|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Xen dom0 crash
El 18/05/15 a les 15.57, Eggert, Lars ha escrit:
> Forgot to CC the Intel folks...
>
> On 2015-5-18, at 15:55, Lars Eggert <lars@xxxxxxxxxx> wrote:
>>
>> Hi,
>>
>> Roger asked me to send this bug report to xen-devel. I'm trying to bring up
>> a Xen dom0 on a Fujitsu RX308, but it crashes when strying to start the
>> kernel.
>>
>> Any ideas?
>>
>> Lars
>>
>> B2
>> ______ ____ _____ _____
>> | ____| | _ \ / ____| __ \
>> | |___ _ __ ___ ___ | |_) | (___ | | | |
>> | ___| '__/ _ \/ _ \| _ < \___ \| | | |
>> | | | | | __/ __/| |_) |____) | |__| |
>> | | | | | | || | |
>> |_| |_| \___|\___||____/|_____/|_____/ ``` `
>> s` `.....---.......--.``` -/
>> + Welcome to FreeBSD +4H+ .--` /y:` +.
>> /boot/kernel/cc_vegas.ko size 0x30d0 at 0x1068000:. :o `+-
>> Booting...el/cc_hd.ko size 0x2c00 at 0x1062000000 -/` -o/
>> Xen 4.6-unstabletcp.ko size 0x2f90 at 0x1065000 ::/sy+:.
>> (XEN) Xen version 4.6-unstable (root@xxxxxxxxxx) (gcc47 (FreeBSD Ports
>> Collection) 4.7.4) debug=y Mon May 18 14:50:17 CEST 2015
>> :`
>> (XEN) Latest ChangeSet: | `: :`
>> (XEN) Bootloader: FreeBSD Loader | / /
>> (XEN) Command line: dom0_mem=4096M dom0pvh=1 com1=115200,8n1 console=com1.
>> (XEN) Video information:]ptions... | -- -.
>> (XEN) VGA is text mode 80x25, font 8x16 | `:` `:`
>> (XEN) VBE/DDC methods: none; EDID transfer time: 0 seconds `--.
>> (XEN) EDID info not retrieved because no DDC retrieval method
>> detected=========(XEN) Disc information:====================
>> (XEN) Found 0 MBR signatures
>> (XEN) Found 0 EDD information structures
>> (XEN) Xen-e820 RAM map:+0x50db0 -
>> (XEN) 0000000000000000 - 000000000008b800 (usable)
>> (XEN) 000000000008b800 - 00000000000a0000 (reserved)
>> (XEN) 00000000000e0000 - 0000000000100000 (reserved)
>> (XEN) 0000000000100000 - 000000007cb09000 (usable)
>> (XEN) 000000007cb09000 - 000000007cb39000 (reserved)
>> (XEN) 000000007cb39000 - 000000007cc52000 (ACPI data)
>> (XEN) 000000007cc52000 - 000000007d4b0000 (ACPI NVS)
>> (XEN) 000000007d4b0000 - 000000007eafb000 (reserved)
>> (XEN) 000000007eafb000 - 000000007eafc000 (usable)
>> (XEN) 000000007eafc000 - 000000007eb82000 (ACPI NVS)
>> (XEN) 000000007eb82000 - 000000007f000000 (usable)
>> (XEN) 0000000080000000 - 0000000090000000 (reserved)
>> (XEN) 00000000fed1c000 - 00000000fed20000 (reserved)
>> (XEN) 00000000ff000000 - 0000000100000000 (reserved)
>> (XEN) 0000000100000000 - 0000002080000000 (usable)
>> (XEN) ACPI: RSDP 000F04A0, 0024 (r2 FTS )
>> (XEN) ACPI: XSDT 7CB71090, 00A4 (r1 FTS D2939-B1 1072009 AMI 10013)
>> (XEN) ACPI: FACP 7CB7FAA8, 010C (r5 FTS D2939-B1 1072009 AMI 10013)
>> (XEN) ACPI: DSDT 7CB711C8, E8DD (r2 FTS D2939-B1 114 INTL 20091112)
>> (XEN) ACPI: FACS 7D4A7080, 0040
>> (XEN) ACPI: APIC 7CB7FBB8, 0294 (r3 FTS D2939-B1 1072009 AMI 10013)
>> (XEN) ACPI: FPDT 7CB7FE50, 0044 (r1 FTS D2939-B1 1072009 AMI 10013)
>> (XEN) ACPI: MCFG 7CB7FE98, 003C (r1 FTS OEMMCFG. 1072009 MSFT 97)
>> (XEN) ACPI: SRAT 7CB7FED8, 0530 (r1 A M I AMI SRAT 1 AMI. 0)
>> (XEN) ACPI: SLIT 7CB80408, 0030 (r1 A M I AMI SLIT 0 AMI. 0)
>> (XEN) ACPI: HPET 7CB80438, 0038 (r1 FTS D2939-B1 1072009 AMI. 5)
>> (XEN) ACPI: PRAD 7CB80470, 00BE (r2 PRADID PRADTID 1 MSFT 3000001)
>> (XEN) ACPI: SPMI 7CB80530, 0040 (r5 A M I OEMSPMI 0 AMI. 0)
>> (XEN) ACPI: SSDT 7CB80570, D0CB0 (r2 INTEL CpuPm 4000 INTL 20051117)
>> (XEN) ACPI: SPCR 7CC51220, 0050 (r1 A M I APTIO4 1072009 AMI. 5)
>> (XEN) ACPI: EINJ 7CC51270, 0130 (r1 AMI AMI EINJ 0 0)
>> (XEN) ACPI: ERST 7CC513A0, 0230 (r1 AMIER AMI ERST 0 0)
>> (XEN) ACPI: HEST 7CC515D0, 00A8 (r1 AMI AMI HEST 0 0)
>> (XEN) ACPI: BERT 7CC51678, 0030 (r1 AMI AMI BERT 0 0)
>> (XEN) ACPI: DMAR 7CC516A8, 0110 (r1 A M I OEMDMAR 1 INTL 1)
>> (XEN) System RAM: 131023MB (134167628kB)
>> (XEN) SRAT: PXM 0 -> APIC 0 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 1 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 2 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 3 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 4 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 5 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 6 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 7 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 8 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 9 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 16 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 17 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 18 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 19 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 20 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 21 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 22 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 23 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 24 -> Node 0
>> (XEN) SRAT: PXM 0 -> APIC 25 -> Node 0
>> (XEN) SRAT: PXM 1 -> APIC 32 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 33 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 34 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 35 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 36 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 37 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 38 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 39 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 40 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 41 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 48 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 49 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 50 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 51 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 52 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 53 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 54 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 55 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 56 -> Node 1
>> (XEN) SRAT: PXM 1 -> APIC 57 -> Node 1
>> (XEN) SRAT: Node 0 PXM 0 0-80000000
>> (XEN) SRAT: Node 0 PXM 0 100000000-1080000000
>> (XEN) SRAT: Node 1 PXM 1 1080000000-2080000000
>> (XEN) NUMA: Allocated memnodemap from 207f338000 - 207f339000
>> (XEN) NUMA: Using 19 for the hash shift.
>> (XEN) Domain heap initialised DMA width 32 bits
>> (XEN) found SMP MP-table at 000fdbe0
>> (XEN) DMI 2.7 present.
>> (XEN) Using APIC driver default
>> (XEN) ACPI: PM-Timer IO Port: 0x408
>> (XEN) ACPI: v5 SLEEP INFO: control[0:0], status[0:0]
>> (XEN) ACPI: SLEEP INFO: pm1x_cnt[1:404,1:0], pm1x_evt[1:400,1:0]
>> (XEN) ACPI: 32/64X FACS address mismatch in FADT -
>> 7d4a7080/0000000000000000, using 32
>> (XEN) ACPI: wakeup_vec[7d4a708c], vec_size[20]
>> (XEN) ACPI: Local APIC address 0xfee00000
>> (XEN) ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled)
>> (XEN) Processor #0 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled)
>> (XEN) Processor #2 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x04] lapic_id[0x04] enabled)
>> (XEN) Processor #4 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x06] lapic_id[0x06] enabled)
>> (XEN) Processor #6 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x08] lapic_id[0x08] enabled)
>> (XEN) Processor #8 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x0a] lapic_id[0x10] enabled)
>> (XEN) Processor #16 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x0c] lapic_id[0x12] enabled)
>> (XEN) Processor #18 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x0e] lapic_id[0x14] enabled)
>> (XEN) Processor #20 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x10] lapic_id[0x16] enabled)
>> (XEN) Processor #22 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x12] lapic_id[0x18] enabled)
>> (XEN) Processor #24 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x14] lapic_id[0x20] enabled)
>> (XEN) Processor #32 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x16] lapic_id[0x22] enabled)
>> (XEN) Processor #34 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x18] lapic_id[0x24] enabled)
>> (XEN) Processor #36 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x1a] lapic_id[0x26] enabled)
>> (XEN) Processor #38 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x1c] lapic_id[0x28] enabled)
>> (XEN) Processor #40 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x1e] lapic_id[0x30] enabled)
>> (XEN) Processor #48 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x20] lapic_id[0x32] enabled)
>> (XEN) Processor #50 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x22] lapic_id[0x34] enabled)
>> (XEN) Processor #52 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x24] lapic_id[0x36] enabled)
>> (XEN) Processor #54 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x26] lapic_id[0x38] enabled)
>> (XEN) Processor #56 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled)
>> (XEN) Processor #1 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled)
>> (XEN) Processor #3 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x05] lapic_id[0x05] enabled)
>> (XEN) Processor #5 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x07] lapic_id[0x07] enabled)
>> (XEN) Processor #7 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x09] lapic_id[0x09] enabled)
>> (XEN) Processor #9 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x0b] lapic_id[0x11] enabled)
>> (XEN) Processor #17 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x0d] lapic_id[0x13] enabled)
>> (XEN) Processor #19 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x0f] lapic_id[0x15] enabled)
>> (XEN) Processor #21 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x11] lapic_id[0x17] enabled)
>> (XEN) Processor #23 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x13] lapic_id[0x19] enabled)
>> (XEN) Processor #25 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x15] lapic_id[0x21] enabled)
>> (XEN) Processor #33 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x17] lapic_id[0x23] enabled)
>> (XEN) Processor #35 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x19] lapic_id[0x25] enabled)
>> (XEN) Processor #37 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x1b] lapic_id[0x27] enabled)
>> (XEN) Processor #39 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x1d] lapic_id[0x29] enabled)
>> (XEN) Processor #41 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x1f] lapic_id[0x31] enabled)
>> (XEN) Processor #49 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x21] lapic_id[0x33] enabled)
>> (XEN) Processor #51 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x23] lapic_id[0x35] enabled)
>> (XEN) Processor #53 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x25] lapic_id[0x37] enabled)
>> (XEN) Processor #55 7:14 APIC version 21
>> (XEN) ACPI: LAPIC (acpi_id[0x27] lapic_id[0x39] enabled)
>> (XEN) Processor #57 7:14 APIC version 21
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1])
>> (XEN) ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1])
>> (XEN) Overriding APIC driver with bigsmp
>> (XEN) ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0])
>> (XEN) IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23
>> (XEN) ACPI: IOAPIC (id[0x02] address[0xfec01000] gsi_base[24])
>> (XEN) IOAPIC[1]: apic_id 2, version 32, address 0xfec01000, GSI 24-47
>> (XEN) ACPI: IOAPIC (id[0x03] address[0xfec40000] gsi_base[48])
>> (XEN) IOAPIC[2]: apic_id 3, version 32, address 0xfec40000, GSI 48-71
>> (XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
>> (XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
>> (XEN) ACPI: IRQ0 used by override.
>> (XEN) ACPI: IRQ2 used by override.
>> (XEN) ACPI: IRQ9 used by override.
>> (XEN) Enabling APIC mode: Phys. Using 3 I/O APICs
>> (XEN) ACPI: HPET id: 0x8086a701 base: 0xfed00000
>> (XEN) Xen ERST support is initialized.
>> (XEN) HEST: Table parsing has been initialized
>> (XEN) Using ACPI (MADT) for SMP configuration information
>> (XEN) SMP: Allowing 40 CPUs (0 hotplug CPUs)
>> (XEN) IRQ limits: 72 GSI, 7624 MSI/MSI-X
>> (XEN) Switched to APIC driver x2apic_cluster.
>> (XEN) Using scheduler: SMP Credit Scheduler (credit)
>> (XEN) Detected 2800.090 MHz processor.
>> (XEN) Initing memory sharing.
>> (XEN) xstate_init: using cntxt_size: 0x340 and states: 0x7
>> (XEN) mce_intel.c:735: MCA Capability: BCAST 1 SER 1 CMCI 1 firstbank 0
>> extended MCE MSR 0
>> (XEN) Intel machine check reporting enabled
>> (XEN) alt table ffff82d0802deab0 -> ffff82d0802dfd40
>> (XEN) PCI: MCFG configuration 0: base 80000000 segment 0000 buses 00 - ff
>> (XEN) PCI: MCFG area at 80000000 reserved in E820
>> (XEN) PCI: Using MCFG for segment 0000 bus 00-ff
>> (XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB.
>> (XEN) Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB.
>> (XEN) Intel VT-d Snoop Control enabled.
>> (XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
>> (XEN) Intel VT-d Queued Invalidation enabled.
>> (XEN) Intel VT-d Interrupt Remapping enabled.
>> (XEN) Intel VT-d Shared EPT tables enabled.
>> (XEN) I/O virtualisation enabled
>> (XEN) - Dom0 mode: Relaxed
>> (XEN) Interrupt remapping enabled
>> (XEN) Enabled directed EOI with ioapic_ack_old on!
>> (XEN) ENABLING IO-APIC IRQs
>> (XEN) -> Using old ACK method
>> (XEN) ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=-1 pin2=-1
>> (XEN) TSC deadline timer enabled
>> (XEN) Platform timer is 14.318MHz HPET
>> (XEN) Defaulting to alternative key handling; send 'A' to switch to normal
>> mode.
>> (XEN) Allocated console ring of 512 KiB.
>> (XEN) mwait-idle: MWAIT substates: 0x1120
>> (XEN) mwait-idle: v0.4 model 0x3e
>> (XEN) mwait-idle: lapic_timer_reliable_states 0xffffffff
>> (XEN) VMX: Supported advanced features:
>> (XEN) - APIC MMIO access virtualisation
>> (XEN) - APIC TPR shadow
>> (XEN) - Extended Page Tables (EPT)
>> (XEN) - Virtual-Processor Identifiers (VPID)
>> (XEN) - Virtual NMI
>> (XEN) - MSR direct-access bitmap
>> (XEN) - Unrestricted Guest
>> (XEN) - APIC Register Virtualization
>> (XEN) - Virtual Interrupt Delivery
>> (XEN) - Posted Interrupt Processing
I've realized that both reports of this errors were from hardware that
supported posted interrupts, while I don't have any hardware that
supports it. The following is just a hunch, but could you try the
attached patch?
I'm also working on a patch to check what actually caused vmlaunch to
fail, but that's going to take a little bit more time.
Roger.
---
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index a714549..dcbccc5 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -976,6 +976,9 @@ static int construct_vmcs(struct vcpu *v)
| SECONDARY_EXEC_VIRTUAL_INTR_DELIVERY);
v->arch.hvm_vmx.exec_control &= ~CPU_BASED_TPR_SHADOW;
+ __vmwrite(PIN_BASED_VM_EXEC_CONTROL,
+ (vmx_pin_based_exec_control & ~PIN_BASED_POSTED_INTERRUPT));
+
/* Unrestricted guest (real mode for EPT) */
v->arch.hvm_vmx.secondary_exec_control &=
~SECONDARY_EXEC_UNRESTRICTED_GUEST;
@@ -1539,12 +1542,200 @@ void vmx_destroy_vmcs(struct vcpu *v)
free_xenheap_page(v->arch.hvm_vmx.msr_bitmap);
}
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |