[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] failed to boot FreeBSD 11-CURRENT as Xen PVH Dom0
On 02/04/15 17:39, Roger Pau Monné wrote: > Hello, (Inserted PVH into subject. Please note that PVH is still experimental in Xen.) > > El 02/04/15 a les 18.23, Gavin Mu ha escrit: >> Today I tried Xen Dom0 on one SuperMicro X9SRW-F machine, but it failed to >> bootup. Is there anybody can help? thanks. >> >> (XEN) Xen version 4.6-unstable (root@) (gcc47 (FreeBSD Ports Collection) >> 4.7.4) debug=y Fri Apr 3 00:04:50 CST 2015 >> (XEN) Latest ChangeSet: Tue Mar 17 15:11:33 2015 +0100 git:3a28f76 >> (XEN) Bootloader: FreeBSD Loader >> (XEN) Command line: dom0_mem=8192M dom0_max_vcpus=4 dom0pvh=1 >> com2=115200,8n1,0x2f8 guest_loglvl console=com2,vga iommu=debug >> (XEN) Video information: >> (XEN) VGA is text mode 80x25, font 8x16 >> (XEN) VBE/DDC methods: none; EDID transfer time: 0 seconds >> (XEN) EDID info not retrieved because no DDC retrieval method detected >> (XEN) Disc information: | >> (XEN) Found 1 MBR signatures] | >> (XEN) Found 1 EDD information structures | >> (XEN) Xen-e820 RAM map:er prompt | >> (XEN) 0000000000000000 - 000000000009ac00 (usable) >> (XEN) 000000000009ac00 - 00000000000a0000 (reserved) >> (XEN) 00000000000e0000 - 0000000000100000 (reserved) >> (XEN) 0000000000100000 - 000000007dda0000 (usable) >> (XEN) 000000007dda0000 - 000000007dddf000 (reserved) >> (XEN) 000000007dddf000 - 000000007dee6000 (ACPI data) >> (XEN) 000000007dee6000 - 000000007e0f1000 (ACPI NVS) >> (XEN) 000000007e0f1000 - 000000007f36b000 (reserved) >> (XEN) 000000007f36b000 - 000000007f800000 (ACPI NVS) >> (XEN) 0000000080000000 - 0000000090000000 (reserved) >> (XEN) 00000000fed1c000 - 00000000fed40000 (reserved) >> (XEN) 00000000ff000000 - 0000000100000000 (reserved) >> (XEN) 0000000100000000 - 0000000480000000 (usable)R >> (XEN) ACPI: RSDP 000F04A0, 0024 (r2 SUPERM)eBSD. >> (XEN) ACPI: XSDT 7DE13088, 008C (r1 SUPERM SMCI--MB 1 AMI 10013) >> (XEN) ACPI: FACP 7DE1D8F0, 00F4 (r4 SUPERM SMCI--MB 1 AMI 10013) >> (XEN) ACPI: DSDT 7DE131A0, A74A (r2 SUPERM SMCI--MB 0 INTL 20091112) >> (XEN) ACPI: FACS 7E0E8080, 0040, 'help' for more detailed help. >> (XEN) ACPI: APIC 7DE1D9E8, 0100 (r3 1 AMI 10013) >> (XEN) ACPI: FPDT 7DE1DAE8, 0044 (r1 1 AMI 10013) >> (XEN) ACPI: HPET 7DE1DB30, 0038 (r1 SUPERM SMCI--MB 1 AMI. 5) >> (XEN) ACPI: PRAD 7DE1DB68, 00BE (r2 PRADID PRADTID 1 MSFT 4000000) >> (XEN) ACPI: SPMI 7DE1DC28, 0040 (r5 A M I OEMSPMI 0 AMI. 0) >> (XEN) ACPI: SSDT 7DE1DC68, C7AE8 (r2 INTEL CpuPm 4000 INTL 20091112) >> (XEN) ACPI: EINJ 7DEE5750, 0130 (r1 AMI AMI EINJ 0 0) >> (XEN) ACPI: ERST 7DEE5880, 0230 (r1 AMIER AMI ERST 0 0) >> (XEN) ACPI: HEST 7DEE5AB0, 00A8 (r1 AMI AMI HEST 0 0) >> (XEN) ACPI: BERT 7DEE5B58, 0030 (r1 AMI AMI BERT 0 0) >> (XEN) ACPI: DMAR 7DEE5B88, 00C4 (r1 A M I OEMDMAR 1 INTL 1) >> (XEN) ACPI: MCFG 7DEE5C50, 003C (r1 SUPERM SMCI--MB 1 MSFT 97) >> (XEN) System RAM: 16349MB (16741608kB) >> (XEN) No NUMA configuration found >> (XEN) Faking a node at 0000000000000000-0000000480000000 >> (XEN) Domain heap initialised >> (XEN) found SMP MP-table at 000fd950 >> (XEN) DMI 2.7 present. >> (XEN) Using APIC driver default >> (XEN) ACPI: PM-Timer IO Port: 0x408 >> (XEN) ACPI: SLEEP INFO: pm1x_cnt[1:404,1:0], pm1x_evt[1:400,1:0] >> (XEN) ACPI: 32/64X FACS address mismatch in FADT - >> 7e0e8080/0000000000000000, using 32 >> (XEN) ACPI: wakeup_vec[7e0e808c], vec_size[20] >> (XEN) ACPI: Local APIC address 0xfee00000 >> (XEN) ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) >> (XEN) Processor #0 7:14 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled) >> (XEN) Processor #2 7:14 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x04] lapic_id[0x04] enabled) >> (XEN) Processor #4 7:14 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x06] lapic_id[0x06] enabled) >> (XEN) Processor #6 7:14 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x08] lapic_id[0x08] enabled) >> (XEN) Processor #8 7:14 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x0a] lapic_id[0x0a] enabled) >> (XEN) Processor #10 7:14 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled) >> (XEN) Processor #1 7:14 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled) >> (XEN) Processor #3 7:14 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x05] lapic_id[0x05] enabled) >> (XEN) Processor #5 7:14 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x07] lapic_id[0x07] enabled) >> (XEN) Processor #7 7:14 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x09] lapic_id[0x09] enabled) >> (XEN) Processor #9 7:14 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x0b] lapic_id[0x0b] enabled) >> (XEN) Processor #11 7:14 APIC version 21 >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) >> (XEN) ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) >> (XEN) Overriding APIC driver with bigsmp >> (XEN) ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >> (XEN) IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 >> (XEN) ACPI: IOAPIC (id[0x02] address[0xfec01000] gsi_base[24]) >> (XEN) IOAPIC[1]: apic_id 2, version 32, address 0xfec01000, GSI 24-47 >> (XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >> (XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >> (XEN) ACPI: IRQ0 used by override. >> (XEN) ACPI: IRQ2 used by override. >> (XEN) ACPI: IRQ9 used by override. >> (XEN) Enabling APIC mode: Phys. Using 2 I/O APICs >> (XEN) ACPI: HPET id: 0x8086a701 base: 0xfed00000 >> (XEN) [VT-D]dmar.c:788: Host address width 46 >> (XEN) [VT-D]dmar.c:802: found ACPI_DMAR_DRHD: >> (XEN) [VT-D]dmar.c:472: dmaru->address = fbffc000 >> (XEN) [VT-D]iommu.c:1137: drhd->address = fbffc000 iommu->reg = >> ffff82c000201000 >> (XEN) [VT-D]iommu.c:1139: cap = d2078c106f0466 ecap = f020de >> (XEN) [VT-D]dmar.c:397: IOAPIC: 0000:00:1f.7 >> (XEN) [VT-D]dmar.c:397: IOAPIC: 0000:00:05.4 >> (XEN) [VT-D]dmar.c:361: MSI HPET: 0000:f0:0f.0 >> (XEN) [VT-D]dmar.c:486: flags: INCLUDE_ALL >> (XEN) [VT-D]dmar.c:807: found ACPI_DMAR_RMRR: >> (XEN) [VT-D]dmar.c:383: endpoint: 0000:00:1d.0 >> (XEN) [VT-D]dmar.c:383: endpoint: 0000:00:1a.0 >> (XEN) [VT-D]dmar.c:676: RMRR region: base_addr 7ddb5000 end_address >> 7ddc1fff >> (XEN) [VT-D]dmar.c:812: found ACPI_DMAR_ATSR: >> (XEN) [VT-D]dmar.c:705: atsru->all_ports: 0 >> (XEN) [VT-D]dmar.c:353: bridge: 0000:00:01.0 start=0 sec=1 sub=2 >> (XEN) [VT-D]dmar.c:353: bridge: 0000:00:02.0 start=0 sec=3 sub=4 >> (XEN) [VT-D]dmar.c:353: bridge: 0000:00:02.2 start=0 sec=5 sub=b >> (XEN) [VT-D]dmar.c:353: bridge: 0000:00:03.0 start=0 sec=c sub=c >> (XEN) [VT-D]dmar.c:353: bridge: 0000:00:03.2 start=0 sec=d sub=d >> (XEN) [VT-D]dmar.c:817: found ACPI_DMAR_RHSA: >> (XEN) [VT-D]dmar.c:757: rhsau->address: fbffc000 rhsau->proximity_domain: 0 >> (XEN) Xen ERST support is initialized. >> (XEN) HEST: Table parsing has been initialized >> (XEN) Using ACPI (MADT) for SMP configuration information >> (XEN) SMP: Allowing 12 CPUs (0 hotplug CPUs) >> (XEN) IRQ limits: 48 GSI, 2272 MSI/MSI-X >> (XEN) Switched to APIC driver x2apic_cluster. >> (XEN) Using scheduler: SMP Credit Scheduler (credit) >> (XEN) Detected 2100.082 MHz processor. >> (XEN) Initing memory sharing. >> (XEN) xstate_init: using cntxt_size: 0x340 and states: 0x7 >> (XEN) mce_intel.c:735: MCA Capability: BCAST 1 SER 1 CMCI 1 firstbank 0 >> extended MCE MSR 0 >> (XEN) Intel machine check reporting enabled >> (XEN) alt table ffff82d0802dd990 -> ffff82d0802debd8 >> (XEN) PCI: MCFG configuration 0: base 80000000 segment 0000 buses 00 - ff >> (XEN) PCI: MCFG area at 80000000 reserved in E820 >> (XEN) PCI: Using MCFG for segment 0000 bus 00-ff >> (XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB. >> (XEN) Intel VT-d Snoop Control enabled. >> (XEN) Intel VT-d Dom0 DMA Passthrough not enabled. >> (XEN) Intel VT-d Queued Invalidation enabled. >> (XEN) Intel VT-d Interrupt Remapping enabled. >> (XEN) Intel VT-d Shared EPT tables enabled. >> (XEN) I/O virtualisation enabled >> (XEN) - Dom0 mode: Relaxed >> (XEN) Interrupt remapping enabled >> (XEN) Enabled directed EOI with ioapic_ack_old on! >> (XEN) ENABLING IO-APIC IRQs >> (XEN) -> Using old ACK method >> (XEN) ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=-1 pin2=-1 >> (XEN) TSC deadline timer enabled >> (XEN) Platform timer is 14.318MHz HPET >> (XEN) Allocated console ring of 128 KiB. >> (XEN) mwait-idle: MWAIT substates: 0x1120 >> (XEN) mwait-idle: v0.4 model 0x3e >> (XEN) mwait-idle: lapic_timer_reliable_states 0xffffffff >> (XEN) VMX: Supported advanced features: >> (XEN) - APIC MMIO access virtualisation >> (XEN) - APIC TPR shadow >> (XEN) - Extended Page Tables (EPT) >> (XEN) - Virtual-Processor Identifiers (VPID) >> (XEN) - Virtual NMI >> (XEN) - MSR direct-access bitmap >> (XEN) - Unrestricted Guest >> (XEN) - APIC Register Virtualization >> (XEN) - Virtual Interrupt Delivery >> (XEN) - Posted Interrupt Processing >> (XEN) HVM: ASIDs enabled. >> (XEN) HVM: VMX enabled >> (XEN) HVM: Hardware Assisted Paging (HAP) detected >> (XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB >> (XEN) Brought up 12 CPUs >> (XEN) ACPI sleep modes: S3 >> (XEN) mcheck_poll: Machine check polling timer started. >> (XEN) Dom0 has maximum 816 PIRQs >> (XEN) *** LOADING DOMAIN 0 *** >> (XEN) elf_parse_binary: phdr: paddr=0xffffffff80200000 memsz=0x6b36cc >> (XEN) elf_parse_binary: phdr: paddr=0xffffffff80ab36d0 memsz=0x1e2798 >> (XEN) elf_parse_binary: memory: 0xffffffff80200000 -> 0xffffffff80c95e68 >> (XEN) elf_xen_parse_note: GUEST_OS = "FreeBSD" >> (XEN) elf_xen_parse_note: GUEST_VERSION = "0x10c923" >> (XEN) elf_xen_parse_note: XEN_VERSION = "xen-3.0" >> (XEN) elf_xen_parse_note: VIRT_BASE = 0xffffffff80000000 >> (XEN) elf_xen_parse_note: PADDR_OFFSET = 0xffffffff80000000 >> (XEN) elf_xen_parse_note: ENTRY = 0xffffffff8078a000 >> (XEN) elf_xen_parse_note: HYPERCALL_PAGE = 0xffffffff80789000 >> (XEN) elf_xen_parse_note: HV_START_LOW = 0xffff800000000000 >> (XEN) elf_xen_parse_note: FEATURES = >> "writable_descriptor_tables|auto_translated_physmap|supervisor_mode_kernel|hvm_callback_vector" >> (XEN) elf_xen_parse_note: PAE_MODE = "yes" >> (XEN) elf_xen_parse_note: unknown xen elf note (0xd) >> (XEN) elf_xen_parse_note: LOADER = "generic" >> (XEN) elf_xen_parse_note: SUSPEND_CANCEL = 0x0 >> (XEN) elf_xen_parse_note: BSD_SYMTAB = "yes" >> (XEN) elf_xen_parse: using notes from SHT_NOTE section >> (XEN) elf_xen_addr_calc_check: addresses: >> (XEN) virt_base = 0xffffffff80000000 >> (XEN) elf_paddr_offset = 0xffffffff80000000 >> (XEN) virt_offset = 0x0 >> (XEN) virt_kstart = 0xffffffff80200000 >> (XEN) virt_kend = 0xffffffff80e1cea0 >> (XEN) virt_entry = 0xffffffff8078a000 >> (XEN) p2m_base = 0xffffffffffffffff >> (XEN) Xen kernel: 64-bit, lsb, compat32 >> (XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0xffffffff80200000 -> >> 0xffffffff80c95e68 >> (XEN) Dom0 symbol map 0xffffffff80c95e68 -> 0xffffffff80e1cea0 >> (XEN) PHYSICAL MEMORY ARRANGEMENT: >> (XEN) Dom0 alloc.: 0000000470000000->0000000472000000 (2087721 pages to >> be allocated) >> (XEN) Init. ramdisk: 000000047fb29000->0000000480000000 >> (XEN) VIRTUAL MEMORY ARRANGEMENT: >> (XEN) Loaded kernel: ffffffff80200000->ffffffff80e1cea0 >> (XEN) Init. ramdisk: ffffffff80e1d000->ffffffff812f4000 >> (XEN) Phys-Mach map: ffffffff812f4000->ffffffff822f4000 >> (XEN) Start info: ffffffff822f4000->ffffffff822f54b4 >> (XEN) Page tables: ffffffff822f6000->ffffffff8230b000 >> (XEN) Boot stack: ffffffff8230b000->ffffffff8230c000 >> (XEN) TOTAL: ffffffff80000000->ffffffff82400000 >> (XEN) ENTRY ADDRESS: ffffffff8078a000 >> (XEN) Dom0 has maximum 4 VCPUs >> (XEN) elf_load_binary: phdr 2 at 0xffffffff80200000 -> 0xffffffff808b36cc >> (XEN) elf_load_binary: phdr 3 at 0xffffffff80ab36d0 -> 0xffffffff80b327f8 >> (XEN) elf_load_bsdsyms: shdr 4 at 0xffff83047f28a308 -> 0xffffffff80c967b0 >> (XEN) elf_load_bsdsyms: shdr 33 at 0xffff83047f9cc10a -> 0xffffffff80cc1180 >> (XEN) elf_load_bsdsyms: shdr 34 at 0xffff83047f9ccbb8 -> 0xffffffff80cc1330 >> (XEN) elf_load_bsdsyms: shdr 35 at 0xffff83047fa78bf0 -> 0xffffffff80d6d368 >> (XEN) [VT-D]iommu.c:1421: d0:Hostbridge: skip 0000:00:00.0 map >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:00:04.0 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:00:04.1 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:00:04.2 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:00:04.3 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:00:04.4 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:00:04.5 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:00:04.6 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:00:04.7 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:00:05.0 >> (XEN) Masked VT-d error signaling on 0000:00:05.0 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:00:05.2 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:00:05.4 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:00:16.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:00:16.1 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:00:1a.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:00:1d.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:00:1f.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:00:1f.2 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:00:1f.3 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:00:1f.6 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:01:00.0 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:01:00.1 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:03:00.0 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:03:00.1 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:03:00.2 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:03:00.3 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:07:00.0 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:07:00.1 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:07:00.2 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:07:00.3 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:09:00.0 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:09:00.1 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:09:00.2 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:09:00.3 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:0f:00.0 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:0f:00.1 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:11:04.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:08.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:09.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0a.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0a.1 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0a.2 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0a.3 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0b.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0b.3 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0c.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0c.1 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0c.2 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0d.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0d.1 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0d.2 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0e.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:0e.1 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:0f.0 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:0f.1 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:0f.2 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:0f.3 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:0f.4 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:0f.5 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:10.0 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:10.1 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:10.2 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:10.3 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:10.4 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:10.5 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:10.6 >> (XEN) [VT-D]iommu.c:1435: d0:PCIe: map 0000:ff:10.7 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:13.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:13.1 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:13.4 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:13.5 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:16.0 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:16.1 >> (XEN) [VT-D]iommu.c:1447: d0:PCI: map 0000:ff:16.2 >> (XEN) [VT-D]iommu.c:730: iommu_enable_translation: iommu->reg = >> ffff82c000201000 >> (XEN) Scrubbing Free RAM on 1 nodes using 6 CPUs >> (XEN) ........................done. >> (XEN) Initial low memory virq threshold set at 0x4000 pages. >> (XEN) Std. Loglevel: All >> (XEN) Guest Loglevel: Errors and warnings >> (XEN) Xen is relinquishing VGA console. >> (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to >> Xen) >> (XEN) Freed 308kB init memory. >> (XEN) <vm_launch_fail> error code 7 >> (XEN) domain_crash_sync called from vmcs.c:1319 >> (XEN) Domain 0 (vcpu#0) crashed on cpu#0: >> (XEN) ----[ Xen-4.6-unstable x86_64 debug=y Not tainted ]---- >> (XEN) CPU: 0 >> (XEN) RIP: 0000:[<ffffffff8078a000>] >> (XEN) RFLAGS: 0000000000000200 CONTEXT: hvm guest >> (XEN) rax: 0000000000000000 rbx: ffff82d0802e8000 rcx: ffff82d0802eff80 >> (XEN) rdx: ffff82d0801e08a8 rsi: 0000000000000000 rdi: ffff82d0801ecb0c >> (XEN) rbp: ffff82d080105fa6 rsp: ffffffff8230c000 r8: ffff8304741c0000 >> (XEN) r9: ffff82d080106013 r10: ffff82d0802eff70 r11: 0000000000000000 >> (XEN) r12: ffff82d0802eff50 r13: ffff830473fc9000 r14: ffff8304741c0000 >> (XEN) r15: ffff82d08018e547 cr0: 0000000080000011 cr4: 0000000000000020 >> (XEN) cr3: 00000000022f6000 cr2: 0000000000000000 >> (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0000 >> (XEN) Guest stack trace from rsp=ffffffff8230c000: >> (XEN) Fault while accessing guest memory. >> (XEN) Domain 0 crashed: rebooting machine in 5 seconds. > This looks like a Xen issue. AFAICT Xen fails to even start the Dom0 > guest, so I don't think it's FreeBSD related. I'm CCing xen-devel, let's > see if someone can provide more insight. vmlaunch failure 7 means "VM entry with invalid control field" Unfortunately, this means that 1 of a large number of things possibly went wrong. (At some point, I need to implement the checks as described in the manual, to help identify which specific issue caused the failure). However, given that the stack trace fails, I would hazard a guess that the initial stack pointer is located on a non-present page. ~Andrew _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |