
(XEN) <RMRR> iommu_map 0x8f298
(XEN) <RMRR> iommu_map 0x8f299
(XEN) <RMRR> iommu_map 0x8f29a
(XEN) <RMRR> iommu_map 0x8f29b
(XEN) <RMRR> iommu_map 0x8f29c
(XEN) <RMRR> iommu_map 0x8f29d
(XEN) <RMRR> iommu_map 0x8f29e
(XEN) <RMRR> iommu_map 0x8f29f
(XEN) <RMRR> iommu_map 0x8f2a0
(XEN) <RMRR> iommu_map 0x8f2a1
(XEN) <RMRR> iommu_map 0x8f2a2
(XEN) <RMRR> iommu_map 0x8f2a3
(XEN) <RMRR> iommu_map 0x8f2a4
(XEN) <RMRR> iommu_map 0x8f2a5
(XEN) <RMRR> iommu_map 0x8f2a6
(XEN) <RMRR> iommu_map 0x8f2a7
(XEN) <RMRR> iommu_map 0x8f2a8
(XEN) <RMRR> iommu_map 0x8f2a9
(XEN) <RMRR> iommu_map 0x8f2aa
(XEN) <RMRR> iommu_map 0x8f2ab
(XEN) <RMRR> iommu_map 0x8f2ac
(XEN) <RMRR> iommu_map 0x8f2ad
(XEN) <RMRR> iommu_map 0x8f2ae
(XEN) <RMRR> iommu_map 0x8f2af
(XEN) <RMRR> iommu_map 0x8f2b0
(XEN) <RMRR> iommu_map 0x8f2b1
(XEN) <RMRR> iommu_map 0x8f2b2
(XEN) <RMRR> iommu_map 0x8f2b3
(XEN) <RMRR> iommu_map 0x8f2b4
(XEN) <RMRR> iommu_map 0x8f2b5
(XEN) <RMRR> iommu_map 0x8f2b6
(XEN) <RMRR> iommu_map 0x8f2b7
(XEN) <RMRR> iommu_map 0x8f2b8
(XEN) <RMRR> iommu_map 0x8f2b9
(XEN) <RMRR> iommu_map 0x8f2ba
(XEN) <RMRR> iommu_map 0x8f2bb
(XEN) <RMRR> iommu_map 0x8f2bc
(XEN) <RMRR> iommu_map 0x8f2bd
(XEN) <RMRR> iommu_map 0x8f2be
(XEN) <RMRR> iommu_map 0x8f2bf
(XEN) <RMRR> iommu_map 0x8f2c0
(XEN) <RMRR> iommu_map 0x8f2c1
(XEN) <RMRR> iommu_map 0x8f2c2
(XEN) <RMRR> iommu_map 0x8f2c3
(XEN) <RMRR> iommu_map 0x8f2c4
(XEN) <RMRR> iommu_map 0x8f2c5
(XEN) <RMRR> iommu_map 0x8f2c6
(XEN) <RMRR> iommu_map 0x8f2c7
(XEN) <RMRR> iommu_map 0x8f2c8
(XEN) <RMRR> iommu_map 0x8f2c9
(XEN) <RMRR> iommu_map 0x8f2ca
(XEN) <RMRR> iommu_map 0x8f2cb
(XEN) <RMRR> iommu_map 0x8f2cc
(XEN) <RMRR> iommu_map 0x8f2cd
(XEN) <RMRR> iommu_map 0x8f2ce
(XEN) <RMRR> iommu_map 0x8f2cf
(XEN) <RMRR> iommu_map 0x8f2d0
(XEN) <RMRR> iommu_map 0x8f2d1
(XEN) <RMRR> iommu_map 0x8f2d2
(XEN) <RMRR> iommu_map 0x8f2d3
(XEN) <RMRR> iommu_map 0x8f2d4
(XEN) <RMRR> iommu_map 0x8f2d5
(XEN) <RMRR> iommu_map 0x8f2d6
(XEN) <RMRR> iommu_map 0x8f2d7
(XEN) <RMRR> iommu_map 0x8f2d8
(XEN) <RMRR> iommu_map 0x8f2d9
(XEN) <RMRR> iommu_map 0x8f2da
(XEN) <RMRR> iommu_map 0x8f2db
(XEN) <RMRR> iommu_map 0x8f2dc
(XEN) <RMRR> iommu_map 0x8f2dd
(XEN) <RMRR> iommu_map 0x8f2de
(XEN) <RMRR> iommu_map 0x8f2df
(XEN) <RMRR> iommu_map 0x8f2e0
(XEN) <RMRR> iommu_map 0x8f2e1
(XEN) <RMRR> iommu_map 0x8f2e2
(XEN) <RMRR> iommu_map 0x8f2e3
(XEN) <RMRR> iommu_map 0x8f2e4
(XEN) <RMRR> iommu_map 0x8f2e5
(XEN) <RMRR> iommu_map 0x8f2e6
(XEN) <RMRR> iommu_map 0x8f2e7
(XEN) <RMRR> iommu_map 0x8f2e8
(XEN) <RMRR> iommu_map 0x8f2e9
(XEN) <RMRR> iommu_map 0x8f2ea
(XEN) <RMRR> iommu_map 0x8f2eb
(XEN) <RMRR> iommu_map 0x8f2ec
(XEN) <RMRR> iommu_map 0x8f2ed
(XEN) <RMRR> iommu_map 0x8f2ee
(XEN) <RMRR> iommu_map 0x8f2ef
(XEN) <RMRR> iommu_map 0x8f2f0
(XEN) <RMRR> iommu_map 0x8f2f1
(XEN) <RMRR> iommu_map 0x8f2f2
(XEN) <RMRR> iommu_map 0x8f2f3
(XEN) <RMRR> iommu_map 0x8f2f4
(XEN) <RMRR> iommu_map 0x8f2f5
(XEN) <RMRR> iommu_map 0x8f2f6
(XEN) <RMRR> iommu_map 0x8f2f7
(XEN) <RMRR> iommu_map 0x8f2f8
(XEN) <RMRR> iommu_map 0x8f2f9
(XEN) <RMRR> iommu_map 0x8f2fa
(XEN) <RMRR> iommu_map 0x8f2fb
(XEN) <RMRR> iommu_map 0x8f2fc
(XEN) <RMRR> iommu_map 0x8f2fd
(XEN) <RMRR> iommu_map 0x8f2fe
(XEN) <RMRR> iommu_map 0x8f2ff
(XEN) <RMRR> iommu_map 0x8f300
(XEN) <RMRR> iommu_map 0x8f301
(XEN) <RMRR> iommu_map 0x8f302
(XEN) <RMRR> iommu_map 0x8f303
(XEN) <RMRR> iommu_map 0x8f304
(XEN) <RMRR> iommu_map 0x8f305
(XEN) <RMRR> iommu_map 0x8f306
(XEN) <RMRR> iommu_map 0x8f307
(XEN) <RMRR> iommu_map 0x8f308
(XEN) <RMRR> iommu_map 0x8f309
(XEN) <RMRR> iommu_map 0x8f30a
(XEN) <RMRR> iommu_map 0x8f30b
(XEN) <RMRR> iommu_map 0x8f30c
(XEN) <RMRR> iommu_map 0x8f30d
(XEN) <RMRR> iommu_map 0x8f30e
(XEN) <RMRR> iommu_map 0x8f30f
(XEN) <RMRR> iommu_map 0x8f310
(XEN) <RMRR> iommu_map 0x8f311
(XEN) <RMRR> iommu_map 0x8f312
(XEN) <RMRR> iommu_map 0x8f313
(XEN) <RMRR> iommu_map 0x8f314
(XEN) <RMRR> iommu_map 0x8f315
(XEN) <RMRR> iommu_map 0x8f316
(XEN) <RMRR> iommu_map 0x8f317
(XEN) <RMRR> iommu_map 0x8f318
(XEN) <RMRR> iommu_map 0x8f319
(XEN) <RMRR> iommu_map 0x8f31a
(XEN) <RMRR> iommu_map 0x8f31b
(XEN) <RMRR> iommu_map 0x8f31c
(XEN) <RMRR> iommu_map 0x8f31d
(XEN) <RMRR> iommu_map 0x8f31e
(XEN) <RMRR> iommu_map 0x8f31f
(XEN) <RMRR> iommu_map 0x8f320
(XEN) <RMRR> iommu_map 0x8f321
(XEN) <RMRR> iommu_map 0x8f322
(XEN) <RMRR> iommu_map 0x8f323
(XEN) <RMRR> iommu_map 0x8f324
(XEN) <RMRR> iommu_map 0x8f325
(XEN) <RMRR> iommu_map 0x8f326
(XEN) <RMRR> iommu_map 0x8f327
(XEN) <RMRR> iommu_map 0x8f328
(XEN) <RMRR> iommu_map 0x8f329
(XEN) <RMRR> iommu_map 0x8f32a
(XEN) <RMRR> iommu_map 0x8f32b
(XEN) <RMRR> iommu_map 0x8f32c
(XEN) <RMRR> iommu_map 0x8f32d
(XEN) <RMRR> iommu_map 0x8f32e
(XEN) <RMRR> iommu_map 0x8f32f
(XEN) <RMRR> iommu_map 0x8f330
(XEN) <RMRR> iommu_map 0x8f331
(XEN) <RMRR> iommu_map 0x8f332
(XEN) <RMRR> iommu_map 0x8f333
(XEN) <RMRR> iommu_map 0x8f334
(XEN) <RMRR> iommu_map 0x8f335
(XEN) <RMRR> iommu_map 0x8f336
(XEN) <RMRR> iommu_map 0x8f337
(XEN) <RMRR> iommu_map 0x8f338
(XEN) <RMRR> iommu_map 0x8f339
(XEN) <RMRR> iommu_map 0x8f33a
(XEN) <RMRR> iommu_map 0x8f33b
(XEN) <RMRR> iommu_map 0x8f33c
(XEN) <RMRR> iommu_map 0x8f33d
(XEN) <RMRR> iommu_map 0x8f33e
(XEN) <RMRR> iommu_map 0x8f33f
(XEN) <RMRR> iommu_map 0x8f340
(XEN) <RMRR> iommu_map 0x8f341
(XEN) <RMRR> iommu_map 0x8f342
(XEN) <RMRR> iommu_map 0x8f343
(XEN) <RMRR> iommu_map 0x8f344
(XEN) <RMRR> iommu_map 0x8f345
(XEN) <RMRR> iommu_map 0x8f346
(XEN) <RMRR> iommu_map 0x8f347
(XEN) <RMRR> iommu_map 0x8f348
(XEN) <RMRR> iommu_map 0x8f349
(XEN) <RMRR> iommu_map 0x8f34a
(XEN) <RMRR> iommu_map 0x8f34b
(XEN) <RMRR> iommu_map 0x8f34c
(XEN) <RMRR> iommu_map 0x8f34d
(XEN) <RMRR> iommu_map 0x8f34e
(XEN) <RMRR> iommu_map 0x8f34f
(XEN) <RMRR> iommu_map 0x8f350
(XEN) <RMRR> iommu_map 0x8f351
(XEN) <RMRR> iommu_map 0x8f352
(XEN) <RMRR> iommu_map 0x8f353
(XEN) <RMRR> iommu_map 0x8f354
(XEN) <RMRR> iommu_map 0x8f355
(XEN) <RMRR> iommu_map 0x8f356
(XEN) <RMRR> iommu_map 0x8f357
(XEN) <RMRR> iommu_map 0x8f358
(XEN) <RMRR> iommu_map 0x8f359
(XEN) <RMRR> iommu_map 0x8f35a
(XEN) <RMRR> iommu_map 0x8f35b
(XEN) <RMRR> iommu_map 0x8f35c
(XEN) <RMRR> iommu_map 0x8f35d
(XEN) <RMRR> iommu_map 0x8f35e
(XEN) <RMRR> iommu_map 0x8f35f
(XEN) <RMRR> iommu_map 0x8f360
(XEN) <RMRR> iommu_map 0x8f361
(XEN) <RMRR> iommu_map 0x8f362
(XEN) <RMRR> iommu_map 0x8f363
(XEN) <RMRR> iommu_map 0x8f364
(XEN) <RMRR> iommu_map 0x8f365
(XEN) <RMRR> iommu_map 0x8f366
(XEN) <RMRR> iommu_map 0x8f367
(XEN) <RMRR> iommu_map 0x8f368
(XEN) <RMRR> iommu_map 0x8f369
(XEN) <RMRR> iommu_map 0x8f36a
(XEN) <RMRR> iommu_map 0x8f36b
(XEN) <RMRR> iommu_map 0x8f36c
(XEN) <RMRR> iommu_map 0x8f36d
(XEN) <RMRR> iommu_map 0x8f36e
(XEN) <RMRR> iommu_map 0x8f36f
(XEN) <RMRR> iommu_map 0x8f370
(XEN) <RMRR> iommu_map 0x8f371
(XEN) <RMRR> iommu_map 0x8f372
(XEN) <RMRR> iommu_map 0x8f373
(XEN) <RMRR> iommu_map 0x8f374
(XEN) <RMRR> iommu_map 0x8f375
(XEN) <RMRR> iommu_map 0x8f376
(XEN) <RMRR> iommu_map 0x8f377
(XEN) <RMRR> iommu_map 0x8f378
(XEN) <RMRR> iommu_map 0x8f379
(XEN) <RMRR> iommu_map 0x8f37a
(XEN) <RMRR> iommu_map 0x8f37b
(XEN) <RMRR> iommu_map 0x8f37c
(XEN) <RMRR> iommu_map 0x8f37d
(XEN) <RMRR> iommu_map 0x8f37e
(XEN) <RMRR> iommu_map 0x8f37f
(XEN) <RMRR> iommu_map 0x8f380
(XEN) <RMRR> iommu_map 0x8f381
(XEN) <RMRR> iommu_map 0x8f382
(XEN) <RMRR> iommu_map 0x8f383
(XEN) <RMRR> iommu_map 0x8f384
(XEN) <RMRR> iommu_map 0x8f385
(XEN) <RMRR> iommu_map 0x8f386
(XEN) <RMRR> iommu_map 0x8f387
(XEN) <RMRR> iommu_map 0x8f388
(XEN) <RMRR> iommu_map 0x8f389
(XEN) <RMRR> iommu_map 0x8f38a
(XEN) <RMRR> iommu_map 0x8f38b
(XEN) <RMRR> iommu_map 0x8f38c
(XEN) <RMRR> iommu_map 0x8f38d
(XEN) <RMRR> iommu_map 0x8f38e
(XEN) <RMRR> iommu_map 0x8f38f
(XEN) <RMRR> iommu_map 0x8f390
(XEN) <RMRR> iommu_map 0x8f391
(XEN) <RMRR> iommu_map 0x8f392
(XEN) <RMRR> iommu_map 0x8f393
(XEN) <RMRR> iommu_map 0x8f394
(XEN) <RMRR> iommu_map 0x8f395
(XEN) <RMRR> iommu_map 0x8f396
(XEN) <RMRR> iommu_map 0x8f397
(XEN) <RMRR> iommu_map 0x8f398
(XEN) <RMRR> iommu_map 0x8f399
(XEN) <RMRR> iommu_map 0x8f39a
(XEN) <RMRR> iommu_map 0x8f39b
(XEN) <RMRR> iommu_map 0x8f39c
(XEN) <RMRR> iommu_map 0x8f39d
(XEN) <RMRR> iommu_map 0x8f39e
(XEN) <RMRR> iommu_map 0x8f39f
(XEN) <RMRR> iommu_map 0x8f3a0
(XEN) <RMRR> iommu_map 0x8f3a1
(XEN) <RMRR> iommu_map 0x8f3a2
(XEN) <RMRR> iommu_map 0x8f3a3
(XEN) <RMRR> iommu_map 0x8f3a4
(XEN) <RMRR> iommu_map 0x8f3a5
(XEN) <RMRR> iommu_map 0x8f3a6
(XEN) <RMRR> iommu_map 0x8f3a7
(XEN) <RMRR> iommu_map 0x8f3a8
(XEN) <RMRR> iommu_map 0x8f3a9
(XEN) <RMRR> iommu_map 0x8f3aa
(XEN) <RMRR> iommu_map 0x8f3ab
(XEN) <RMRR> iommu_map 0x8f3ac
(XEN) <RMRR> iommu_map 0x8f3ad
(XEN) <RMRR> iommu_map 0x8f3ae
(XEN) <RMRR> iommu_map 0x8f3af
(XEN) <RMRR> iommu_map 0x8f3b0
(XEN) <RMRR> iommu_map 0x8f3b1
(XEN) <RMRR> iommu_map 0x8f3b2
(XEN) <RMRR> iommu_map 0x8f3b3
(XEN) <RMRR> iommu_map 0x8f3b4
(XEN) <RMRR> iommu_map 0x8f3b5
(XEN) <RMRR> iommu_map 0x8f3b6
(XEN) <RMRR> iommu_map 0x8f3b7
(XEN) <RMRR> iommu_map 0x8f3b8
(XEN) <RMRR> iommu_map 0x8f3b9
(XEN) <RMRR> iommu_map 0x8f3ba
(XEN) <RMRR> iommu_map 0x8f3bb
(XEN) <RMRR> iommu_map 0x8f3bc
(XEN) <RMRR> iommu_map 0x8f3bd
(XEN) <RMRR> iommu_map 0x8f3be
(XEN) <RMRR> iommu_map 0x8f3bf
(XEN) <RMRR> iommu_map 0x8f3c0
(XEN) <RMRR> iommu_map 0x8f3c1
(XEN) <RMRR> iommu_map 0x8f3c2
(XEN) <RMRR> iommu_map 0x8f3c3
(XEN) <RMRR> iommu_map 0x8f3c4
(XEN) <RMRR> iommu_map 0x8f3c5
(XEN) <RMRR> iommu_map 0x8f3c6
(XEN) <RMRR> iommu_map 0x8f3c7
(XEN) <RMRR> iommu_map 0x8f3c8
(XEN) <RMRR> iommu_map 0x8f3c9
(XEN) <RMRR> iommu_map 0x8f3ca
(XEN) <RMRR> iommu_map 0x8f3cb
(XEN) <RMRR> iommu_map 0x8f3cc
(XEN) <RMRR> iom(XEN) <RMRR> iommu_map 0x8f5cd
(XEN) <RMRR> iommu_map 0x8f5ce
(XEN) <RMRR> iommu_map 0x8f5cf
(XEN) <RMRR> iommu_map 0x8f5d0
(XEN) <RMRR> iommu_map 0x8f5d1
(XEN) <RMRR> iommu_map 0x8f5d2
(XEN) <RMRR> iommu_map 0x8f5d3
(XEN) <RMRR> iommu_map 0x8f5d4
(XEN) <RMRR> iommu_map 0x8f5d5
(XEN) <RMRR> iommu_map 0x8f5d6
(XEN) <RMRR> iommu_map 0x8f5d7
(XEN) <RMRR> iommu_map 0x8f5d8
(XEN) <RMRR> iommu_map 0x8f5d9
(XEN) <RMRR> iommu_map 0x8f5da
(XEN) <RMRR> iommu_map 0x8f5db
(XEN) <RMRR> iommu_map 0x8f5dc
(XEN) <RMRR> iommu_map 0x8f5dd
(XEN) <RMRR> iommu_map 0x8f5de
(XEN) <RMRR> iommu_map 0x8f5df
(XEN) <RMRR> iommu_map 0x8f5e0
(XEN) <RMRR> iommu_map 0x8f5e1
(XEN) <RMRR> iommu_map 0x8f5e2
(XEN) <RMRR> iommu_map 0x8f5e3
(XEN) <RMRR> iommu_map 0x8f5e4
(XEN) <RMRR> iommu_map 0x8f5e5
(XEN) <RMRR> iommu_map 0x8f5e6
(XEN) <RMRR> iommu_map 0x8f5e7
(XEN) <RMRR> iommu_map 0x8f5e8
(XEN) <RMRR> iommu_map 0x8f5e9
(XEN) <RMRR> iommu_map 0x8f5ea
(XEN) <RMRR> iommu_map 0x8f5eb
(XEN) <RMRR> iommu_map 0x8f5ec
(XEN) <RMRR> iommu_map 0x8f5ed
(XEN) <RMRR> iommu_map 0x8f5ee
(XEN) <RMRR> iommu_map 0x8f5ef
(XEN) <RMRR> iommu_map 0x8f5f0
(XEN) <RMRR> iommu_map 0x8f5f1
(XEN) <RMRR> iommu_map 0x8f5f2
(XEN) <RMRR> iommu_map 0x8f5f3
(XEN) <RMRR> iommu_map 0x8f5f4
(XEN) <RMRR> iommu_map 0x8f5f5
(XEN) <RMRR> iommu_map 0x8f5f6
(XEN) <RMRR> iommu_map 0x8f5f7
(XEN) <RMRR> iommu_map 0x8f5f8
(XEN) <RMRR> iommu_map 0x8f5f9
(XEN) <RMRR> iommu_map 0x8f5fa
(XEN) <RMRR> iommu_map 0x8f5fb
(XEN) <RMRR> iommu_map 0x8f5fc
(XEN) <RMRR> iommu_map 0x8f5fd
(XEN) <RMRR> iommu_map 0x8f5fe
(XEN) <RMRR> iommu_map 0x8f5ff
(XEN) <RMRR> iommu_map 0x8f600
(XEN) <RMRR> iommu_map 0x8f601
(XEN) <RMRR> iommu_map 0x8f602
(XEN) <RMRR> iommu_map 0x8f603
(XEN) <RMRR> iommu_map 0x8f604
(XEN) <RMRR> iommu_map 0x8f605
(XEN) <RMRR> iommu_map 0x8f606
(XEN) <RMRR> iommu_map 0x8f607
(XEN) <RMRR> iommu_map 0x8f608
(XEN) <RMRR> iommu_map 0x8f609
(XEN) <RMRR> iommu_map 0x8f60a
(XEN) <RMRR> iommu_map 0x8f60b
(XEN) <RMRR> iommu_map 0x8f60c
(XEN) <RMRR> iommu_map 0x8f60d
(XEN) <RMRR> iommu_map 0x8f60e
(XEN) <RMRR> iommu_map 0x8f60f
(XEN) <RMRR> iommu_map 0x8f610
(XEN) <RMRR> iommu_map 0x8f611
(XEN) <RMRR> iommu_map 0x8f612
(XEN) <RMRR> iommu_map 0x8f613
(XEN) <RMRR> iommu_map 0x8f614
(XEN) <RMRR> iommu_map 0x8f615
(XEN) <RMRR> iommu_map 0x8f616
(XEN) <RMRR> iommu_map 0x8f617
(XEN) <RMRR> iommu_map 0x8f618
(XEN) <RMRR> iommu_map 0x8f619
(XEN) <RMRR> iommu_map 0x8f61a
(XEN) <RMRR> iommu_map 0x8f61b
(XEN) <RMRR> iommu_map 0x8f61c
(XEN) <RMRR> iommu_map 0x8f61d
(XEN) <RMRR> iommu_map 0x8f61e
(XEN) <RMRR> iommu_map 0x8f61f
(XEN) <RMRR> iommu_map 0x8f620
(XEN) <RMRR> iommu_map 0x8f621
(XEN) <RMRR> iommu_map 0x8f622
(XEN) <RMRR> iommu_map 0x8f623
(XEN) <RMRR> iommu_map 0x8f624
(XEN) <RMRR> iommu_map 0x8f625
(XEN) <RMRR> iommu_map 0x8f626
(XEN) <RMRR> iommu_map 0x8f627
(XEN) <RMRR> iommu_map 0x8f628
(XEN) <RMRR> iommu_map 0x8f629
(XEN) <RMRR> iommu_map 0x8f62a
(XEN) <RMRR> iommu_map 0x8f62b
(XEN) <RMRR> iommu_map 0x8f62c
(XEN) <RMRR> iommu_map 0x8f62d
(XEN) <RMRR> iommu_map 0x8f62e
(XEN) <RMRR> iommu_map 0x8f62f
(XEN) <RMRR> iommu_map 0x8f630
(XEN) <RMRR> iommu_map 0x8f631
(XEN) <RMRR> iommu_map 0x8f632
(XEN) <RMRR> iommu_map 0x8f633
(XEN) <RMRR> iommu_map 0x8f634
(XEN) <RMRR> iommu_map 0x8f635
(XEN) <RMRR> iommu_map 0x8f636
(XEN) <RMRR> iommu_map 0x8f637
(XEN) <RMRR> iommu_map 0x8f638
(XEN) <RMRR> iommu_map 0x8f639
(XEN) <RMRR> iommu_map 0x8f63a
(XEN) <RMRR> iommu_map 0x8f63b
(XEN) <RMRR> iommu_map 0x8f63c
(XEN) <RMRR> iommu_map 0x8f63d
(XEN) <RMRR> iommu_map 0x8f63e
(XEN) <RMRR> iommu_map 0x8f63f
(XEN) <RMRR> iommu_map 0x8f640
(XEN) <RMRR> iommu_map 0x8f641
(XEN) <RMRR> iommu_map 0x8f642
(XEN) <RMRR> iommu_map 0x8f643
(XEN) <RMRR> iommu_map 0x8f644
(XEN) <RMRR> iommu_map 0x8f645
(XEN) <RMRR> iommu_map 0x8f646
(XEN) <RMRR> iommu_map 0x8f647
(XEN) <RMRR> iommu_map 0x8f648
(XEN) <RMRR> iommu_map 0x8f649
(XEN) <RMRR> iommu_map 0x8f64a
(XEN) <RMRR> iommu_map 0x8f64b
(XEN) <RMRR> iommu_map 0x8f64c
(XEN) <RMRR> iommu_map 0x8f64d
(XEN) <RMRR> iommu_map 0x8f64e
(XEN) <RMRR> iommu_map 0x8f64f
(XEN) <RMRR> iommu_map 0x8f650
(XEN) <RMRR> iommu_map 0x8f651
(XEN) <RMRR> iommu_map 0x8f652
(XEN) <RMRR> iommu_map 0x8f653
(XEN) <RMRR> iommu_map 0x8f654
(XEN) <RMRR> iommu_map 0x8f655
(XEN) <RMRR> iommu_map 0x8f656
(XEN) <RMRR> iommu_map 0x8f657
(XEN) <RMRR> iommu_map 0x8f658
(XEN) <RMRR> iommu_map 0x8f659
(XEN) <RMRR> iommu_map 0x8f65a
(XEN) <RMRR> iommu_map 0x8f65b
(XEN) <RMRR> iommu_map 0x8f65c
(XEN) <RMRR> iommu_map 0x8f65d
(XEN) <RMRR> iommu_map 0x8f65e
(XEN) <RMRR> iommu_map 0x8f65f
(XEN) <RMRR> iommu_map 0x8f660
(XEN) <RMRR> iommu_map 0x8f661
(XEN) <RMRR> iommu_map 0x8f662
(XEN) <RMRR> iommu_map 0x8f663
(XEN) <RMRR> iommu_map 0x8f664
(XEN) <RMRR> iommu_map 0x8f665
(XEN) <RMRR> iommu_map 0x8f666
(XEN) <RMRR> iommu_map 0x8f667
(XEN) <RMRR> iommu_map 0x8f668
(XEN) <RMRR> iommu_map 0x8f669
(XEN) <RMRR> iommu_map 0x8f66a
(XEN) <RMRR> iommu_map 0x8f66b
(XEN) <RMRR> iommu_map 0x8f66c
(XEN) <RMRR> iommu_map 0x8f66d
(XEN) <RMRR> iommu_map 0x8f66e
(XEN) <RMRR> iommu_map 0x8f66f
(XEN) <RMRR> iommu_map 0x8f670
(XEN) <RMRR> iommu_map 0x8f671
(XEN) <RMRR> iommu_map 0x8f672
(XEN) <RMRR> iommu_map 0x8f673
(XEN) <RMRR> iommu_map 0x8f674
(XEN) <RMRR> iommu_map 0x8f675
(XEN) <RMRR> iommu_map 0x8f676
(XEN) <RMRR> iommu_map 0x8f677
(XEN) <RMRR> iommu_map 0x8f678
(XEN) <RMRR> iommu_map 0x8f679
(XEN) <RMRR> iommu_map 0x8f67a
(XEN) <RMRR> iommu_map 0x8f67b
(XEN) <RMRR> iommu_map 0x8f67c
(XEN) <RMRR> iommu_map 0x8f67d
(XEN) <RMRR> iommu_map 0x8f67e
(XEN) <RMRR> iommu_map 0x8f67f
(XEN) <RMRR> iommu_map 0x8f680
(XEN) <RMRR> iommu_map 0x8f681
(XEN) <RMRR> iommu_map 0x8f682
(XEN) <RMRR> iommu_map 0x8f683
(XEN) <RMRR> iommu_map 0x8f684
(XEN) <RMRR> iommu_map 0x8f685
(XEN) <RMRR> iommu_map 0x8f686
(XEN) <RMRR> iommu_map 0x8f687
(XEN) <RMRR> iommu_map 0x8f688
(XEN) <RMRR> iommu_map 0x8f689
(XEN) <RMRR> iommu_map 0x8f68a
(XEN) <RMRR> iommu_map 0x8f68b
(XEN) <RMRR> iommu_map 0x8f68c
(XEN) <RMRR> iommu_map 0x8f68d
(XEN) <RMRR> iommu_map 0x8f68e
(XEN) <RMRR> iommu_map 0x8f68f
(XEN) <RMRR> iommu_map 0x8f690
(XEN) <RMRR> iommu_map 0x8f691
(XEN) <RMRR> iommu_map 0x8f692
(XEN) <RMRR> iommu_map 0x8f693
(XEN) <RMRR> iommu_map 0x8f694
(XEN) <RMRR> iommu_map 0x8f695
(XEN) <RMRR> iommu_map 0x8f696
(XEN) <RMRR> iommu_map 0x8f697
(XEN) <RMRR> iommu_map 0x8f698
(XEN) <RMRR> iommu_map 0x8f699
(XEN) <RMRR> iommu_map 0x8f69a
(XEN) <RMRR> iommu_map 0x8f69b
(XEN) <RMRR> iommu_map 0x8f69c
(XEN) <RMRR> iommu_map 0x8f69d
(XEN) <RMRR> iommu_map 0x8f69e
(XEN) <RMRR> iommu_map 0x8f69f
(XEN) <RMRR> iommu_map 0x8f6a0
(XEN) <RMRR> iommu_map 0x8f6a1
(XEN) <RMRR> iommu_map 0x8f6a2
(XEN) <RMRR> iommu_map 0x8f6a3
(XEN) <RMRR> iommu_map 0x8f6a4
(XEN) <RMRR> iommu_map 0x8f6a5
(XEN) <RMRR> iommu_map 0x8f6a6
(XEN) <RMRR> iommu_map 0x8f6a7
(XEN) <RMRR> iommu_map 0x8f6a8
(XEN) <RMRR> iommu_map 0x8f6a9
(XEN) <RMRR> iommu_map 0x8f6aa
(XEN) <RMRR> iommu_map 0x8f6ab
(XEN) <RMRR> iommu_map 0x8f6ac
(XEN) <RMRR> iommu_map 0x8f6ad
(XEN) <RMRR> iommu_map 0x8f6ae
(XEN) <RMRR> iommu_map 0x8f6af
(XEN) <RMRR> iommu_map 0x8f6b0
(XEN) <RMRR> iommu_map 0x8f6b1
(XEN) <RMRR> iommu_map 0x8f6b2
(XEN) <RMRR> iommu_map 0x8f6b3
(XEN) <RMRR> iommu_map 0x8f6b4
(XEN) <RMRR> iommu_map 0x8f6b5
(XEN) <RMRR> iommu_map 0x8f6b6
(XEN) <RMRR> iommu_map 0x8f6b7
(XEN) <RMRR> iommu_map 0x8f6b8
(XEN) <RMRR> iommu_map 0x8f6b9
(XEN) <RMRR> iommu_map 0x8f6ba
(XEN) <RMRR> iommu_map 0x8f6bb
(XEN) <RMRR> iommu_map 0x8f6bc
(XEN) <RMRR> iommu_map 0x8f6bd
(XEN) <RMRR> iommu_map 0x8f6be
(XEN) <RMRR> iommu_map 0x8f6bf
(XEN) <RMRR> iommu_map 0x8f6c0
(XEN) <RMRR> iommu_map 0x8f6c1
(XEN) <RMRR> iommu_map 0x8f6c2
(XEN) <RMRR> iommu_map 0x8f6c3
(XEN) <RMRR> iommu_map 0x8f6c4
(XEN) <RMRR> iommu_map 0x8f6c5
(XEN) <RMRR> iommu_map 0x8f6c6
(XEN) <RMRR> iommu_map 0x8f6c7
(XEN) <RMRR> iommu_map 0x8f6c8
(XEN) <RMRR> iommu_map 0x8f6c9
(XEN) <RMRR> iommu_map 0x8f6ca
(XEN) <RMRR> iommu_map 0x8f6cb
(XEN) <RMRR> iommu_map 0x8f6cc
(XEN) <RMRR> iommu_map 0x8f6cd
(XEN) <RMRR> iommu_map 0x8f6ce
(XEN) <RMRR> iommu_map 0x8f6cf
(XEN) <RMRR> iommu_map 0x8f6d0
(XEN) <RMRR> iommu_map 0x8f6d1
(XEN) <RMRR> iommu_map 0x8f6d2
(XEN) <RMRR> iommu_map 0x8f6d3
(XEN) <RMRR> iommu_map 0x8f6d4
(XEN) <RMRR> iommu_map 0x8f6d5
(XEN) <RMRR> iommu_map 0x8f6d6
(XEN) <RMRR> iommu_map 0x8f6d7
(XEN) <RMRR> iommu_map 0x8f6d8
(XEN) <RMRR> iommu_map 0x8f6d9
(XEN) <RMRR> iommu_map 0x8f6da
(XEN) <RMRR> iommu_map 0x8f6db
(XEN) <RMRR> iommu_map 0x8f6dc
(XEN) <RMRR> iommu_map 0x8f6dd
(XEN) <RMRR> iommu_map 0x8f6de
(XEN) <RMRR> iommu_map 0x8f6df
(XEN) <RMRR> iommu_map 0x8f6e0
(XEN) <RMRR> iommu_map 0x8f6e1
(XEN) <RMRR> iommu_map 0x8f6e2
(XEN) <RMRR> iommu_map 0x8f6e3
(XEN) <RMRR> iommu_map 0x8f6e4
(XEN) <RMRR> iommu_map 0x8f6e5
(XEN) <RMRR> iommu_map 0x8f6e6
(XEN) <RMRR> iommu_map 0x8f6e7
(XEN) <RMRR> iommu_map 0x8f6e8
(XEN) <RMRR> iommu_map 0x8f6e9
(XEN) <RMRR> iommu_map 0x8f6ea
(XEN) <RMRR> iommu_map 0x8f6eb
(XEN) <RMRR> iommu_map 0x8f6ec
(XEN) <RMRR> iommu_map 0x8f6ed
(XEN) <RMRR> iommu_map 0x8f6ee
(XEN) <RMRR> iommu_map 0x8f6ef
(XEN) <RMRR> iommu_map 0x8f6f0
(XEN) <RMRR> iommu_map 0x8f6f1
(XEN) <RMRR> iommu_map 0x8f6f2
(XEN) <RMRR> iommu_map 0x8f6f3
(XEN) <RMRR> iommu_map 0x8f6f4
(XEN) <RMRR> iommu_map 0x8f6f5
(XEN) <RMRR> iommu_map 0x8f6f6
(XEN) <RMRR> iommu_map 0x8f6f7
(XEN) <RMRR> iommu_map 0x8f6f8
(XEN) <RMRR> iommu_map 0x8f6f9
(XEN) <RMRR> iommu_map 0x8f6fa
(XEN) <RMRR> iommu_map 0x8f6fb
(XEN) <RMRR> iommu_map 0x8f6fc
(XEN) <RMRR> iommu_map 0x8f6fd
(XEN) <RMRR> iommu_map 0x8f6fe
(XEN) <RMRR> iommu_map 0x8f6ff
(XEN) <RMRR> iommu_map 0x8f700
(XEN) <RMRR> iommu_map 0x8f701
(XEN) <RMRR> iommu_map 0x8f702
(XEN) <RMRR> iommu_map 0x8f703
(XEN) <RMRR> iommu_map 0x8f704
(XEN) <RMRR> iommu_map 0x8f705
(XEN) <RMRR> iommu_map 0x8f706
(XEN) <RMRR> iommu_map 0x8f707
(XEN) <RMRR> iommu_map 0x8f708
(XEN) <RMRR> iommu_map 0x8f709
(XEN) <RMRR> iommu_map 0x8f70a
(XEN) <RMRR> iommu_map 0x8f70b
(XEN) <RMRR> iommu_map 0x8f70c
(XEN) <RMRR> iommu_map 0x8f70d
(XEN) <RMRR> iommu_map 0x8f70e
(XEN) <RMRR> iommu_map 0x8f70f
(XEN) <RMRR> iommu_map 0x8f710
(XEN) <RMRR> iommu_map 0x8f711
(XEN) <RMRR> iommu_map 0x8f712
(XEN) <RMRR> iommu_map 0x8f713
(XEN) <RMRR> iommu_map 0x8f714
(XEN) <RMRR> iommu_map 0x8f715
(XEN) <RMRR> iommu_map 0x8f716
(XEN) <RMRR> iommu_map 0x8f717
(XEN) <RMRR> iommu_map 0x8f718
(XEN) <RMRR> iommu_map 0x8f719
(XEN) <RMRR> iommu_map 0x8f71a
(XEN) <RMRR> iommu_map 0x8f71b
(XEN) <RMRR> iommu_map 0x8f71c
(XEN) <RMRR> iommu_map 0x8f71d
(XEN) <RMRR> iommu_map 0x8f71e
(XEN) <RMRR> iommu_map 0x8f71f
(XEN) <RMRR> iommu_map 0x8f720
(XEN) <RMRR> iommu_map 0x8f721
(XEN) <RMRR> iommu_map 0x8f722
(XEN) <RMRR> iommu_map 0x8f723
(XEN) <RMRR> iommu_map 0x8f724
(XEN) <RMRR> iommu_map 0x8f725
(XEN) <RMRR> iommu_map 0x8f726
(XEN) <RMRR> iommu_map 0x8f727
(XEN) <RMRR> iommu_map 0x8f728
(XEN) <RMRR> iommu_map 0x8f729
(XEN) <RMRR> iommu_map 0x8f72a
(XEN) <RMRR> iommu_map 0x8f72b
(XEN) <RMRR> iommu_map 0x8f72c
(XEN) <RMRR> iommu_map 0x8f72d
(XEN) <RMRR> iommu_map 0x8f72e
(XEN) <RMRR> iommu_map 0x8f72f
(XEN) <RMRR> iommu_map 0x8f730
(XEN) <RMRR> iommu_map 0x8f731
(XEN) <RMRR> iommu_map 0x8f732
(XEN) <RMRR> iommu_map 0x8f733
(XEN) <RMRR> iommu_map 0x8f734
(XEN) <RMRR> iommu_map 0x8f735
(XEN) <RMRR> iommu_map 0x8f736
(XEN) <RMRR> iommu_map 0x8f737
(XEN) <RMRR> iommu_map 0x8f738
(XEN) <RMRR> iommu_map 0x8f739
(XEN) <RMRR> iommu_map 0x8f73a
(XEN) <RMRR> iommu_map 0x8f73b
(XEN) <RMRR> iommu_map 0x8f73c
(XEN) <RMRR> iommu_map 0x8f73d
(XEN) <RMRR> iommu_map 0x8f73e
(XEN) <RMRR> iommu_map 0x8f73f
(XEN) <RMRR> iommu_map 0x8f740
(XEN) <RMRR> iommu_map 0x8f741
(XEN) <RMRR> iommu_map 0x8f742
(XEN) <RMRR> iommu_map 0x8f743
(XEN) <RMRR> iommu_map 0x8f744
(XEN) <RMRR> iommu_map 0x8f745
(XEN) <RMRR> iommu_map 0x8f746
(XEN) <RMRR> iommu_map 0x8f747
(XEN) <RMRR> iommu_map 0x8f748
(XEN) <RMRR> iommu_map 0x8f749
(XEN) <RMRR> iommu_map 0x8f74a
(XEN) <RMRR> iommu_map 0x8f74b
(XEN) <RMRR> iommu_map 0x8f74c
(XEN) <RMRR> iommu_map 0x8f74d
(XEN) <RMRR> iommu_map 0x8f74e
(XEN) <RMRR> iommu_map 0x8f74f
(XEN) <RMRR> iommu_map 0x8f750
(XEN) <RMRR> iommu_map 0x8f751
(XEN) <RMRR> iommu_map 0x8f752
(XEN) <RMRR> iommu_map 0x8f753
(XEN) <RMRR> iommu_map 0x8f754
(XEN) <RMRR> iommu_map 0x8f755
(XEN) <RMRR> iommu_map 0x8f756
(XEN) <RMRR> iommu_map 0x8f757
(XEN) <RMRR> iommu_map 0x8f758
(XEN) <RMRR> iommu_map 0x8f759
(XEN) <RMRR> iommu_map 0x8f75a
(XEN) <RMRR> iommu_map 0x8f75b
(XEN) <RMRR> iommu_map 0x8f75c
(XEN) <RMRR> iommu_map 0x8f75d
(XEN) <RMRR> iommu_map 0x8f75e
(XEN) <RMRR> iommu_map 0x8f75f
(XEN) <RMRR> iommu_map 0x8f760
(XEN) <RMRR> iommu_map 0x8f761
(XEN) <RMRR> iommu_map 0x8f762
(XEN) <RMRR> iommu_map 0x8f763
(XEN) <RMRR> iommu_map 0x8f764
(XEN) <RMRR> iommu_map 0x8f765
(XEN) <RMRR> iommu_map 0x8f766
(XEN) <RMRR> iommu_map 0x8f767
(XEN) <RMRR> iommu_map 0x8f768
(XEN) <RMRR> iommu_map 0x8f769
(XEN) <RMRR> iommu_map 0x8f76a
(XEN) <RMRR> iommu_map 0x8f76b
(XEN) <RMRR> iommu_map 0x8f76c
(XEN) <RMRR> iommu_map 0x8f76d
(XEN) <RMRR> iommu_map 0x8f76e
(XEN) <RMRR> iommu_map 0x8f76f
(XEN) <RMRR> iommu_map 0x8f770
(XEN) <RMRR> iommu_map 0x8f771
(XEN) <RMRR> iommu_map 0x8f772
(XEN) <RMRR> iommu_map 0x8f773
(XEN) <RMRR> iommu_map 0x8f774
(XEN) <RMRR> iommu_map 0x8f775
(XEN) <RMRR> iommu_map 0x8f776
(XEN) <RMRR> iommu_map 0x8f777
(XEN) <RMRR> iommu_map 0x8f778
(XEN) <RMRR> iommu_map 0x8f779
(XEN) <RMRR> iommu_map 0x8f77a
(XEN) <RMRR> iommu_map 0x8f77b
(XEN) <RMRR> iommu_map 0x8f77c
(XEN) <RMRR> iommu_map 0x8f77d
(XEN) <RMRR> iommu_map 0x8f77e
(XEN) <RMRR> iommu_map 0x8f77f
(XEN) <RMRR> iommu_map 0x8f780
(XEN) <RMRR> iommu_map 0x8f781
(XEN) <RMRR> iommu_map 0x8f782
(XEN) <RMRR> iommu_map 0x8f783
(XEN) <RMRR> iommu_map 0x8f784
(XEN) <RMRR> iommu_map 0x8f785
(XEN) <RMRR> iommu_map 0x8f786
(XEN) <RMRR> iommu_map 0x8f787
(XEN) <RMRR> iommu_map 0x8f788
(XEN) <RMRR> iommu_map 0x8f789
(XEN) <RMRR> iommu_map 0x8f78a
(XEN) <RMRR> iommu_map 0x8f78b
(XEN) <RMRR> iommu_map 0x8f78c
(XEN) <RMRR> iommu_map 0x8f78d
(XEN) <RMRR> iommu_map 0x8f78e
(XEN) <RMRR> iommu_map 0x8f78f
(XEN) <RMRR> iommu_map 0x8f790
(XEN) <RMRR> iommu_map 0x8f791
(XEN) <RMRR> iommu_map 0x8f792
(XEN) <RMRR> iommu_map 0x8f793
(XEN) <RMRR> iommu_map 0x8f794
(XEN) <RMRR> iommu_map 0x8f795
(XEN) <RMRR> iommu_map 0x8f796
(XEN) <RMRR> iommu_map 0x8f797
(XEN) <RMRR> iommu_map 0x8f798
(XEN) <RMRR> iommu_map 0x8f799
(XEN) <RMRR> iommu_map 0x8f79a
(XEN) <RMRR> iommu_map 0x8f79b
(XEN) <RMRR> iommu_map 0x8f79c
(XEN) <RMRR> iommu_map 0x8f79d
(XEN) <RMRR> iommu_map 0x8f79e
(XEN) <RMRR> iommu_map 0x8f79f
(XEN) <RMRR> iommu_map 0x8f7a0
(XEN) <RMRR> iommu_map 0x8f7a1
(XEN) <RMRR> iommu_map 0x8f7a2
(XEN) <RMRR> iommu_map 0x8f7a3
(XEN) <RMRR> iommu_map 0x8f7a4
(XEN) <RMRR> iommu_map 0x8f7a5
(XEN) <RMRR> iommu_map 0x8f7a6
(XEN) <RMRR> iommu_map 0x8f7a7
(XEN) <RMRR> iommu_map 0x8f7a8
(XEN) <RMRR> iommu_map 0x8f7a9
(XEN) <RMRR> iommu_map 0x8f7aa
(XEN) <RMRR> iommu_map 0x8f7ab
(XEN) <RMRR> iommu_map 0x8f7ac
(XEN) <RMRR> iommu_map 0x8f7ad
(XEN) <RMRR> iommu_map 0x8f7ae
(XEN) <RMRR> iommu_map 0x8f7af
(XEN) <RMRR> iommu_map 0x8f7b0
(XEN) <RMRR> iommu_map 0x8f7b1
(XEN) <RMRR> iommu_map 0x8f7b2
(XEN) <RMRR> iommu_map 0x8f7b3
(XEN) <RMRR> iommu_map 0x8f7b4
(XEN) <RMRR> iommu_map 0x8f7b5
(XEN) <RMRR> iommu_map 0x8f7b6
(XEN) <RMRR> iommu_map 0x8f7b7
(XEN) <RMRR> iommu_map 0x8f7b8
(XEN) <RMRR> iommu_map 0x8f7b9
(XEN) <RMRR> iommu_map 0x8f7ba
(XEN) <RMRR> iommu_map 0x8f7bb
(XEN) <RMRR> iommu_map 0x8f7bc
(XEN) <RMRR> iommu_map 0x8f7bd
(XEN) <RMRR> iommu_map 0x8f7be
(XEN) <RMRR> iommu_map 0x8f7bf
(XEN) <RMRR> iommu_map 0x8f7c0
(XEN) <RMRR> iommu_map 0x8f7c1
(XEN) <RMRR> iommu_map 0x8f7c2
(XEN) <RMRR> iommu_map 0x8f7c3
(XEN) <RMRR> iommu_map 0x8f7c4
(XEN) <RMRR> iommu_map 0x8f7c5
(XEN) <RMRR> iommu_map 0x8f7c6
(XEN) <RMRR> iommu_map 0x8f7c7
(XEN) <RMRR> iommu_map 0x8f7c8
(XEN) <RMRR> iommu_map 0x8f7c9
(XEN) <RMRR> iommu_map 0x8f7ca
(XEN) <RMRR> iommu_map 0x8f7cb
(XEN) <RMRR> iom(XEN) <RMRR> iommu_map 0x8f9cc
(XEN) <RMRR> iommu_map 0x8f9cd
(XEN) <RMRR> iommu_map 0x8f9ce
(XEN) <RMRR> iommu_map 0x8f9cf
(XEN) <RMRR> iommu_map 0x8f9d0
(XEN) <RMRR> iommu_map 0x8f9d1
(XEN) <RMRR> iommu_map 0x8f9d2
(XEN) <RMRR> iommu_map 0x8f9d3
(XEN) <RMRR> iommu_map 0x8f9d4
(XEN) <RMRR> iommu_map 0x8f9d5
(XEN) <RMRR> iommu_map 0x8f9d6
(XEN) <RMRR> iommu_map 0x8f9d7
(XEN) <RMRR> iommu_map 0x8f9d8
(XEN) <RMRR> iommu_map 0x8f9d9
(XEN) <RMRR> iommu_map 0x8f9da
(XEN) <RMRR> iommu_map 0x8f9db
(XEN) <RMRR> iommu_map 0x8f9dc
(XEN) <RMRR> iommu_map 0x8f9dd
(XEN) <RMRR> iommu_map 0x8f9de
(XEN) <RMRR> iommu_map 0x8f9df
(XEN) <RMRR> iommu_map 0x8f9e0
(XEN) <RMRR> iommu_map 0x8f9e1
(XEN) <RMRR> iommu_map 0x8f9e2
(XEN) <RMRR> iommu_map 0x8f9e3
(XEN) <RMRR> iommu_map 0x8f9e4
(XEN) <RMRR> iommu_map 0x8f9e5
(XEN) <RMRR> iommu_map 0x8f9e6
(XEN) <RMRR> iommu_map 0x8f9e7
(XEN) <RMRR> iommu_map 0x8f9e8
(XEN) <RMRR> iommu_map 0x8f9e9
(XEN) <RMRR> iommu_map 0x8f9ea
(XEN) <RMRR> iommu_map 0x8f9eb
(XEN) <RMRR> iommu_map 0x8f9ec
(XEN) <RMRR> iommu_map 0x8f9ed
(XEN) <RMRR> iommu_map 0x8f9ee
(XEN) <RMRR> iommu_map 0x8f9ef
(XEN) <RMRR> iommu_map 0x8f9f0
(XEN) <RMRR> iommu_map 0x8f9f1
(XEN) <RMRR> iommu_map 0x8f9f2
(XEN) <RMRR> iommu_map 0x8f9f3
(XEN) <RMRR> iommu_map 0x8f9f4
(XEN) <RMRR> iommu_map 0x8f9f5
(XEN) <RMRR> iommu_map 0x8f9f6
(XEN) <RMRR> iommu_map 0x8f9f7
(XEN) <RMRR> iommu_map 0x8f9f8
(XEN) <RMRR> iommu_map 0x8f9f9
(XEN) <RMRR> iommu_map 0x8f9fa
(XEN) <RMRR> iommu_map 0x8f9fb
(XEN) <RMRR> iommu_map 0x8f9fc
(XEN) <RMRR> iommu_map 0x8f9fd
(XEN) <RMRR> iommu_map 0x8f9fe
(XEN) <RMRR> iommu_map 0x8f9ff
(XEN) <RMRR> iommu_map 0x8fa00
(XEN) <RMRR> iommu_map 0x8fa01
(XEN) <RMRR> iommu_map 0x8fa02
(XEN) <RMRR> iommu_map 0x8fa03
(XEN) <RMRR> iommu_map 0x8fa04
(XEN) <RMRR> iommu_map 0x8fa05
(XEN) <RMRR> iommu_map 0x8fa06
(XEN) <RMRR> iommu_map 0x8fa07
(XEN) <RMRR> iommu_map 0x8fa08
(XEN) <RMRR> iommu_map 0x8fa09
(XEN) <RMRR> iommu_map 0x8fa0a
(XEN) <RMRR> iommu_map 0x8fa0b
(XEN) <RMRR> iommu_map 0x8fa0c
(XEN) <RMRR> iommu_map 0x8fa0d
(XEN) <RMRR> iommu_map 0x8fa0e
(XEN) <RMRR> iommu_map 0x8fa0f
(XEN) <RMRR> iommu_map 0x8fa10
(XEN) <RMRR> iommu_map 0x8fa11
(XEN) <RMRR> iommu_map 0x8fa12
(XEN) <RMRR> iommu_map 0x8fa13
(XEN) <RMRR> iommu_map 0x8fa14
(XEN) <RMRR> iommu_map 0x8fa15
(XEN) <RMRR> iommu_map 0x8fa16
(XEN) <RMRR> iommu_map 0x8fa17
(XEN) <RMRR> iommu_map 0x8fa18
(XEN) <RMRR> iommu_map 0x8fa19
(XEN) <RMRR> iommu_map 0x8fa1a
(XEN) <RMRR> iommu_map 0x8fa1b
(XEN) <RMRR> iommu_map 0x8fa1c
(XEN) <RMRR> iommu_map 0x8fa1d
(XEN) <RMRR> iommu_map 0x8fa1e
(XEN) <RMRR> iommu_map 0x8fa1f
(XEN) <RMRR> iommu_map 0x8fa20
(XEN) <RMRR> iommu_map 0x8fa21
(XEN) <RMRR> iommu_map 0x8fa22
(XEN) <RMRR> iommu_map 0x8fa23
(XEN) <RMRR> iommu_map 0x8fa24
(XEN) <RMRR> iommu_map 0x8fa25
(XEN) <RMRR> iommu_map 0x8fa26
(XEN) <RMRR> iommu_map 0x8fa27
(XEN) <RMRR> iommu_map 0x8fa28
(XEN) <RMRR> iommu_map 0x8fa29
(XEN) <RMRR> iommu_map 0x8fa2a
(XEN) <RMRR> iommu_map 0x8fa2b
(XEN) <RMRR> iommu_map 0x8fa2c
(XEN) <RMRR> iommu_map 0x8fa2d
(XEN) <RMRR> iommu_map 0x8fa2e
(XEN) <RMRR> iommu_map 0x8fa2f
(XEN) <RMRR> iommu_map 0x8fa30
(XEN) <RMRR> iommu_map 0x8fa31
(XEN) <RMRR> iommu_map 0x8fa32
(XEN) <RMRR> iommu_map 0x8fa33
(XEN) <RMRR> iommu_map 0x8fa34
(XEN) <RMRR> iommu_map 0x8fa35
(XEN) <RMRR> iommu_map 0x8fa36
(XEN) <RMRR> iommu_map 0x8fa37
(XEN) <RMRR> iommu_map 0x8fa38
(XEN) <RMRR> iommu_map 0x8fa39
(XEN) <RMRR> iommu_map 0x8fa3a
(XEN) <RMRR> iommu_map 0x8fa3b
(XEN) <RMRR> iommu_map 0x8fa3c
(XEN) <RMRR> iommu_map 0x8fa3d
(XEN) <RMRR> iommu_map 0x8fa3e
(XEN) <RMRR> iommu_map 0x8fa3f
(XEN) <RMRR> iommu_map 0x8fa40
(XEN) <RMRR> iommu_map 0x8fa41
(XEN) <RMRR> iommu_map 0x8fa42
(XEN) <RMRR> iommu_map 0x8fa43
(XEN) <RMRR> iommu_map 0x8fa44
(XEN) <RMRR> iommu_map 0x8fa45
(XEN) <RMRR> iommu_map 0x8fa46
(XEN) <RMRR> iommu_map 0x8fa47
(XEN) <RMRR> iommu_map 0x8fa48
(XEN) <RMRR> iommu_map 0x8fa49
(XEN) <RMRR> iommu_map 0x8fa4a
(XEN) <RMRR> iommu_map 0x8fa4b
(XEN) <RMRR> iommu_map 0x8fa4c
(XEN) <RMRR> iommu_map 0x8fa4d
(XEN) <RMRR> iommu_map 0x8fa4e
(XEN) <RMRR> iommu_map 0x8fa4f
(XEN) <RMRR> iommu_map 0x8fa50
(XEN) <RMRR> iommu_map 0x8fa51
(XEN) <RMRR> iommu_map 0x8fa52
(XEN) <RMRR> iommu_map 0x8fa53
(XEN) <RMRR> iommu_map 0x8fa54
(XEN) <RMRR> iommu_map 0x8fa55
(XEN) <RMRR> iommu_map 0x8fa56
(XEN) <RMRR> iommu_map 0x8fa57
(XEN) <RMRR> iommu_map 0x8fa58
(XEN) <RMRR> iommu_map 0x8fa59
(XEN) <RMRR> iommu_map 0x8fa5a
(XEN) <RMRR> iommu_map 0x8fa5b
(XEN) <RMRR> iommu_map 0x8fa5c
(XEN) <RMRR> iommu_map 0x8fa5d
(XEN) <RMRR> iommu_map 0x8fa5e
(XEN) <RMRR> iommu_map 0x8fa5f
(XEN) <RMRR> iommu_map 0x8fa60
(XEN) <RMRR> iommu_map 0x8fa61
(XEN) <RMRR> iommu_map 0x8fa62
(XEN) <RMRR> iommu_map 0x8fa63
(XEN) <RMRR> iommu_map 0x8fa64
(XEN) <RMRR> iommu_map 0x8fa65
(XEN) <RMRR> iommu_map 0x8fa66
(XEN) <RMRR> iommu_map 0x8fa67
(XEN) <RMRR> iommu_map 0x8fa68
(XEN) <RMRR> iommu_map 0x8fa69
(XEN) <RMRR> iommu_map 0x8fa6a
(XEN) <RMRR> iommu_map 0x8fa6b
(XEN) <RMRR> iommu_map 0x8fa6c
(XEN) <RMRR> iommu_map 0x8fa6d
(XEN) <RMRR> iommu_map 0x8fa6e
(XEN) <RMRR> iommu_map 0x8fa6f
(XEN) <RMRR> iommu_map 0x8fa70
(XEN) <RMRR> iommu_map 0x8fa71
(XEN) <RMRR> iommu_map 0x8fa72
(XEN) <RMRR> iommu_map 0x8fa73
(XEN) <RMRR> iommu_map 0x8fa74
(XEN) <RMRR> iommu_map 0x8fa75
(XEN) <RMRR> iommu_map 0x8fa76
(XEN) <RMRR> iommu_map 0x8fa77
(XEN) <RMRR> iommu_map 0x8fa78
(XEN) <RMRR> iommu_map 0x8fa79
(XEN) <RMRR> iommu_map 0x8fa7a
(XEN) <RMRR> iommu_map 0x8fa7b
(XEN) <RMRR> iommu_map 0x8fa7c
(XEN) <RMRR> iommu_map 0x8fa7d
(XEN) <RMRR> iommu_map 0x8fa7e
(XEN) <RMRR> iommu_map 0x8fa7f
(XEN) <RMRR> iommu_map 0x8fa80
(XEN) <RMRR> iommu_map 0x8fa81
(XEN) <RMRR> iommu_map 0x8fa82
(XEN) <RMRR> iommu_map 0x8fa83
(XEN) <RMRR> iommu_map 0x8fa84
(XEN) <RMRR> iommu_map 0x8fa85
(XEN) <RMRR> iommu_map 0x8fa86
(XEN) <RMRR> iommu_map 0x8fa87
(XEN) <RMRR> iommu_map 0x8fa88
(XEN) <RMRR> iommu_map 0x8fa89
(XEN) <RMRR> iommu_map 0x8fa8a
(XEN) <RMRR> iommu_map 0x8fa8b
(XEN) <RMRR> iommu_map 0x8fa8c
(XEN) <RMRR> iommu_map 0x8fa8d
(XEN) <RMRR> iommu_map 0x8fa8e
(XEN) <RMRR> iommu_map 0x8fa8f
(XEN) <RMRR> iommu_map 0x8fa90
(XEN) <RMRR> iommu_map 0x8fa91
(XEN) <RMRR> iommu_map 0x8fa92
(XEN) <RMRR> iommu_map 0x8fa93
(XEN) <RMRR> iommu_map 0x8fa94
(XEN) <RMRR> iommu_map 0x8fa95
(XEN) <RMRR> iommu_map 0x8fa96
(XEN) <RMRR> iommu_map 0x8fa97
(XEN) <RMRR> iommu_map 0x8fa98
(XEN) <RMRR> iommu_map 0x8fa99
(XEN) <RMRR> iommu_map 0x8fa9a
(XEN) <RMRR> iommu_map 0x8fa9b
(XEN) <RMRR> iommu_map 0x8fa9c
(XEN) <RMRR> iommu_map 0x8fa9d
(XEN) <RMRR> iommu_map 0x8fa9e
(XEN) <RMRR> iommu_map 0x8fa9f
(XEN) <RMRR> iommu_map 0x8faa0
(XEN) <RMRR> iommu_map 0x8faa1
(XEN) <RMRR> iommu_map 0x8faa2
(XEN) <RMRR> iommu_map 0x8faa3
(XEN) <RMRR> iommu_map 0x8faa4
(XEN) <RMRR> iommu_map 0x8faa5
(XEN) <RMRR> iommu_map 0x8faa6
(XEN) <RMRR> iommu_map 0x8faa7
(XEN) <RMRR> iommu_map 0x8faa8
(XEN) <RMRR> iommu_map 0x8faa9
(XEN) <RMRR> iommu_map 0x8faaa
(XEN) <RMRR> iommu_map 0x8faab
(XEN) <RMRR> iommu_map 0x8faac
(XEN) <RMRR> iommu_map 0x8faad
(XEN) <RMRR> iommu_map 0x8faae
(XEN) <RMRR> iommu_map 0x8faaf
(XEN) <RMRR> iommu_map 0x8fab0
(XEN) <RMRR> iommu_map 0x8fab1
(XEN) <RMRR> iommu_map 0x8fab2
(XEN) <RMRR> iommu_map 0x8fab3
(XEN) <RMRR> iommu_map 0x8fab4
(XEN) <RMRR> iommu_map 0x8fab5
(XEN) <RMRR> iommu_map 0x8fab6
(XEN) <RMRR> iommu_map 0x8fab7
(XEN) <RMRR> iommu_map 0x8fab8
(XEN) <RMRR> iommu_map 0x8fab9
(XEN) <RMRR> iommu_map 0x8faba
(XEN) <RMRR> iommu_map 0x8fabb
(XEN) <RMRR> iommu_map 0x8fabc
(XEN) <RMRR> iommu_map 0x8fabd
(XEN) <RMRR> iommu_map 0x8fabe
(XEN) <RMRR> iommu_map 0x8fabf
(XEN) <RMRR> iommu_map 0x8fac0
(XEN) <RMRR> iommu_map 0x8fac1
(XEN) <RMRR> iommu_map 0x8fac2
(XEN) <RMRR> iommu_map 0x8fac3
(XEN) <RMRR> iommu_map 0x8fac4
(XEN) <RMRR> iommu_map 0x8fac5
(XEN) <RMRR> iommu_map 0x8fac6
(XEN) <RMRR> iommu_map 0x8fac7
(XEN) <RMRR> iommu_map 0x8fac8
(XEN) <RMRR> iommu_map 0x8fac9
(XEN) <RMRR> iommu_map 0x8faca
(XEN) <RMRR> iommu_map 0x8facb
(XEN) <RMRR> iommu_map 0x8facc
(XEN) <RMRR> iommu_map 0x8facd
(XEN) <RMRR> iommu_map 0x8face
(XEN) <RMRR> iommu_map 0x8facf
(XEN) <RMRR> iommu_map 0x8fad0
(XEN) <RMRR> iommu_map 0x8fad1
(XEN) <RMRR> iommu_map 0x8fad2
(XEN) <RMRR> iommu_map 0x8fad3
(XEN) <RMRR> iommu_map 0x8fad4
(XEN) <RMRR> iommu_map 0x8fad5
(XEN) <RMRR> iommu_map 0x8fad6
(XEN) <RMRR> iommu_map 0x8fad7
(XEN) <RMRR> iommu_map 0x8fad8
(XEN) <RMRR> iommu_map 0x8fad9
(XEN) <RMRR> iommu_map 0x8fada
(XEN) <RMRR> iommu_map 0x8fadb
(XEN) <RMRR> iommu_map 0x8fadc
(XEN) <RMRR> iommu_map 0x8fadd
(XEN) <RMRR> iommu_map 0x8fade
(XEN) <RMRR> iommu_map 0x8fadf
(XEN) <RMRR> iommu_map 0x8fae0
(XEN) <RMRR> iommu_map 0x8fae1
(XEN) <RMRR> iommu_map 0x8fae2
(XEN) <RMRR> iommu_map 0x8fae3
(XEN) <RMRR> iommu_map 0x8fae4
(XEN) <RMRR> iommu_map 0x8fae5
(XEN) <RMRR> iommu_map 0x8fae6
(XEN) <RMRR> iommu_map 0x8fae7
(XEN) <RMRR> iommu_map 0x8fae8
(XEN) <RMRR> iommu_map 0x8fae9
(XEN) <RMRR> iommu_map 0x8faea
(XEN) <RMRR> iommu_map 0x8faeb
(XEN) <RMRR> iommu_map 0x8faec
(XEN) <RMRR> iommu_map 0x8faed
(XEN) <RMRR> iommu_map 0x8faee
(XEN) <RMRR> iommu_map 0x8faef
(XEN) <RMRR> iommu_map 0x8faf0
(XEN) <RMRR> iommu_map 0x8faf1
(XEN) <RMRR> iommu_map 0x8faf2
(XEN) <RMRR> iommu_map 0x8faf3
(XEN) <RMRR> iommu_map 0x8faf4
(XEN) <RMRR> iommu_map 0x8faf5
(XEN) <RMRR> iommu_map 0x8faf6
(XEN) <RMRR> iommu_map 0x8faf7
(XEN) <RMRR> iommu_map 0x8faf8
(XEN) <RMRR> iommu_map 0x8faf9
(XEN) <RMRR> iommu_map 0x8fafa
(XEN) <RMRR> iommu_map 0x8fafb
(XEN) <RMRR> iommu_map 0x8fafc
(XEN) <RMRR> iommu_map 0x8fafd
(XEN) <RMRR> iommu_map 0x8fafe
(XEN) <RMRR> iommu_map 0x8faff
(XEN) <RMRR> iommu_map 0x8fb00
(XEN) <RMRR> iommu_map 0x8fb01
(XEN) <RMRR> iommu_map 0x8fb02
(XEN) <RMRR> iommu_map 0x8fb03
(XEN) <RMRR> iommu_map 0x8fb04
(XEN) <RMRR> iommu_map 0x8fb05
(XEN) <RMRR> iommu_map 0x8fb06
(XEN) <RMRR> iommu_map 0x8fb07
(XEN) <RMRR> iommu_map 0x8fb08
(XEN) <RMRR> iommu_map 0x8fb09
(XEN) <RMRR> iommu_map 0x8fb0a
(XEN) <RMRR> iommu_map 0x8fb0b
(XEN) <RMRR> iommu_map 0x8fb0c
(XEN) <RMRR> iommu_map 0x8fb0d
(XEN) <RMRR> iommu_map 0x8fb0e
(XEN) <RMRR> iommu_map 0x8fb0f
(XEN) <RMRR> iommu_map 0x8fb10
(XEN) <RMRR> iommu_map 0x8fb11
(XEN) <RMRR> iommu_map 0x8fb12
(XEN) <RMRR> iommu_map 0x8fb13
(XEN) <RMRR> iommu_map 0x8fb14
(XEN) <RMRR> iommu_map 0x8fb15
(XEN) <RMRR> iommu_map 0x8fb16
(XEN) <RMRR> iommu_map 0x8fb17
(XEN) <RMRR> iommu_map 0x8fb18
(XEN) <RMRR> iommu_map 0x8fb19
(XEN) <RMRR> iommu_map 0x8fb1a
(XEN) <RMRR> iommu_map 0x8fb1b
(XEN) <RMRR> iommu_map 0x8fb1c
(XEN) <RMRR> iommu_map 0x8fb1d
(XEN) <RMRR> iommu_map 0x8fb1e
(XEN) <RMRR> iommu_map 0x8fb1f
(XEN) <RMRR> iommu_map 0x8fb20
(XEN) <RMRR> iommu_map 0x8fb21
(XEN) <RMRR> iommu_map 0x8fb22
(XEN) <RMRR> iommu_map 0x8fb23
(XEN) <RMRR> iommu_map 0x8fb24
(XEN) <RMRR> iommu_map 0x8fb25
(XEN) <RMRR> iommu_map 0x8fb26
(XEN) <RMRR> iommu_map 0x8fb27
(XEN) <RMRR> iommu_map 0x8fb28
(XEN) <RMRR> iommu_map 0x8fb29
(XEN) <RMRR> iommu_map 0x8fb2a
(XEN) <RMRR> iommu_map 0x8fb2b
(XEN) <RMRR> iommu_map 0x8fb2c
(XEN) <RMRR> iommu_map 0x8fb2d
(XEN) <RMRR> iommu_map 0x8fb2e
(XEN) <RMRR> iommu_map 0x8fb2f
(XEN) <RMRR> iommu_map 0x8fb30
(XEN) <RMRR> iommu_map 0x8fb31
(XEN) <RMRR> iommu_map 0x8fb32
(XEN) <RMRR> iommu_map 0x8fb33
(XEN) <RMRR> iommu_map 0x8fb34
(XEN) <RMRR> iommu_map 0x8fb35
(XEN) <RMRR> iommu_map 0x8fb36
(XEN) <RMRR> iommu_map 0x8fb37
(XEN) <RMRR> iommu_map 0x8fb38
(XEN) <RMRR> iommu_map 0x8fb39
(XEN) <RMRR> iommu_map 0x8fb3a
(XEN) <RMRR> iommu_map 0x8fb3b
(XEN) <RMRR> iommu_map 0x8fb3c
(XEN) <RMRR> iommu_map 0x8fb3d
(XEN) <RMRR> iommu_map 0x8fb3e
(XEN) <RMRR> iommu_map 0x8fb3f
(XEN) <RMRR> iommu_map 0x8fb40
(XEN) <RMRR> iommu_map 0x8fb41
(XEN) <RMRR> iommu_map 0x8fb42
(XEN) <RMRR> iommu_map 0x8fb43
(XEN) <RMRR> iommu_map 0x8fb44
(XEN) <RMRR> iommu_map 0x8fb45
(XEN) <RMRR> iommu_map 0x8fb46
(XEN) <RMRR> iommu_map 0x8fb47
(XEN) <RMRR> iommu_map 0x8fb48
(XEN) <RMRR> iommu_map 0x8fb49
(XEN) <RMRR> iommu_map 0x8fb4a
(XEN) <RMRR> iommu_map 0x8fb4b
(XEN) <RMRR> iommu_map 0x8fb4c
(XEN) <RMRR> iommu_map 0x8fb4d
(XEN) <RMRR> iommu_map 0x8fb4e
(XEN) <RMRR> iommu_map 0x8fb4f
(XEN) <RMRR> iommu_map 0x8fb50
(XEN) <RMRR> iommu_map 0x8fb51
(XEN) <RMRR> iommu_map 0x8fb52
(XEN) <RMRR> iommu_map 0x8fb53
(XEN) <RMRR> iommu_map 0x8fb54
(XEN) <RMRR> iommu_map 0x8fb55
(XEN) <RMRR> iommu_map 0x8fb56
(XEN) <RMRR> iommu_map 0x8fb57
(XEN) <RMRR> iommu_map 0x8fb58
(XEN) <RMRR> iommu_map 0x8fb59
(XEN) <RMRR> iommu_map 0x8fb5a
(XEN) <RMRR> iommu_map 0x8fb5b
(XEN) <RMRR> iommu_map 0x8fb5c
(XEN) <RMRR> iommu_map 0x8fb5d
(XEN) <RMRR> iommu_map 0x8fb5e
(XEN) <RMRR> iommu_map 0x8fb5f
(XEN) <RMRR> iommu_map 0x8fb60
(XEN) <RMRR> iommu_map 0x8fb61
(XEN) <RMRR> iommu_map 0x8fb62
(XEN) <RMRR> iommu_map 0x8fb63
(XEN) <RMRR> iommu_map 0x8fb64
(XEN) <RMRR> iommu_map 0x8fb65
(XEN) <RMRR> iommu_map 0x8fb66
(XEN) <RMRR> iommu_map 0x8fb67
(XEN) <RMRR> iommu_map 0x8fb68
(XEN) <RMRR> iommu_map 0x8fb69
(XEN) <RMRR> iommu_map 0x8fb6a
(XEN) <RMRR> iommu_map 0x8fb6b
(XEN) <RMRR> iommu_map 0x8fb6c
(XEN) <RMRR> iommu_map 0x8fb6d
(XEN) <RMRR> iommu_map 0x8fb6e
(XEN) <RMRR> iommu_map 0x8fb6f
(XEN) <RMRR> iommu_map 0x8fb70
(XEN) <RMRR> iommu_map 0x8fb71
(XEN) <RMRR> iommu_map 0x8fb72
(XEN) <RMRR> iommu_map 0x8fb73
(XEN) <RMRR> iommu_map 0x8fb74
(XEN) <RMRR> iommu_map 0x8fb75
(XEN) <RMRR> iommu_map 0x8fb76
(XEN) <RMRR> iommu_map 0x8fb77
(XEN) <RMRR> iommu_map 0x8fb78
(XEN) <RMRR> iommu_map 0x8fb79
(XEN) <RMRR> iommu_map 0x8fb7a
(XEN) <RMRR> iommu_map 0x8fb7b
(XEN) <RMRR> iommu_map 0x8fb7c
(XEN) <RMRR> iommu_map 0x8fb7d
(XEN) <RMRR> iommu_map 0x8fb7e
(XEN) <RMRR> iommu_map 0x8fb7f
(XEN) <RMRR> iommu_map 0x8fb80
(XEN) <RMRR> iommu_map 0x8fb81
(XEN) <RMRR> iommu_map 0x8fb82
(XEN) <RMRR> iommu_map 0x8fb83
(XEN) <RMRR> iommu_map 0x8fb84
(XEN) <RMRR> iommu_map 0x8fb85
(XEN) <RMRR> iommu_map 0x8fb86
(XEN) <RMRR> iommu_map 0x8fb87
(XEN) <RMRR> iommu_map 0x8fb88
(XEN) <RMRR> iommu_map 0x8fb89
(XEN) <RMRR> iommu_map 0x8fb8a
(XEN) <RMRR> iommu_map 0x8fb8b
(XEN) <RMRR> iommu_map 0x8fb8c
(XEN) <RMRR> iommu_map 0x8fb8d
(XEN) <RMRR> iommu_map 0x8fb8e
(XEN) <RMRR> iommu_map 0x8fb8f
(XEN) <RMRR> iommu_map 0x8fb90
(XEN) <RMRR> iommu_map 0x8fb91
(XEN) <RMRR> iommu_map 0x8fb92
(XEN) <RMRR> iommu_map 0x8fb93
(XEN) <RMRR> iommu_map 0x8fb94
(XEN) <RMRR> iommu_map 0x8fb95
(XEN) <RMRR> iommu_map 0x8fb96
(XEN) <RMRR> iommu_map 0x8fb97
(XEN) <RMRR> iommu_map 0x8fb98
(XEN) <RMRR> iommu_map 0x8fb99
(XEN) <RMRR> iommu_map 0x8fb9a
(XEN) <RMRR> iommu_map 0x8fb9b
(XEN) <RMRR> iommu_map 0x8fb9c
(XEN) <RMRR> iommu_map 0x8fb9d
(XEN) <RMRR> iommu_map 0x8fb9e
(XEN) <RMRR> iommu_map 0x8fb9f
(XEN) <RMRR> iommu_map 0x8fba0
(XEN) <RMRR> iommu_map 0x8fba1
(XEN) <RMRR> iommu_map 0x8fba2
(XEN) <RMRR> iommu_map 0x8fba3
(XEN) <RMRR> iommu_map 0x8fba4
(XEN) <RMRR> iommu_map 0x8fba5
(XEN) <RMRR> iommu_map 0x8fba6
(XEN) <RMRR> iommu_map 0x8fba7
(XEN) <RMRR> iommu_map 0x8fba8
(XEN) <RMRR> iommu_map 0x8fba9
(XEN) <RMRR> iommu_map 0x8fbaa
(XEN) <RMRR> iommu_map 0x8fbab
(XEN) <RMRR> iommu_map 0x8fbac
(XEN) <RMRR> iommu_map 0x8fbad
(XEN) <RMRR> iommu_map 0x8fbae
(XEN) <RMRR> iommu_map 0x8fbaf
(XEN) <RMRR> iommu_map 0x8fbb0
(XEN) <RMRR> iommu_map 0x8fbb1
(XEN) <RMRR> iommu_map 0x8fbb2
(XEN) <RMRR> iommu_map 0x8fbb3
(XEN) <RMRR> iommu_map 0x8fbb4
(XEN) <RMRR> iommu_map 0x8fbb5
(XEN) <RMRR> iommu_map 0x8fbb6
(XEN) <RMRR> iommu_map 0x8fbb7
(XEN) <RMRR> iommu_map 0x8fbb8
(XEN) <RMRR> iommu_map 0x8fbb9
(XEN) <RMRR> iommu_map 0x8fbba
(XEN) <RMRR> iommu_map 0x8fbbb
(XEN) <RMRR> iommu_map 0x8fbbc
(XEN) <RMRR> iommu_map 0x8fbbd
(XEN) <RMRR> iommu_map 0x8fbbe
(XEN) <RMRR> iommu_map 0x8fbbf
(XEN) <RMRR> iommu_map 0x8fbc0
(XEN) <RMRR> iommu_map 0x8fbc1
(XEN) <RMRR> iommu_map 0x8fbc2
(XEN) <RMRR> iommu_map 0x8fbc3
(XEN) <RMRR> iommu_map 0x8fbc4
(XEN) <RMRR> iommu_map 0x8fbc5
(XEN) <RMRR> iommu_map 0x8fbc6
(XEN) <RMRR> iommu_map 0x8fbc7
(XEN) <RMRR> iommu_map 0x8fbc8
(XEN) <RMRR> iommu_map 0x8fbc9
(XEN) <RMRR> iommu_map 0x8fbca
(XEN) <RMRR> iom(XEN) <RMRR> iommu_map 0x8fdcb
(XEN) <RMRR> iommu_map 0x8fdcc
(XEN) <RMRR> iommu_map 0x8fdcd
(XEN) <RMRR> iommu_map 0x8fdce
(XEN) <RMRR> iommu_map 0x8fdcf
(XEN) <RMRR> iommu_map 0x8fdd0
(XEN) <RMRR> iommu_map 0x8fdd1
(XEN) <RMRR> iommu_map 0x8fdd2
(XEN) <RMRR> iommu_map 0x8fdd3
(XEN) <RMRR> iommu_map 0x8fdd4
(XEN) <RMRR> iommu_map 0x8fdd5
(XEN) <RMRR> iommu_map 0x8fdd6
(XEN) <RMRR> iommu_map 0x8fdd7
(XEN) <RMRR> iommu_map 0x8fdd8
(XEN) <RMRR> iommu_map 0x8fdd9
(XEN) <RMRR> iommu_map 0x8fdda
(XEN) <RMRR> iommu_map 0x8fddb
(XEN) <RMRR> iommu_map 0x8fddc
(XEN) <RMRR> iommu_map 0x8fddd
(XEN) <RMRR> iommu_map 0x8fdde
(XEN) <RMRR> iommu_map 0x8fddf
(XEN) <RMRR> iommu_map 0x8fde0
(XEN) <RMRR> iommu_map 0x8fde1
(XEN) <RMRR> iommu_map 0x8fde2
(XEN) <RMRR> iommu_map 0x8fde3
(XEN) <RMRR> iommu_map 0x8fde4
(XEN) <RMRR> iommu_map 0x8fde5
(XEN) <RMRR> iommu_map 0x8fde6
(XEN) <RMRR> iommu_map 0x8fde7
(XEN) <RMRR> iommu_map 0x8fde8
(XEN) <RMRR> iommu_map 0x8fde9
(XEN) <RMRR> iommu_map 0x8fdea
(XEN) <RMRR> iommu_map 0x8fdeb
(XEN) <RMRR> iommu_map 0x8fdec
(XEN) <RMRR> iommu_map 0x8fded
(XEN) <RMRR> iommu_map 0x8fdee
(XEN) <RMRR> iommu_map 0x8fdef
(XEN) <RMRR> iommu_map 0x8fdf0
(XEN) <RMRR> iommu_map 0x8fdf1
(XEN) <RMRR> iommu_map 0x8fdf2
(XEN) <RMRR> iommu_map 0x8fdf3
(XEN) <RMRR> iommu_map 0x8fdf4
(XEN) <RMRR> iommu_map 0x8fdf5
(XEN) <RMRR> iommu_map 0x8fdf6
(XEN) <RMRR> iommu_map 0x8fdf7
(XEN) <RMRR> iommu_map 0x8fdf8
(XEN) <RMRR> iommu_map 0x8fdf9
(XEN) <RMRR> iommu_map 0x8fdfa
(XEN) <RMRR> iommu_map 0x8fdfb
(XEN) <RMRR> iommu_map 0x8fdfc
(XEN) <RMRR> iommu_map 0x8fdfd
(XEN) <RMRR> iommu_map 0x8fdfe
(XEN) <RMRR> iommu_map 0x8fdff
(XEN) <RMRR> iommu_map 0x8fe00
(XEN) <RMRR> iommu_map 0x8fe01
(XEN) <RMRR> iommu_map 0x8fe02
(XEN) <RMRR> iommu_map 0x8fe03
(XEN) <RMRR> iommu_map 0x8fe04
(XEN) <RMRR> iommu_map 0x8fe05
(XEN) <RMRR> iommu_map 0x8fe06
(XEN) <RMRR> iommu_map 0x8fe07
(XEN) <RMRR> iommu_map 0x8fe08
(XEN) <RMRR> iommu_map 0x8fe09
(XEN) <RMRR> iommu_map 0x8fe0a
(XEN) <RMRR> iommu_map 0x8fe0b
(XEN) <RMRR> iommu_map 0x8fe0c
(XEN) <RMRR> iommu_map 0x8fe0d
(XEN) <RMRR> iommu_map 0x8fe0e
(XEN) <RMRR> iommu_map 0x8fe0f
(XEN) <RMRR> iommu_map 0x8fe10
(XEN) <RMRR> iommu_map 0x8fe11
(XEN) <RMRR> iommu_map 0x8fe12
(XEN) <RMRR> iommu_map 0x8fe13
(XEN) <RMRR> iommu_map 0x8fe14
(XEN) <RMRR> iommu_map 0x8fe15
(XEN) <RMRR> iommu_map 0x8fe16
(XEN) <RMRR> iommu_map 0x8fe17
(XEN) <RMRR> iommu_map 0x8fe18
(XEN) <RMRR> iommu_map 0x8fe19
(XEN) <RMRR> iommu_map 0x8fe1a
(XEN) <RMRR> iommu_map 0x8fe1b
(XEN) <RMRR> iommu_map 0x8fe1c
(XEN) <RMRR> iommu_map 0x8fe1d
(XEN) <RMRR> iommu_map 0x8fe1e
(XEN) <RMRR> iommu_map 0x8fe1f
(XEN) <RMRR> iommu_map 0x8fe20
(XEN) <RMRR> iommu_map 0x8fe21
(XEN) <RMRR> iommu_map 0x8fe22
(XEN) <RMRR> iommu_map 0x8fe23
(XEN) <RMRR> iommu_map 0x8fe24
(XEN) <RMRR> iommu_map 0x8fe25
(XEN) <RMRR> iommu_map 0x8fe26
(XEN) <RMRR> iommu_map 0x8fe27
(XEN) <RMRR> iommu_map 0x8fe28
(XEN) <RMRR> iommu_map 0x8fe29
(XEN) <RMRR> iommu_map 0x8fe2a
(XEN) <RMRR> iommu_map 0x8fe2b
(XEN) <RMRR> iommu_map 0x8fe2c
(XEN) <RMRR> iommu_map 0x8fe2d
(XEN) <RMRR> iommu_map 0x8fe2e
(XEN) <RMRR> iommu_map 0x8fe2f
(XEN) <RMRR> iommu_map 0x8fe30
(XEN) <RMRR> iommu_map 0x8fe31
(XEN) <RMRR> iommu_map 0x8fe32
(XEN) <RMRR> iommu_map 0x8fe33
(XEN) <RMRR> iommu_map 0x8fe34
(XEN) <RMRR> iommu_map 0x8fe35
(XEN) <RMRR> iommu_map 0x8fe36
(XEN) <RMRR> iommu_map 0x8fe37
(XEN) <RMRR> iommu_map 0x8fe38
(XEN) <RMRR> iommu_map 0x8fe39
(XEN) <RMRR> iommu_map 0x8fe3a
(XEN) <RMRR> iommu_map 0x8fe3b
(XEN) <RMRR> iommu_map 0x8fe3c
(XEN) <RMRR> iommu_map 0x8fe3d
(XEN) <RMRR> iommu_map 0x8fe3e
(XEN) <RMRR> iommu_map 0x8fe3f
(XEN) <RMRR> iommu_map 0x8fe40
(XEN) <RMRR> iommu_map 0x8fe41
(XEN) <RMRR> iommu_map 0x8fe42
(XEN) <RMRR> iommu_map 0x8fe43
(XEN) <RMRR> iommu_map 0x8fe44
(XEN) <RMRR> iommu_map 0x8fe45
(XEN) <RMRR> iommu_map 0x8fe46
(XEN) <RMRR> iommu_map 0x8fe47
(XEN) <RMRR> iommu_map 0x8fe48
(XEN) <RMRR> iommu_map 0x8fe49
(XEN) <RMRR> iommu_map 0x8fe4a
(XEN) <RMRR> iommu_map 0x8fe4b
(XEN) <RMRR> iommu_map 0x8fe4c
(XEN) <RMRR> iommu_map 0x8fe4d
(XEN) <RMRR> iommu_map 0x8fe4e
(XEN) <RMRR> iommu_map 0x8fe4f
(XEN) <RMRR> iommu_map 0x8fe50
(XEN) <RMRR> iommu_map 0x8fe51
(XEN) <RMRR> iommu_map 0x8fe52
(XEN) <RMRR> iommu_map 0x8fe53
(XEN) <RMRR> iommu_map 0x8fe54
(XEN) <RMRR> iommu_map 0x8fe55
(XEN) <RMRR> iommu_map 0x8fe56
(XEN) <RMRR> iommu_map 0x8fe57
(XEN) <RMRR> iommu_map 0x8fe58
(XEN) <RMRR> iommu_map 0x8fe59
(XEN) <RMRR> iommu_map 0x8fe5a
(XEN) <RMRR> iommu_map 0x8fe5b
(XEN) <RMRR> iommu_map 0x8fe5c
(XEN) <RMRR> iommu_map 0x8fe5d
(XEN) <RMRR> iommu_map 0x8fe5e
(XEN) <RMRR> iommu_map 0x8fe5f
(XEN) <RMRR> iommu_map 0x8fe60
(XEN) <RMRR> iommu_map 0x8fe61
(XEN) <RMRR> iommu_map 0x8fe62
(XEN) <RMRR> iommu_map 0x8fe63
(XEN) <RMRR> iommu_map 0x8fe64
(XEN) <RMRR> iommu_map 0x8fe65
(XEN) <RMRR> iommu_map 0x8fe66
(XEN) <RMRR> iommu_map 0x8fe67
(XEN) <RMRR> iommu_map 0x8fe68
(XEN) <RMRR> iommu_map 0x8fe69
(XEN) <RMRR> iommu_map 0x8fe6a
(XEN) <RMRR> iommu_map 0x8fe6b
(XEN) <RMRR> iommu_map 0x8fe6c
(XEN) <RMRR> iommu_map 0x8fe6d
(XEN) <RMRR> iommu_map 0x8fe6e
(XEN) <RMRR> iommu_map 0x8fe6f
(XEN) <RMRR> iommu_map 0x8fe70
(XEN) <RMRR> iommu_map 0x8fe71
(XEN) <RMRR> iommu_map 0x8fe72
(XEN) <RMRR> iommu_map 0x8fe73
(XEN) <RMRR> iommu_map 0x8fe74
(XEN) <RMRR> iommu_map 0x8fe75
(XEN) <RMRR> iommu_map 0x8fe76
(XEN) <RMRR> iommu_map 0x8fe77
(XEN) <RMRR> iommu_map 0x8fe78
(XEN) <RMRR> iommu_map 0x8fe79
(XEN) <RMRR> iommu_map 0x8fe7a
(XEN) <RMRR> iommu_map 0x8fe7b
(XEN) <RMRR> iommu_map 0x8fe7c
(XEN) <RMRR> iommu_map 0x8fe7d
(XEN) <RMRR> iommu_map 0x8fe7e
(XEN) <RMRR> iommu_map 0x8fe7f
(XEN) <RMRR> iommu_map 0x8fe80
(XEN) <RMRR> iommu_map 0x8fe81
(XEN) <RMRR> iommu_map 0x8fe82
(XEN) <RMRR> iommu_map 0x8fe83
(XEN) <RMRR> iommu_map 0x8fe84
(XEN) <RMRR> iommu_map 0x8fe85
(XEN) <RMRR> iommu_map 0x8fe86
(XEN) <RMRR> iommu_map 0x8fe87
(XEN) <RMRR> iommu_map 0x8fe88
(XEN) <RMRR> iommu_map 0x8fe89
(XEN) <RMRR> iommu_map 0x8fe8a
(XEN) <RMRR> iommu_map 0x8fe8b
(XEN) <RMRR> iommu_map 0x8fe8c
(XEN) <RMRR> iommu_map 0x8fe8d
(XEN) <RMRR> iommu_map 0x8fe8e
(XEN) <RMRR> iommu_map 0x8fe8f
(XEN) <RMRR> iommu_map 0x8fe90
(XEN) <RMRR> iommu_map 0x8fe91
(XEN) <RMRR> iommu_map 0x8fe92
(XEN) <RMRR> iommu_map 0x8fe93
(XEN) <RMRR> iommu_map 0x8fe94
(XEN) <RMRR> iommu_map 0x8fe95
(XEN) <RMRR> iommu_map 0x8fe96
(XEN) <RMRR> iommu_map 0x8fe97
(XEN) <RMRR> iommu_map 0x8fe98
(XEN) <RMRR> iommu_map 0x8fe99
(XEN) <RMRR> iommu_map 0x8fe9a
(XEN) <RMRR> iommu_map 0x8fe9b
(XEN) <RMRR> iommu_map 0x8fe9c
(XEN) <RMRR> iommu_map 0x8fe9d
(XEN) <RMRR> iommu_map 0x8fe9e
(XEN) <RMRR> iommu_map 0x8fe9f
(XEN) <RMRR> iommu_map 0x8fea0
(XEN) <RMRR> iommu_map 0x8fea1
(XEN) <RMRR> iommu_map 0x8fea2
(XEN) <RMRR> iommu_map 0x8fea3
(XEN) <RMRR> iommu_map 0x8fea4
(XEN) <RMRR> iommu_map 0x8fea5
(XEN) <RMRR> iommu_map 0x8fea6
(XEN) <RMRR> iommu_map 0x8fea7
(XEN) <RMRR> iommu_map 0x8fea8
(XEN) <RMRR> iommu_map 0x8fea9
(XEN) <RMRR> iommu_map 0x8feaa
(XEN) <RMRR> iommu_map 0x8feab
(XEN) <RMRR> iommu_map 0x8feac
(XEN) <RMRR> iommu_map 0x8fead
(XEN) <RMRR> iommu_map 0x8feae
(XEN) <RMRR> iommu_map 0x8feaf
(XEN) <RMRR> iommu_map 0x8feb0
(XEN) <RMRR> iommu_map 0x8feb1
(XEN) <RMRR> iommu_map 0x8feb2
(XEN) <RMRR> iommu_map 0x8feb3
(XEN) <RMRR> iommu_map 0x8feb4
(XEN) <RMRR> iommu_map 0x8feb5
(XEN) <RMRR> iommu_map 0x8feb6
(XEN) <RMRR> iommu_map 0x8feb7
(XEN) <RMRR> iommu_map 0x8feb8
(XEN) <RMRR> iommu_map 0x8feb9
(XEN) <RMRR> iommu_map 0x8feba
(XEN) <RMRR> iommu_map 0x8febb
(XEN) <RMRR> iommu_map 0x8febc
(XEN) <RMRR> iommu_map 0x8febd
(XEN) <RMRR> iommu_map 0x8febe
(XEN) <RMRR> iommu_map 0x8febf
(XEN) <RMRR> iommu_map 0x8fec0
(XEN) <RMRR> iommu_map 0x8fec1
(XEN) <RMRR> iommu_map 0x8fec2
(XEN) <RMRR> iommu_map 0x8fec3
(XEN) <RMRR> iommu_map 0x8fec4
(XEN) <RMRR> iommu_map 0x8fec5
(XEN) <RMRR> iommu_map 0x8fec6
(XEN) <RMRR> iommu_map 0x8fec7
(XEN) <RMRR> iommu_map 0x8fec8
(XEN) <RMRR> iommu_map 0x8fec9
(XEN) <RMRR> iommu_map 0x8feca
(XEN) <RMRR> iommu_map 0x8fecb
(XEN) <RMRR> iommu_map 0x8fecc
(XEN) <RMRR> iommu_map 0x8fecd
(XEN) <RMRR> iommu_map 0x8fece
(XEN) <RMRR> iommu_map 0x8fecf
(XEN) <RMRR> iommu_map 0x8fed0
(XEN) <RMRR> iommu_map 0x8fed1
(XEN) <RMRR> iommu_map 0x8fed2
(XEN) <RMRR> iommu_map 0x8fed3
(XEN) <RMRR> iommu_map 0x8fed4
(XEN) <RMRR> iommu_map 0x8fed5
(XEN) <RMRR> iommu_map 0x8fed6
(XEN) <RMRR> iommu_map 0x8fed7
(XEN) <RMRR> iommu_map 0x8fed8
(XEN) <RMRR> iommu_map 0x8fed9
(XEN) <RMRR> iommu_map 0x8feda
(XEN) <RMRR> iommu_map 0x8fedb
(XEN) <RMRR> iommu_map 0x8fedc
(XEN) <RMRR> iommu_map 0x8fedd
(XEN) <RMRR> iommu_map 0x8fede
(XEN) <RMRR> iommu_map 0x8fedf
(XEN) <RMRR> iommu_map 0x8fee0
(XEN) <RMRR> iommu_map 0x8fee1
(XEN) <RMRR> iommu_map 0x8fee2
(XEN) <RMRR> iommu_map 0x8fee3
(XEN) <RMRR> iommu_map 0x8fee4
(XEN) <RMRR> iommu_map 0x8fee5
(XEN) <RMRR> iommu_map 0x8fee6
(XEN) <RMRR> iommu_map 0x8fee7
(XEN) <RMRR> iommu_map 0x8fee8
(XEN) <RMRR> iommu_map 0x8fee9
(XEN) <RMRR> iommu_map 0x8feea
(XEN) <RMRR> iommu_map 0x8feeb
(XEN) <RMRR> iommu_map 0x8feec
(XEN) <RMRR> iommu_map 0x8feed
(XEN) <RMRR> iommu_map 0x8feee
(XEN) <RMRR> iommu_map 0x8feef
(XEN) <RMRR> iommu_map 0x8fef0
(XEN) <RMRR> iommu_map 0x8fef1
(XEN) <RMRR> iommu_map 0x8fef2
(XEN) <RMRR> iommu_map 0x8fef3
(XEN) <RMRR> iommu_map 0x8fef4
(XEN) <RMRR> iommu_map 0x8fef5
(XEN) <RMRR> iommu_map 0x8fef6
(XEN) <RMRR> iommu_map 0x8fef7
(XEN) <RMRR> iommu_map 0x8fef8
(XEN) <RMRR> iommu_map 0x8fef9
(XEN) <RMRR> iommu_map 0x8fefa
(XEN) <RMRR> iommu_map 0x8fefb
(XEN) <RMRR> iommu_map 0x8fefc
(XEN) <RMRR> iommu_map 0x8fefd
(XEN) <RMRR> iommu_map 0x8fefe
(XEN) <RMRR> iommu_map 0x8feff
(XEN) <RMRR> iommu_map 0x8ff00
(XEN) <RMRR> iommu_map 0x8ff01
(XEN) <RMRR> iommu_map 0x8ff02
(XEN) <RMRR> iommu_map 0x8ff03
(XEN) <RMRR> iommu_map 0x8ff04
(XEN) <RMRR> iommu_map 0x8ff05
(XEN) <RMRR> iommu_map 0x8ff06
(XEN) <RMRR> iommu_map 0x8ff07
(XEN) <RMRR> iommu_map 0x8ff08
(XEN) <RMRR> iommu_map 0x8ff09
(XEN) <RMRR> iommu_map 0x8ff0a
(XEN) <RMRR> iommu_map 0x8ff0b
(XEN) <RMRR> iommu_map 0x8ff0c
(XEN) <RMRR> iommu_map 0x8ff0d
(XEN) <RMRR> iommu_map 0x8ff0e
(XEN) <RMRR> iommu_map 0x8ff0f
(XEN) <RMRR> iommu_map 0x8ff10
(XEN) <RMRR> iommu_map 0x8ff11
(XEN) <RMRR> iommu_map 0x8ff12
(XEN) <RMRR> iommu_map 0x8ff13
(XEN) <RMRR> iommu_map 0x8ff14
(XEN) <RMRR> iommu_map 0x8ff15
(XEN) <RMRR> iommu_map 0x8ff16
(XEN) <RMRR> iommu_map 0x8ff17
(XEN) <RMRR> iommu_map 0x8ff18
(XEN) <RMRR> iommu_map 0x8ff19
(XEN) <RMRR> iommu_map 0x8ff1a
(XEN) <RMRR> iommu_map 0x8ff1b
(XEN) <RMRR> iommu_map 0x8ff1c
(XEN) <RMRR> iommu_map 0x8ff1d
(XEN) <RMRR> iommu_map 0x8ff1e
(XEN) <RMRR> iommu_map 0x8ff1f
(XEN) <RMRR> iommu_map 0x8ff20
(XEN) <RMRR> iommu_map 0x8ff21
(XEN) <RMRR> iommu_map 0x8ff22
(XEN) <RMRR> iommu_map 0x8ff23
(XEN) <RMRR> iommu_map 0x8ff24
(XEN) <RMRR> iommu_map 0x8ff25
(XEN) <RMRR> iommu_map 0x8ff26
(XEN) <RMRR> iommu_map 0x8ff27
(XEN) <RMRR> iommu_map 0x8ff28
(XEN) <RMRR> iommu_map 0x8ff29
(XEN) <RMRR> iommu_map 0x8ff2a
(XEN) <RMRR> iommu_map 0x8ff2b
(XEN) <RMRR> iommu_map 0x8ff2c
(XEN) <RMRR> iommu_map 0x8ff2d
(XEN) <RMRR> iommu_map 0x8ff2e
(XEN) <RMRR> iommu_map 0x8ff2f
(XEN) <RMRR> iommu_map 0x8ff30
(XEN) <RMRR> iommu_map 0x8ff31
(XEN) <RMRR> iommu_map 0x8ff32
(XEN) <RMRR> iommu_map 0x8ff33
(XEN) <RMRR> iommu_map 0x8ff34
(XEN) <RMRR> iommu_map 0x8ff35
(XEN) <RMRR> iommu_map 0x8ff36
(XEN) <RMRR> iommu_map 0x8ff37
(XEN) <RMRR> iommu_map 0x8ff38
(XEN) <RMRR> iommu_map 0x8ff39
(XEN) <RMRR> iommu_map 0x8ff3a
(XEN) <RMRR> iommu_map 0x8ff3b
(XEN) <RMRR> iommu_map 0x8ff3c
(XEN) <RMRR> iommu_map 0x8ff3d
(XEN) <RMRR> iommu_map 0x8ff3e
(XEN) <RMRR> iommu_map 0x8ff3f
(XEN) <RMRR> iommu_map 0x8ff40
(XEN) <RMRR> iommu_map 0x8ff41
(XEN) <RMRR> iommu_map 0x8ff42
(XEN) <RMRR> iommu_map 0x8ff43
(XEN) <RMRR> iommu_map 0x8ff44
(XEN) <RMRR> iommu_map 0x8ff45
(XEN) <RMRR> iommu_map 0x8ff46
(XEN) <RMRR> iommu_map 0x8ff47
(XEN) <RMRR> iommu_map 0x8ff48
(XEN) <RMRR> iommu_map 0x8ff49
(XEN) <RMRR> iommu_map 0x8ff4a
(XEN) <RMRR> iommu_map 0x8ff4b
(XEN) <RMRR> iommu_map 0x8ff4c
(XEN) <RMRR> iommu_map 0x8ff4d
(XEN) <RMRR> iommu_map 0x8ff4e
(XEN) <RMRR> iommu_map 0x8ff4f
(XEN) <RMRR> iommu_map 0x8ff50
(XEN) <RMRR> iommu_map 0x8ff51
(XEN) <RMRR> iommu_map 0x8ff52
(XEN) <RMRR> iommu_map 0x8ff53
(XEN) <RMRR> iommu_map 0x8ff54
(XEN) <RMRR> iommu_map 0x8ff55
(XEN) <RMRR> iommu_map 0x8ff56
(XEN) <RMRR> iommu_map 0x8ff57
(XEN) <RMRR> iommu_map 0x8ff58
(XEN) <RMRR> iommu_map 0x8ff59
(XEN) <RMRR> iommu_map 0x8ff5a
(XEN) <RMRR> iommu_map 0x8ff5b
(XEN) <RMRR> iommu_map 0x8ff5c
(XEN) <RMRR> iommu_map 0x8ff5d
(XEN) <RMRR> iommu_map 0x8ff5e
(XEN) <RMRR> iommu_map 0x8ff5f
(XEN) <RMRR> iommu_map 0x8ff60
(XEN) <RMRR> iommu_map 0x8ff61
(XEN) <RMRR> iommu_map 0x8ff62
(XEN) <RMRR> iommu_map 0x8ff63
(XEN) <RMRR> iommu_map 0x8ff64
(XEN) <RMRR> iommu_map 0x8ff65
(XEN) <RMRR> iommu_map 0x8ff66
(XEN) <RMRR> iommu_map 0x8ff67
(XEN) <RMRR> iommu_map 0x8ff68
(XEN) <RMRR> iommu_map 0x8ff69
(XEN) <RMRR> iommu_map 0x8ff6a
(XEN) <RMRR> iommu_map 0x8ff6b
(XEN) <RMRR> iommu_map 0x8ff6c
(XEN) <RMRR> iommu_map 0x8ff6d
(XEN) <RMRR> iommu_map 0x8ff6e
(XEN) <RMRR> iommu_map 0x8ff6f
(XEN) <RMRR> iommu_map 0x8ff70
(XEN) <RMRR> iommu_map 0x8ff71
(XEN) <RMRR> iommu_map 0x8ff72
(XEN) <RMRR> iommu_map 0x8ff73
(XEN) <RMRR> iommu_map 0x8ff74
(XEN) <RMRR> iommu_map 0x8ff75
(XEN) <RMRR> iommu_map 0x8ff76
(XEN) <RMRR> iommu_map 0x8ff77
(XEN) <RMRR> iommu_map 0x8ff78
(XEN) <RMRR> iommu_map 0x8ff79
(XEN) <RMRR> iommu_map 0x8ff7a
(XEN) <RMRR> iommu_map 0x8ff7b
(XEN) <RMRR> iommu_map 0x8ff7c
(XEN) <RMRR> iommu_map 0x8ff7d
(XEN) <RMRR> iommu_map 0x8ff7e
(XEN) <RMRR> iommu_map 0x8ff7f
(XEN) <RMRR> iommu_map 0x8ff80
(XEN) <RMRR> iommu_map 0x8ff81
(XEN) <RMRR> iommu_map 0x8ff82
(XEN) <RMRR> iommu_map 0x8ff83
(XEN) <RMRR> iommu_map 0x8ff84
(XEN) <RMRR> iommu_map 0x8ff85
(XEN) <RMRR> iommu_map 0x8ff86
(XEN) <RMRR> iommu_map 0x8ff87
(XEN) <RMRR> iommu_map 0x8ff88
(XEN) <RMRR> iommu_map 0x8ff89
(XEN) <RMRR> iommu_map 0x8ff8a
(XEN) <RMRR> iommu_map 0x8ff8b
(XEN) <RMRR> iommu_map 0x8ff8c
(XEN) <RMRR> iommu_map 0x8ff8d
(XEN) <RMRR> iommu_map 0x8ff8e
(XEN) <RMRR> iommu_map 0x8ff8f
(XEN) <RMRR> iommu_map 0x8ff90
(XEN) <RMRR> iommu_map 0x8ff91
(XEN) <RMRR> iommu_map 0x8ff92
(XEN) <RMRR> iommu_map 0x8ff93
(XEN) <RMRR> iommu_map 0x8ff94
(XEN) <RMRR> iommu_map 0x8ff95
(XEN) <RMRR> iommu_map 0x8ff96
(XEN) <RMRR> iommu_map 0x8ff97
(XEN) <RMRR> iommu_map 0x8ff98
(XEN) <RMRR> iommu_map 0x8ff99
(XEN) <RMRR> iommu_map 0x8ff9a
(XEN) <RMRR> iommu_map 0x8ff9b
(XEN) <RMRR> iommu_map 0x8ff9c
(XEN) <RMRR> iommu_map 0x8ff9d
(XEN) <RMRR> iommu_map 0x8ff9e
(XEN) <RMRR> iommu_map 0x8ff9f
(XEN) <RMRR> iommu_map 0x8ffa0
(XEN) <RMRR> iommu_map 0x8ffa1
(XEN) <RMRR> iommu_map 0x8ffa2
(XEN) <RMRR> iommu_map 0x8ffa3
(XEN) <RMRR> iommu_map 0x8ffa4
(XEN) <RMRR> iommu_map 0x8ffa5
(XEN) <RMRR> iommu_map 0x8ffa6
(XEN) <RMRR> iommu_map 0x8ffa7
(XEN) <RMRR> iommu_map 0x8ffa8
(XEN) <RMRR> iommu_map 0x8ffa9
(XEN) <RMRR> iommu_map 0x8ffaa
(XEN) <RMRR> iommu_map 0x8ffab
(XEN) <RMRR> iommu_map 0x8ffac
(XEN) <RMRR> iommu_map 0x8ffad
(XEN) <RMRR> iommu_map 0x8ffae
(XEN) <RMRR> iommu_map 0x8ffaf
(XEN) <RMRR> iommu_map 0x8ffb0
(XEN) <RMRR> iommu_map 0x8ffb1
(XEN) <RMRR> iommu_map 0x8ffb2
(XEN) <RMRR> iommu_map 0x8ffb3
(XEN) <RMRR> iommu_map 0x8ffb4
(XEN) <RMRR> iommu_map 0x8ffb5
(XEN) <RMRR> iommu_map 0x8ffb6
(XEN) <RMRR> iommu_map 0x8ffb7
(XEN) <RMRR> iommu_map 0x8ffb8
(XEN) <RMRR> iommu_map 0x8ffb9
(XEN) <RMRR> iommu_map 0x8ffba
(XEN) <RMRR> iommu_map 0x8ffbb
(XEN) <RMRR> iommu_map 0x8ffbc
(XEN) <RMRR> iommu_map 0x8ffbd
(XEN) <RMRR> iommu_map 0x8ffbe
(XEN) <RMRR> iommu_map 0x8ffbf
(XEN) <RMRR> iommu_map 0x8ffc0
(XEN) <RMRR> iommu_map 0x8ffc1
(XEN) <RMRR> iommu_map 0x8ffc2
(XEN) <RMRR> iommu_map 0x8ffc3
(XEN) <RMRR> iommu_map 0x8ffc4
(XEN) <RMRR> iommu_map 0x8ffc5
(XEN) <RMRR> iommu_map 0x8ffc6
(XEN) <RMRR> iommu_map 0x8ffc7
(XEN) <RMRR> iommu_map 0x8ffc8
(XEN) <RMRR> iommu_map 0x8ffc9
(XEN) <RMRR> iom(XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
(XEN) Freed 480kB init memory
mapping kernel into physical memory
about to get started...
[    0.000000] Linux version 5.2.2-linuxkit (root@7f07c3b31511) (gcc version 8.3.0 (Alpine 8.3.0)) #1 SMP Wed Jul 24 22:58:26 UTC 2019
[    0.000000] Command line: console=tty0 rootdelay=3 root=PARTUUID=c695b171-a773-4599-9e93-171a1baa972c text
[    0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
[    0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
[    0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
[    0.000000] x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
[    0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format.
[    0.000000] Released 0 page(s)
[    0.000000] BIOS-provided physical RAM map:
[    0.000000] Xen: [mem 0x0000000000000000-0x0000000000057fff] usable
[    0.000000] Xen: [mem 0x0000000000058000-0x0000000000058fff] reserved
[    0.000000] Xen: [mem 0x0000000000059000-0x000000000009efff] usable
[    0.000000] Xen: [mem 0x000000000009f000-0x00000000000fffff] reserved
[    0.000000] Xen: [mem 0x0000000000100000-0x0000000040061fff] usable
[    0.000000] Xen: [mem 0x000000008648a000-0x000000008648afff] ACPI NVS
[    0.000000] Xen: [mem 0x000000008648b000-0x00000000864b4fff] reserved
[    0.000000] Xen: [mem 0x000000008c224000-0x000000008c527fff] reserved
[    0.000000] Xen: [mem 0x000000008c736000-0x000000008cea6fff] ACPI NVS
[    0.000000] Xen: [mem 0x000000008cea7000-0x000000008d2fefff] reserved
[    0.000000] Xen: [mem 0x000000008d300000-0x000000008d3fffff] reserved
[    0.000000] Xen: [mem 0x00000000e0000000-0x00000000efffffff] reserved
[    0.000000] Xen: [mem 0x00000000fe000000-0x00000000fe010fff] reserved
[    0.000000] Xen: [mem 0x00000000fec00000-0x00000000fec00fff] reserved
[    0.000000] Xen: [mem 0x00000000fed90000-0x00000000fed91fff] reserved
[    0.000000] Xen: [mem 0x00000000fee00000-0x00000000feefffff] reserved
[    0.000000] Xen: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
[    0.000000] NX (Execute Disable) protection: active
[    0.000000] efi: EFI v2.40 by American Megatrends
[    0.000000] efi:  ESRT=0x8d29c098  ACPI=0x8ce49000  ACPI 2.0=0x8ce49000  SMBIOS=0xf05e0  SMBIOS 3.0=0xf0600  MPS=0xfc9c0 
[    0.000000] SMBIOS 3.0.0 present.
[    0.000000] DMI:  /, BIOS 5.11 06/12/2017
[    0.000000] Hypervisor detected: Xen PV
[    0.000646] tsc: Detected 2496.124 MHz processor
[    0.010215] last_pfn = 0x40062 max_arch_pfn = 0x400000000
[    0.010217] Disabled
[    0.010218] x86/PAT: MTRRs disabled, skipping PAT initialization too.
[    0.010222] x86/PAT: Configuration [0-7]: WB  WT  UC- UC  WC  WP  UC  UC  
[    0.010246] Kernel/User page tables isolation: disabled on XEN PV.
[    0.182389] Secure boot disabled
[    0.182403] ACPI: Early table checksum verification disabled
[    0.182410] ACPI: RSDP 0x000000008CE49000 000024 (v02 ALASKA)
[    0.182419] ACPI: XSDT 0x000000008CE490A8 0000CC (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.182448] ACPI: FACP 0x000000008CE6C370 00010C (v05 ALASKA A M I    01072009 AMI  00010013)
[    0.182503] ACPI: DSDT 0x000000008CE49208 023167 (v02 ALASKA A M I    01072009 INTL 20120913)
[    0.182514] ACPI: FACS 0x000000008CE8EF80 000040
[    0.182525] ACPI: APIC 0x000000008CE6C480 000084 (v03 ALASKA A M I    01072009 AMI  00010013)
[    0.182536] ACPI: FPDT 0x000000008CE6C508 000044 (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.182547] ACPI: FIDT 0x000000008CE6C550 00009C (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.182558] ACPI: MCFG 0x000000008CE6C5F0 00003C (v01 ALASKA A M I    01072009 MSFT 00000097)
[    0.182569] ACPI: HPET 0x000000008CE6C630 000038 (v01 ALASKA A M I    01072009 AMI. 0005000B)
[    0.182580] ACPI: LPIT 0x000000008CE6C668 000094 (v01 INTEL  SKL-ULT  00000000 MSFT 0000005F)
[    0.182591] ACPI: SSDT 0x000000008CE6C700 000248 (v02 INTEL  sensrhub 00000000 INTL 20120913)
[    0.182602] ACPI: SSDT 0x000000008CE6C948 002BAE (v02 INTEL  PtidDevc 00001000 INTL 20120913)
[    0.182613] ACPI: SSDT 0x000000008CE6F4F8 000BE3 (v02 INTEL  Ther_Rvp 00001000 INTL 20120913)
[    0.182624] ACPI: SSDT 0x000000008CE700E0 0004A3 (v02 INTEL  zpodd    00001000 INTL 20120913)
[    0.182635] ACPI: DBGP 0x000000008CE70588 000034 (v01 INTEL           00000000 MSFT 0000005F)
[    0.182646] ACPI: DBG2 0x000000008CE705C0 000054 (v00 INTEL           00000000 MSFT 0000005F)
[    0.182657] ACPI: SSDT 0x000000008CE70618 0006E9 (v02 INTEL  xh_rvp07 00000000 INTL 20120913)
[    0.182668] ACPI: SSDT 0x000000008CE70D08 00547E (v02 SaSsdt SaSsdt   00003000 INTL 20120913)
[    0.182679] ACPI: UEFI 0x000000008CE76188 000042 (v01                 00000000      00000000)
[    0.182700] ACPI: SSDT 0x000000008CE761D0 000E73 (v02 CpuRef CpuSsdt  00003000 INTL 20120913)
[    0.182711] ACPI: BGRT 0x000000008CE77048 000038 (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.182722] ACPI: RMAD 0x000000008CE77080 0000A8 (v01 INTEL  SKL      00000001 INTL 00000001)
[    0.182733] ACPI: TPM2 0x000000008CE77128 000034 (v03        Tpm2Tabl 00000001 AMI  00000000)
[    0.182744] ACPI: ASF! 0x000000008CE77160 0000A5 (v32 INTEL   HCG     00000001 TFSM 000F4240)
[    0.182774] Setting APIC routing to Xen PV.
[    0.186454] Zone ranges:
[    0.186456]   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
[    0.186458]   DMA32    [mem 0x0000000001000000-0x0000000040061fff]
[    0.186459]   Normal   empty
[    0.186461] Movable zone start for each node
[    0.186462] Early memory node ranges
[    0.186463]   node   0: [mem 0x0000000000001000-0x0000000000057fff]
[    0.186464]   node   0: [mem 0x0000000000059000-0x000000000009efff]
[    0.186466]   node   0: [mem 0x0000000000100000-0x0000000040061fff]
[    0.186468] Zeroed struct page in unavailable ranges: 99 pages
[    0.186470] Initmem setup node 0 [mem 0x0000000000001000-0x0000000040061fff]
[    0.190005] p2m virtual area at (____ptrval____), size is 40000000
[    0.447807] Remapped 98 page(s)
[    0.447849] Reserving Intel graphics memory at [mem 0x8e000000-0x8fffffff]
[    0.448168] ACPI: PM-Timer IO Port: 0x1808
[    0.448201] ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
[    0.448203] ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
[    0.448205] ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
[    0.448207] ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
[    0.448250] IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
[    0.448258] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
[    0.448261] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
[    0.448274] Using ACPI (MADT) for SMP configuration information
[    0.448279] ACPI: HPET id: 0x8086a701 base: 0xfed00000
[    0.448285] smpboot: Allowing 4 CPUs, 0 hotplug CPUs
[    0.448302] [mem 0x90000000-0xdfffffff] available for PCI devices
[    0.448306] Booting paravirtualized kernel on Xen
[    0.448307] Xen version: 4.12.0 (preserve-AD)
[    0.448310] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[    0.558877] setup_percpu: NR_CPUS:128 nr_cpumask_bits:128 nr_cpu_ids:4 nr_node_ids:1
[    0.559139] percpu: Embedded 53 pages/cpu s177368 r8192 d31528 u524288
[    0.559195] Built 1 zonelists, mobility grouping on.  Total pages: 258024
[    0.559198] Kernel command line: console=tty0 rootdelay=3 root=PARTUUID=c695b171-a773-4599-9e93-171a1baa972c text
[    0.559386] Dentry cache hash table entries: 131072 (order: 8, 1048576 bytes)
[    0.559427] Inode-cache hash table entries: 65536 (order: 7, 524288 bytes)
[    0.589181] software IO TLB: mapped [mem 0x3a600000-0x3e600000] (64MB)
[    0.593735] Memory: 930848K/1048572K available (12291K kernel code, 1624K rwdata, 3196K rodata, 1652K init, 1816K bss, 117724K reserved, 0K cma-reserved)
[    0.593831] ftrace: allocating 45006 entries in 176 pages
[    0.613848] rcu: Hierarchical RCU implementation.
[    0.613851] rcu: 	RCU restricting CPUs from NR_CPUS=128 to nr_cpu_ids=1.
[    0.613853] rcu: RCU calculated value of scheduler-enlistment delay is 10 jiffies.
[    0.613854] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1
[    0.617102] Using NULL legacy PIC
[    0.617103] NR_IRQS: 8448, nr_irqs: 256, preallocated irqs: 0
[    0.617144] xen:events: Using FIFO-based ABI
[    0.617277] random: get_random_bytes called from start_kernel+0x2d8/0x4ae with crng_init=0
[    0.617392] Console: colour dummy device 80x25
[    0.617578] printk: console [tty0] enabled
[    0.618206] printk: console [hvc0] enabled
[    0.618215] ACPI: Core revision 20190509
[    0.633324] ACPI BIOS Warning (bug): Incorrect checksum in table [BGRT] - 0x89, should be 0xAF (20190509/tbprint-177)
[    0.633440] clocksource: xen: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
[    0.633463] installing Xen timer for CPU 0
[    0.633491] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23faec6d5b7, max_idle_ns: 440795304359 ns
[    0.633502] Calibrating delay loop (skipped), value calculated using timer frequency.. 4992.24 BogoMIPS (lpj=24961240)
[    0.633511] pid_max: default: 32768 minimum: 301
[    0.633570] LSM: Security Framework initializing
[    0.633577] Yama: becoming mindful.
[    0.633602] Mount-cache hash table entries: 2048 (order: 2, 16384 bytes)
[    0.633611] Mountpoint-cache hash table entries: 2048 (order: 2, 16384 bytes)
[    0.633924] Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
[    0.633930] Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
[    0.633937] Spectre V2 : Mitigation: Full generic retpoline
[    0.633941] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
[    0.633948] Speculative Store Bypass: Vulnerable
[    0.633954] MDS: Vulnerable: Clear CPU buffers attempted, no microcode
[    0.662416] Freeing SMP alternatives memory: 20K
[    0.663613] VPMU disabled by hypervisor.
[    0.663815] Performance Events: unsupported p6 CPU model 78 no PMU driver, software events only.
[    0.663887] rcu: Hierarchical SRCU implementation.
[    0.663985] NMI watchdog: Perf NMI watchdog permanently disabled
[    0.664051] smp: Bringing up secondary CPUs ...
[    0.664056] smp: Brought up 1 node, 1 CPU
[    0.664060] smpboot: Max logical packages: 4
[    0.664230] devtmpfs: initialized
[    0.664302] x86/mm: Memory block size: 128MB
[    0.664692] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[    0.664703] futex hash table entries: 256 (order: 2, 16384 bytes)
[    0.664753] pinctrl core: initialized pinctrl subsystem
[    0.664932] NET: Registered protocol family 16
[    0.664952] xen:grant_table: Grant tables using version 1 layout
[    0.664969] Grant table initialized
[    0.665113] audit: initializing netlink subsys (disabled)
[    0.665221] audit: type=2000 audit(1564509155.705:1): state=initialized audit_enabled=0 res=1
[    0.665383] ACPI FADT declares the system doesn't support PCIe ASPM, so disable it
[    0.665391] ACPI: bus type PCI registered
[    0.665524] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000)
[    0.665534] PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820
[    0.716394] PCI: Using configuration type 1 for base access
[    0.719770] cryptd: max_cpu_qlen set to 1000
[    0.722662] ACPI: Added _OSI(Module Device)
[    0.722668] ACPI: Added _OSI(Processor Device)
[    0.722672] ACPI: Added _OSI(3.0 _SCP Extensions)
[    0.722677] ACPI: Added _OSI(Processor Aggregator Device)
[    0.722683] ACPI: Added _OSI(Linux-Dell-Video)
[    0.722687] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
[    0.722693] ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
[    0.772270] ACPI: 8 ACPI AML tables successfully acquired and loaded
[    0.776631] ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored
[    0.781780] ACPI: Dynamic OEM Table Load:
[    0.781791] ACPI: SSDT 0xFFFF888039888400 00037F (v02 PmRef  Cpu0Cst  00003001 INTL 20120913)
[    0.782444] ACPI: Dynamic OEM Table Load:
[    0.782453] ACPI: SSDT 0xFFFF8880398FC800 00063F (v02 PmRef  Cpu0Ist  00003000 INTL 20120913)
[    0.784853] ACPI: EC: EC started
[    0.784858] ACPI: EC: interrupt blocked
[    0.784917] ACPI: \_SB_.PCI0.LPCB.EC0_: Used as first EC
[    0.784924] ACPI: \_SB_.PCI0.LPCB.EC0_: GPE=0x50, EC_CMD/EC_SC=0x66, EC_DATA=0x62
[    0.784931] ACPI: \_SB_.PCI0.LPCB.EC0_: Boot DSDT EC used to handle transactions
[    0.784937] ACPI: Interpreter enabled
[    0.784955] ACPI: (supports S0 S5)
[    0.784960] ACPI: Using IOAPIC for interrupt routing
[    0.785013] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
[    0.786383] ACPI: Enabled 7 GPEs in block 00 to 7F
[    0.789751] ACPI: Power Resource [PG00] (on)
[    0.790199] ACPI: Power Resource [PG01] (on)
[    0.790629] ACPI: Power Resource [PG02] (on)
[    0.797498] ACPI: Power Resource [WRST] (on)
[    0.798008] ACPI: Power Resource [WRST] (on)
[    0.798466] ACPI: Power Resource [WRST] (on)
[    0.798923] ACPI: Power Resource [WRST] (on)
[    0.799419] ACPI: Power Resource [WRST] (on)
[    0.799864] ACPI: Power Resource [WRST] (on)
[    0.800318] ACPI: Power Resource [WRST] (on)
[    0.800837] ACPI: Power Resource [WRST] (on)
[    0.801295] ACPI: Power Resource [WRST] (on)
[    0.801741] ACPI: Power Resource [WRST] (on)
[    0.802265] ACPI: Power Resource [WRST] (on)
[    0.802714] ACPI: Power Resource [WRST] (on)
[    0.803160] ACPI: Power Resource [WRST] (on)
[    0.803641] ACPI: Power Resource [WRST] (on)
[    0.804088] ACPI: Power Resource [WRST] (on)
[    0.804538] ACPI: Power Resource [WRST] (on)
[    0.805051] ACPI: Power Resource [WRST] (on)
[    0.805511] ACPI: Power Resource [WRST] (on)
[    0.805964] ACPI: Power Resource [WRST] (on)
[    0.806464] ACPI: Power Resource [WRST] (on)
[    0.822080] ACPI: Power Resource [FN00] (off)
[    0.822198] ACPI: Power Resource [FN01] (off)
[    0.822313] ACPI: Power Resource [FN02] (off)
[    0.822427] ACPI: Power Resource [FN03] (off)
[    0.822540] ACPI: Power Resource [FN04] (off)
[    0.824176] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe])
[    0.824189] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3]
[    0.827485] acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME PCIeCapability LTR]
[    0.827494] acpi PNP0A08:00: FADT indicates ASPM is unsupported, using BIOS configuration
[    0.828152] PCI host bridge to bus 0000:00
[    0.828160] pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
[    0.828166] pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
[    0.828172] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
[    0.828179] pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window]
[    0.828186] pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window]
[    0.828193] pci_bus 0000:00: root bus resource [bus 00-fe]
[    0.828222] pci 0000:00:00.0: [8086:1904] type 00 class 0x060000
(XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
(XEN) PCI add device 0000:00:00.0
[    0.828899] pci 0000:00:02.0: [8086:1916] type 00 class 0x030000
[    0.828953] pci 0000:00:02.0: reg 0x10: [mem 0xde000000-0xdeffffff 64bit]
[    0.828986] pci 0000:00:02.0: reg 0x18: [mem 0xc0000000-0xcfffffff 64bit pref]
[    0.829010] pci 0000:00:02.0: reg 0x20: [io  0xf000-0xf03f]
[    0.829073] pci 0000:00:02.0: BAR 2: assigned to efifb
(XEN) PCI add device 0000:00:02.0
[    0.829381] pci 0000:00:08.0: [8086:1911] type 00 class 0x088000
[    0.829439] pci 0000:00:08.0: reg 0x10: [mem 0xdf44f000-0xdf44ffff 64bit]
(XEN) PCI add device 0000:00:08.0
[    0.829858] pci 0000:00:14.0: [8086:9d2f] type 00 class 0x0c0330
[    0.829930] pci 0000:00:14.0: reg 0x10: [mem 0xdf430000-0xdf43ffff 64bit]
[    0.830139] pci 0000:00:14.0: PME# supported from D3hot D3cold
(XEN) PCI add device 0000:00:14.0
[    0.830507] pci 0000:00:14.2: [8086:9d31] type 00 class 0x118000
[    0.830584] pci 0000:00:14.2: reg 0x10: [mem 0xdf44e000-0xdf44efff 64bit]
(XEN) PCI add device 0000:00:14.2
[    0.830994] pci 0000:00:16.0: [8086:9d3a] type 00 class 0x078000
[    0.831069] pci 0000:00:16.0: reg 0x10: [mem 0xdf44d000-0xdf44dfff 64bit]
[    0.831320] pci 0000:00:16.0: PME# supported from D3hot
(XEN) PCI add device 0000:00:16.0
[    0.831591] pci 0000:00:17.0: [8086:9d03] type 00 class 0x010601
[    0.831657] pci 0000:00:17.0: reg 0x10: [mem 0xdf448000-0xdf449fff]
[    0.831687] pci 0000:00:17.0: reg 0x14: [mem 0xdf44c000-0xdf44c0ff]
[    0.831718] pci 0000:00:17.0: reg 0x18: [io  0xf090-0xf097]
[    0.831748] pci 0000:00:17.0: reg 0x1c: [io  0xf080-0xf083]
[    0.831778] pci 0000:00:17.0: reg 0x20: [io  0xf060-0xf07f]
[    0.831807] pci 0000:00:17.0: reg 0x24: [mem 0xdf44b000-0xdf44b7ff]
[    0.831945] pci 0000:00:17.0: PME# supported from D3hot
(XEN) PCI add device 0000:00:17.0
[    0.832211] pci 0000:00:1c.0: [8086:9d12] type 01 class 0x060400
[    0.832486] pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold
[    0.832529] pci 0000:00:1c.0: Intel SPT PCH root port ACS workaround enabled
(XEN) PCI add device 0000:00:1c.0
[    0.832876] pci 0000:00:1c.5: [8086:9d15] type 01 class 0x060400
[    0.833156] pci 0000:00:1c.5: PME# supported from D0 D3hot D3cold
[    0.833202] pci 0000:00:1c.5: Intel SPT PCH root port ACS workaround enabled
(XEN) PCI add device 0000:00:1c.5
[    0.833481] pci 0000:00:1f.0: [8086:9d48] type 00 class 0x060100
(XEN) PCI add device 0000:00:1f.0
[    0.833994] pci 0000:00:1f.2: [8086:9d21] type 00 class 0x058000
[    0.834045] pci 0000:00:1f.2: reg 0x10: [mem 0xdf444000-0xdf447fff]
(XEN) PCI add device 0000:00:1f.2
[    0.834421] pci 0000:00:1f.3: [8086:9d70] type 00 class 0x040300
[    0.834500] pci 0000:00:1f.3: reg 0x10: [mem 0xdf440000-0xdf443fff 64bit]
[    0.834593] pci 0000:00:1f.3: reg 0x20: [mem 0xdf420000-0xdf42ffff 64bit]
[    0.834738] pci 0000:00:1f.3: PME# supported from D3hot D3cold
(XEN) PCI add device 0000:00:1f.3
[    0.835065] pci 0000:00:1f.4: [8086:9d23] type 00 class 0x0c0500
[    0.835158] pci 0000:00:1f.4: reg 0x10: [mem 0xdf44a000-0xdf44a0ff 64bit]
[    0.835261] pci 0000:00:1f.4: reg 0x20: [io  0xf040-0xf05f]
(XEN) PCI add device 0000:00:1f.4
[    0.835653] pci 0000:00:1f.6: [8086:156f] type 00 class 0x020000
[    0.835726] pci 0000:00:1f.6: reg 0x10: [mem 0xdf400000-0xdf41ffff]
[    0.835992] [    1.553652] ahci 0000:00:17.0: AHCI 0001.0301 32 slots 2 ports 6 Gbps 0x3 impl SATA mode
[    1.553684] ahci 0000:00:17.0: flags: 64bit ncq pm led clo only pio slum part deso sadm sds apst 
[    1.554000] scsi host0: ahci
[    1.554109] scsi host1: ahci
[    1.554171] ata1: SATA max UDMA/133 abar m2048@0xdf44b000 port 0xdf44b100 irq 131
[    1.554204] ata2: SATA max UDMA/133 abar m2048@0xdf44b000 port 0xdf44b180 irq 131
[    1.554376] tun: Universal TUN/TAP device driver, 1.6
[    1.554502] VMware vmxnet3 virtual NIC driver - version 1.4.16.0-k-NAPI
[    1.554537] xen_netfront: Initialising Xen virtual ethernet driver
[    1.554577] hv_vmbus: registering driver hv_netvsc
[    1.554597] Fusion MPT base driver 3.04.20
[    1.554614] Copyright (c) 1999-2008 LSI Corporation
[    1.554635] Fusion MPT SPI Host driver 3.04.20
[    1.555595] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
[    1.556521] ehci-pci: EHCI PCI platform driver
[    1.557417] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
[    1.558376] ohci-pci: OHCI PCI platform driver
[    1.559305] uhci_hcd: USB Universal Host Controller Interface driver
[    1.560344] Already setup the GSI :16
[    1.561320] xhci_hcd 0000:00:14.0: xHCI Host Controller
[    1.562258] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1
[    1.564277] xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000081109810
[    1.565268] xhci_hcd 0000:00:14.0: cache line size of 64 is not supported
[    1.566547] hub 1-0:1.0: USB hub found
[    1.567514] hub 1-0:1.0: 12 ports detected
[    1.569648] xhci_hcd 0000:00:14.0: xHCI Host Controller
[    1.570606] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2
[    1.571521] xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed
[    1.572600] hub 2-0:1.0: USB hub found
[    1.573605] hub 2-0:1.0: 6 ports detected
[    1.574898] usb: port power management may be unreliable
[    1.576327] usbcore: registered new interface driver usb-storage
[    1.577322] i8042: PNP: No PS/2 controller found.
[    1.578233] i8042: Probing ports directly.
[    1.583858] serio: i8042 KBD port at 0x60,0x64 irq 1
[    1.584834] serio: i8042 AUX port at 0x60,0x64 irq 12
[    1.585890] hv_vmbus: registering driver hyperv_keyboard
[    1.586894] mousedev: PS/2 mouse device common for all mice
[    1.587973] input: PC Speaker as /devices/platform/pcspkr/input/input4
[    1.589028] rtc_cmos 00:08: RTC can wake from S4
[    1.590580] rtc_cmos 00:08: registered as rtc0
[    1.591561] rtc_cmos 00:08: alarms up to one month, y3k, 242 bytes nvram
[    1.592538] i2c /dev entries driver
[    1.593496] device-mapper: ioctl: 4.40.0-ioctl (2019-01-18) initialised: dm-devel@redhat.com
[    1.594533] intel_pstate: CPU model not supported
[    1.595518] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input3
[    1.596563] sdhci: Secure Digital Host Controller Interface driver
[    1.597476] sdhci: Copyright(c) Pierre Ossman
[    1.599478] sdhci-pltfm: SDHCI platform and OF driver helper
[    1.600865] EFI Variables Facility v0.08 2004-May-17
[    1.607713] pstore: Registered efi as persistent store backend
[    1.608641] usbcore: registered new interface driver usbhid
[    1.609591] usbhid: USB HID core driver
[    1.610543] hv_utils: Registering HyperV Utility Driver
[    1.611443] hv_vmbus: registering driver hv_utils
[    1.612396] hv_vmbus: registering driver hv_balloon
[    1.613331] oprofile: using NMI timer interrupt.
[    1.614240] GACT probability on
[    1.615168] Mirror/redirect action on
[    1.616074] Simple TC action Loaded
[    1.616918] u32 classifier
[    1.617822]     Performance counters on
[    1.618671]     input device check on
[    1.619573]     Actions configured
[    1.620588] xt_time: kernel timezone is -0000
[    1.621422] IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP)
[    1.622320] IPVS: Connection hash table configured (size=4096, memory=64Kbytes)
[    1.623332] IPVS: ipvs loaded.
[    1.624186] IPVS: [rr] scheduler registered.
[    1.625078] IPVS: [wrr] scheduler registered.
[    1.625955] IPVS: [lc] scheduler registered.
[    1.626784] IPVS: [wlc] scheduler registered.
[    1.627661] IPVS: [fo] scheduler registered.
[    1.628514] IPVS: [ovf] scheduler registered.
[    1.629336] IPVS: [lblc] scheduler registered.
[    1.630201] IPVS: [lblcr] scheduler registered.
[    1.630980] IPVS: [dh] scheduler registered.
[    1.631843] IPVS: [sh] scheduler registered.
[    1.632696] IPVS: [sed] scheduler registered.
[    1.633467] IPVS: [nq] scheduler registered.
[    1.634314] IPVS: ftp: loaded support on port[0] = 21
[    1.635129] ipip: IPv4 and MPLS over IPv4 tunneling driver
[    1.636047] gre: GRE over IPv4 demultiplexor driver
[    1.636947] ipt_CLUSTERIP: ClusterIP Version 0.8 loaded successfully
[    1.637741] Initializing XFRM netlink socket
[    1.638576] NET: Registered protocol family 10
[    1.639584] Segment Routing with IPv6
[    1.640543] NET: Registered protocol family 17
[    1.641361] NET: Registered protocol family 15
[    1.642116] Bridge firewalling registered
[    1.642974] 8021q: 802.1Q VLAN Support v1.8
[    1.643823] 9pnet: Installing 9P2000 support
[    1.644567] Initialising Xen transport for 9pfs
[    1.645389] Key type dns_resolver registered
[    1.646164] NET: Registered protocol family 40
[    1.647037] AVX2 version of gcm_enc/dec engaged.
[    1.647760] AES CTR mode by8 optimization enabled
[    1.649302] sched_clock: Marking stable (1627508612, 16278049)->(1649983119, -6196458)
[    1.650162] registered taskstats version 1
[    1.650975] Loading compiled-in X.509 certificates
[    1.651809] pstore: Using crash dump compression: deflate
[    1.652921] Key type big_key registered
[    1.653879] Key type encrypted registered
[    1.655815] rtc_cmos 00:08: setting system clock to 2019-07-30T17:52:37 UTC (1564509157)
[    1.656694] Waiting 3 sec before mounting root device...
[    1.876343] ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
[    1.882001] ata1.00: ATA-9: SQF-S25M8-64G-SAC, SAFM02A3, max UDMA/133
[    1.882998] ata1.00: 125045424 sectors, multi 16: LBA48 NCQ (depth 32), AA
[    1.883951] ata2: SATA link down (SStatus 4 SControl 300)
[    1.885069] ata1.00: configured for UDMA/133
[    1.886151] scsi 0:0:0:0: Direct-Access     ATA      SQF-S25M8-64G-SA 02A3 PQ: 0 ANSI: 5
[    1.887272] sd 0:0:0:0: [sda] 125045424 512-byte logical blocks: (64.0 GB/59.6 GiB)
[    1.888052] sd 0:0:0:0: [sda] Write Protect is off
[    1.888911] sd 0:0:0:0: Attached scsi generic sg0 type 0
[    1.889738] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
[    1.892255]  sda: sda1 sda2 sda3 sda4 sda9
[    1.893364] sd 0:0:0:0: [sda] Attached SCSI disk
[    1.903646] usb 1-4: new low-speed USB device number 2 using xhci_hcd
[    1.993599] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23faec6d5b7, max_idle_ns: 440795304359 ns
[    1.994625] clocksource: Switched to clocksource tsc
[    2.094528] input: Logitech USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-4/1-4:1.0/0003:046D:C31C.0001/input/input6
[    2.163787] hid-generic 0003:046D:C31C.0001: input: USB HID v1.10 Keyboard [Logitech USB Keyboard] on usb-0000:00:14.0-4/input0
[    2.170514] input: Logitech USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-4/1-4:1.1/0003:046D:C31C.0002/input/input7
[    2.233620] usb 2-2: new SuperSpeed Gen 1 USB device number 2 using xhci_hcd
[    2.234838] input: Logitech USB Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-4/1-4:1.1/0003:046D:C31C.0002/input/input8
[    2.235981] hid-generic 0003:046D:C31C.0002: input: USB HID v1.10 Device [Logitech USB Keyboard] on usb-0000:00:14.0-4/input1
[    2.270405] usb-storage 2-2:1.0: USB Mass Storage device detected
[    2.271711] scsi host2: usb-storage 2-2:1.0
[    2.413557] usb 1-7: new full-speed USB device number 3 using xhci_hcd
[    2.593787] random: fast init done
[    3.276491] scsi 2:0:0:0: Direct-Access              Patriot Memory   PMAP PQ: 0 ANSI: 6
[    3.277923] sd 2:0:0:0: Attached scsi generic sg1 type 0
[    3.280402] sd 2:0:0:0: [sdb] 61833216 512-byte logical blocks: (31.7 GB/29.5 GiB)
[    3.284879] sd 2:0:0:0: [sdb] Write Protect is off
[    3.289398] sd 2:0:0:0: [sdb] No Caching mode page found
[    3.290414] sd 2:0:0:0: [sdb] Assuming drive cache: write through
[    3.307621] GPT:Primary header thinks Alt. header is not at the end of the disk.
[    3.308873] GPT:716799 != 61833215
[    3.310126] GPT:Alternate GPT header not at the end of the disk.
[    3.311372] GPT:716799 != 61833215
[    3.312638] GPT: Use GNU Parted to correct GPT errors.
[    3.313909]  sdb: sdb1 sdb2 sdb4 sdb5
[    3.322977] sd 2:0:0:0: [sdb] Attached SCSI removable disk
[    4.720598] VFS: Mounted root (squashfs filesystem) readonly on device 8:2.
[    4.723597] Freeing unused kernel image memory: 1652K
[    4.743655] Write protecting the kernel read-only data: 18432k
[    4.752701] Freeing unused kernel image memory: 2028K
[    4.754474] Freeing unused kernel image memory: 900K
[    4.755790] Run /sbin/init as init process
[    5.394625] e1000e: Intel(R) PRO/1000 Network Driver - 3.2.6-k
[    5.395669] e1000e: Copyright(c) 1999 - 2015 Intel Corporation.
[    5.396906] Already setup the GSI :16
[    5.398089] e1000e 0000:00:1f.6: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode
[    5.500141] e1000e 0000:00:1f.6 0000:00:1f.6 (uninitialized): registered PHC clock
[    5.592232] e1000e 0000:00:1f.6 eth0: (PCI Express:2.5GT/s:Width x1) 00:0b:ab:e4:d0:c5
[    5.593317] e1000e 0000:00:1f.6 eth0: Intel(R) PRO/1000 Network Connection
[    5.596226] e1000e 0000:00:1f.6 eth0: MAC: 12, PHY: 12, PBA No: FFFFFF-0FF
[    5.635782] cfg80211: Loading compiled-in X.509 certificates for regulatory database
[    5.648965] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
[    5.650120] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
[    5.651269] cfg80211: failed to load regulatory.db
[    5.712607] rtl8723be 0000:01:00.0: enabling device (0000 -> 0003)
[    5.713904] Already setup the GSI :18
[    5.746649] rtl8723be: Using firmware rtlwifi/rtl8723befw_36.bin
[    5.750483] rtlwifi: rtlwifi: wireless switch is on
[    5.770463] igb: Intel(R) Gigabit Ethernet Network Driver - version 5.6.0-k
[    5.771576] igb: Copyright (c) 2007-2014 Intel Corporation.
[    5.772836] Already setup the GSI :17
[    5.804561] pps pps0: new PPS source ptp1
[    5.805915] igb 0000:02:00.0: added PHC on eth1
[    5.807264] igb 0000:02:00.0: Intel(R) Gigabit Ethernet Network Connection
[    5.808634] igb 0000:02:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:0b:ab:e4:d0:c6
[    5.810063] igb 0000:02:00.0: eth1: PBA No: 000200-000
[    5.811425] igb 0000:02:00.0: Using MSI-X interrupts. 1 rx queue(s), 1 tx queue(s)
[    6.743197] IPVS: ftp: loaded support on port[0] = 21
[    6.919282] FAT-fs (sda4): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive!
[    6.923375] FAT-fs (sda4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck.
[    7.020527] IPVS: ftp: loaded support on port[0] = 21
[    7.059272] random: crng init done
[    9.123675] usbcore: registered new interface driver qcserial
[    9.124892] usbserial: USB Serial support registered for Qualcomm USB modem
[    9.136107] usbcore: registered new interface driver cdc_wdm
[    9.143810] usbcore: registered new interface driver qmi_wwan
[    9.811695] EXT4-fs (sda9): mounting ext3 file system using the ext4 subsystem
[    9.833095] EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null)

[-- Attachment #3: Type: text/plain, Size: 157 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-26  7:58                                     ` Jan Beulich
@ 2019-07-30 17:56                                       ` Roman Shaposhnik
  2019-07-31  8:34                                         ` Jan Beulich
  0 siblings, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-30 17:56 UTC (permalink / raw)
  To: Jan Beulich
  Cc: Juergen Gross, Andrew Cooper, Paul Durrant, xen-devel,
	boris.ostrovsky, Roger Pau Monné

On Fri, Jul 26, 2019 at 1:06 AM Jan Beulich <JBeulich@suse.com> wrote:
>
> On 23.07.2019 20:25, Roman Shaposhnik wrote:
> > Interestingly enough, adding iommu_inclusive_mapping=1 AND iommu=debug
> > booted the system just fine.
>
> Btw (I've noticed this only now) - are you saying without "iommu=debug"
> the box does _not_ boot fine, despite the other option?

Yes. But it made sense to me since iommu=debug (as per your
explanation) overwhelms the CPU and I guess adding
iommu_inclusive_mapping=1 avoids the code path that does it?

Thanks,
Roman.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-30 17:55                                 ` Roman Shaposhnik
@ 2019-07-31  8:31                                   ` Jan Beulich
  2019-07-31  8:36                                   ` Roger Pau Monné
  1 sibling, 0 replies; 65+ messages in thread
From: Jan Beulich @ 2019-07-31  8:31 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: Juergen Gross, Andrew Cooper, Paul Durrant, xen-devel,
	boris.ostrovsky, Roger Pau Monné

On 30.07.2019 19:55, Roman Shaposhnik wrote:
> Sorry -- got a bit distracted yesterday. Attached is the log with only
> your latest patch attached. Interestingly enough the box booted fine
> without screen artifacts. So I guess we're getting closer...

I'm afraid I can't make sense of this and the prior results: Afaics
it was only debugging code which got changed, the actual code
changes to address the issue remained the same. Hence the earlier
patch should have worked too, if this latest one does.

Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-30 17:56                                       ` Roman Shaposhnik
@ 2019-07-31  8:34                                         ` Jan Beulich
  2019-07-31  8:58                                           ` Andrew Cooper
  0 siblings, 1 reply; 65+ messages in thread
From: Jan Beulich @ 2019-07-31  8:34 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: Juergen Gross, Andrew Cooper, Paul Durrant, xen-devel,
	boris.ostrovsky, Roger Pau Monné

On 30.07.2019 19:56, Roman Shaposhnik wrote:
> On Fri, Jul 26, 2019 at 1:06 AM Jan Beulich <JBeulich@suse.com> wrote:
>>
>> On 23.07.2019 20:25, Roman Shaposhnik wrote:
>>> Interestingly enough, adding iommu_inclusive_mapping=1 AND iommu=debug
>>> booted the system just fine.
>>
>> Btw (I've noticed this only now) - are you saying without "iommu=debug"
>> the box does _not_ boot fine, despite the other option?
> 
> Yes. But it made sense to me since iommu=debug (as per your
> explanation) overwhelms the CPU and I guess adding
> iommu_inclusive_mapping=1 avoids the code path that does it?

I'm afraid I don't follow: My question was whether
"iommu_inclusive_mapping=1" alone would not allow the box to boot.
Without "iommu=debug" there's no excessive logging afaict, no
matter what other IOMMU options you use.

Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-30 17:55                                 ` Roman Shaposhnik
  2019-07-31  8:31                                   ` Jan Beulich
@ 2019-07-31  8:36                                   ` Roger Pau Monné
  2019-07-31  8:43                                     ` Roger Pau Monné
  2019-07-31 19:30                                     ` Roman Shaposhnik
  1 sibling, 2 replies; 65+ messages in thread
From: Roger Pau Monné @ 2019-07-31  8:36 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Tue, Jul 30, 2019 at 10:55:24AM -0700, Roman Shaposhnik wrote:
> Sorry -- got a bit distracted yesterday. Attached is the log with only
> your latest patch attached. Interestingly enough the box booted fine
> without screen artifacts. So I guess we're getting closer...
> 
> Thanks for all the help!

That's quite weird, there's no functional changes between the
previous patches and this one, the only difference is that this patch
has more verbose output.

Are you sure you didn't have any local patches on top of Xen that
could explain this difference in behaviour?

Thanks, Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-31  8:36                                   ` Roger Pau Monné
@ 2019-07-31  8:43                                     ` Roger Pau Monné
  2019-07-31 19:35                                       ` Roman Shaposhnik
  2019-07-31 19:30                                     ` Roman Shaposhnik
  1 sibling, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-07-31  8:43 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Wed, Jul 31, 2019 at 10:36:31AM +0200, Roger Pau Monné wrote:
> On Tue, Jul 30, 2019 at 10:55:24AM -0700, Roman Shaposhnik wrote:
> > Sorry -- got a bit distracted yesterday. Attached is the log with only
> > your latest patch attached. Interestingly enough the box booted fine
> > without screen artifacts. So I guess we're getting closer...
> > 
> > Thanks for all the help!
> 
> That's quite weird, there's no functional changes between the
> previous patches and this one, the only difference is that this patch
> has more verbose output.
> 
> Are you sure you didn't have any local patches on top of Xen that
> could explain this difference in behaviour?

FWIW, can you please try the plain patch again:

https://lists.xenproject.org/archives/html/xen-devel/2019-07/msg01547.html

And report back?

I would like to get this committed ASAP if it does fix your issue.

Thanks, Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-31  8:34                                         ` Jan Beulich
@ 2019-07-31  8:58                                           ` Andrew Cooper
  2019-07-31  9:30                                             ` Jan Beulich
  0 siblings, 1 reply; 65+ messages in thread
From: Andrew Cooper @ 2019-07-31  8:58 UTC (permalink / raw)
  To: Jan Beulich, Roman Shaposhnik
  Cc: Juergen Gross, xen-devel, boris.ostrovsky, Paul Durrant,
	Roger Pau Monné

On 31/07/2019 09:34, Jan Beulich wrote:
> On 30.07.2019 19:56, Roman Shaposhnik wrote:
>> On Fri, Jul 26, 2019 at 1:06 AM Jan Beulich <JBeulich@suse.com> wrote:
>>> On 23.07.2019 20:25, Roman Shaposhnik wrote:
>>>> Interestingly enough, adding iommu_inclusive_mapping=1 AND iommu=debug
>>>> booted the system just fine.
>>> Btw (I've noticed this only now) - are you saying without "iommu=debug"
>>> the box does _not_ boot fine, despite the other option?
>> Yes. But it made sense to me since iommu=debug (as per your
>> explanation) overwhelms the CPU and I guess adding
>> iommu_inclusive_mapping=1 avoids the code path that does it?
> I'm afraid I don't follow: My question was whether
> "iommu_inclusive_mapping=1" alone would not allow the box to boot.
> Without "iommu=debug" there's no excessive logging afaict, no
> matter what other IOMMU options you use.

Without inclusive mappings, the system boots but the screen is junk and
there are DMA faults all over the place.  With inclusive mappings, it
all "works" fine.

With debug enabled, the DMA faults are spat out to the console for a
short while, until an APIC error occurs and the system wedges completely.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-31  8:58                                           ` Andrew Cooper
@ 2019-07-31  9:30                                             ` Jan Beulich
  2019-07-31 19:37                                               ` Roman Shaposhnik
  0 siblings, 1 reply; 65+ messages in thread
From: Jan Beulich @ 2019-07-31  9:30 UTC (permalink / raw)
  To: Andrew Cooper, Roman Shaposhnik
  Cc: Juergen Gross, xen-devel, boris.ostrovsky, Paul Durrant,
	Roger Pau Monné

On 31.07.2019 10:58, Andrew Cooper wrote:
> On 31/07/2019 09:34, Jan Beulich wrote:
>> On 30.07.2019 19:56, Roman Shaposhnik wrote:
>>> On Fri, Jul 26, 2019 at 1:06 AM Jan Beulich <JBeulich@suse.com> wrote:
>>>> On 23.07.2019 20:25, Roman Shaposhnik wrote:
>>>>> Interestingly enough, adding iommu_inclusive_mapping=1 AND iommu=debug
>>>>> booted the system just fine.
>>>> Btw (I've noticed this only now) - are you saying without "iommu=debug"
>>>> the box does _not_ boot fine, despite the other option?
>>> Yes. But it made sense to me since iommu=debug (as per your
>>> explanation) overwhelms the CPU and I guess adding
>>> iommu_inclusive_mapping=1 avoids the code path that does it?
>> I'm afraid I don't follow: My question was whether
>> "iommu_inclusive_mapping=1" alone would not allow the box to boot.
>> Without "iommu=debug" there's no excessive logging afaict, no
>> matter what other IOMMU options you use.
> 
> Without inclusive mappings, the system boots but the screen is junk and
> there are DMA faults all over the place.  With inclusive mappings, it
> all "works" fine.
> 
> With debug enabled, the DMA faults are spat out to the console for a
> short while, until an APIC error occurs and the system wedges completely.

Right - the verbosity _with_ "iommu=debug" may be a problem. Hence me
wondering whether the system indeed wouldn't boot _without_ that option.

Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-31  8:36                                   ` Roger Pau Monné
  2019-07-31  8:43                                     ` Roger Pau Monné
@ 2019-07-31 19:30                                     ` Roman Shaposhnik
  2019-08-01  8:45                                       ` Roger Pau Monné
  1 sibling, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-31 19:30 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Wed, Jul 31, 2019 at 1:36 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>
> On Tue, Jul 30, 2019 at 10:55:24AM -0700, Roman Shaposhnik wrote:
> > Sorry -- got a bit distracted yesterday. Attached is the log with only
> > your latest patch attached. Interestingly enough the box booted fine
> > without screen artifacts. So I guess we're getting closer...
> >
> > Thanks for all the help!
>
> That's quite weird, there's no functional changes between the
> previous patches and this one, the only difference is that this patch
> has more verbose output.

That's super weird indeed. I'm re-trying your very first patch right
now to see if it may be a pilot error on my part (hope not).

> Are you sure you didn't have any local patches on top of Xen that
> could explain this difference in behaviour?

Pretty sure -- but let me push my branch in EVE and show to you all
(you will need Docker installed to build Xen the way EVE does).

But if you want to check for yourself:
   $ git clone https://github.com/rvs/eve.git -b xen-bug
   $ cd eve/pkg/xen
   $ docker build  --no-cache  .
   $ docker export $(docker create XXX a) | tar xvf - boot
   $ ls boot/xen.gz

Thanks,
Roman.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-31  8:43                                     ` Roger Pau Monné
@ 2019-07-31 19:35                                       ` Roman Shaposhnik
  2019-07-31 19:46                                         ` Andrew Cooper
  0 siblings, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-31 19:35 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Wed, Jul 31, 2019 at 1:43 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>
> On Wed, Jul 31, 2019 at 10:36:31AM +0200, Roger Pau Monné wrote:
> > On Tue, Jul 30, 2019 at 10:55:24AM -0700, Roman Shaposhnik wrote:
> > > Sorry -- got a bit distracted yesterday. Attached is the log with only
> > > your latest patch attached. Interestingly enough the box booted fine
> > > without screen artifacts. So I guess we're getting closer...
> > >
> > > Thanks for all the help!
> >
> > That's quite weird, there's no functional changes between the
> > previous patches and this one, the only difference is that this patch
> > has more verbose output.
> >
> > Are you sure you didn't have any local patches on top of Xen that
> > could explain this difference in behaviour?
>
> FWIW, can you please try the plain patch again:
>
> https://lists.xenproject.org/archives/html/xen-devel/2019-07/msg01547.html
>
> And report back?
>
> I would like to get this committed ASAP if it does fix your issue.

I'd like to say that it did -- but I tried it again just now and it
still garbled screen and tons of:

(XEN) printk: 26665 messages suppressed.
(XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
8e14c000, iommu reg = ffff82c0008de000

I'm very much confused by what's going on, but it seems that's the
case -- adding those debug print statements make the issue go away

Here are the patches that are being applied:
   NOT WORKING:
https://github.com/rvs/eve/blob/xen-bug/pkg/xen/01-iommu-mappings.patch

   WORKING: https://github.com/rvs/eve/blob/a1291fcd4e669df2a63285afb5e8b4841f45c1c8/pkg/xen/01-iommu-mappings.patch

At this point I'm really not sure what's going on.

Thanks,
Roman.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-31  9:30                                             ` Jan Beulich
@ 2019-07-31 19:37                                               ` Roman Shaposhnik
  0 siblings, 0 replies; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-31 19:37 UTC (permalink / raw)
  To: Jan Beulich
  Cc: Juergen Gross, Andrew Cooper, Paul Durrant, xen-devel,
	boris.ostrovsky, Roger Pau Monné

On Wed, Jul 31, 2019 at 2:46 AM Jan Beulich <JBeulich@suse.com> wrote:
>
> On 31.07.2019 10:58, Andrew Cooper wrote:
> > On 31/07/2019 09:34, Jan Beulich wrote:
> >> On 30.07.2019 19:56, Roman Shaposhnik wrote:
> >>> On Fri, Jul 26, 2019 at 1:06 AM Jan Beulich <JBeulich@suse.com> wrote:
> >>>> On 23.07.2019 20:25, Roman Shaposhnik wrote:
> >>>>> Interestingly enough, adding iommu_inclusive_mapping=1 AND iommu=debug
> >>>>> booted the system just fine.
> >>>> Btw (I've noticed this only now) - are you saying without "iommu=debug"
> >>>> the box does _not_ boot fine, despite the other option?
> >>> Yes. But it made sense to me since iommu=debug (as per your
> >>> explanation) overwhelms the CPU and I guess adding
> >>> iommu_inclusive_mapping=1 avoids the code path that does it?
> >> I'm afraid I don't follow: My question was whether
> >> "iommu_inclusive_mapping=1" alone would not allow the box to boot.
> >> Without "iommu=debug" there's no excessive logging afaict, no
> >> matter what other IOMMU options you use.
> >
> > Without inclusive mappings, the system boots but the screen is junk and
> > there are DMA faults all over the place.  With inclusive mappings, it
> > all "works" fine.
> >
> > With debug enabled, the DMA faults are spat out to the console for a
> > short while, until an APIC error occurs and the system wedges completely.
>
> Right - the verbosity _with_ "iommu=debug" may be a problem. Hence me
> wondering whether the system indeed wouldn't boot _without_ that option.

Without iommu=debug (and any other option) the screen is garbled.

Thanks,
Roman.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-31 19:35                                       ` Roman Shaposhnik
@ 2019-07-31 19:46                                         ` Andrew Cooper
  2019-07-31 21:03                                           ` Roman Shaposhnik
  2019-08-01  7:35                                           ` Jan Beulich
  0 siblings, 2 replies; 65+ messages in thread
From: Andrew Cooper @ 2019-07-31 19:46 UTC (permalink / raw)
  To: Roman Shaposhnik, Roger Pau Monné
  Cc: jgross, xen-devel, boris.ostrovsky, Paul Durrant, jbeulich

On 31/07/2019 20:35, Roman Shaposhnik wrote:
> On Wed, Jul 31, 2019 at 1:43 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>> On Wed, Jul 31, 2019 at 10:36:31AM +0200, Roger Pau Monné wrote:
>>> On Tue, Jul 30, 2019 at 10:55:24AM -0700, Roman Shaposhnik wrote:
>>>> Sorry -- got a bit distracted yesterday. Attached is the log with only
>>>> your latest patch attached. Interestingly enough the box booted fine
>>>> without screen artifacts. So I guess we're getting closer...
>>>>
>>>> Thanks for all the help!
>>> That's quite weird, there's no functional changes between the
>>> previous patches and this one, the only difference is that this patch
>>> has more verbose output.
>>>
>>> Are you sure you didn't have any local patches on top of Xen that
>>> could explain this difference in behaviour?
>> FWIW, can you please try the plain patch again:
>>
>> https://lists.xenproject.org/archives/html/xen-devel/2019-07/msg01547.html
>>
>> And report back?
>>
>> I would like to get this committed ASAP if it does fix your issue.
> I'd like to say that it did -- but I tried it again just now and it
> still garbled screen and tons of:
>
> (XEN) printk: 26665 messages suppressed.
> (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
> 8e14c000, iommu reg = ffff82c0008de000
>
> I'm very much confused by what's going on, but it seems that's the
> case -- adding those debug print statements make the issue go away
>
> Here are the patches that are being applied:
>    NOT WORKING:
> https://github.com/rvs/eve/blob/xen-bug/pkg/xen/01-iommu-mappings.patch
>
>    WORKING: https://github.com/rvs/eve/blob/a1291fcd4e669df2a63285afb5e8b4841f45c1c8/pkg/xen/01-iommu-mappings.patch
>
> At this point I'm really not sure what's going on.

Ok.  seeing as you've double checked this, the mystery deepens.

My bet is on the intel_iommu_lookup_page() call having side effects[1]. 
If you take out the debugging in the middle of the loop in
rmrr_identity_mapping(), does the problem reproduce again?

~Andrew

[1] Looking at the internals of addr_to_dma_page_maddr(), it does 100%
more memory allocation and higher-level PTE construction than looks wise
for what is supposed to be a getter.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-31 19:46                                         ` Andrew Cooper
@ 2019-07-31 21:03                                           ` Roman Shaposhnik
  2019-08-01  8:15                                             ` Roger Pau Monné
  2019-08-01  7:35                                           ` Jan Beulich
  1 sibling, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-07-31 21:03 UTC (permalink / raw)
  To: Andrew Cooper
  Cc: jgross, Paul Durrant, jbeulich, xen-devel, boris.ostrovsky,
	Roger Pau Monné

On Wed, Jul 31, 2019 at 12:46 PM Andrew Cooper
<andrew.cooper3@citrix.com> wrote:
>
> On 31/07/2019 20:35, Roman Shaposhnik wrote:
> > On Wed, Jul 31, 2019 at 1:43 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> >> On Wed, Jul 31, 2019 at 10:36:31AM +0200, Roger Pau Monné wrote:
> >>> On Tue, Jul 30, 2019 at 10:55:24AM -0700, Roman Shaposhnik wrote:
> >>>> Sorry -- got a bit distracted yesterday. Attached is the log with only
> >>>> your latest patch attached. Interestingly enough the box booted fine
> >>>> without screen artifacts. So I guess we're getting closer...
> >>>>
> >>>> Thanks for all the help!
> >>> That's quite weird, there's no functional changes between the
> >>> previous patches and this one, the only difference is that this patch
> >>> has more verbose output.
> >>>
> >>> Are you sure you didn't have any local patches on top of Xen that
> >>> could explain this difference in behaviour?
> >> FWIW, can you please try the plain patch again:
> >>
> >> https://lists.xenproject.org/archives/html/xen-devel/2019-07/msg01547.html
> >>
> >> And report back?
> >>
> >> I would like to get this committed ASAP if it does fix your issue.
> > I'd like to say that it did -- but I tried it again just now and it
> > still garbled screen and tons of:
> >
> > (XEN) printk: 26665 messages suppressed.
> > (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
> > 8e14c000, iommu reg = ffff82c0008de000
> >
> > I'm very much confused by what's going on, but it seems that's the
> > case -- adding those debug print statements make the issue go away
> >
> > Here are the patches that are being applied:
> >    NOT WORKING:
> > https://github.com/rvs/eve/blob/xen-bug/pkg/xen/01-iommu-mappings.patch
> >
> >    WORKING: https://github.com/rvs/eve/blob/a1291fcd4e669df2a63285afb5e8b4841f45c1c8/pkg/xen/01-iommu-mappings.patch
> >
> > At this point I'm really not sure what's going on.
>
> Ok.  seeing as you've double checked this, the mystery deepens.
>
> My bet is on the intel_iommu_lookup_page() call having side effects[1].
> If you take out the debugging in the middle of the loop in
> rmrr_identity_mapping(), does the problem reproduce again?
>
> ~Andrew
>
> [1] Looking at the internals of addr_to_dma_page_maddr(), it does 100%
> more memory allocation and higher-level PTE construction than looks wise
> for what is supposed to be a getter.

Yup. That's what it is -- intel_iommu_lookup_page() seems to be the culprit.

I've did the experiment in the other direction -- adding a dummy call:
     https://github.com/rvs/eve/blob/36aeeaa7c0a53474fb1ecef2ff587a86637df858/pkg/xen/01-iommu-mappings.patch#L23
on top of original Roger's patch makes system boot NORMALLY.

Thanks,
Roman.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-31 19:46                                         ` Andrew Cooper
  2019-07-31 21:03                                           ` Roman Shaposhnik
@ 2019-08-01  7:35                                           ` Jan Beulich
  1 sibling, 0 replies; 65+ messages in thread
From: Jan Beulich @ 2019-08-01  7:35 UTC (permalink / raw)
  To: Andrew Cooper
  Cc: Juergen Gross, Roman Shaposhnik, Paul Durrant, xen-devel,
	boris.ostrovsky, Roger Pau Monné

On 31.07.2019 21:46, Andrew Cooper wrote:
> My bet is on the intel_iommu_lookup_page() call having side effects[1].
> If you take out the debugging in the middle of the loop in
> rmrr_identity_mapping(), does the problem reproduce again?

While your guess was right according to Roman's latest results, I'd
still like to note that ...

> [1] Looking at the internals of addr_to_dma_page_maddr(), it does 100%
> more memory allocation and higher-level PTE construction than looks wise
> for what is supposed to be a getter.

... there being 0 passed as last argument is supposed to suppress
any allocations (and from looking at the function I can't really
see any side effects yet in this case; all I do see is that the
first check of "alloc" could/should happen before looking up
PCI device and DRHD).

I've also double checked - there clearly is a flush after the call
to setup_hwdom_rmrr(). I'm not even convinced this flush has much
value, seeing that translation gets enabled only afterwards.

Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-31 21:03                                           ` Roman Shaposhnik
@ 2019-08-01  8:15                                             ` Roger Pau Monné
  2019-08-01 18:25                                               ` Roman Shaposhnik
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-08-01  8:15 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Wed, Jul 31, 2019 at 02:03:24PM -0700, Roman Shaposhnik wrote:
> On Wed, Jul 31, 2019 at 12:46 PM Andrew Cooper
> <andrew.cooper3@citrix.com> wrote:
> >
> > On 31/07/2019 20:35, Roman Shaposhnik wrote:
> > > On Wed, Jul 31, 2019 at 1:43 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > >> On Wed, Jul 31, 2019 at 10:36:31AM +0200, Roger Pau Monné wrote:
> > >>> On Tue, Jul 30, 2019 at 10:55:24AM -0700, Roman Shaposhnik wrote:
> > >>>> Sorry -- got a bit distracted yesterday. Attached is the log with only
> > >>>> your latest patch attached. Interestingly enough the box booted fine
> > >>>> without screen artifacts. So I guess we're getting closer...
> > >>>>
> > >>>> Thanks for all the help!
> > >>> That's quite weird, there's no functional changes between the
> > >>> previous patches and this one, the only difference is that this patch
> > >>> has more verbose output.
> > >>>
> > >>> Are you sure you didn't have any local patches on top of Xen that
> > >>> could explain this difference in behaviour?
> > >> FWIW, can you please try the plain patch again:
> > >>
> > >> https://lists.xenproject.org/archives/html/xen-devel/2019-07/msg01547.html
> > >>
> > >> And report back?
> > >>
> > >> I would like to get this committed ASAP if it does fix your issue.
> > > I'd like to say that it did -- but I tried it again just now and it
> > > still garbled screen and tons of:
> > >
> > > (XEN) printk: 26665 messages suppressed.
> > > (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
> > > 8e14c000, iommu reg = ffff82c0008de000
> > >
> > > I'm very much confused by what's going on, but it seems that's the
> > > case -- adding those debug print statements make the issue go away
> > >
> > > Here are the patches that are being applied:
> > >    NOT WORKING:
> > > https://github.com/rvs/eve/blob/xen-bug/pkg/xen/01-iommu-mappings.patch
> > >
> > >    WORKING: https://github.com/rvs/eve/blob/a1291fcd4e669df2a63285afb5e8b4841f45c1c8/pkg/xen/01-iommu-mappings.patch
> > >
> > > At this point I'm really not sure what's going on.
> >
> > Ok.  seeing as you've double checked this, the mystery deepens.
> >
> > My bet is on the intel_iommu_lookup_page() call having side effects[1].
> > If you take out the debugging in the middle of the loop in
> > rmrr_identity_mapping(), does the problem reproduce again?
> >
> > ~Andrew
> >
> > [1] Looking at the internals of addr_to_dma_page_maddr(), it does 100%
> > more memory allocation and higher-level PTE construction than looks wise
> > for what is supposed to be a getter.
> 
> Yup. That's what it is -- intel_iommu_lookup_page() seems to be the culprit.
> 
> I've did the experiment in the other direction -- adding a dummy call:
>      https://github.com/rvs/eve/blob/36aeeaa7c0a53474fb1ecef2ff587a86637df858/pkg/xen/01-iommu-mappings.patch#L23
> on top of original Roger's patch makes system boot NORMALLY.

I'm again quite lost, and I don't really understand why mappings added
by arch_iommu_hwdom_init seems to work fine while mappings added by
rmrr_identity_mapping don't.

I have yet another patch for you to try, which attempts to mimic
exactly what arch_iommu_hwdom_init does into rmrr_identity_mapping,
can you please give it a try?

This has the added bonus of limiting the use of
{set/clear}_identity_p2m_entry to translated domains only, since
rmrr_identity_mapping was the only caller against PV domains.

Thanks, Roger.
---8<---
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index fef97c82f6..d36a58b1a6 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -1341,10 +1341,8 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
 
     if ( !paging_mode_translate(p2m->domain) )
     {
-        if ( !need_iommu_pt_sync(d) )
-            return 0;
-        return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
-                                IOMMUF_readable | IOMMUF_writable);
+        ASSERT_UNREACHABLE();
+        return -ENXIO;
     }
 
     gfn_lock(p2m, gfn, 0);
@@ -1432,9 +1430,8 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
 
     if ( !paging_mode_translate(d) )
     {
-        if ( !need_iommu_pt_sync(d) )
-            return 0;
-        return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
+        ASSERT_UNREACHABLE();
+        return -ENXIO;
     }
 
     gfn_lock(p2m, gfn, 0);
diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
index 5d72270c5b..62df5ca5aa 100644
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -1969,6 +1969,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
     unsigned long end_pfn = PAGE_ALIGN_4K(rmrr->end_address) >> PAGE_SHIFT_4K;
     struct mapped_rmrr *mrmrr;
     struct domain_iommu *hd = dom_iommu(d);
+    unsigned int flush_flags = 0;
 
     ASSERT(pcidevs_locked());
     ASSERT(rmrr->base_address < rmrr->end_address);
@@ -1982,7 +1983,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
         if ( mrmrr->base == rmrr->base_address &&
              mrmrr->end == rmrr->end_address )
         {
-            int ret = 0;
+            int ret = 0, err;
 
             if ( map )
             {
@@ -1995,13 +1996,20 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
 
             while ( base_pfn < end_pfn )
             {
-                if ( clear_identity_p2m_entry(d, base_pfn) )
-                    ret = -ENXIO;
+                if ( paging_mode_translate(d) )
+                    ret = clear_identity_p2m_entry(d, base_pfn);
+                else
+                    ret = iommu_unmap(d, _dfn(base_pfn), PAGE_ORDER_4K,
+                                      &flush_flags);
                 base_pfn++;
             }
 
             list_del(&mrmrr->list);
             xfree(mrmrr);
+            /* Keep the previous error code if there's one. */
+            err = iommu_iotlb_flush_all(d, flush_flags);
+            if ( !ret )
+                ret = err;
             return ret;
         }
     }
@@ -2011,8 +2019,13 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
 
     while ( base_pfn < end_pfn )
     {
-        int err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag);
+        int err;
 
+        if ( paging_mode_translate(d) )
+            err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag);
+        else
+            err = iommu_map(d, _dfn(base_pfn), _mfn(base_pfn), PAGE_ORDER_4K,
+                            IOMMUF_readable | IOMMUF_writable, &flush_flags);
         if ( err )
             return err;
         base_pfn++;
@@ -2026,7 +2039,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
     mrmrr->count = 1;
     list_add_tail(&mrmrr->list, &hd->arch.mapped_rmrrs);
 
-    return 0;
+    return iommu_iotlb_flush_all(d, flush_flags);
 }
 
 static int intel_iommu_add_device(u8 devfn, struct pci_dev *pdev)


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply related	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-07-31 19:30                                     ` Roman Shaposhnik
@ 2019-08-01  8:45                                       ` Roger Pau Monné
  2019-08-01 18:19                                         ` Roman Shaposhnik
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-08-01  8:45 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Wed, Jul 31, 2019 at 12:30:04PM -0700, Roman Shaposhnik wrote:
> On Wed, Jul 31, 2019 at 1:36 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> >
> > On Tue, Jul 30, 2019 at 10:55:24AM -0700, Roman Shaposhnik wrote:
> > > Sorry -- got a bit distracted yesterday. Attached is the log with only
> > > your latest patch attached. Interestingly enough the box booted fine
> > > without screen artifacts. So I guess we're getting closer...
> > >
> > > Thanks for all the help!
> >
> > That's quite weird, there's no functional changes between the
> > previous patches and this one, the only difference is that this patch
> > has more verbose output.
> 
> That's super weird indeed. I'm re-trying your very first patch right
> now to see if it may be a pilot error on my part (hope not).
> 
> > Are you sure you didn't have any local patches on top of Xen that
> > could explain this difference in behaviour?
> 
> Pretty sure -- but let me push my branch in EVE and show to you all
> (you will need Docker installed to build Xen the way EVE does).

I'm afraid it's quite hard for me to figure out whether you have any
patches on top of Xen or not.

For further testing can you make sure you don't have any custom
patches on top of Xen (if you indeed had any in the previous
attempts)?

Thanks, Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-01  8:45                                       ` Roger Pau Monné
@ 2019-08-01 18:19                                         ` Roman Shaposhnik
  0 siblings, 0 replies; 65+ messages in thread
From: Roman Shaposhnik @ 2019-08-01 18:19 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Thu, Aug 1, 2019 at 1:45 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>
> On Wed, Jul 31, 2019 at 12:30:04PM -0700, Roman Shaposhnik wrote:
> > On Wed, Jul 31, 2019 at 1:36 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > >
> > > On Tue, Jul 30, 2019 at 10:55:24AM -0700, Roman Shaposhnik wrote:
> > > > Sorry -- got a bit distracted yesterday. Attached is the log with only
> > > > your latest patch attached. Interestingly enough the box booted fine
> > > > without screen artifacts. So I guess we're getting closer...
> > > >
> > > > Thanks for all the help!
> > >
> > > That's quite weird, there's no functional changes between the
> > > previous patches and this one, the only difference is that this patch
> > > has more verbose output.
> >
> > That's super weird indeed. I'm re-trying your very first patch right
> > now to see if it may be a pilot error on my part (hope not).
> >
> > > Are you sure you didn't have any local patches on top of Xen that
> > > could explain this difference in behaviour?
> >
> > Pretty sure -- but let me push my branch in EVE and show to you all
> > (you will need Docker installed to build Xen the way EVE does).
>
> I'm afraid it's quite hard for me to figure out whether you have any
> patches on top of Xen or not.

It is actually super simple. We use Docker containers as method for
guaranteeing that our build environment is always pristine and controlled.
Precisely to avoid this type of issues like random patches getting in, etc.

So... let me explain (not so much to convince you to use it, but rather
to have an extra pair of eye on an off chance that I actually missed
something):

All of our builds steps are captured in the following Dockerfile:
      https://github.com/rvs/eve/blob/xen-bug/pkg/xen/Dockerfile
it is based on Alpine Linux 3.7 and we only install the following
packages into a printing Alpine:
      https://github.com/rvs/eve/blob/xen-bug/pkg/xen/Dockerfile#L5
then we proceed with downloading Xen from a printing upsteram
tarball:
      https://github.com/rvs/eve/blob/xen-bug/pkg/xen/Dockerfile#L36
and only apply patches that sit next to the Dockerfile and have
patch file extension:
      https://github.com/rvs/eve/blob/xen-bug/pkg/xen/Dockerfile#L50

At this point this is a single patch:
      https://github.com/rvs/eve/blob/xen-bug/pkg/xen/01-iommu-mappings.patch
there's literally nothing else in that folder:
      https://github.com/rvs/eve/blob/xen-bug/pkg/xen

Then we proceed with building Xen in a very vanilla fashion:
      https://github.com/rvs/eve/blob/xen-bug/pkg/xen/Dockerfile#L64

That's it! That's literally all the build logic.

> For further testing can you make sure you don't have any custom
> patches on top of Xen (if you indeed had any in the previous
> attempts)?

I don't think there's any way for extra patches to sneak in, but please
see the above explanation.

Thanks,
Roman.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-01  8:15                                             ` Roger Pau Monné
@ 2019-08-01 18:25                                               ` Roman Shaposhnik
  2019-08-02  8:05                                                 ` Roger Pau Monné
  0 siblings, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-08-01 18:25 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Thu, Aug 1, 2019 at 1:16 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>
> On Wed, Jul 31, 2019 at 02:03:24PM -0700, Roman Shaposhnik wrote:
> > On Wed, Jul 31, 2019 at 12:46 PM Andrew Cooper
> > <andrew.cooper3@citrix.com> wrote:
> > >
> > > On 31/07/2019 20:35, Roman Shaposhnik wrote:
> > > > On Wed, Jul 31, 2019 at 1:43 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > > >> On Wed, Jul 31, 2019 at 10:36:31AM +0200, Roger Pau Monné wrote:
> > > >>> On Tue, Jul 30, 2019 at 10:55:24AM -0700, Roman Shaposhnik wrote:
> > > >>>> Sorry -- got a bit distracted yesterday. Attached is the log with only
> > > >>>> your latest patch attached. Interestingly enough the box booted fine
> > > >>>> without screen artifacts. So I guess we're getting closer...
> > > >>>>
> > > >>>> Thanks for all the help!
> > > >>> That's quite weird, there's no functional changes between the
> > > >>> previous patches and this one, the only difference is that this patch
> > > >>> has more verbose output.
> > > >>>
> > > >>> Are you sure you didn't have any local patches on top of Xen that
> > > >>> could explain this difference in behaviour?
> > > >> FWIW, can you please try the plain patch again:
> > > >>
> > > >> https://lists.xenproject.org/archives/html/xen-devel/2019-07/msg01547.html
> > > >>
> > > >> And report back?
> > > >>
> > > >> I would like to get this committed ASAP if it does fix your issue.
> > > > I'd like to say that it did -- but I tried it again just now and it
> > > > still garbled screen and tons of:
> > > >
> > > > (XEN) printk: 26665 messages suppressed.
> > > > (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
> > > > 8e14c000, iommu reg = ffff82c0008de000
> > > >
> > > > I'm very much confused by what's going on, but it seems that's the
> > > > case -- adding those debug print statements make the issue go away
> > > >
> > > > Here are the patches that are being applied:
> > > >    NOT WORKING:
> > > > https://github.com/rvs/eve/blob/xen-bug/pkg/xen/01-iommu-mappings.patch
> > > >
> > > >    WORKING: https://github.com/rvs/eve/blob/a1291fcd4e669df2a63285afb5e8b4841f45c1c8/pkg/xen/01-iommu-mappings.patch
> > > >
> > > > At this point I'm really not sure what's going on.
> > >
> > > Ok.  seeing as you've double checked this, the mystery deepens.
> > >
> > > My bet is on the intel_iommu_lookup_page() call having side effects[1].
> > > If you take out the debugging in the middle of the loop in
> > > rmrr_identity_mapping(), does the problem reproduce again?
> > >
> > > ~Andrew
> > >
> > > [1] Looking at the internals of addr_to_dma_page_maddr(), it does 100%
> > > more memory allocation and higher-level PTE construction than looks wise
> > > for what is supposed to be a getter.
> >
> > Yup. That's what it is -- intel_iommu_lookup_page() seems to be the culprit.
> >
> > I've did the experiment in the other direction -- adding a dummy call:
> >      https://github.com/rvs/eve/blob/36aeeaa7c0a53474fb1ecef2ff587a86637df858/pkg/xen/01-iommu-mappings.patch#L23
> > on top of original Roger's patch makes system boot NORMALLY.
>
> I'm again quite lost, and I don't really understand why mappings added
> by arch_iommu_hwdom_init seems to work fine while mappings added by
> rmrr_identity_mapping don't.
>
> I have yet another patch for you to try, which attempts to mimic
> exactly what arch_iommu_hwdom_init does into rmrr_identity_mapping,
> can you please give it a try?
>
> This has the added bonus of limiting the use of
> {set/clear}_identity_p2m_entry to translated domains only, since
> rmrr_identity_mapping was the only caller against PV domains.
>
> Thanks, Roger.
> ---8<---
> diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> index fef97c82f6..d36a58b1a6 100644
> --- a/xen/arch/x86/mm/p2m.c
> +++ b/xen/arch/x86/mm/p2m.c
> @@ -1341,10 +1341,8 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
>
>      if ( !paging_mode_translate(p2m->domain) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> -            return 0;
> -        return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
> -                                IOMMUF_readable | IOMMUF_writable);
> +        ASSERT_UNREACHABLE();
> +        return -ENXIO;
>      }
>
>      gfn_lock(p2m, gfn, 0);
> @@ -1432,9 +1430,8 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
>
>      if ( !paging_mode_translate(d) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> -            return 0;
> -        return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
> +        ASSERT_UNREACHABLE();
> +        return -ENXIO;
>      }
>
>      gfn_lock(p2m, gfn, 0);
> diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
> index 5d72270c5b..62df5ca5aa 100644
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -1969,6 +1969,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
>      unsigned long end_pfn = PAGE_ALIGN_4K(rmrr->end_address) >> PAGE_SHIFT_4K;
>      struct mapped_rmrr *mrmrr;
>      struct domain_iommu *hd = dom_iommu(d);
> +    unsigned int flush_flags = 0;
>
>      ASSERT(pcidevs_locked());
>      ASSERT(rmrr->base_address < rmrr->end_address);
> @@ -1982,7 +1983,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
>          if ( mrmrr->base == rmrr->base_address &&
>               mrmrr->end == rmrr->end_address )
>          {
> -            int ret = 0;
> +            int ret = 0, err;
>
>              if ( map )
>              {
> @@ -1995,13 +1996,20 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
>
>              while ( base_pfn < end_pfn )
>              {
> -                if ( clear_identity_p2m_entry(d, base_pfn) )
> -                    ret = -ENXIO;
> +                if ( paging_mode_translate(d) )
> +                    ret = clear_identity_p2m_entry(d, base_pfn);
> +                else
> +                    ret = iommu_unmap(d, _dfn(base_pfn), PAGE_ORDER_4K,
> +                                      &flush_flags);
>                  base_pfn++;
>              }
>
>              list_del(&mrmrr->list);
>              xfree(mrmrr);
> +            /* Keep the previous error code if there's one. */
> +            err = iommu_iotlb_flush_all(d, flush_flags);
> +            if ( !ret )
> +                ret = err;
>              return ret;
>          }
>      }
> @@ -2011,8 +2019,13 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
>
>      while ( base_pfn < end_pfn )
>      {
> -        int err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag);
> +        int err;
>
> +        if ( paging_mode_translate(d) )
> +            err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag);
> +        else
> +            err = iommu_map(d, _dfn(base_pfn), _mfn(base_pfn), PAGE_ORDER_4K,
> +                            IOMMUF_readable | IOMMUF_writable, &flush_flags);
>          if ( err )
>              return err;
>          base_pfn++;
> @@ -2026,7 +2039,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
>      mrmrr->count = 1;
>      list_add_tail(&mrmrr->list, &hd->arch.mapped_rmrrs);
>
> -    return 0;
> +    return iommu_iotlb_flush_all(d, flush_flags);
>  }
>
>  static int intel_iommu_add_device(u8 devfn, struct pci_dev *pdev)

This patch completely fixes the problem for me!

Thanks Roger! I'd love to see this in Xen 4.13

Thanks,
Roman.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-01 18:25                                               ` Roman Shaposhnik
@ 2019-08-02  8:05                                                 ` Roger Pau Monné
  2019-08-06 16:17                                                   ` Roger Pau Monné
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-08-02  8:05 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Thu, Aug 01, 2019 at 11:25:04AM -0700, Roman Shaposhnik wrote:
> On Thu, Aug 1, 2019 at 1:16 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> >
> > On Wed, Jul 31, 2019 at 02:03:24PM -0700, Roman Shaposhnik wrote:
> > > On Wed, Jul 31, 2019 at 12:46 PM Andrew Cooper
> > > <andrew.cooper3@citrix.com> wrote:
> > > >
> > > > On 31/07/2019 20:35, Roman Shaposhnik wrote:
> > > > > On Wed, Jul 31, 2019 at 1:43 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > > > >> On Wed, Jul 31, 2019 at 10:36:31AM +0200, Roger Pau Monné wrote:
> > > > >>> On Tue, Jul 30, 2019 at 10:55:24AM -0700, Roman Shaposhnik wrote:
> > > > >>>> Sorry -- got a bit distracted yesterday. Attached is the log with only
> > > > >>>> your latest patch attached. Interestingly enough the box booted fine
> > > > >>>> without screen artifacts. So I guess we're getting closer...
> > > > >>>>
> > > > >>>> Thanks for all the help!
> > > > >>> That's quite weird, there's no functional changes between the
> > > > >>> previous patches and this one, the only difference is that this patch
> > > > >>> has more verbose output.
> > > > >>>
> > > > >>> Are you sure you didn't have any local patches on top of Xen that
> > > > >>> could explain this difference in behaviour?
> > > > >> FWIW, can you please try the plain patch again:
> > > > >>
> > > > >> https://lists.xenproject.org/archives/html/xen-devel/2019-07/msg01547.html
> > > > >>
> > > > >> And report back?
> > > > >>
> > > > >> I would like to get this committed ASAP if it does fix your issue.
> > > > > I'd like to say that it did -- but I tried it again just now and it
> > > > > still garbled screen and tons of:
> > > > >
> > > > > (XEN) printk: 26665 messages suppressed.
> > > > > (XEN) [VT-D]DMAR:[DMA Read] Request device [0000:00:02.0] fault addr
> > > > > 8e14c000, iommu reg = ffff82c0008de000
> > > > >
> > > > > I'm very much confused by what's going on, but it seems that's the
> > > > > case -- adding those debug print statements make the issue go away
> > > > >
> > > > > Here are the patches that are being applied:
> > > > >    NOT WORKING:
> > > > > https://github.com/rvs/eve/blob/xen-bug/pkg/xen/01-iommu-mappings.patch
> > > > >
> > > > >    WORKING: https://github.com/rvs/eve/blob/a1291fcd4e669df2a63285afb5e8b4841f45c1c8/pkg/xen/01-iommu-mappings.patch
> > > > >
> > > > > At this point I'm really not sure what's going on.
> > > >
> > > > Ok.  seeing as you've double checked this, the mystery deepens.
> > > >
> > > > My bet is on the intel_iommu_lookup_page() call having side effects[1].
> > > > If you take out the debugging in the middle of the loop in
> > > > rmrr_identity_mapping(), does the problem reproduce again?
> > > >
> > > > ~Andrew
> > > >
> > > > [1] Looking at the internals of addr_to_dma_page_maddr(), it does 100%
> > > > more memory allocation and higher-level PTE construction than looks wise
> > > > for what is supposed to be a getter.
> > >
> > > Yup. That's what it is -- intel_iommu_lookup_page() seems to be the culprit.
> > >
> > > I've did the experiment in the other direction -- adding a dummy call:
> > >      https://github.com/rvs/eve/blob/36aeeaa7c0a53474fb1ecef2ff587a86637df858/pkg/xen/01-iommu-mappings.patch#L23
> > > on top of original Roger's patch makes system boot NORMALLY.
> >
> > I'm again quite lost, and I don't really understand why mappings added
> > by arch_iommu_hwdom_init seems to work fine while mappings added by
> > rmrr_identity_mapping don't.
> >
> > I have yet another patch for you to try, which attempts to mimic
> > exactly what arch_iommu_hwdom_init does into rmrr_identity_mapping,
> > can you please give it a try?
> >
> > This has the added bonus of limiting the use of
> > {set/clear}_identity_p2m_entry to translated domains only, since
> > rmrr_identity_mapping was the only caller against PV domains.
> >
> > Thanks, Roger.
> > ---8<---
> > diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> > index fef97c82f6..d36a58b1a6 100644
> > --- a/xen/arch/x86/mm/p2m.c
> > +++ b/xen/arch/x86/mm/p2m.c
> > @@ -1341,10 +1341,8 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
> >
> >      if ( !paging_mode_translate(p2m->domain) )
> >      {
> > -        if ( !need_iommu_pt_sync(d) )
> > -            return 0;
> > -        return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
> > -                                IOMMUF_readable | IOMMUF_writable);
> > +        ASSERT_UNREACHABLE();
> > +        return -ENXIO;
> >      }
> >
> >      gfn_lock(p2m, gfn, 0);
> > @@ -1432,9 +1430,8 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
> >
> >      if ( !paging_mode_translate(d) )
> >      {
> > -        if ( !need_iommu_pt_sync(d) )
> > -            return 0;
> > -        return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
> > +        ASSERT_UNREACHABLE();
> > +        return -ENXIO;
> >      }
> >
> >      gfn_lock(p2m, gfn, 0);
> > diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
> > index 5d72270c5b..62df5ca5aa 100644
> > --- a/xen/drivers/passthrough/vtd/iommu.c
> > +++ b/xen/drivers/passthrough/vtd/iommu.c
> > @@ -1969,6 +1969,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
> >      unsigned long end_pfn = PAGE_ALIGN_4K(rmrr->end_address) >> PAGE_SHIFT_4K;
> >      struct mapped_rmrr *mrmrr;
> >      struct domain_iommu *hd = dom_iommu(d);
> > +    unsigned int flush_flags = 0;
> >
> >      ASSERT(pcidevs_locked());
> >      ASSERT(rmrr->base_address < rmrr->end_address);
> > @@ -1982,7 +1983,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
> >          if ( mrmrr->base == rmrr->base_address &&
> >               mrmrr->end == rmrr->end_address )
> >          {
> > -            int ret = 0;
> > +            int ret = 0, err;
> >
> >              if ( map )
> >              {
> > @@ -1995,13 +1996,20 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
> >
> >              while ( base_pfn < end_pfn )
> >              {
> > -                if ( clear_identity_p2m_entry(d, base_pfn) )
> > -                    ret = -ENXIO;
> > +                if ( paging_mode_translate(d) )
> > +                    ret = clear_identity_p2m_entry(d, base_pfn);
> > +                else
> > +                    ret = iommu_unmap(d, _dfn(base_pfn), PAGE_ORDER_4K,
> > +                                      &flush_flags);
> >                  base_pfn++;
> >              }
> >
> >              list_del(&mrmrr->list);
> >              xfree(mrmrr);
> > +            /* Keep the previous error code if there's one. */
> > +            err = iommu_iotlb_flush_all(d, flush_flags);
> > +            if ( !ret )
> > +                ret = err;
> >              return ret;
> >          }
> >      }
> > @@ -2011,8 +2019,13 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
> >
> >      while ( base_pfn < end_pfn )
> >      {
> > -        int err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag);
> > +        int err;
> >
> > +        if ( paging_mode_translate(d) )
> > +            err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag);
> > +        else
> > +            err = iommu_map(d, _dfn(base_pfn), _mfn(base_pfn), PAGE_ORDER_4K,
> > +                            IOMMUF_readable | IOMMUF_writable, &flush_flags);
> >          if ( err )
> >              return err;
> >          base_pfn++;
> > @@ -2026,7 +2039,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
> >      mrmrr->count = 1;
> >      list_add_tail(&mrmrr->list, &hd->arch.mapped_rmrrs);
> >
> > -    return 0;
> > +    return iommu_iotlb_flush_all(d, flush_flags);
> >  }
> >
> >  static int intel_iommu_add_device(u8 devfn, struct pci_dev *pdev)
> 
> This patch completely fixes the problem for me!
> 
> Thanks Roger! I'd love to see this in Xen 4.13

Thanks for testing!

It's still not clear to me why the previous approach didn't work, but
I think this patch is better because it removes the usage of
{set/clear}_identity_p2m_entry from PV domains. I will submit this
formally now.

Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-02  8:05                                                 ` Roger Pau Monné
@ 2019-08-06 16:17                                                   ` Roger Pau Monné
  2019-08-06 21:48                                                     ` Roman Shaposhnik
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-08-06 16:17 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Fri, Aug 02, 2019 at 10:05:40AM +0200, Roger Pau Monné wrote:
> On Thu, Aug 01, 2019 at 11:25:04AM -0700, Roman Shaposhnik wrote:
> > This patch completely fixes the problem for me!
> > 
> > Thanks Roger! I'd love to see this in Xen 4.13
> 
> Thanks for testing!
> 
> It's still not clear to me why the previous approach didn't work, but
> I think this patch is better because it removes the usage of
> {set/clear}_identity_p2m_entry from PV domains. I will submit this
> formally now.

Sorry to bother again, but since we still don't understand why the
previous fix didn't work for you, and I can't reproduce this with my
hardware, could you give the attached patch a try?

AFAICT the only difference between the non-working version and the
working version is the flush, so I've added it here.

Thanks, Roger.
---8<---
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index fef97c82f6..3605614aaf 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
 
     if ( !paging_mode_translate(p2m->domain) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
                                 IOMMUF_readable | IOMMUF_writable);
@@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
 
     if ( !paging_mode_translate(d) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
     }
diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
index 5d72270c5b..9fd5c97be2 100644
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -2026,7 +2026,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
     mrmrr->count = 1;
     list_add_tail(&mrmrr->list, &hd->arch.mapped_rmrrs);
 
-    return 0;
+    return iommu_iotlb_flush_all(d, IOMMU_FLUSHF_added | IOMMU_FLUSHF_modified);
 }
 
 static int intel_iommu_add_device(u8 devfn, struct pci_dev *pdev)


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply related	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-06 16:17                                                   ` Roger Pau Monné
@ 2019-08-06 21:48                                                     ` Roman Shaposhnik
  2019-08-07  7:08                                                       ` Jan Beulich
  2019-08-07  7:35                                                       ` Roger Pau Monné
  0 siblings, 2 replies; 65+ messages in thread
From: Roman Shaposhnik @ 2019-08-06 21:48 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Tue, Aug 6, 2019 at 9:18 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>
> On Fri, Aug 02, 2019 at 10:05:40AM +0200, Roger Pau Monné wrote:
> > On Thu, Aug 01, 2019 at 11:25:04AM -0700, Roman Shaposhnik wrote:
> > > This patch completely fixes the problem for me!
> > >
> > > Thanks Roger! I'd love to see this in Xen 4.13
> >
> > Thanks for testing!
> >
> > It's still not clear to me why the previous approach didn't work, but
> > I think this patch is better because it removes the usage of
> > {set/clear}_identity_p2m_entry from PV domains. I will submit this
> > formally now.
>
> Sorry to bother again, but since we still don't understand why the
> previous fix didn't work for you, and I can't reproduce this with my
> hardware, could you give the attached patch a try?

No worries -- and thanks for helping to get it over the finish line --
this is much appreciated!

I'm happy to say that this latest patch is also working just fine. So
I guess this is the one that's going to land in Xen 4.13?

Thanks,
Roman.

> AFAICT the only difference between the non-working version and the
> working version is the flush, so I've added it here.
>
> Thanks, Roger.
> ---8<---
> diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> index fef97c82f6..3605614aaf 100644
> --- a/xen/arch/x86/mm/p2m.c
> +++ b/xen/arch/x86/mm/p2m.c
> @@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
>
>      if ( !paging_mode_translate(p2m->domain) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>              return 0;
>          return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
>                                  IOMMUF_readable | IOMMUF_writable);
> @@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
>
>      if ( !paging_mode_translate(d) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>              return 0;
>          return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
>      }
> diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
> index 5d72270c5b..9fd5c97be2 100644
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -2026,7 +2026,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
>      mrmrr->count = 1;
>      list_add_tail(&mrmrr->list, &hd->arch.mapped_rmrrs);
>
> -    return 0;
> +    return iommu_iotlb_flush_all(d, IOMMU_FLUSHF_added | IOMMU_FLUSHF_modified);
>  }
>
>  static int intel_iommu_add_device(u8 devfn, struct pci_dev *pdev)
>

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-06 21:48                                                     ` Roman Shaposhnik
@ 2019-08-07  7:08                                                       ` Jan Beulich
  2019-08-07  9:57                                                         ` Roger Pau Monné
  2019-08-07  7:35                                                       ` Roger Pau Monné
  1 sibling, 1 reply; 65+ messages in thread
From: Jan Beulich @ 2019-08-07  7:08 UTC (permalink / raw)
  To: Roman Shaposhnik, Roger Pau Monné
  Cc: Juergen Gross, Andrew Cooper, boris.ostrovsky, Paul Durrant, xen-devel

On 06.08.2019 23:48, Roman Shaposhnik wrote:
> On Tue, Aug 6, 2019 at 9:18 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>>
>> On Fri, Aug 02, 2019 at 10:05:40AM +0200, Roger Pau Monné wrote:
>>> On Thu, Aug 01, 2019 at 11:25:04AM -0700, Roman Shaposhnik wrote:
>>>> This patch completely fixes the problem for me!
>>>>
>>>> Thanks Roger! I'd love to see this in Xen 4.13
>>>
>>> Thanks for testing!
>>>
>>> It's still not clear to me why the previous approach didn't work, but
>>> I think this patch is better because it removes the usage of
>>> {set/clear}_identity_p2m_entry from PV domains. I will submit this
>>> formally now.
>>
>> Sorry to bother again, but since we still don't understand why the
>> previous fix didn't work for you, and I can't reproduce this with my
>> hardware, could you give the attached patch a try?
> 
> No worries -- and thanks for helping to get it over the finish line --
> this is much appreciated!
> 
> I'm happy to say that this latest patch is also working just fine. So
> I guess this is the one that's going to land in Xen 4.13?

Not necessarily - the other patch is also a candidate, but its
description would need to explain what was actually wrong.

>> AFAICT the only difference between the non-working version and the
>> working version is the flush, so I've added it here.

Now I'm afraid I still can't draw a helpful conclusion from Roman's
successful test: intel_iommu_hwdom_init(), after having called
setup_hwdom_rmrr(), calls iommu_flush_all() (with one other,
seemingly innocent call in between). The only conclusion I _could_
draw is that iommu_flush_all() doesn't do what its name says. Which
would be quite bad. But

[orig]
iommu_flush_all()
-> iommu_flush_iotlb_global(flush_non_present_entry=0)
-> flush->iotlb(DMA_TLB_GLOBAL_FLUSH, flush_non_present_entry=0)

[patch]
iommu_flush_iotlb_all()
-> iommu_flush_iotlb(dma_old_pte_present=0, page_count=0)
-> iommu_flush_iotlb_dsi(flush_non_present_entry=0)
-> flush->iotlb(DMA_TLB_DSI_FLUSH, flush_non_present_entry=0)

suggests to me that (as one would infer from the names) is the
more through flush. I must be overlooking something ...

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-06 21:48                                                     ` Roman Shaposhnik
  2019-08-07  7:08                                                       ` Jan Beulich
@ 2019-08-07  7:35                                                       ` Roger Pau Monné
  2019-08-07  8:31                                                         ` Jan Beulich
  2019-08-12  8:57                                                         ` Roger Pau Monné
  1 sibling, 2 replies; 65+ messages in thread
From: Roger Pau Monné @ 2019-08-07  7:35 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Tue, Aug 06, 2019 at 02:48:51PM -0700, Roman Shaposhnik wrote:
> On Tue, Aug 6, 2019 at 9:18 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> >
> > On Fri, Aug 02, 2019 at 10:05:40AM +0200, Roger Pau Monné wrote:
> > > On Thu, Aug 01, 2019 at 11:25:04AM -0700, Roman Shaposhnik wrote:
> > > > This patch completely fixes the problem for me!
> > > >
> > > > Thanks Roger! I'd love to see this in Xen 4.13
> > >
> > > Thanks for testing!
> > >
> > > It's still not clear to me why the previous approach didn't work, but
> > > I think this patch is better because it removes the usage of
> > > {set/clear}_identity_p2m_entry from PV domains. I will submit this
> > > formally now.
> >
> > Sorry to bother again, but since we still don't understand why the
> > previous fix didn't work for you, and I can't reproduce this with my
> > hardware, could you give the attached patch a try?
> 
> No worries -- and thanks for helping to get it over the finish line --
> this is much appreciated!
> 
> I'm happy to say that this latest patch is also working just fine. So
> I guess this is the one that's going to land in Xen 4.13?

No, not really, sorry this was still a debug patch.

So I think the behaviour you are seeing can only be explained if the
IOMMU is already enabled by the firmware when booting into Xen, can
this be the case?

I have a patch I would like you to try to confirm this, can you please
give it a spin and report back (ideally with the Xen boot log).

Thanks, Roger.
---8<---
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index fef97c82f6..3605614aaf 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
 
     if ( !paging_mode_translate(p2m->domain) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
                                 IOMMUF_readable | IOMMUF_writable);
@@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
 
     if ( !paging_mode_translate(d) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
     }
diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
index 5d72270c5b..9dd0ed7f63 100644
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -2316,6 +2316,9 @@ static int __init vtd_setup(void)
      */
     for_each_drhd_unit ( drhd )
     {
+        unsigned long flags;
+        uint32_t val;
+
         iommu = drhd->iommu;
 
         printk("Intel VT-d iommu %"PRIu32" supported page sizes: 4kB",
@@ -2351,6 +2354,22 @@ static int __init vtd_setup(void)
         if ( !vtd_ept_page_compatible(iommu) )
             iommu_hap_pt_share = 0;
 
+        spin_lock_irqsave(&iommu->register_lock, flags);
+        val = dmar_readl(iommu->reg, DMAR_GSTS_REG);
+        /*
+         * TODO: needs to be revisited once Xen supports booting with an
+         * already enabled IOMMU.
+         */
+        if ( val & DMA_GSTS_TES )
+        {
+            printk(XENLOG_WARNING VTDPREFIX
+                   "IOMMU: DMA remapping already enabled, disabling it\n");
+            dmar_writel(iommu->reg, DMAR_GCMD_REG, val & ~DMA_GCMD_TE);
+            IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG, dmar_readl,
+                          !(val & DMA_GSTS_TES), val);
+        }
+        spin_unlock_irqrestore(&iommu->register_lock, flags);
+
         ret = iommu_set_interrupt(drhd);
         if ( ret )
         {


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply related	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-07  7:35                                                       ` Roger Pau Monné
@ 2019-08-07  8:31                                                         ` Jan Beulich
  2019-08-07 10:17                                                           ` Roger Pau Monné
  2019-08-12  8:57                                                         ` Roger Pau Monné
  1 sibling, 1 reply; 65+ messages in thread
From: Jan Beulich @ 2019-08-07  8:31 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: Juergen Gross, Andrew Cooper, Roman Shaposhnik, Paul Durrant,
	xen-devel, boris.ostrovsky

On 07.08.2019 09:35, Roger Pau Monné  wrote:
> On Tue, Aug 06, 2019 at 02:48:51PM -0700, Roman Shaposhnik wrote:
>> On Tue, Aug 6, 2019 at 9:18 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>>>
>>> On Fri, Aug 02, 2019 at 10:05:40AM +0200, Roger Pau Monné wrote:
>>>> On Thu, Aug 01, 2019 at 11:25:04AM -0700, Roman Shaposhnik wrote:
>>>>> This patch completely fixes the problem for me!
>>>>>
>>>>> Thanks Roger! I'd love to see this in Xen 4.13
>>>>
>>>> Thanks for testing!
>>>>
>>>> It's still not clear to me why the previous approach didn't work, but
>>>> I think this patch is better because it removes the usage of
>>>> {set/clear}_identity_p2m_entry from PV domains. I will submit this
>>>> formally now.
>>>
>>> Sorry to bother again, but since we still don't understand why the
>>> previous fix didn't work for you, and I can't reproduce this with my
>>> hardware, could you give the attached patch a try?
>>
>> No worries -- and thanks for helping to get it over the finish line --
>> this is much appreciated!
>>
>> I'm happy to say that this latest patch is also working just fine. So
>> I guess this is the one that's going to land in Xen 4.13?
> 
> No, not really, sorry this was still a debug patch.
> 
> So I think the behaviour you are seeing can only be explained if the
> IOMMU is already enabled by the firmware when booting into Xen, can
> this be the case?

Even then - why would the existing flush not suffice in this case?

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-07  7:08                                                       ` Jan Beulich
@ 2019-08-07  9:57                                                         ` Roger Pau Monné
  2019-08-07 10:03                                                           ` Jan Beulich
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-08-07  9:57 UTC (permalink / raw)
  To: Jan Beulich
  Cc: Juergen Gross, Andrew Cooper, Roman Shaposhnik, Paul Durrant,
	xen-devel, boris.ostrovsky

On Wed, Aug 07, 2019 at 09:08:58AM +0200, Jan Beulich wrote:
> On 06.08.2019 23:48, Roman Shaposhnik wrote:
> > On Tue, Aug 6, 2019 at 9:18 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > > 
> > > On Fri, Aug 02, 2019 at 10:05:40AM +0200, Roger Pau Monné wrote:
> > > > On Thu, Aug 01, 2019 at 11:25:04AM -0700, Roman Shaposhnik wrote:
> > > > > This patch completely fixes the problem for me!
> > > > > 
> > > > > Thanks Roger! I'd love to see this in Xen 4.13
> > > > 
> > > > Thanks for testing!
> > > > 
> > > > It's still not clear to me why the previous approach didn't work, but
> > > > I think this patch is better because it removes the usage of
> > > > {set/clear}_identity_p2m_entry from PV domains. I will submit this
> > > > formally now.
> > > 
> > > Sorry to bother again, but since we still don't understand why the
> > > previous fix didn't work for you, and I can't reproduce this with my
> > > hardware, could you give the attached patch a try?
> > 
> > No worries -- and thanks for helping to get it over the finish line --
> > this is much appreciated!
> > 
> > I'm happy to say that this latest patch is also working just fine. So
> > I guess this is the one that's going to land in Xen 4.13?
> 
> Not necessarily - the other patch is also a candidate, but its
> description would need to explain what was actually wrong.
> 
> > > AFAICT the only difference between the non-working version and the
> > > working version is the flush, so I've added it here.
> 
> Now I'm afraid I still can't draw a helpful conclusion from Roman's
> successful test: intel_iommu_hwdom_init(), after having called
> setup_hwdom_rmrr(), calls iommu_flush_all() (with one other,
> seemingly innocent call in between). The only conclusion I _could_
> draw is that iommu_flush_all() doesn't do what its name says. Which
> would be quite bad. But
> 
> [orig]
> iommu_flush_all()
> -> iommu_flush_iotlb_global(flush_non_present_entry=0)
> -> flush->iotlb(DMA_TLB_GLOBAL_FLUSH, flush_non_present_entry=0)
> 
> [patch]
> iommu_flush_iotlb_all()
> -> iommu_flush_iotlb(dma_old_pte_present=0, page_count=0)
> -> iommu_flush_iotlb_dsi(flush_non_present_entry=0)
> -> flush->iotlb(DMA_TLB_DSI_FLUSH, flush_non_present_entry=0)
> 
> suggests to me that (as one would infer from the names) is the
> more through flush. I must be overlooking something ...

I went over the iotlb queued invalidation code and it seems fine to
me, I haven't been able to spot any issues with it, and as you say
above the only difference is the flush type (DSI vs GLOBAL).

Again and just to make sure it's actually the flush type (and nothing
in between) the factor that makes this work or break, can you try the
above patch?

Thanks, Roger.
---8<---
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index fef97c82f6..3605614aaf 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
 
     if ( !paging_mode_translate(p2m->domain) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
                                 IOMMUF_readable | IOMMUF_writable);
@@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
 
     if ( !paging_mode_translate(d) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
     }
diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
index 5d72270c5b..885185ad09 100644
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -2026,7 +2026,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
     mrmrr->count = 1;
     list_add_tail(&mrmrr->list, &hd->arch.mapped_rmrrs);
 
-    return 0;
+    return iommu_flush_all();
 }
 
 static int intel_iommu_add_device(u8 devfn, struct pci_dev *pdev)


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply related	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-07  9:57                                                         ` Roger Pau Monné
@ 2019-08-07 10:03                                                           ` Jan Beulich
  0 siblings, 0 replies; 65+ messages in thread
From: Jan Beulich @ 2019-08-07 10:03 UTC (permalink / raw)
  To: Roger Pau Monné, Roman Shaposhnik
  Cc: Juergen Gross, Andrew Cooper, boris.ostrovsky, Paul Durrant, xen-devel

On 07.08.2019 11:57, Roger Pau Monné  wrote:
> On Wed, Aug 07, 2019 at 09:08:58AM +0200, Jan Beulich wrote:
>> On 06.08.2019 23:48, Roman Shaposhnik wrote:
>>> On Tue, Aug 6, 2019 at 9:18 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>>>>
>>>> On Fri, Aug 02, 2019 at 10:05:40AM +0200, Roger Pau Monné wrote:
>>>>> On Thu, Aug 01, 2019 at 11:25:04AM -0700, Roman Shaposhnik wrote:
>>>>>> This patch completely fixes the problem for me!
>>>>>>
>>>>>> Thanks Roger! I'd love to see this in Xen 4.13
>>>>>
>>>>> Thanks for testing!
>>>>>
>>>>> It's still not clear to me why the previous approach didn't work, but
>>>>> I think this patch is better because it removes the usage of
>>>>> {set/clear}_identity_p2m_entry from PV domains. I will submit this
>>>>> formally now.
>>>>
>>>> Sorry to bother again, but since we still don't understand why the
>>>> previous fix didn't work for you, and I can't reproduce this with my
>>>> hardware, could you give the attached patch a try?
>>>
>>> No worries -- and thanks for helping to get it over the finish line --
>>> this is much appreciated!
>>>
>>> I'm happy to say that this latest patch is also working just fine. So
>>> I guess this is the one that's going to land in Xen 4.13?
>>
>> Not necessarily - the other patch is also a candidate, but its
>> description would need to explain what was actually wrong.
>>
>>>> AFAICT the only difference between the non-working version and the
>>>> working version is the flush, so I've added it here.
>>
>> Now I'm afraid I still can't draw a helpful conclusion from Roman's
>> successful test: intel_iommu_hwdom_init(), after having called
>> setup_hwdom_rmrr(), calls iommu_flush_all() (with one other,
>> seemingly innocent call in between). The only conclusion I _could_
>> draw is that iommu_flush_all() doesn't do what its name says. Which
>> would be quite bad. But
>>
>> [orig]
>> iommu_flush_all()
>> -> iommu_flush_iotlb_global(flush_non_present_entry=0)
>> -> flush->iotlb(DMA_TLB_GLOBAL_FLUSH, flush_non_present_entry=0)
>>
>> [patch]
>> iommu_flush_iotlb_all()
>> -> iommu_flush_iotlb(dma_old_pte_present=0, page_count=0)
>> -> iommu_flush_iotlb_dsi(flush_non_present_entry=0)
>> -> flush->iotlb(DMA_TLB_DSI_FLUSH, flush_non_present_entry=0)
>>
>> suggests to me that (as one would infer from the names) is the
>> more through flush. I must be overlooking something ...
> 
> I went over the iotlb queued invalidation code and it seems fine to
> me, I haven't been able to spot any issues with it, and as you say
> above the only difference is the flush type (DSI vs GLOBAL).
> 
> Again and just to make sure it's actually the flush type (and nothing
> in between) the factor that makes this work or break, can you try the
> above patch?

And I take it the "you" here was meant for Roman (only on Cc),
not me.

Jan

> Thanks, Roger.
> ---8<---
> diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> index fef97c82f6..3605614aaf 100644
> --- a/xen/arch/x86/mm/p2m.c
> +++ b/xen/arch/x86/mm/p2m.c
> @@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
>   
>       if ( !paging_mode_translate(p2m->domain) )
>       {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>               return 0;
>           return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
>                                   IOMMUF_readable | IOMMUF_writable);
> @@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
>   
>       if ( !paging_mode_translate(d) )
>       {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>               return 0;
>           return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
>       }
> diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
> index 5d72270c5b..885185ad09 100644
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -2026,7 +2026,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map,
>       mrmrr->count = 1;
>       list_add_tail(&mrmrr->list, &hd->arch.mapped_rmrrs);
>   
> -    return 0;
> +    return iommu_flush_all();
>   }
>   
>   static int intel_iommu_add_device(u8 devfn, struct pci_dev *pdev)
> 
> 


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-07  8:31                                                         ` Jan Beulich
@ 2019-08-07 10:17                                                           ` Roger Pau Monné
  0 siblings, 0 replies; 65+ messages in thread
From: Roger Pau Monné @ 2019-08-07 10:17 UTC (permalink / raw)
  To: Jan Beulich
  Cc: Juergen Gross, Andrew Cooper, Roman Shaposhnik, Paul Durrant,
	xen-devel, boris.ostrovsky

On Wed, Aug 07, 2019 at 10:31:40AM +0200, Jan Beulich wrote:
> On 07.08.2019 09:35, Roger Pau Monné  wrote:
> > On Tue, Aug 06, 2019 at 02:48:51PM -0700, Roman Shaposhnik wrote:
> > > On Tue, Aug 6, 2019 at 9:18 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > > > 
> > > > On Fri, Aug 02, 2019 at 10:05:40AM +0200, Roger Pau Monné wrote:
> > > > > On Thu, Aug 01, 2019 at 11:25:04AM -0700, Roman Shaposhnik wrote:
> > > > > > This patch completely fixes the problem for me!
> > > > > > 
> > > > > > Thanks Roger! I'd love to see this in Xen 4.13
> > > > > 
> > > > > Thanks for testing!
> > > > > 
> > > > > It's still not clear to me why the previous approach didn't work, but
> > > > > I think this patch is better because it removes the usage of
> > > > > {set/clear}_identity_p2m_entry from PV domains. I will submit this
> > > > > formally now.
> > > > 
> > > > Sorry to bother again, but since we still don't understand why the
> > > > previous fix didn't work for you, and I can't reproduce this with my
> > > > hardware, could you give the attached patch a try?
> > > 
> > > No worries -- and thanks for helping to get it over the finish line --
> > > this is much appreciated!
> > > 
> > > I'm happy to say that this latest patch is also working just fine. So
> > > I guess this is the one that's going to land in Xen 4.13?
> > 
> > No, not really, sorry this was still a debug patch.
> > 
> > So I think the behaviour you are seeing can only be explained if the
> > IOMMU is already enabled by the firmware when booting into Xen, can
> > this be the case?
> 
> Even then - why would the existing flush not suffice in this case?

It should indeed, I'm just trying to figure out what's different in
his setup.

Also I'm not sure the iommu init code was designed taking into account
that the iommu DMA translation might already be enabled by the
firmware.

Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-07  7:35                                                       ` Roger Pau Monné
  2019-08-07  8:31                                                         ` Jan Beulich
@ 2019-08-12  8:57                                                         ` Roger Pau Monné
  2019-08-13 19:24                                                           ` Roman Shaposhnik
  1 sibling, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-08-12  8:57 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

Ping?

I know I've posted this quite recently, but have you been able to test
the two proposed patches?

ie: the one here and:

https://lists.xenproject.org/archives/html/xen-devel/2019-08/msg00643.html

I would like to figure out exactly what's going on and fix this
properly.

Thanks, Roger.

On Wed, Aug 07, 2019 at 09:35:34AM +0200, Roger Pau Monné wrote:
> On Tue, Aug 06, 2019 at 02:48:51PM -0700, Roman Shaposhnik wrote:
> > On Tue, Aug 6, 2019 at 9:18 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > >
> > > On Fri, Aug 02, 2019 at 10:05:40AM +0200, Roger Pau Monné wrote:
> > > > On Thu, Aug 01, 2019 at 11:25:04AM -0700, Roman Shaposhnik wrote:
> > > > > This patch completely fixes the problem for me!
> > > > >
> > > > > Thanks Roger! I'd love to see this in Xen 4.13
> > > >
> > > > Thanks for testing!
> > > >
> > > > It's still not clear to me why the previous approach didn't work, but
> > > > I think this patch is better because it removes the usage of
> > > > {set/clear}_identity_p2m_entry from PV domains. I will submit this
> > > > formally now.
> > >
> > > Sorry to bother again, but since we still don't understand why the
> > > previous fix didn't work for you, and I can't reproduce this with my
> > > hardware, could you give the attached patch a try?
> > 
> > No worries -- and thanks for helping to get it over the finish line --
> > this is much appreciated!
> > 
> > I'm happy to say that this latest patch is also working just fine. So
> > I guess this is the one that's going to land in Xen 4.13?
> 
> No, not really, sorry this was still a debug patch.
> 
> So I think the behaviour you are seeing can only be explained if the
> IOMMU is already enabled by the firmware when booting into Xen, can
> this be the case?
> 
> I have a patch I would like you to try to confirm this, can you please
> give it a spin and report back (ideally with the Xen boot log).
> 
> Thanks, Roger.
> ---8<---
> diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> index fef97c82f6..3605614aaf 100644
> --- a/xen/arch/x86/mm/p2m.c
> +++ b/xen/arch/x86/mm/p2m.c
> @@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
>  
>      if ( !paging_mode_translate(p2m->domain) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>              return 0;
>          return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
>                                  IOMMUF_readable | IOMMUF_writable);
> @@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
>  
>      if ( !paging_mode_translate(d) )
>      {
> -        if ( !need_iommu_pt_sync(d) )
> +        if ( !has_iommu_pt(d) )
>              return 0;
>          return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
>      }
> diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
> index 5d72270c5b..9dd0ed7f63 100644
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -2316,6 +2316,9 @@ static int __init vtd_setup(void)
>       */
>      for_each_drhd_unit ( drhd )
>      {
> +        unsigned long flags;
> +        uint32_t val;
> +
>          iommu = drhd->iommu;
>  
>          printk("Intel VT-d iommu %"PRIu32" supported page sizes: 4kB",
> @@ -2351,6 +2354,22 @@ static int __init vtd_setup(void)
>          if ( !vtd_ept_page_compatible(iommu) )
>              iommu_hap_pt_share = 0;
>  
> +        spin_lock_irqsave(&iommu->register_lock, flags);
> +        val = dmar_readl(iommu->reg, DMAR_GSTS_REG);
> +        /*
> +         * TODO: needs to be revisited once Xen supports booting with an
> +         * already enabled IOMMU.
> +         */
> +        if ( val & DMA_GSTS_TES )
> +        {
> +            printk(XENLOG_WARNING VTDPREFIX
> +                   "IOMMU: DMA remapping already enabled, disabling it\n");
> +            dmar_writel(iommu->reg, DMAR_GCMD_REG, val & ~DMA_GCMD_TE);
> +            IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG, dmar_readl,
> +                          !(val & DMA_GSTS_TES), val);
> +        }
> +        spin_unlock_irqrestore(&iommu->register_lock, flags);
> +
>          ret = iommu_set_interrupt(drhd);
>          if ( ret )
>          {
> 
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-devel

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-12  8:57                                                         ` Roger Pau Monné
@ 2019-08-13 19:24                                                           ` Roman Shaposhnik
  2019-08-14  8:06                                                             ` Roger Pau Monné
  0 siblings, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-08-13 19:24 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

Hi Roger,

sorry for the delay -- I hope you will understand that I actually had
a good reason. See below:

On Mon, Aug 12, 2019 at 1:57 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>
> Ping?
>
> I know I've posted this quite recently, but have you been able to test
> the two proposed patches?
>
> ie: the one here and:
>
> https://lists.xenproject.org/archives/html/xen-devel/2019-08/msg00643.html
>
> I would like to figure out exactly what's going on and fix this
> properly.

Turns out this may actually be related to the BIOS version on these
boxes. I have
one with the BIOS build from 06/07/2018 and the other one is from 2017. So with
2 of your proposed patches -- we now have a 2x2 test matrix. The awful
part seems
to be that the behavior looks to be slightly different.

I need an extra day to summarize it all and I'll follow up quickly. It
just so far I lost
time trying to figure out while the same build would behave
differently on different
boxes only to find out that the BIOS is different (and the really
awful part is that
they both report as version 5.0.1.1 -- it is only when you look at the timestamp
of the build -- that's where you see them being different :-( ).

Thanks,
Roman.

> On Wed, Aug 07, 2019 at 09:35:34AM +0200, Roger Pau Monné wrote:
> > On Tue, Aug 06, 2019 at 02:48:51PM -0700, Roman Shaposhnik wrote:
> > > On Tue, Aug 6, 2019 at 9:18 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > > >
> > > > On Fri, Aug 02, 2019 at 10:05:40AM +0200, Roger Pau Monné wrote:
> > > > > On Thu, Aug 01, 2019 at 11:25:04AM -0700, Roman Shaposhnik wrote:
> > > > > > This patch completely fixes the problem for me!
> > > > > >
> > > > > > Thanks Roger! I'd love to see this in Xen 4.13
> > > > >
> > > > > Thanks for testing!
> > > > >
> > > > > It's still not clear to me why the previous approach didn't work, but
> > > > > I think this patch is better because it removes the usage of
> > > > > {set/clear}_identity_p2m_entry from PV domains. I will submit this
> > > > > formally now.
> > > >
> > > > Sorry to bother again, but since we still don't understand why the
> > > > previous fix didn't work for you, and I can't reproduce this with my
> > > > hardware, could you give the attached patch a try?
> > >
> > > No worries -- and thanks for helping to get it over the finish line --
> > > this is much appreciated!
> > >
> > > I'm happy to say that this latest patch is also working just fine. So
> > > I guess this is the one that's going to land in Xen 4.13?
> >
> > No, not really, sorry this was still a debug patch.
> >
> > So I think the behaviour you are seeing can only be explained if the
> > IOMMU is already enabled by the firmware when booting into Xen, can
> > this be the case?
> >
> > I have a patch I would like you to try to confirm this, can you please
> > give it a spin and report back (ideally with the Xen boot log).
> >
> > Thanks, Roger.
> > ---8<---
> > diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> > index fef97c82f6..3605614aaf 100644
> > --- a/xen/arch/x86/mm/p2m.c
> > +++ b/xen/arch/x86/mm/p2m.c
> > @@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l,
> >
> >      if ( !paging_mode_translate(p2m->domain) )
> >      {
> > -        if ( !need_iommu_pt_sync(d) )
> > +        if ( !has_iommu_pt(d) )
> >              return 0;
> >          return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
> >                                  IOMMUF_readable | IOMMUF_writable);
> > @@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l)
> >
> >      if ( !paging_mode_translate(d) )
> >      {
> > -        if ( !need_iommu_pt_sync(d) )
> > +        if ( !has_iommu_pt(d) )
> >              return 0;
> >          return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
> >      }
> > diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
> > index 5d72270c5b..9dd0ed7f63 100644
> > --- a/xen/drivers/passthrough/vtd/iommu.c
> > +++ b/xen/drivers/passthrough/vtd/iommu.c
> > @@ -2316,6 +2316,9 @@ static int __init vtd_setup(void)
> >       */
> >      for_each_drhd_unit ( drhd )
> >      {
> > +        unsigned long flags;
> > +        uint32_t val;
> > +
> >          iommu = drhd->iommu;
> >
> >          printk("Intel VT-d iommu %"PRIu32" supported page sizes: 4kB",
> > @@ -2351,6 +2354,22 @@ static int __init vtd_setup(void)
> >          if ( !vtd_ept_page_compatible(iommu) )
> >              iommu_hap_pt_share = 0;
> >
> > +        spin_lock_irqsave(&iommu->register_lock, flags);
> > +        val = dmar_readl(iommu->reg, DMAR_GSTS_REG);
> > +        /*
> > +         * TODO: needs to be revisited once Xen supports booting with an
> > +         * already enabled IOMMU.
> > +         */
> > +        if ( val & DMA_GSTS_TES )
> > +        {
> > +            printk(XENLOG_WARNING VTDPREFIX
> > +                   "IOMMU: DMA remapping already enabled, disabling it\n");
> > +            dmar_writel(iommu->reg, DMAR_GCMD_REG, val & ~DMA_GCMD_TE);
> > +            IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG, dmar_readl,
> > +                          !(val & DMA_GSTS_TES), val);
> > +        }
> > +        spin_unlock_irqrestore(&iommu->register_lock, flags);
> > +
> >          ret = iommu_set_interrupt(drhd);
> >          if ( ret )
> >          {
> >
> >
> > _______________________________________________
> > Xen-devel mailing list
> > Xen-devel@lists.xenproject.org
> > https://lists.xenproject.org/mailman/listinfo/xen-devel

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-13 19:24                                                           ` Roman Shaposhnik
@ 2019-08-14  8:06                                                             ` Roger Pau Monné
  2019-08-19  5:00                                                               ` Roman Shaposhnik
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-08-14  8:06 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Tue, Aug 13, 2019 at 12:24:32PM -0700, Roman Shaposhnik wrote:
> Hi Roger,
> 
> sorry for the delay -- I hope you will understand that I actually had
> a good reason. See below:

No problem, just wanted to make sure this doesn't fell through the
cracks.

> On Mon, Aug 12, 2019 at 1:57 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> >
> > Ping?
> >
> > I know I've posted this quite recently, but have you been able to test
> > the two proposed patches?
> >
> > ie: the one here and:
> >
> > https://lists.xenproject.org/archives/html/xen-devel/2019-08/msg00643.html
> >
> > I would like to figure out exactly what's going on and fix this
> > properly.
> 
> Turns out this may actually be related to the BIOS version on these
> boxes. I have
> one with the BIOS build from 06/07/2018 and the other one is from 2017. So with
> 2 of your proposed patches -- we now have a 2x2 test matrix. The awful
> part seems
> to be that the behavior looks to be slightly different.
> 
> I need an extra day to summarize it all and I'll follow up quickly. It
> just so far I lost
> time trying to figure out while the same build would behave
> differently on different
> boxes only to find out that the BIOS is different (and the really
> awful part is that
> they both report as version 5.0.1.1 -- it is only when you look at the timestamp
> of the build -- that's where you see them being different :-( ).

Oh, that's awful. I hope you can get something clear out of this.

Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-14  8:06                                                             ` Roger Pau Monné
@ 2019-08-19  5:00                                                               ` Roman Shaposhnik
  2019-08-19  8:16                                                                 ` Roger Pau Monné
  0 siblings, 1 reply; 65+ messages in thread
From: Roman Shaposhnik @ 2019-08-19  5:00 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

Hi Roger!

Some good news, some bad news ;-)

Good news is that on the newer BIOS, your original patch seems to work fine.

IOW, with newer BIOS:
    1. without your original patch I see garbled screen
    2. with your original patch everything boots normally.

Bad news is that with older BIOS, your original patch seems to either
work or not depending on the BIOS some of the BIOS settings.

IOW, with older BIOS:
    1. without your original patch I see garbled screen (regardless of
BIOS settings)
    2. with your original patch AND resetting to a factory defaults of
BIOS settings -- everything boots normally
    3. when I load up our custom settings -- the only thing that can
boot normally is the latest patch

So, would it make sense and commit your original patch for now? This
will unlock me with newer BIOSes on these boxes.

As for the older BIOSes, I still feel that it would be great for Xen
to boot more reliably -- especially since Xen 4.10 seems to be doing
fine regardless of BIOS version and settings.

What do you think?

Btw, just to be clear -- when I say your original patch here's what I mean:

diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index fef97c82f6..3605614aaf 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -1341,7 +1341,7 @@ int set_identity_p2m_entry(struct domain *d,
unsigned long gfn_l,

     if ( !paging_mode_translate(p2m->domain) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K,
                                 IOMMUF_readable | IOMMUF_writable);
@@ -1432,7 +1432,7 @@ int clear_identity_p2m_entry(struct domain *d,
unsigned long gfn_l)

     if ( !paging_mode_translate(d) )
     {
-        if ( !need_iommu_pt_sync(d) )
+        if ( !has_iommu_pt(d) )
             return 0;
         return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K);
     }

Thanks,
Roman.

On Wed, Aug 14, 2019 at 1:06 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>
> On Tue, Aug 13, 2019 at 12:24:32PM -0700, Roman Shaposhnik wrote:
> > Hi Roger,
> >
> > sorry for the delay -- I hope you will understand that I actually had
> > a good reason. See below:
>
> No problem, just wanted to make sure this doesn't fell through the
> cracks.
>
> > On Mon, Aug 12, 2019 at 1:57 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > >
> > > Ping?
> > >
> > > I know I've posted this quite recently, but have you been able to test
> > > the two proposed patches?
> > >
> > > ie: the one here and:
> > >
> > > https://lists.xenproject.org/archives/html/xen-devel/2019-08/msg00643.html
> > >
> > > I would like to figure out exactly what's going on and fix this
> > > properly.
> >
> > Turns out this may actually be related to the BIOS version on these
> > boxes. I have
> > one with the BIOS build from 06/07/2018 and the other one is from 2017. So with
> > 2 of your proposed patches -- we now have a 2x2 test matrix. The awful
> > part seems
> > to be that the behavior looks to be slightly different.
> >
> > I need an extra day to summarize it all and I'll follow up quickly. It
> > just so far I lost
> > time trying to figure out while the same build would behave
> > differently on different
> > boxes only to find out that the BIOS is different (and the really
> > awful part is that
> > they both report as version 5.0.1.1 -- it is only when you look at the timestamp
> > of the build -- that's where you see them being different :-( ).
>
> Oh, that's awful. I hope you can get something clear out of this.
>
> Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply related	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-19  5:00                                                               ` Roman Shaposhnik
@ 2019-08-19  8:16                                                                 ` Roger Pau Monné
  2019-08-20  2:03                                                                   ` Roman Shaposhnik
  0 siblings, 1 reply; 65+ messages in thread
From: Roger Pau Monné @ 2019-08-19  8:16 UTC (permalink / raw)
  To: Roman Shaposhnik
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Sun, Aug 18, 2019 at 10:00:17PM -0700, Roman Shaposhnik wrote:
> Hi Roger!
> 
> Some good news, some bad news ;-)
> 
> Good news is that on the newer BIOS, your original patch seems to work fine.
> 
> IOW, with newer BIOS:
>     1. without your original patch I see garbled screen
>     2. with your original patch everything boots normally.

That would be my expectation.

> Bad news is that with older BIOS, your original patch seems to either
> work or not depending on the BIOS some of the BIOS settings.
> 
> IOW, with older BIOS:
>     1. without your original patch I see garbled screen (regardless of
> BIOS settings)
>     2. with your original patch AND resetting to a factory defaults of
> BIOS settings -- everything boots normally
>     3. when I load up our custom settings -- the only thing that can
> boot normally is the latest patch
> 
> So, would it make sense and commit your original patch for now? This
> will unlock me with newer BIOSes on these boxes.

I think so, can you please provide a tested-by to the patch:

https://lists.xenproject.org/archives/html/xen-devel/2019-07/msg01547.html

Feel free to also note the weird behaviour you are seeing with this
box and firmware version.

> As for the older BIOSes, I still feel that it would be great for Xen
> to boot more reliably -- especially since Xen 4.10 seems to be doing
> fine regardless of BIOS version and settings.
> 
> What do you think?

We could add a quirk for this fimrware version and hardware if we know
exactly what the issue is. Have you figured out if it's related to the
flush? ie: iommu_iotlb_flush vs iommu_iotlb_flush_all vs iommu_flush_all?

Thanks, Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

* Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx
  2019-08-19  8:16                                                                 ` Roger Pau Monné
@ 2019-08-20  2:03                                                                   ` Roman Shaposhnik
  0 siblings, 0 replies; 65+ messages in thread
From: Roman Shaposhnik @ 2019-08-20  2:03 UTC (permalink / raw)
  To: Roger Pau Monné
  Cc: jgross, Andrew Cooper, Paul Durrant, jbeulich, xen-devel,
	boris.ostrovsky

On Mon, Aug 19, 2019 at 1:16 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>
> On Sun, Aug 18, 2019 at 10:00:17PM -0700, Roman Shaposhnik wrote:
> > Hi Roger!
> >
> > Some good news, some bad news ;-)
> >
> > Good news is that on the newer BIOS, your original patch seems to work fine.
> >
> > IOW, with newer BIOS:
> >     1. without your original patch I see garbled screen
> >     2. with your original patch everything boots normally.
>
> That would be my expectation.
>
> > Bad news is that with older BIOS, your original patch seems to either
> > work or not depending on the BIOS some of the BIOS settings.
> >
> > IOW, with older BIOS:
> >     1. without your original patch I see garbled screen (regardless of
> > BIOS settings)
> >     2. with your original patch AND resetting to a factory defaults of
> > BIOS settings -- everything boots normally
> >     3. when I load up our custom settings -- the only thing that can
> > boot normally is the latest patch
> >
> > So, would it make sense and commit your original patch for now? This
> > will unlock me with newer BIOSes on these boxes.
>
> I think so, can you please provide a tested-by to the patch:
>
> https://lists.xenproject.org/archives/html/xen-devel/2019-07/msg01547.html

Done.

> Feel free to also note the weird behaviour you are seeing with this
> box and firmware version.
>
> > As for the older BIOSes, I still feel that it would be great for Xen
> > to boot more reliably -- especially since Xen 4.10 seems to be doing
> > fine regardless of BIOS version and settings.
> >
> > What do you think?
>
> We could add a quirk for this fimrware version and hardware if we know
> exactly what the issue is. Have you figured out if it's related to the
> flush? ie: iommu_iotlb_flush vs iommu_iotlb_flush_all vs iommu_flush_all?

I am actually at Open Source Summit in San Diego right now -- away from
my lab. I'll try to capture as much data on Fri as possible when I come back.

Please stay tuned.

Thanks,
Roman.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 65+ messages in thread

end of thread, other threads:[~2019-08-20  2:04 UTC | newest]

Thread overview: 65+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-07-19 19:31 [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx Roman Shaposhnik
2019-07-19 20:02 ` Roman Shaposhnik
2019-07-22  8:20   ` Paul Durrant
2019-07-22 11:48     ` Roger Pau Monné
2019-07-22 11:54       ` Paul Durrant
2019-07-22 13:48         ` Roger Pau Monné
2019-07-22 14:03           ` Paul Durrant
2019-07-22 14:39             ` Roger Pau Monné
2019-07-22 15:02               ` Paul Durrant
2019-07-22 15:21                 ` Roger Pau Monné
2019-07-22 23:36                   ` Roman Shaposhnik
2019-07-22 23:47                     ` Andrew Cooper
2019-07-23 17:32                       ` Roman Shaposhnik
2019-07-23 17:35                         ` Andrew Cooper
2019-07-23 17:48                           ` Roman Shaposhnik
2019-07-23 17:50                             ` Andrew Cooper
2019-07-23 17:58                               ` Roman Shaposhnik
2019-07-23 18:12                                 ` Andrew Cooper
2019-07-23 18:25                                   ` Roman Shaposhnik
2019-07-26  7:58                                     ` Jan Beulich
2019-07-30 17:56                                       ` Roman Shaposhnik
2019-07-31  8:34                                         ` Jan Beulich
2019-07-31  8:58                                           ` Andrew Cooper
2019-07-31  9:30                                             ` Jan Beulich
2019-07-31 19:37                                               ` Roman Shaposhnik
2019-07-24 12:00                                 ` Jan Beulich
2019-07-24 12:04                                   ` Jan Beulich
2019-07-24 11:23                         ` Andrew Cooper
2019-07-24 11:40                           ` Andrew Cooper
2019-07-24 14:11                         ` Roger Pau Monné
2019-07-26  0:47                           ` Roman Shaposhnik
2019-07-26  9:35                             ` Roger Pau Monné
2019-07-30  9:21                               ` Roger Pau Monné
2019-07-30 17:55                                 ` Roman Shaposhnik
2019-07-31  8:31                                   ` Jan Beulich
2019-07-31  8:36                                   ` Roger Pau Monné
2019-07-31  8:43                                     ` Roger Pau Monné
2019-07-31 19:35                                       ` Roman Shaposhnik
2019-07-31 19:46                                         ` Andrew Cooper
2019-07-31 21:03                                           ` Roman Shaposhnik
2019-08-01  8:15                                             ` Roger Pau Monné
2019-08-01 18:25                                               ` Roman Shaposhnik
2019-08-02  8:05                                                 ` Roger Pau Monné
2019-08-06 16:17                                                   ` Roger Pau Monné
2019-08-06 21:48                                                     ` Roman Shaposhnik
2019-08-07  7:08                                                       ` Jan Beulich
2019-08-07  9:57                                                         ` Roger Pau Monné
2019-08-07 10:03                                                           ` Jan Beulich
2019-08-07  7:35                                                       ` Roger Pau Monné
2019-08-07  8:31                                                         ` Jan Beulich
2019-08-07 10:17                                                           ` Roger Pau Monné
2019-08-12  8:57                                                         ` Roger Pau Monné
2019-08-13 19:24                                                           ` Roman Shaposhnik
2019-08-14  8:06                                                             ` Roger Pau Monné
2019-08-19  5:00                                                               ` Roman Shaposhnik
2019-08-19  8:16                                                                 ` Roger Pau Monné
2019-08-20  2:03                                                                   ` Roman Shaposhnik
2019-08-01  7:35                                           ` Jan Beulich
2019-07-31 19:30                                     ` Roman Shaposhnik
2019-08-01  8:45                                       ` Roger Pau Monné
2019-08-01 18:19                                         ` Roman Shaposhnik
2019-07-20 16:39 ` Andrew Cooper
2019-07-22  8:03   ` Paul Durrant
2019-07-24 17:42 ` Rich Persaud
2019-07-26  1:13   ` Roman Shaposhnik

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).