__ __ _ _ _ _ _ ___ _ \ \/ /___ _ __ | || | / | || | / _ \ __ _ _ __ ___| |__ \ // _ \ '_ \ | || |_ | | || |_| | | |/ _` | '__/ __| '_ \ / \ __/ | | | |__ _|| |__ _| |_| | (_| | | | (__| | | | /_/\_\___|_| |_| |_|(_)_| |_|(_)___/ \__,_|_| \___|_| |_| (XEN) Xen version 4.14.0 (arthur@localdomain) (gcc (GCC) 10.2.0) debug=n Sat Nov 14 19:12:53 CET 2020 (XEN) Latest ChangeSet: (XEN) Bootloader: GRUB 2.04 (XEN) Command line: dom0_mem=4096M,max:4096M ucode=scan (XEN) Xen image load base address: 0x82a00000 (XEN) Video information: (XEN) VGA is graphics mode 1024x768, 32 bpp (XEN) Disc information: (XEN) Found 0 MBR signatures (XEN) Found 2 EDD information structures (XEN) EFI RAM map: (XEN) [0000000000000000, 000000000005efff] (usable) (XEN) [000000000005f000, 000000000005ffff] (reserved) (XEN) [0000000000060000, 000000000009ffff] (usable) (XEN) [00000000000a0000, 00000000000fffff] (reserved) (XEN) [0000000000100000, 000000007baaafff] (usable) (XEN) [000000007baab000, 000000007baabfff] (ACPI NVS) (XEN) [000000007baac000, 000000007baacfff] (reserved) (XEN) [000000007baad000, 00000000836fafff] (usable) (XEN) [00000000836fb000, 000000008b887fff] (reserved) (XEN) [000000008b888000, 000000008bbabfff] (usable) (XEN) [000000008bbac000, 000000008bfbdfff] (ACPI NVS) (XEN) [000000008bfbe000, 000000008f6fefff] (reserved) (XEN) [000000008f6ff000, 000000008f6fffff] (usable) (XEN) [000000008f700000, 000000008fffffff] (reserved) (XEN) [00000000e0000000, 00000000efffffff] (reserved) (XEN) [00000000fe000000, 00000000fe010fff] (reserved) (XEN) [00000000fec00000, 00000000fec00fff] (reserved) (XEN) [00000000fee00000, 00000000fee00fff] (reserved) (XEN) [00000000ff000000, 00000000ffffffff] (reserved) (XEN) [0000000100000000, 000000106effffff] (usable) (XEN) ACPI: RSDP 8BEBF000, 0024 (r2 ALASKA) (XEN) ACPI: XSDT 8BEBF0D0, 011C (r1 ALASKA A M I 1072009 AMI 10013) (XEN) ACPI: FACP 8BEFD728, 0114 (r6 ALASKA A M I 1072009 AMI 10013) (XEN) ACPI: DSDT 8BEBF280, 3E4A4 (r2 ALASKA A M I 1072009 INTL 20160527) (XEN) ACPI: FACS 8BFBDF80, 0040 (XEN) ACPI: APIC 8BEFD840, 00F4 (r4 ALASKA A M I 1072009 AMI 10013) (XEN) ACPI: FPDT 8BEFD938, 0044 (r1 ALASKA A M I 1072009 AMI 10013) (XEN) ACPI: FIDT 8BEFD980, 009C (r1 ALASKA A M I 1072009 AMI 10013) (XEN) ACPI: MCFG 8BEFDA20, 003C (r1 ALASKA A M I 1072009 MSFT 97) (XEN) ACPI: SPMI 8BEFDA60, 0041 (r5 ALASKA A M I 0 AMI. 0) (XEN) ACPI: SSDT 8BEFDAA8, 0378 (r1 SataRe SataTabl 1000 INTL 20160527) (XEN) ACPI: SSDT 8BEFDE20, 17D5 (r2 CpuRef CpuSsdt 3000 INTL 20160527) (XEN) ACPI: AAFT 8BEFF5F8, 007B (r1 ALASKA OEMAAFT 1072009 MSFT 97) (XEN) ACPI: SSDT 8BEFF678, 31C7 (r2 SaSsdt SaSsdt 3000 INTL 20160527) (XEN) ACPI: SSDT 8BF02840, 2358 (r2 PegSsd PegSsdt 1000 INTL 20160527) (XEN) ACPI: HPET 8BF04B98, 0038 (r1 INTEL A M I 2 1000013) (XEN) ACPI: SSDT 8BF04BD0, 0F9E (r2 INTEL Ther_Rvp 1000 INTL 20160527) (XEN) ACPI: SSDT 8BF05B70, 08DA (r2 INTEL xh_mossb 0 INTL 20160527) (XEN) ACPI: UEFI 8BF06450, 0048 (r1 ALASKA A M I 2 1000013) (XEN) ACPI: LPIT 8BF06498, 005C (r1 INTEL A M I 2 1000013) (XEN) ACPI: SSDT 8BF064F8, 27DE (r2 INTEL PtidDevc 1000 INTL 20160527) (XEN) ACPI: SSDT 8BF08CD8, 0FFE (r2 INTEL TbtTypeC 0 INTL 20160527) (XEN) ACPI: DBGP 8BF09CD8, 0034 (r1 ALASKA A M I 2 1000013) (XEN) ACPI: DBG2 8BF09D10, 0054 (r0 ALASKA A M I 2 1000013) (XEN) ACPI: SSDT 8BF09D68, 1931 (r2 ALASKA UsbCTabl 1000 INTL 20160527) (XEN) ACPI: SSDT 8BF0B6A0, 0144 (r2 Intel ADebTabl 1000 INTL 20160527) (XEN) ACPI: DMAR 8BF0B7E8, 0070 (r1 INTEL EDK2 2 1000013) (XEN) ACPI: SPCR 8BF0B858, 0050 (r2 A M I APTIO V 1072009 AMI. 5000D) (XEN) ACPI: TPM2 8BF0B8A8, 0034 (r4 ALASKA A M I 1 AMI 0) (XEN) ACPI: SSDT 8BF0B8E0, 0D8F (r2 INTEL SpsNm 2 INTL 20160527) (XEN) ACPI: WSMT 8BF0C670, 0028 (r1 ALASKA A M I 1072009 AMI 10013) (XEN) ACPI: EINJ 8BF0C698, 0130 (r1 AMI AMI.EINJ 0 AMI. 0) (XEN) ACPI: ERST 8BF0C7C8, 0230 (r1 AMIER AMI.ERST 0 AMI. 0) (XEN) ACPI: BERT 8BF0C9F8, 0030 (r1 AMI AMI.BERT 0 AMI. 0) (XEN) ACPI: HEST 8BF0CA28, 00A8 (r1 AMI AMI.HEST 0 AMI. 0) (XEN) System RAM: 65321MB (66889460kB) (XEN) Domain heap initialised (XEN) ACPI: Invalid sleep control/status register data: 0:0x8:0x3 0:0x8:0x3 (XEN) ACPI: 32/64X FACS address mismatch in FADT - 8bfbdf80/0000000000000000, using 32 (XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 (XEN) Enabling APIC mode: Phys. Using 1 I/O APICs (XEN) Switched to APIC driver x2apic_cluster (XEN) microcode: CPU0 updated from revision 0x96 to 0xde, date = 2020-05-25 (XEN) CPU0: TSC: ratio: 284 / 2 (XEN) CPU0: bus: 100MHz base: 3400MHz max: 4800MHz (XEN) CPU0: 800..3400 MHz (XEN) xstate: size: 0x440 and states: 0x1f (XEN) Speculative mitigation facilities: (XEN) Hardware features: IBRS/IBPB STIBP L1D_FLUSH SSBD MD_CLEAR SRBDS_CTRL (XEN) Compiled-in support: INDIRECT_THUNK SHADOW_PAGING (XEN) Xen settings: BTI-Thunk JMP, SPEC_CTRL: IBRS+ SSBD-, Other: SRB_LOCK+ IBPB L1D_FLUSH VERW BRANCH_HARDEN (XEN) L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 39, Safe address 8000000000 (XEN) Support for HVM VMs: MSR_SPEC_CTRL RSB EAGER_FPU MD_CLEAR (XEN) Support for PV VMs: MSR_SPEC_CTRL RSB EAGER_FPU MD_CLEAR (XEN) XPTI (64-bit PV only): Dom0 enabled, DomU enabled (with PCID) (XEN) PV L1TF shadowing: Dom0 disabled, DomU enabled (XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2) (XEN) Initializing Credit2 scheduler (XEN) Platform timer is 24.000MHz HPET (XEN) Detected 3408.138 MHz processor. (XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB (XEN) Intel VT-d Snoop Control enabled. (XEN) Intel VT-d Dom0 DMA Passthrough not enabled. (XEN) Intel VT-d Queued Invalidation enabled. (XEN) Intel VT-d Interrupt Remapping enabled. (XEN) Intel VT-d Posted Interrupt not enabled. (XEN) Intel VT-d Shared EPT tables enabled. (XEN) I/O virtualisation enabled (XEN) - Dom0 mode: Relaxed (XEN) Interrupt remapping enabled (XEN) Enabled directed EOI with ioapic_ack_old on! (XEN) ENABLING IO-APIC IRQs (XEN) -> Using old ACK method (XEN) Allocated console ring of 32 KiB. (XEN) VMX: Supported advanced features: (XEN) - APIC MMIO access virtualisation (XEN) - APIC TPR shadow (XEN) - Extended Page Tables (EPT) (XEN) - Virtual-Processor Identifiers (VPID) (XEN) - Virtual NMI (XEN) - MSR direct-access bitmap (XEN) - Unrestricted Guest (XEN) - VMCS shadowing (XEN) - VM Functions (XEN) - Virtualisation Exceptions (XEN) - Page Modification Logging (XEN) HVM: ASIDs enabled. (XEN) VMX: Disabling executable EPT superpages due to CVE-2018-12207 (XEN) HVM: VMX enabled (XEN) HVM: Hardware Assisted Paging (HAP) detected (XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB (XEN) microcode: CPU2 updated from revision 0x96 to 0xde, date = 2020-05-25 (XEN) microcode: CPU4 updated from revision 0x96 to 0xde, date = 2020-05-25 (XEN) microcode: CPU6 updated from revision 0x96 to 0xde, date = 2020-05-25 (XEN) microcode: CPU8 updated from revision 0x96 to 0xde, date = 2020-05-25 (XEN) microcode: CPU10 updated from revision 0x96 to 0xde, date = 2020-05-25 (XEN) Brought up 12 CPUs (XEN) Scheduling granularity: cpu, 1 CPU per sched-resource (XEN) Multiple initrd candidates, picking module #1 (XEN) Dom0 has maximum 952 PIRQs (XEN) Xen kernel: 64-bit, lsb, compat32 (XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x3800000 (XEN) PHYSICAL MEMORY ARRANGEMENT: (XEN) Dom0 alloc.: 0000001038000000->000000103c000000 (1027222 pages to be allocated) (XEN) Init. ramdisk: 000000106d921000->000000106ec8b000 (XEN) VIRTUAL MEMORY ARRANGEMENT: (XEN) Loaded kernel: ffffffff81000000->ffffffff83800000 (XEN) Init. ramdisk: 0000000000000000->0000000000000000 (XEN) Phys-Mach map: 0000008000000000->0000008000800000 (XEN) Start info: ffffffff83800000->ffffffff838004b8 (XEN) Xenstore ring: 0000000000000000->0000000000000000 (XEN) Console ring: 0000000000000000->0000000000000000 (XEN) Page tables: ffffffff83801000->ffffffff83822000 (XEN) Boot stack: ffffffff83822000->ffffffff83823000 (XEN) TOTAL: ffffffff80000000->ffffffff83c00000 (XEN) ENTRY ADDRESS: ffffffff82da7180 (XEN) Dom0 has maximum 12 VCPUs (XEN) Initial low memory virq threshold set at 0x4000 pages. (XEN) Scrubbing Free RAM in background (XEN) Std. Loglevel: Errors and warnings (XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings) (XEN) *************************************************** (XEN) Booted on L1TF-vulnerable hardware with SMT/Hyperthreading (XEN) enabled. Please assess your configuration and choose an (XEN) explicit 'smt=' setting. See XSA-273. (XEN) *************************************************** (XEN) Booted on MLPDS/MFBDS-vulnerable hardware with SMT/Hyperthreading (XEN) enabled. Mitigations will not be fully effective. Please (XEN) choose an explicit smt= setting. See XSA-297. (XEN) *************************************************** (XEN) 3... 2... 1... (XEN) Xen is relinquishing VGA console. (XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input) (XEN) Freed 556kB init memory