[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Xen master hangs
On Tue, Jul 28, 2015 at 10:01 AM, Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> wrote: > On Tue, Jul 28, 2015 at 09:30:59AM -0500, Doug Goldstein wrote: >> On Mon, Jul 27, 2015 at 4:11 PM, Doug Goldstein <cardoe@xxxxxxxxxx> wrote: >> > On Mon, Jul 27, 2015 at 4:55 AM, Andrew Cooper >> > <andrew.cooper3@xxxxxxxxxx> wrote: >> >> On 24/07/15 17:52, Doug Goldstein wrote: >> >> >> >> <snip> >> >> So now I've got a build of staging >> 8398ec706ff60e17a5044470fa2e90a1b081f37a with debug=y and >> frame_pointer=n so that we can get a good call trace. As Andrew >> pointed out to me on IRC right now stack tracing is broken with EFI >> boots due to a mix of using frame pointers (in Xen) and no frame >> pointer (EFI). Here's the latest output: >> >> The system is powered on. >> Xen 4.6-unstable >> (XEN) Xen version 4.6-unstable (doug@) (gcc (Ubuntu 4.9.2-10ubuntu13) >> 4.9.2) debug=y Tue Jul 28 09:03:53 CDT 2015 >> (XEN) Latest ChangeSet: Fri Jul 24 17:29:41 2015 +0200 git:8398ec7-dirty >> (XEN) Bootloader: EFI >> (XEN) Command line: com1=115200,8n1,0x40b0 console=com1 loglvl=all >> console_timestamp=boot >> (XEN) Video information: >> (XEN) VGA is graphics mode 1920x1080, 32 bpp >> (XEN) Disc information: >> (XEN) Found 0 MBR signatures >> (XEN) Found 1 EDD information structures >> (XEN) EFI RAM map: >> (XEN) 0000000000000000 - 000000000009c000 (usable) >> (XEN) 000000000009c000 - 000000000009d000 (reserved) >> (XEN) 000000000009d000 - 000000000009e000 (usable) >> (XEN) 000000000009e000 - 00000000000c0000 (reserved) >> (XEN) 0000000000100000 - 0000000020000000 (usable) >> (XEN) 0000000020000000 - 0000000020200000 (reserved) >> (XEN) 0000000020200000 - 0000000040004000 (usable) >> (XEN) 0000000040004000 - 0000000040005000 (reserved) >> (XEN) 0000000040005000 - 00000000ceaad000 (usable) >> (XEN) 00000000ceaad000 - 00000000cecaf000 (reserved) >> (XEN) 00000000cecaf000 - 00000000d660b000 (usable) >> (XEN) 00000000d660b000 - 00000000daa9f000 (reserved) >> (XEN) 00000000daa9f000 - 00000000dab9f000 (ACPI NVS) >> (XEN) 00000000dab9f000 - 00000000dabff000 (ACPI data) >> (XEN) 00000000dabff000 - 00000000dac00000 (usable) >> (XEN) 00000000dac00000 - 00000000dfa00000 (reserved) >> (XEN) 00000000f80f8000 - 00000000f80f9000 (reserved) >> (XEN) 00000000fed1c000 - 00000000fed90000 (reserved) >> (XEN) 0000000100000000 - 000000021e600000 (usable) >> (XEN) 000000021e600000 - 000000021f000000 (reserved) >> (XEN) ACPI: RSDP DABFE014, 0024 (r2 LL SNB 1 INTL 1) >> (XEN) ACPI: UEFI DABD9000, 02A6 (r1 LENOVO TP-G1 2680 PTL 2) >> (XEN) ACPI: DBG2 DABD8000, 00E9 (r0 LENOVO TP-G1 2680 PTL 2) >> (XEN) ACPI: BGRT DABD7000, 0038 (r0 LENOVO TP-G1 2680 PTL 2) >> (XEN) System RAM: 8007MB (8199832kB) >> (XEN) No NUMA configuration found >> (XEN) Faking a node at 0000000000000000-000000021e600000 >> (XEN) Domain heap initialised >> (XEN) SMBIOS 2.7 present. >> (XEN) DMI 2.7 present. >> (XEN) Using APIC driver default >> (XEN) ACPI: PM-Timer IO Port: 0x408 >> (XEN) ACPI: v5 SLEEP INFO: control[1:0], status[1:0] >> (XEN) ACPI: SLEEP INFO: pm1x_cnt[1:404,1:0], pm1x_evt[1:400,1:0] >> (XEN) ACPI: 32/64X FACS address mismatch in FADT - >> dab5a000/0000000000000000, using 32 >> (XEN) ACPI: wakeup_vec[dab5a00c], vec_size[20] >> (XEN) ACPI: Local APIC address 0xfee00000 >> (XEN) ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled) >> (XEN) Processor #0 7:10 APIC version 21 >> (XEN) ACPI: LAPIC (acpi_id[0x02] lapic_id[0x01] enabled) >> (XEN) Processor #1 7:10 APIC version 21 >> (XEN) AC 0 bus_irq 0 global_irq 2 dfl dfl) >> (XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >> (XEN) ACPI: IRQ0 used by override. >> (XEN) ACPI: IRQ2 used by override. >> (XEN) ACPI: IRQ9 used by override. >> (XEN) Enabling APIC mode: Flat. Using 1 I/O APICs >> (XEN) ACPI: HPET id: 0x8086a301 base: 0xfed00000 >> (XEN) ERST table was not found >> (XEN) ACPI: BGRT: invalidating v0 image at 0xd3649018 >> (XEN) Using ACPI (MADT) for SMP configuration information >> (XEN) SMP: Allowing 8 CPUs (4 hotplug CPUs) >> (XEN) IRQ limits: 24 GSI, 760 MSI/MSI-X >> (XEN) Switched to APIC driver x2apic_cluster. >> (XEN) xstate_init: using cntxt_size: 0x340 and states: 0x7 >> (XEN) mce_intel.c:735: MCA Capability: BCAST 1 SER 0 CMCI 1 firstbank >> 0 extended MCE MSR 0 >> (XEN) Intel machine check reporting enabled >> (XEN) Using scheduler: SMP Credit Scheduler (credit) >> (XEN) Detected 2594.177 MHz processor. >> (XEN) EFI memory map: >> (XEN) 0000000000000-0000000086fff type=7 attr=000000000000000f >> (XEN) 0000000087000-0000000087fff type=4 attr=000000000000000f >> (XEN) 0000000088000-0000000098fff type=7 attr=000000000000000f >> (XEN) 0000000099000-000000009bfff type=2 attr=000000000000000f >> (XEN) 000000009c000-000000009cfff type=0 attr=000000000000000f >> (XEN) 000000009d000-000000009dfff type=4 attr=000000000000000f >> (XEN) 000000009e000-000000009ffff type=0 attr=000000000000000f >> (XEN) 0000000100000-000001fffffff type=7 attr=000000000000000f >> (XEN) 0000020000000-00000201fffff type=0 attr=000000000000000f >> (XEN) 0000020200000-0000040003fff type=7 attr=000000000000000f >> (XEN) 0000040004000-0000040004fff type=0 attr=000000000000000f >> (XEN) 0000040005000-00000cc48dfff type=7 attr=000000000000000f >> (XEN) 00000cc48e000-00000cc4adfff type=4 attr=000000000000000f >> (XEN) 00000cc4ae000-00000cc53cfff type=7 attr=000000000000000f >> (XEN) 00000cc53d000-00000cea96fff type=2 attr=000000000000000f >> (XEN) 00000cea97000-00000ceaacfff type=4 attr=000000000000000f >> (XEN) 00000ceaad000-00000cecaefff type=0 attr=000000000000000f >> (XEN) 00000cecaf000-00000cf47dfff type=4 attr=000000000000000f >> (XEN) 00000cf47e000-00000cf910fff type=7 attr=000000000000000f >> (XEN) 00000cf911000-00000d0b10fff type=1 attr=000000000000000f >> (XEN) 00000d0b11000-00000d2145fff type=7 attr=000000000000000f >> (XEN) 00000d2146000-00000d237ffff type=4 attr=000000000000000f >> (XEN) 00000d2380000-00000d2573fff type=7 attr=000000000000000f >> (XEN) 00000d2574000-00000d3e52fff type=4 attr=000000000000000f >> (XEN) 00000d3e53000-00000d3e56fff type=7 attr=000000000000000f >> (XEN) 00000d3e57000-00000d4270fff type=4 attr=000000000000000f >> (XEN) 00000d4271000-00000d427afff type=7 attr=000000000000000f >> (XEN) 00000d427b000-00000d5c0afff type=4 attr=000000000000000f >> (XEN) 00000d5c0b000-00000d6156fff type=7 attr=000000000000000f >> (XEN) 00000d6157000-00000d660afff type=3 attr=000000000000000f >> (XEN) 00000d660b000-00000d66e0fff type=5 attr=800000000000000f >> (XEN) 00000d66e1000-00000d680afff type=5 attr=800000000000000f >> (XEN) 00000d680b000-00000d73b3fff type=6 attr=800000000000000f >> (XEN) 00000d73b4000-00000da259fff type=6 attr=800000000000000f >> (XEN) 00000da25a000-00000da7effff type=0 attr=000000000000000f >> (XEN) 00000da7f0000-00000daa9afff type=0 attr=000000000000000f >> (XEN) 00000daa9b000-00000daa9bfff type=0 attr=000000000000000f >> (XEN) 00000daa9c000-00000daa9efff type=0 attr=000000000000000f >> (XEN) 00000daa9f000-00000daaf4fff type=10 attr=000000000000000f >> (XEN) 00000daaf5000-00000dab9efff type=10 attr=000000000000000f >> (XEN) 00000dab9f000-00000dabd6fff type=9 attr=000000000000000f >> (XEN) 0000000000000f >> (XEN) 00000dabff000-00000dabfffff type=4 attr=000000000000000f >> (XEN) 0000100000000-000021e5fffff type=7 attr=000000000000000f >> (XEN) 00000000a0000-00000000bffff type=0 attr=0000000000000000 >> (XEN) 00000dac00000-00000df9fffff type=0 attr=0000000000000000 >> (XEN) 00000f80f8000-00000f80f8fff type=11 attr=8000000000000001 >> (XEN) 00000fed1c000-00000fed1ffff type=11 attr=8000000000000001 >> (XEN) 00000fed20000-00000fed8ffff type=0 attr=0000000000000000 >> (XEN) 000021e600000-000021effffff type=0 attr=0000000000000000 >> (XEN) Initing memory sharing. >> (XEN) alt table ffff82d0802f6150 -> ffff82d0802f7440 >> (XEN) PCI: MCFG configuration 0: base f8000000 segment 0000 buses 00 - 3f >> (XEN) PCI: Not using MCFG for segment 0000 bus 00-3f >> (XEN) Intel VT-d iommu 0 supported page sizes: 4kB. >> (XEN) Intel VT-d iommu 1 supported page sizes: 4kB. >> (XEN) Intel VT-d Snoop Control not enabled. >> (XEN) Intel VT-d Dom0 DMA Passthrough not enabled. >> (XEN) Intel VT-d Queued Invalidation enabled. >> (XEN) Intel VT-d Interrupt Remapping enabled. >> (XEN) Intel VT-d Shared EPT tables not enabled. >> (XEN) I/O virtualisation enabled >> (XEN) - Dom0 mode: Relaxed >> (XEN) Interrupt remapping enabled >> (XEN) Enabled directed EOI with ioapic_ack_old on! >> (XEN) ENABLING IO-APIC IRQs >> (XEN) -> Using old ACK method >> (XEN) ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=-1 pin2=-1 >> (XEN) TSC deadline timer enabled >> (XEN) Platform timer is 14.318MHz HPET >> (XEN) Allocated console ring of 32 KiB. >> (XEN) mwait-idle: MWAIT substates: 0x21120 >> (XEN) mwait-idle: v0.4 model 0x3a >> (XEN) mwait-idle: lapic_timer_reliable_states 0xffffffff >> (XEN) VMX: Supported advanced features: >> (XEN) - APIC MMIO access virtualisation >> (XEN) - APIC TPR shadow >> (XEN) - Extended Page Tables (EPT) >> (XEN) - Virtual-Processor Identifiers (VPID) >> (XEN) - Virtual NMI >> (XEN) - MSR direct-access bitmap >> (XEN) - Unrestricted Guest >> (XEN) HVM: ASIDs enabled. >> (XEN) HVM: VMX enabled >> (XEN) HVM: Hardware Assisted Paging (HAP) detected >> (XEN) HVM: HAP page sizes: 4kB, 2MB >> (XEN) Brought up 4 CPUs >> (XEN) ACPI sleep modes: S3 >> (XEN) VPMU: disabled >> (XEN) mcheck_poll: Machine check polling timer started. >> (XEN) Dom0 has maximum 600 PIRQs >> (XEN) NX (Execute Disable) protection active >> (XEN) *** LOADING DOMAIN 0 *** >> (XEN) elf_parse_binary: phdr: paddr=0x1000000 memsz=0xbac000 >> (XEN) elf_parse_binary: phdr: paddr=0x1c00000 memsz=0x136000 >> (XEN) elf_parse_binary: phdr: paddr=0x1d36000 memsz=0x15440 >> (XEN) elf_parse_binary: phdr: paddr=0x1d4c000 memsz=0x2bf000 >> (XEN) elf_parse_binary: memory: 0x1000000 -> 0x200b000 >> (XEN) elf_xen_parse_note: GUEST_OS = "linux" >> (XEN) elf_xen_parse_note: GUEST_VERSION = "2.6" >> (XEN) elf_xen_parse_note: XEN_VERSION = "xen-3.0" >> (XEN) elf_xen_parse_note: VIRT_BASE = 0xffffffff80000000 >> (XEN) elf_xen_parse_note: ENTRY = 0xffffffff81d4c1f0 >> (XEN) eck: addresses: >> (XEN) virt_base = 0xffffffff80000000 >> (XEN) elf_paddr_offset = 0x0 >> (XEN) virt_offset = 0xffffffff80000000 >> (XEN) virt_kstart = 0xffffffff81000000 >> (XEN) virt_kend = 0xffffffff8200b000 >> (XEN) virt_entry = 0xffffffff81d4c1f0 >> (XEN) p2m_base = 0xffffffffffffffff >> (XEN) Xen kernel: 64-bit, lsb, compat32 >> (XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x200b000 >> (XEN) PHYSICAL MEMORY ARRANGEMENT: >> (XEN) Dom0 alloc.: 0000000210000000->0000000214000000 (1963504 >> pages to be allocated) >> (XEN) Init. ramdisk: 000000021c6f6000->000000021e5ffd57 >> (XEN) VIRTUAL MEMORY ARRANGEMENT: >> (XEN) Loaded kernel: ffffffff81000000->ffffffff8200b000 >> (XEN) Init. ramdisk: 0000000000000000->0000000000000000 >> (XEN) Phys-Mach map: ffffffff8200b000->ffffffff82f357d0 >> (XEN) Start info: ffffffff82f36000->ffffffff82f364b4 >> (XEN) Page tables: ffffffff82f37000->ffffffff82f52000 >> (XEN) Boot stack: ffffffff82f52000->ffffffff82f53000 >> (XEN) TOTAL: ffffffff80000000->ffffff(XEN) traps.c:2686:d0v0 >> Domain attempted WRMSR 00000000c0000081 from 0xe023e00800000000 to >> 0x0023001000000000. >> (XEN) traps.c:2686:d0v0 Domain attempted WRMSR 00000000c0000082 from >> 0xffff82d0bffff000 to 0xffffffff817cb550. >> (XEN) traps.c:2686:d0v0 Domain attempted WRMSR 00000000c0000083 from >> 0xffff82d0bffff020 to 0xffffffff817cdb80. >> (XEN) traps.c:2686:d0v0 Domain attempted WRMSR 0000000000000174 from >> 0x000000000000e008 to 0x0000000000000010. >> (XEN) traps.c:2686:d0v0 Domain attempted WRMSR 0000000000000175 from >> 0xffff8300cfd07fc0 to 0x0000000000000000. >> (XEN) traps.c:2686:d0v0 Domain attempted WRMSR 0000000000000176 from >> 0xffff82d08023ad70 to 0xffffffff817cde90. >> (XEN) traps.c:2686:d0v0 Domain attempted WRMSR 00000000c0000083 from >> 0xffff82d0bffff020 to 0xffffffff817ce0d0. >> (XEN) traps.c:2686:d0v0 Domain attempted WRMSR 00000000c0000084 from >> 0x0000000000074700 to 0x0000000000047700. >> (XEN) traps.c:2686:d0v0 Domain attempted WRMSR 00000000000001c9 from >> 0x0000000000000000 to 0x0000000000000003. >> (XEN) traps.c:2686:d0v0 Domain attempted WRMSR 00000000000001a6 from >> 0x0000000000000000 to 0x00000000000001ff. >> (XEN) traps.c:2686:d0v0 Domain attempted WRMSR 00000000000001a7 from >> 0x0000000000000000 to 0x00000000000001ff. >> (XEN) traps.c:2686:d0v0 Domain attempted WRMSR 00000000000003f6 from >> 0x000000000000ffff to 0x000000000000fe00. >> (XEN) traps.c:2686:d0v1 Domain attempted WRMSR 00000000c0000081 from >> 0xe023e00800000000 to 0x0023001000000000. >> (XEN) traps.c:2686:d0v1 Domain attempted WRMSR 00000000c0000082 from >> 0xffff82d0bfffe080 to 0xffffffff817cb550. >> (XEN) traps.c:2686:d0v1 Domain attempted WRMSR 00000000c0000083 from >> 0xffff82d0bfffe0a0 to 0xffffffff817cdb80. >> (XEN) traps.c:2686:d0v1 Domain attempted WRMSR 0000000000000174 from >> 0x000000000000e008 to 0x0000000000000010. >> (XEN) traps.c:2686:d0v1 Domain attempted WRMSR >> 00000000000001700000e008 to 0x0000000000000010. >> (XEN) traps.c:2686:d0v2 Domain attempted WRMSR 0000000000000175 from >> 0xffff830216cc7fc0 to 0x0000000000000000. >> (XEN) traps.c:2686:d0v2 Domain attempted WRMSR 0000000000000176 from >> 0xffff82d08023ad70 to 0xffffffff817cde90. >> (XEN) traps.c:2686:d0v2 Domain attempted WRMSR 00000000c0000083 from >> 0xffff82d0bfffd120 to 0xffffffff817ce0d0. >> (XEN) traps.c:2686:d0v2 Domain attempted WRMSR 00000000c0000084 from >> 0x0000000000074700 to 0x0000000000047700. >> (XEN) traps.c:2686:d0v3 Domain attempted WRMSR 00000000c0000081 from >> 0xe023e00800000000 to 0x0023001000000000. >> (XEN) traps.c:2686:d0v3 Domain attempted WRMSR 00000000c0000082 from >> 0xffff82d0bfffc180 to 0xffffffff817cb550. >> (XEN) traps.c:2686:d0v3 Domain attempted WRMSR 00000000c0000083 from >> 0xffff82d0bfffc1a0 to 0xffffffff817cdb80. >> (XEN) traps.c:2686:d0v3 Domain attempted WRMSR 0000000000000174 from >> 0x000000000000e008 to 0x0000000000000010. >> (XEN) traps.c:2686:d0v3 Domain attempted WRMSR 0000000000000175 from >> 0xffff830216c7ffc0 to 0x0000000000000000. >> (XEN) traps.c:2686:d0v3 Domain attemp(XEN) d0: Forcing read-only >> access to MFN fed00 >> (XEN) ----[ Xen-4.6-unstable x86_64 debug=y Not tainted ]---- >> (XEN) CPU: 3 >> (XEN) RIP: e008:[<00000000cea9727b>] 00000000cea9727b >> (XEN) RFLAGS: 0000000000010286 CONTEXT: hypervisor (d0v3) >> (XEN) rax: 00000000cea9727b rbx: ffff830216c7fe48 rcx: 000000000000001f >> (XEN) rdx: 00000000d674ded0 rsi: 000000319697ec80 rdi: ffff83021df64080 >> (XEN) rbp: ffff830216c7fda8 rsp: ffff830216c7fd20 r8: ffff830216c7fe68 >> (XEN) r9: 0000000000000000 r10: 0000000000000000 r11: 00000000db002700 >> (XEN) r12: ffff830216c7fe68 r13: 0000000000000000 r14: ffff83021df64080 >> (XEN) r15: 0000000211c13000 cr0: 0000000080050033 cr4: 00000000001526e0 >> (XEN) cr3: 0000000216cb7000 cr2: 00000000cea9727b >> (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 >> (XEN) Xen stack trace from rsp=ffff830216c7fd20: >> (XEN) 00000000d674cd77 0000000211c13000 ffffffff81ce0a20 ffff82d0802aabc4 >> (XEN) ffff83021df64080 8000000000000013 00000000ffffffa1 0000000216cb7000 >> (XEN) ffff82d08023f5a1 ffff830216c7fe48 ffff830216c7fde8 000000319697ec80 >> (XEN) ffff82d08023f56c ffff830216cc8340 0000000000000003 ffff830216c7fde8 >> (XEN) 0000000000000206 0000000000000400 0000000000000292 ffff830128e0dd80 >> (XEN) ffff830216c7ff18 ffffffff81ce0a20 ffff82d0802aabc4 ffff830216c78000 >> (XEN) ffff82d080320080 ffff830216c7fef8 ffff82d0801673ba ffff830216cc8108 >> (XEN) 0027b02880108237 0000000000000000 ffff880209de7d18 0000000000000002 >> (XEN) ffff830216c7fe38 ffff82d08012ce6a ffff830216c7fe58 ffff82d08018ad0c >> (XEN) 0300000100000031 0000000000000008 0000000000000000 0000000000000400 >> (XEN) ffff8802038c0c00 0000000000000000 0000000000000000 0000000000000000 >> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 >> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 >> (XEN) 0000000000000000 ffff830216c7fef8 ffff8300d65fd000 ffffffff81ce0a20 >> (XEN) 0000000000000000 ffffffff8167e290 0000000000000000 ffff880209de7da8 >> (XEN) ffff82d08023abda ffffffff810010ea 0000000000000007 ffff8802038a85bc >> (XEN) ffff8802038a83dc ffff8802038a85be 0000000000000700 ffff880209de7da8 >> (XEN) ffff8802038c0c00 0000000000000246 ffff88020f0d77c0 ffff880209de7de8 >> (XEN) 00000000000175a0 0000000000000007 ffffffff810010ea 0000000000000000 >> (XEN) ffff8802038c0c00 ffff880209de7d18 0001010000000000 ffffffff810010ea >> (XEN) Xen call trace: >> (XEN) [<00000000cea9727b>] 00000000cea9727b >> (XEN) [<ffff82d08023f5a1>] efi_runtime_call+0x64e/0x80a >> (XEN) [<ffff82d08023f56c>] efi_runtime_call+0x619/0x80a >> (XEN) [<ffff82d0801673ba>] do_platform_op+0xb76/0x1a14 >> (XEN) [<ffff82d08012ce6a>] _spin_lock+0x11/0x52 >> (XEN) [<ffff82d08018ad0c>] stime2tsc+0x78/0x82 >> (XEN) [<ffff82d08023abda>] lstar_enter+0xda/0x134 >> (XEN) >> (XEN) Pagetable walk from 00000000cea9727b: >> (XEN) L4[0x000] = 0000000216cb6063 ffffffffffffffff >> (XEN) L3[0x003] = 00000000cfca4063 ffffffffffffffff >> (XEN) L2[0x075] = 00000000ce9ff063 ffffffffffffffff >> (XEN) L1[0x097] = 80000000cea97163 00000000000d15e5 >> (XEN) >> (XEN) **************************************** >> (XEN) Panic on CPU 3: >> (XEN) FATAL PAGE FAULT >> (XEN) [error_code=0011] >> (XEN) Faulting linear address: 00000000cea9727b >> (XEN) **************************************** >> (XEN) >> (XEN) Reboot in five seconds... > > We added a bunch of overrides that may help. > > The address looks to be for: > (XEN) 00000cea97000-00000ceaacfff type=4 attr=000000000000000f > > Which is of EfiBootServicesData > > Try on the Xen.efi command line to use /mapbs > > You may have to install first EFI Shell Manager and then from there > execute the xen.efi /mapbs > So I installed ShellBinPkg from TianoCore and got their UEFI Shell 2.1. I've kicked it off with both "xen-4.6-unstable.efi /mapbs" and "xen-4.6-unstable.efi -mapbs" but it doesn't make a difference. It fails the same way as above. -- Doug Goldstein _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |