xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
* IOMMU Interrupt Remapping query
@ 2011-06-06 14:32 Andrew Cooper
  2011-06-06 15:21 ` Keir Fraser
  0 siblings, 1 reply; 6+ messages in thread
From: Andrew Cooper @ 2011-06-06 14:32 UTC (permalink / raw)
  To: xen-devel@lists.xensource.com

[-- Attachment #1: Type: text/plain, Size: 1248 bytes --]

I am attempting to fix the kexec interactions with x2apic and iommu
functionality.  Part of this involves ensuring that all IOMMU
functionality is disabled, as the kdump kernels are not happy at having
their interrupts remapped without their knowledge.

I have introduced iommu_disable_x2apic_IR() onto the kexec path, but it
does not seem to actually disable interrupt remapping on Intel boxes
(Specifically the two Intel Nehalem boxes I am testing on).

Specifying iommu=no-intremap on the commandline causes everything to
work correctly, but leaving it out causes the kdump kernel to hang and
eventually reboot, as can be seen on the attached serial log.

The lines starting DBG: are extra debugging I have put in which shows
that the disable_IR() function is being called and writing to the registers.

This problem occurs with the XenServer version of 4.1.0 as well as on
xen-unstable at the moment.

Is there any hardware state which is not taken down by the disable
function, any subtle interactions which I have not taken account of?  I
have looked through the source and nothing pops out, but I am out of ideas.

Thanks in advance,

-- 
Andrew Cooper - Dom0 Kernel Engineer, Citrix XenServer
T: +44 (0)1223 225 900, http://www.citrix.com


[-- Attachment #2: andrewcoop-ohno-kdump-remap --]
[-- Type: text/plain, Size: 94039 bytes --]

Loading /boot/xen.gz... ok
Loading /boot/vmlinuz-2.6-xen... ok
Loading /boot/initrd-2.6-xen.img... ok
 __  __            _  _    _   ___  
 \ \/ /___ _ __   | || |  / | / _ \ 
  \  // _ \ '_ \  | || |_ | || | | |
  /  \  __/ | | | |__   _|| || |_| |
 /_/\_\___|_| |_|    |_|(_)_(_)___/ 
                                    
(XEN) Xen version 4.1.0 (andrewcoop@uk.xensource.com) (gcc version 4.1.2 20080704 (Red Hat 4.1.2-46)) Mon Jun  6 09:39:38 EDT 2011
(XEN) Latest ChangeSet: Mon Jun 06 14:06:31 2011 +0100 23119:f070fde3f08b
(XEN) Bootloader: SYSLINUX 4.02 2010-07-21 
(XEN) Command line: com1=115200,8n1 console=com1,vga dom0_mem=752M lowmem_emergency_pool=1M crashkernel=64M@32M apic_verbosity=debug loglvl=all
(XEN) Video information:
(XEN)  VGA is text mode 80x25, font 8x16
(XEN)  VBE/DDC methods: V2; EDID transfer time: 1 seconds
(XEN) Disc information:
(XEN)  Found 1 MBR signatures
(XEN)  Found 1 EDD information structures
(XEN) Xen-e820 RAM map:
(XEN)  0000000000000000 - 000000000009b400 (usable)
(XEN)  000000000009b400 - 00000000000a0000 (reserved)
(XEN)  00000000000e0000 - 0000000000100000 (reserved)
(XEN)  0000000000100000 - 0000000078c7f000 (usable)
(XEN)  0000000078c7f000 - 0000000078e93000 (ACPI NVS)
(XEN)  0000000078e93000 - 0000000079250000 (ACPI data)
(XEN)  0000000079250000 - 00000000792c4000 (reserved)
(XEN)  00000000792c4000 - 00000000792d1000 (ACPI data)
(XEN)  00000000792d1000 - 00000000792e6000 (reserved)
(XEN)  00000000792e6000 - 0000000079302000 (ACPI data)
(XEN)  0000000079302000 - 000000007930f000 (reserved)
(XEN)  000000007930f000 - 0000000079311000 (ACPI data)
(XEN)  0000000079311000 - 0000000079316000 (reserved)
(XEN)  0000000079316000 - 0000000079338000 (ACPI data)
(XEN)  0000000079338000 - 000000007935a000 (reserved)
(XEN)  000000007935a000 - 000000007938a000 (ACPI data)
(XEN)  000000007938a000 - 00000000793cb000 (reserved)
(XEN)  00000000793cb000 - 000000007968b000 (ACPI data)
(XEN)  000000007968b000 - 00000000796b7000 (reserved)
(XEN)  00000000796b7000 - 00000000799e1000 (ACPI data)
(XEN)  00000000799e1000 - 0000000079be1000 (ACPI NVS)
(XEN)  0000000079be1000 - 0000000079d85000 (ACPI data)
(XEN)  0000000079d85000 - 0000000079d86000 (reserved)
(XEN)  0000000079d86000 - 0000000079d88000 (ACPI data)
(XEN)  0000000079d88000 - 0000000079d8b000 (reserved)
(XEN)  0000000079d8b000 - 0000000079e1c000 (ACPI data)
(XEN)  0000000079e1c000 - 0000000079e87000 (reserved)
(XEN)  0000000079e87000 - 000000007bd5f000 (ACPI data)
(XEN)  000000007bd5f000 - 000000007be4f000 (reserved)
(XEN)  000000007be4f000 - 000000007bf87000 (ACPI data)
(XEN)  000000007bf87000 - 000000007bfcf000 (ACPI NVS)
(XEN)  000000007bfcf000 - 000000007bfff000 (ACPI data)
(XEN)  000000007bfff000 - 0000000090000000 (reserved)
(XEN)  00000000fc000000 - 00000000fd000000 (reserved)
(XEN)  00000000fed1c000 - 00000000fed20000 (reserved)
(XEN)  00000000ff000000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 0000001880000000 (usable)
(XEN) Kdump: 64MB (65536kB) at 0x2000000
(XEN) ACPI: RSDP 000F0410, 0024 (r2 QUANTA)
(XEN) ACPI: XSDT 7BFFE120, 00BC (r1 QUANTA QSSC-S4R        0       1000013)
(XEN) ACPI: FACP 7BFFD000, 00F4 (r4 QUANTA QSSC-S4R        0 MSFT  100000D)
(XEN) ACPI: DSDT 7BFE3000, 19BAD (r2 QUANTA QSSC-S4R        3 MSFT  100000D)
(XEN) ACPI: FACS 7BF87000, 0040
(XEN) ACPI: APIC 7BFE2000, 03E4 (r2 QUANTA QSSC-S4R        0 MSFT  100000D)
(XEN) ACPI: MSCT 7BFE1000, 0090 (r1 QUANTA QSSC-S4R        1 MSFT  100000D)
(XEN) ACPI: MCFG 7BFE0000, 003C (r1 QUANTA QSSC-S4R        1 MSFT  100000D)
(XEN) ACPI: HPET 7BFDF000, 0038 (r1 QUANTA QSSC-S4R        1 MSFT  100000D)
(XEN) ACPI: SLIT 7BFDE000, 003C (r1 QUANTA QSSC-S4R        1 MSFT  100000D)
(XEN) ACPI: SRAT 7BFDD000, 0930 (r2 QUANTA QSSC-S4R        1 MSFT  100000D)
(XEN) ACPI: SPCR 7BFDC000, 0050 (r1 QUANTA QSSC-S4R        0 MSFT  100000D)
(XEN) ACPI: WDDT 7BFDB000, 0040 (r1 QUANTA QSSC-S4R        0 MSFT  100000D)
(XEN) ACPI: SSDT 7BF4A000, 3CFA4 (r2 QUANTA QSSC-S4R     4000 INTL 20061109)
(XEN) ACPI: SSDT 7BFDA000, 0174 (r2 QUANTA QSSC-S4R     4000 INTL 20061109)
(XEN) ACPI: PMCT 7BFD9000, 0064 (r1 QUANTA QSSC-S4R        0 MSFT  100000D)
(XEN) ACPI: MIGT 7BFD8000, 0040 (r1 QUANTA QSSC-S4R        0 MSFT  100000D)
(XEN) ACPI: TCPA 7BFD5000, 0032 (r0 QUANTA QSSC-S4R        0             0)
(XEN) ACPI: HEST 7BFD4000, 05D0 (r1 QUANTA QSSC-S4R        1 INTL        1)
(XEN) ACPI: BERT 7BFD3000, 0030 (r1 QUANTA QSSC-S4R        1 INTL        1)
(XEN) ACPI: ERST 7BFD2000, 0230 (r1 QUANTA QSSC-S4R        1 INTL        1)
(XEN) ACPI: EINJ 7BFD1000, 0130 (r1 QUANTA QSSC-S4R        1 INTL        1)
(XEN) ACPI: DMAR 7BFD0000, 0350 (r1 QUANTA QSSC-S4R        1 MSFT  100000D)
(XEN) System RAM: 98188MB (100544616kB)
(XEN) SRAT: PXM 0 -> APIC 0 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 64 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 32 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 96 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 2 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 66 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 34 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 98 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 4 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 68 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 36 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 100 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 6 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 70 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 38 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 102 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 16 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 80 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 48 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 112 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 18 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 82 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 50 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 114 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 20 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 84 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 52 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 116 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 22 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 86 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 54 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 118 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 1 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 65 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 33 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 97 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 3 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 67 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 35 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 99 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 5 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 69 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 37 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 101 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 7 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 71 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 39 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 103 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 17 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 81 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 49 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 113 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 19 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 83 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 51 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 115 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 21 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 85 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 53 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 117 -> Node 3
(XEN) SRAT: PXM 0 -> APIC 23 -> Node 0
(XEN) SRAT: PXM 2 -> APIC 87 -> Node 1
(XEN) SRAT: PXM 1 -> APIC 55 -> Node 2
(XEN) SRAT: PXM 3 -> APIC 119 -> Node 3
(XEN) SRAT: Node 0 PXM 0 0-80000000
(XEN) SRAT: Node 0 PXM 0 100000000-680000000
(XEN) SRAT: Node 2 PXM 1 680000000-c80000000
(XEN) SRAT: Node 1 PXM 2 c80000000-1280000000
(XEN) SRAT: Node 3 PXM 3 1280000000-1880000000
(XEN) SRAT: hot plug zone found 1900000000 - 3900000000 
(XEN) SRAT: Node 0 PXM 0 1900000000-3900000000
(XEN) SRAT: hot plug zone found 3900000000 - 5900000000 
(XEN) SRAT: Node 0 PXM 0 3900000000-5900000000
(XEN) SRAT: hot plug zone found 5900000000 - 7900000000 
(XEN) SRAT: Node 2 PXM 1 5900000000-7900000000
(XEN) SRAT: hot plug zone found 7900000000 - 9900000000 
(XEN) SRAT: Node 2 PXM 1 7900000000-9900000000
(XEN) SRAT: hot plug zone found 9900000000 - b900000000 
(XEN) SRAT: Node 1 PXM 2 9900000000-b900000000
(XEN) SRAT: hot plug zone found b900000000 - d900000000 
(XEN) SRAT: Node 1 PXM 2 b900000000-d900000000
(XEN) SRAT: hot plug zone found d900000000 - f900000000 
(XEN) SRAT: Node 3 PXM 3 d900000000-f900000000
(XEN) SRAT: hot plug zone found f900000000 - 11900000000 
(XEN) SRAT: Node 3 PXM 3 f900000000-11900000000
(XEN) NUMA: Allocated memnodemap from 187f527000 - 187f528000
(XEN) NUMA: Using 19 for the hash shift.
(XEN) Domain heap initialised DMA width 32 bits
(XEN) found SMP MP-table at 000fdd80
(XEN) DMI 2.5 present.
(XEN) APIC boot state is 'xapic'
(XEN) Using APIC driver default
(XEN) ACPI: PM-Timer IO Port: 0x408
(XEN) ACPI: ACPI SLEEP INFO: pm1x_cnt[404,0], pm1x_evt[400,0]
(XEN) ACPI:                  wakeup_vec[7bf8700c], vec_size[20]
(XEN) ACPI: Local APIC address 0xfee00000
(XEN) ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled)
(XEN) Processor #0 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x20] lapic_id[0x40] enabled)
(XEN) Processor #64 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x10] lapic_id[0x20] enabled)
(XEN) Processor #32 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x30] lapic_id[0x60] enabled)
(XEN) Processor #96 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled)
(XEN) Processor #2 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x22] lapic_id[0x42] enabled)
(XEN) Processor #66 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x12] lapic_id[0x22] enabled)
(XEN) Processor #34 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x32] lapic_id[0x62] enabled)
(XEN) Processor #98 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x04] lapic_id[0x04] enabled)
(XEN) Processor #4 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x24] lapic_id[0x44] enabled)
(XEN) Processor #68 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x14] lapic_id[0x24] enabled)
(XEN) Processor #36 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x34] lapic_id[0x64] enabled)
(XEN) Processor #100 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x06] lapic_id[0x06] enabled)
(XEN) Processor #6 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x26] lapic_id[0x46] enabled)
(XEN) Processor #70 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x16] lapic_id[0x26] enabled)
(XEN) Processor #38 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x36] lapic_id[0x66] enabled)
(XEN) Processor #102 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x08] lapic_id[0x10] enabled)
(XEN) Processor #16 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x28] lapic_id[0x50] enabled)
(XEN) Processor #80 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x18] lapic_id[0x30] enabled)
(XEN) Processor #48 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x38] lapic_id[0x70] enabled)
(XEN) Processor #112 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x0a] lapic_id[0x12] enabled)
(XEN) Processor #18 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x2a] lapic_id[0x52] enabled)
(XEN) Processor #82 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x1a] lapic_id[0x32] enabled)
(XEN) Processor #50 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x3a] lapic_id[0x72] enabled)
(XEN) Processor #114 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x0c] lapic_id[0x14] enabled)
(XEN) Processor #20 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x2c] lapic_id[0x54] enabled)
(XEN) Processor #84 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x1c] lapic_id[0x34] enabled)
(XEN) Processor #52 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x3c] lapic_id[0x74] enabled)
(XEN) Processor #116 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x0e] lapic_id[0x16] enabled)
(XEN) Processor #22 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x2e] lapic_id[0x56] enabled)
(XEN) Processor #86 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x1e] lapic_id[0x36] enabled)
(XEN) Processor #54 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x3e] lapic_id[0x76] enabled)
(XEN) Processor #118 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled)
(XEN) Processor #1 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x21] lapic_id[0x41] enabled)
(XEN) Processor #65 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x11] lapic_id[0x21] enabled)
(XEN) Processor #33 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x31] lapic_id[0x61] enabled)
(XEN) Processor #97 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled)
(XEN) Processor #3 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x23] lapic_id[0x43] enabled)
(XEN) Processor #67 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x13] lapic_id[0x23] enabled)
(XEN) Processor #35 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x33] lapic_id[0x63] enabled)
(XEN) Processor #99 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x05] lapic_id[0x05] enabled)
(XEN) Processor #5 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x25] lapic_id[0x45] enabled)
(XEN) Processor #69 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x15] lapic_id[0x25] enabled)
(XEN) Processor #37 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x35] lapic_id[0x65] enabled)
(XEN) Processor #101 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x07] lapic_id[0x07] enabled)
(XEN) Processor #7 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x27] lapic_id[0x47] enabled)
(XEN) Processor #71 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x17] lapic_id[0x27] enabled)
(XEN) Processor #39 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x37] lapic_id[0x67] enabled)
(XEN) Processor #103 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x09] lapic_id[0x11] enabled)
(XEN) Processor #17 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x29] lapic_id[0x51] enabled)
(XEN) Processor #81 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x19] lapic_id[0x31] enabled)
(XEN) Processor #49 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x39] lapic_id[0x71] enabled)
(XEN) Processor #113 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x0b] lapic_id[0x13] enabled)
(XEN) Processor #19 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x2b] lapic_id[0x53] enabled)
(XEN) Processor #83 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x1b] lapic_id[0x33] enabled)
(XEN) Processor #51 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x3b] lapic_id[0x73] enabled)
(XEN) Processor #115 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x0d] lapic_id[0x15] enabled)
(XEN) Processor #21 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x2d] lapic_id[0x55] enabled)
(XEN) Processor #85 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x1d] lapic_id[0x35] enabled)
(XEN) Processor #53 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x3d] lapic_id[0x75] enabled)
(XEN) Processor #117 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x0f] lapic_id[0x17] enabled)
(XEN) Processor #23 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x2f] lapic_id[0x57] enabled)
(XEN) Processor #87 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x1f] lapic_id[0x37] enabled)
(XEN) Processor #55 6:14 APIC version 21
(XEN) ACPI: LAPIC (acpi_id[0x3f] lapic_id[0x77] enabled)
(XEN) Processor #119 6:14 APIC version 21
(XEN) ACPI: LAPIC_NMI (acpi_id[0x00] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x01] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x02] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x03] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x04] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x05] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x06] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x07] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x08] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x09] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x0a] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x0b] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x0c] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x0d] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x0e] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x0f] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x10] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x11] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x12] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x13] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x14] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x13] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x14] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x15] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x16] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x17] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x18] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x19] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x1a] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x1b] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x1c] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x1d] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x1e] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x1f] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x20] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x21] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x22] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x23] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x24] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x25] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x26] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x27] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x28] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x29] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x2a] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x2b] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x2c] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x2d] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x2e] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x2f] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x30] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x31] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x32] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x33] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x34] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x35] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x36] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x37] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x38] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x39] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x3a] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x3b] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x3c] high level lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x3d] high level lint[0x1])
(XEN) Overriding APIC driver with bigsmp
(XEN) ACPI: IOAPIC (id[0x08] address[0xfec00000] gsi_base[0])
(XEN) IOAPIC[0]: apic_id 8, version 32, address 0xfec00000, GSI 0-23
(XEN) ACPI: IOAPIC (id[0x09] address[0xfec01000] gsi_base[24])
(XEN) IOAPIC[1]: apic_id 9, version 32, address 0xfec01000, GSI 24-47
(XEN) ACPI: IOAPIC (id[0x0a] address[0xfec04000] gsi_base[48])
(XEN) IOAPIC[2]: apic_id 10, version 32, address 0xfec04000, GSI 48-71
(XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
(XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
(XEN) ACPI: IRQ0 used by override.
(XEN) ACPI: IRQ2 used by override.
(XEN) ACPI: IRQ9 used by override.
(XEN) Enabling APIC mode:  Phys.  Using 3 I/O APICs
(XEN) ACPI: HPET id: 0x8086a401 base: 0xfed00000
(XEN) PCI: MCFG configuration 0: base 80000000 segment 0 buses 0 - 255
(XEN) PCI: MCFG area at 80000000 reserved in E820
(XEN) Xen ERST support is initialized.
(XEN) Using ACPI (MADT) for SMP configuration information
(XEN) mapped APIC to ffff82c3ffffe000 (fee00000)
(XEN) mapped IOAPIC to ffff82c3ffffd000 (fec00000)
(XEN) mapped IOAPIC to ffff82c3ffffc000 (fec01000)
(XEN) mapped IOAPIC to ffff82c3ffffb000 (fec04000)
(XEN) IRQ limits: 72 GSI, 12232 MSI/MSI-X
(XEN) DBG: in disable_intremap
(XEN) DBG: in disable_intremap
(XEN) Switched to APIC driver x2apic_cluster.
(XEN) Using scheduler: SMP Credit Scheduler (credit)
(XEN) Detected 1995.038 MHz processor.
(XEN) Initing memory sharing.
(XEN) mce_intel.c:1162: MCA Capability: BCAST 1 SER 1 CMCI 1 firstbank 0 extended MCE MSR 0
(XEN) Intel machine check reporting enabled
(XEN) Intel VT-d Snoop Control enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) I/O virtualisation enabled
(XEN)  - Dom0 mode: Relaxed
(XEN) Getting VERSION: 60015
(XEN) Getting VERSION: 60015
(XEN) Getting ID: 0
(XEN) Getting LVT0: 700
(XEN) Getting LVT1: 400
(XEN) enabled ExtINT on CPU#0
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using new ACK method
(XEN) init IO_APIC IRQs
(XEN)  IO-APIC (apicid-pin) 8-0, 8-16, 8-17, 8-18, 8-19, 8-20, 8-21, 8-22, 8-23, 9-0, 9-1, 9-2, 9-3, 9-4, 9-5, 9-6, 9-7, 9-8, 9-9, 9-10, 9-11, 9-12, 9-13, 9-14, 9-15, 9-16, 9-17, 9-18, 9-19, 9-20, 9-21, 9-22, 9-23, 10-0, 10-1, 10-2, 10-3, 10-4, 10-5, 10-6, 10-7, 10-8, 10-9, 10-10, 10-11, 10-12, 10-13, 10-14, 10-15, 10-16, 10-17, 10-18, 10-19, 10-20, 10-21, 10-22, 10-23 not connected.
(XEN) ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=-1 pin2=-1
(XEN) number of MP IRQ sources: 15.
(XEN) number of IO-APIC #8 registers: 24.
(XEN) number of IO-APIC #9 registers: 24.
(XEN) number of IO-APIC #10 registers: 24.
(XEN) testing the IO APIC.......................
(XEN) IO APIC #8......
(XEN) .... register #00: 08000000
(XEN) .......    : physical APIC id: 08
(XEN) .......    : Delivery Type: 0
(XEN) .......    : LTS          : 0
(XEN) .... register #01: 00170020
(XEN) .......     : max redirection entries: 0017
(XEN) .......     : PRQ implemented: 0
(XEN) .......     : IO APIC version: 0020
(XEN) .... IRQ redirection table:
(XEN)  NR Log Phy Mask Trig IRR Pol Stat Dest Deli Vect:   
(XEN)  00 000 00  1    0    0   0   0    0    0    00
(XEN)  01 000 00  0    0    0   0   0    1    1    38
(XEN)  02 000 00  0    0    0   0   0    1    1    F0
(XEN)  03 000 00  0    0    0   0   0    1    1    40
(XEN)  04 000 00  0    0    0   0   0    1    1    F1
(XEN)  05 000 00  0    0    0   0   0    1    1    48
(XEN)  06 000 00  0    0    0   0   0    1    1    50
(XEN)  07 000 00  0    0    0   0   0    1    1    58
(XEN)  08 000 00  0    0    0   0   0    1    1    60
(XEN)  09 000 00  1    1    0   0   0    1    1    68
(XEN)  0a 000 00  0    0    0   0   0    1    1    70
(XEN)  0b 000 00  0    0    0   0   0    1    1    78
(XEN)  0c 000 00  0    0    0   0   0    1    1    88
(XEN)  0d 000 00  0    0    0   0   0    1    1    90
(XEN)  0e 000 00  0    0    0   0   0    1    1    98
(XEN)  0f 000 00  0    0    0   0   0    1    1    A0
(XEN)  10 000 00  1    0    0   0   0    0    0    00
(XEN)  11 000 00  1    0    0   0   0    0    0    00
(XEN)  12 000 00  1    0    0   0   0    0    0    00
(XEN)  13 000 00  1    0    0   0   0    0    0    00
(XEN)  14 000 00  1    0    0   0   0    0    0    00
(XEN)  15 000 00  1    0    0   0   0    0    0    00
(XEN)  16 000 00  1    0    0   0   0    0    0    00
(XEN)  17 000 00  1    0    0   0   0    0    0    00
(XEN) IO APIC #9......
(XEN) .... register #00: 09000000
(XEN) .......    : physical APIC id: 09
(XEN) .......    : Delivery Type: 0
(XEN) .......    : LTS          : 0
(XEN) .... register #01: 00170020
(XEN) .......     : max redirection entries: 0017
(XEN) .......     : PRQ implemented: 0
(XEN) .......     : IO APIC version: 0020
(XEN) .... register #02: 00000000
(XEN) .......     : arbitration: 00
(XEN) .... register #03: 00000001
(XEN) .......     : Boot DT    : 1
(XEN) .... IRQ redirection table:
(XEN)  NR Log Phy Mask Trig IRR Pol Stat Dest Deli Vect:   
(XEN)  00 000 00  1    0    0   0   0    0    0    00
(XEN)  01 000 00  1    0    0   0   0    0    0    00
(XEN)  02 000 00  1    0    0   0   0    0    0    00
(XEN)  03 000 00  1    0    0   0   0    0    0    00
(XEN)  04 000 00  1    0    0   0   0    0    0    00
(XEN)  05 000 00  1    0    0   0   0    0    0    00
(XEN)  06 000 00  1    0    0   0   0    0    0    00
(XEN)  07 000 00  1    0    0   0   0    0    0    00
(XEN)  08 000 00  1    0    0   0   0    0    0    00
(XEN)  09 000 00  1    0    0   0   0    0    0    00
(XEN)  0a 000 00  1    0    0   0   0    0    0    00
(XEN)  0b 000 00  1    0    0   0   0    0    0    00
(XEN)  0c 000 00  1    0    0   0   0    0    0    00
(XEN)  0d 000 00  1    0    0   0   0    0    0    00
(XEN)  0e 000 00  1    0    0   0   0    0    0    00
(XEN)  0f 000 00  1    0    0   0   0    0    0    00
(XEN)  10 000 00  1    0    0   0   0    0    0    00
(XEN)  11 000 00  1    0    0   0   0    0    0    00
(XEN)  12 000 00  1    0    0   0   0    0    0    00
(XEN)  13 000 00  1    0    0   0   0    0    0    00
(XEN)  14 000 00  1    0    0   0   0    0    0    00
(XEN)  15 000 00  1    0    0   0   0    0    0    00
(XEN)  16 000 00  1    0    0   0   0    0    0    00
(XEN)  17 000 00  1    0    0   0   0    0    0    00
(XEN) IO APIC #10......
(XEN) .... register #00: 0A000000
(XEN) .......    : physical APIC id: 0A
(XEN) .......    : Delivery Type: 0
(XEN) .......    : LTS          : 0
(XEN) .... register #01: 00170020
(XEN) .......     : max redirection entries: 0017
(XEN) .......     : PRQ implemented: 0
(XEN) .......     : IO APIC version: 0020
(XEN) .... register #02: 00000000
(XEN) .......     : arbitration: 00
(XEN) .... register #03: 00000001
(XEN) .......     : Boot DT    : 1
(XEN) .... IRQ redirection table:
(XEN)  NR Log Phy Mask Trig IRR Pol Stat Dest Deli Vect:   
(XEN)  00 000 00  1    0    0   0   0    0    0    00
(XEN)  01 000 00  1    0    0   0   0    0    0    00
(XEN)  02 000 00  1    0    0   0   0    0    0    00
(XEN)  03 000 00  1    0    0   0   0    0    0    00
(XEN)  04 000 00  1    0    0   0   0    0    0    00
(XEN)  05 000 00  1    0    0   0   0    0    0    00
(XEN)  06 000 00  1    0    0   0   0    0    0    00
(XEN)  07 000 00  1    0    0   0   0    0    0    00
(XEN)  08 000 00  1    0    0   0   0    0    0    00
(XEN)  09 000 00  1    0    0   0   0    0    0    00
(XEN)  0a 000 00  1    0    0   0   0    0    0    00
(XEN)  0b 000 00  1    0    0   0   0    0    0    00
(XEN)  0c 000 00  1    0    0   0   0    0    0    00
(XEN)  0d 000 00  1    0    0   0   0    0    0    00
(XEN)  0e 000 00  1    0    0   0   0    0    0    00
(XEN)  0f 000 00  1    0    0   0   0    0    0    00
(XEN)  10 000 00  1    0    0   0   0    0    0    00
(XEN)  11 000 00  1    0    0   0   0    0    0    00
(XEN)  12 000 00  1    0    0   0   0    0    0    00
(XEN)  13 000 00  1    0    0   0   0    0    0    00
(XEN)  14 000 00  1    0    0   0   0    0    0    00
(XEN)  15 000 00  1    0    0   0   0    0    0    00
(XEN)  16 000 00  1    0    0   0   0    0    0    00
(XEN)  17 000 00  1    0    0   0   0    0    0    00
(XEN) Using vector-based indexing
(XEN) IRQ to pin mappings:
(XEN) IRQ240 -> 0:2
(XEN) IRQ56 -> 0:1
(XEN) IRQ64 -> 0:3
(XEN) IRQ241 -> 0:4
(XEN) IRQ72 -> 0:5
(XEN) IRQ80 -> 0:6
(XEN) IRQ88 -> 0:7
(XEN) IRQ96 -> 0:8
(XEN) IRQ104 -> 0:9
(XEN) IRQ112 -> 0:10
(XEN) IRQ120 -> 0:11
(XEN) IRQ136 -> 0:12
(XEN) IRQ144 -> 0:13
(XEN) IRQ152 -> 0:14
(XEN) IRQ160 -> 0:15
(XEN) .................................... done.
(XEN) Using local APIC timer interrupts.
(XEN) calibrating APIC timer ...
(XEN) ..... CPU clock speed is 1995.0857 MHz.
(XEN) ..... host bus clock speed is 133.0056 MHz.
(XEN) ..... bus_scale = 0x00008834
(XEN) Platform timer is 14.318MHz HPET
(XEN) Defaulting to alternative key handling; send 'A' to switch to normal mode.
ÿ(XEN) Allocated console ring of 512 KiB.
(XEN) VMX: Supported advanced features:
(XEN)  - APIC MMIO access virtualisation
(XEN)  - APIC TPR shadow
(XEN)  - Extended Page Tables (EPT)
(XEN)  - Virtual-Processor Identifiers (VPID)
(XEN)  - Virtual NMI
(XEN)  - MSR direct-access bitmap
(XEN) EPT supports 2MB super page.
(XEN) HVM: ASIDs enabled.
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging detected and enabled.
(XEN) masked ExtINT on CPU#1
(XEN) masked ExtINT on CPU#2
(XEN) masked ExtINT on CPU#3
(XEN) masked ExtINT on CPU#4
(XEN) masked ExtINT on CPU#5
(XEN) masked ExtINT on CPU#6
(XEN) masked ExtINT on CPU#7
(XEN) masked ExtINT on CPU#8
(XEN) masked ExtINT on CPU#9
(XEN) masked ExtINT on CPU#10
(XEN) masked ExtINT on CPU#11
(XEN) masked ExtINT on CPU#12
(XEN) masked ExtINT on CPU#13
(XEN) masked ExtINT on CPU#14
(XEN) masked ExtINT on CPU#15
(XEN) masked ExtINT on CPU#16
(XEN) masked ExtINT on CPU#17
(XEN) masked ExtINT on CPU#18
(XEN) masked ExtINT on CPU#19
(XEN) masked ExtINT on CPU#20
(XEN) masked ExtINT on CPU#21
(XEN) masked ExtINT on CPU#22
(XEN) masked ExtINT on CPU#23
(XEN) masked ExtINT on CPU#24
(XEN) masked ExtINT on CPU#25
(XEN) masked ExtINT on CPU#26
(XEN) masked ExtINT on CPU#27
(XEN) masked ExtINT on CPU#28
(XEN) masked ExtINT on CPU#29
(XEN) masked ExtINT on CPU#30
(XEN) masked ExtINT on CPU#31
(XEN) masked ExtINT on CPU#32
(XEN) masked ExtINT on CPU#33
(XEN) masked ExtINT on CPU#34
(XEN) masked ExtINT on CPU#35
(XEN) masked ExtINT on CPU#36
(XEN) masked ExtINT on CPU#37
(XEN) masked ExtINT on CPU#38
(XEN) masked ExtINT on CPU#39
(XEN) masked ExtINT on CPU#40
(XEN) masked ExtINT on CPU#41
(XEN) masked ExtINT on CPU#42
(XEN) masked ExtINT on CPU#43
(XEN) masked ExtINT on CPU#44
(XEN) masked ExtINT on CPU#45
(XEN) masked ExtINT on CPU#46
(XEN) masked ExtINT on CPU#47
(XEN) masked ExtINT on CPU#48
(XEN) masked ExtINT on CPU#49
(XEN) masked ExtINT on CPU#50
(XEN) masked ExtINT on CPU#51
(XEN) masked ExtINT on CPU#52
(XEN) masked ExtINT on CPU#53
(XEN) masked ExtINT on CPU#54
(XEN) masked ExtINT on CPU#55
(XEN) masked ExtINT on CPU#56
(XEN) masked ExtINT on CPU#57
(XEN) masked ExtINT on CPU#58
(XEN) masked ExtINT on CPU#59
(XEN) masked ExtINT on CPU#60
(XEN) masked ExtINT on CPU#61
(XEN) masked ExtINT on CPU#62
(XEN) masked ExtINT on CPU#63
(XEN) Brought up 64 CPUs
(XEN) Testing NMI watchdog --- CPU#0 okay. CPU#1 stuck. CPU#2 stuck. CPU#3 stuck. CPU#4 stuck. CPU#5 stuck. CPU#6 stuck. CPU#7 stuck. CPU#8 stuck. CPU#9 stuck. CPU#10 stuck. CPU#11 stuck. CPU#12 stuck. CPU#13 stuck. CPU#14 stuck. CPU#15 stuck. CPU#16 stuck. CPU#17 stuck. CPU#18 stuck. CPU#19 stuck. CPU#20 stuck. CPU#21 stuck. CPU#22 stuck. CPU#23 stuck. CPU#24 stuck. CPU#25 stuck. CPU#26 stuck. CPU#27 stuck. CPU#28 stuck. CPU#29 stuck. CPU#30 stuck. CPU#31 stuck. CPU#32 stuck. CPU#33 stuck. CPU#34 stuck. CPU#35 stuck. CPU#36 stuck. CPU#37 stuck. CPU#38 stuck. CPU#39 stuck. CPU#40 stuck. CPU#41 stuck. CPU#42 stuck. CPU#43 stuck. CPU#44 stuck. CPU#45 stuck. CPU#46 stuck. CPU#47 stuck. CPU#48 stuck. CPU#49 stuck. CPU#50 stuck. CPU#51 stuck. CPU#52 stuck. CPU#53 stuck. CPU#54 stuck. CPU#55 stuck. CPU#56 stuck. CPU#57 stuck. CPU#58 stuck. CPU#59 stuck. CPU#60 stuck. CPU#61 stuck. CPU#62 stuck. CPU#63 stuck. 
(XEN) HPET's MSI mode hasn't been supported when Interrupt Remapping is enabled.
(XEN) ACPI sleep modes: S3
(XEN) mcheck_poll: Machine check polling timer started.
(XEN) *** LOADING DOMAIN 0 ***
(XEN)  Xen  kernel: 64-bit, lsb, compat32
(XEN)  Dom0 kernel: 32-bit, PAE, lsb, paddr 0x100000 -> 0x5e5000
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000077000000->0000000078000000 (186751 pages to be allocated)
(XEN)  Init. ramdisk: 000000187f97f000->000000187ffffc00
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: 00000000c0100000->00000000c05e5000
(XEN)  Init. ramdisk: 00000000c05e5000->00000000c0c65c00
(XEN)  Phys-Mach map: 00000000c0c66000->00000000c0d22000
(XEN)  Start info:    00000000c0d22000->00000000c0d224b4
(XEN)  Page tables:   00000000c0d23000->00000000c0d31000
(XEN)  Boot stack:    00000000c0d31000->00000000c0d32000
(XEN)  TOTAL:         00000000c0000000->00000000c1000000
(XEN)  ENTRY ADDRESS: 00000000c0100000
(XEN) Dom0 has maximum 64 VCPUs
(XEN) Scrubbing Free RAM: .................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................done.
(XEN) Xen trace buffers: disabled
(XEN) Std. Loglevel: All
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) Xen is relinquishing VGA console.
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen)
(XEN) Freed 236kB init memory.
(XEN) __csched_vcpu_acct_start: setting dom 0 as the privileged domain
Reserving virtual address space above 0xf9c00000
Linux version 2.6.32.12-0.7.1.xs5.9.950.478.170651xen (geeko@buildhost) (gcc version 4.1.2 20080704 (Red Hat 4.1.2-48)) #1 SMP Fri Jun 3 10:32:45 EDT 2011
KERNEL supported cpus:
  Intel GenuineIntel
  AMD AuthenticAMD
  NSC Geode by NSC
  Cyrix CyrixInstead
  Centaur CentaurHauls
  Transmeta GenuineTMx86
  Transmeta TransmetaCPU
Xen-provided machine memory map:
 BIOS: 0000000000000000 - 000000000009b400 (usable)
 BIOS: 000000000009b400 - 00000000000a0000 (reserved)
 BIOS: 00000000000e0000 - 0000000000100000 (reserved)
 BIOS: 0000000000100000 - 0000000078c7f000 (usable)
 BIOS: 0000000078c7f000 - 0000000078e93000 (ACPI NVS)
 BIOS: 0000000078e93000 - 0000000079250000 (ACPI data)
 BIOS: 0000000079250000 - 00000000792c4000 (reserved)
 BIOS: 00000000792c4000 - 00000000792d1000 (ACPI data)
 BIOS: 00000000792d1000 - 00000000792e6000 (reserved)
 BIOS: 00000000792e6000 - 0000000079302000 (ACPI data)
 BIOS: 0000000079302000 - 000000007930f000 (reserved)
 BIOS: 000000007930f000 - 0000000079311000 (ACPI data)
 BIOS: 0000000079311000 - 0000000079316000 (reserved)
 BIOS: 0000000079316000 - 0000000079338000 (ACPI data)
 BIOS: 0000000079338000 - 000000007935a000 (reserved)
 BIOS: 000000007935a000 - 000000007938a000 (ACPI data)
 BIOS: 000000007938a000 - 00000000793cb000 (reserved)
 BIOS: 00000000793cb000 - 000000007968b000 (ACPI data)
 BIOS: 000000007968b000 - 00000000796b7000 (reserved)
 BIOS: 00000000796b7000 - 00000000799e1000 (ACPI data)
 BIOS: 00000000799e1000 - 0000000079be1000 (ACPI NVS)
 BIOS: 0000000079be1000 - 0000000079d85000 (ACPI data)
 BIOS: 0000000079d85000 - 0000000079d86000 (reserved)
 BIOS: 0000000079d86000 - 0000000079d88000 (ACPI data)
 BIOS: 0000000079d88000 - 0000000079d8b000 (reserved)
 BIOS: 0000000079d8b000 - 0000000079e1c000 (ACPI data)
 BIOS: 0000000079e1c000 - 0000000079e87000 (reserved)
 BIOS: 0000000079e87000 - 000000007bd5f000 (ACPI data)
 BIOS: 000000007bd5f000 - 000000007be4f000 (reserved)
 BIOS: 000000007be4f000 - 000000007bf87000 (ACPI data)
 BIOS: 000000007bf87000 - 000000007bfcf000 (ACPI NVS)
 BIOS: 000000007bfcf000 - 000000007bfff000 (ACPI data)
 BIOS: 000000007bfff000 - 0000000090000000 (reserved)
 BIOS: 00000000fc000000 - 00000000fd000000 (reserved)
 BIOS: 00000000fec00000 - 00000000fec02000 (reserved)
 BIOS: 00000000fec04000 - 00000000fec05000 (reserved)
 BIOS: 00000000fed1c000 - 00000000fed20000 (reserved)
 BIOS: 00000000fee00000 - 00000000fee01000 (reserved)
 BIOS: 00000000ff000000 - 0000000100000000 (reserved)
 BIOS: 0000000100000000 - 0000001880000000 (usable)
Xen-provided physical RAM map:
 Xen: 0000000000000000 - 000000002f800000 (usable)
DMI 2.5 present.
last_pfn = 0x2f800 max_arch_pfn = 0x10000000
initial memory mapped : 0 - 00000000
init_memory_mapping: 0000000000000000-000000002f800000
NX (Execute Disable) protection: active
 0000000000 - 002f800000 page 4k
kernel direct mapping tables up to 2f800000 @ d33000-eb4000
RAMDISK: 005e5000 - 00c65c00
ACPI: RSDP 000f0410 00024 (v02 QUANTA)
ACPI: XSDT 7bffe120 000BC (v01 QUANTA QSSC-S4R 00000000      01000013)
ACPI: FACP 7bffd000 000F4 (v04 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: DSDT 7bfe3000 19BAD (v02 QUANTA QSSC-S4R 00000003 MSFT 0100000D)
ACPI: FACS 7bf87000 00040
ACPI: APIC 7bfe2000 003E4 (v02 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: MSCT 7bfe1000 00090 (v01 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
ACPI: MCFG 7bfe0000 0003C (v01 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
ACPI: HPET 7bfdf000 00038 (v01 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
ACPI: SLIT 7bfde000 0003C (v01 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
ACPI: SRAT 7bfdd000 00930 (v02 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
ACPI: SPCR 7bfdc000 00050 (v01 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: WDDT 7bfdb000 00040 (v01 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: SSDT 7bf4a000 3CFA4 (v02 QUANTA QSSC-S4R 00004000 INTL 20061109)
ACPI: SSDT 7bfda000 00174 (v02 QUANTA QSSC-S4R 00004000 INTL 20061109)
ACPI: PMCT 7bfd9000 00064 (v01 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: MIGT 7bfd8000 00040 (v01 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: TCPA 7bfd5000 00032 (v00 QUANTA QSSC-S4R 00000000      00000000)
ACPI: HEST 7bfd4000 005D0 (v01 QUANTA QSSC-S4R 00000001 INTL 00000001)
ACPI: BERT 7bfd3000 00030 (v01 QUANTA QSSC-S4R 00000001 INTL 00000001)
ACPI: ERST 7bfd2000 00230 (v01 QUANTA QSSC-S4R 00000001 INTL 00000001)
ACPI: EINJ 7bfd1000 00130 (v01 QUANTA QSSC-S4R 00000001 INTL 00000001)
ACPI: XMAR 7bfd0000 00350 (v01 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
0MB HIGHMEM available.
760MB LOWMEM available.
  mapped low ram: 0 - 2f800000
  low ram: 0 - 2f800000
  node 0 low ram: 00000000 - 2f000000
  node 0 bootmap 00000000 - 00005e00
(5 early reservations) ==> bootmem [0000000000 - 002f000000]
  #0 [0000100000 - 00005c41d4]    TEXT DATA BSS ==> [0000100000 - 00005c41d4]
  #1 [00005e5000 - 0000d33000]     Xen provided ==> [00005e5000 - 0000d33000]
  #2 [00005c5000 - 00005c528c]              BRK ==> [00005c5000 - 00005c528c]
  #3 [0000d33000 - 0000ea9000]          PGTABLE ==> [0000d33000 - 0000ea9000]
  #4 [0000000000 - 0000006000]          BOOTMAP ==> [0000000000 - 0000006000]
Scan SMP from f9afb000 for 1024 bytes.
Scan SMP from f9b9ac00 for 1024 bytes.
Scan SMP from f9beb000 for 65536 bytes.
found SMP MP-table at [f9bf8d80] 000fdd80
Zone PFN ranges:
  DMA      0x00000000 -> 0x00001000
  Normal   0x00001000 -> 0x0002f800
  HighMem  0x0002f800 -> 0x0002f800
Movable zone start PFN for each node
early_node_map[2] active PFN ranges
    0: 0x00000000 -> 0x0002f000
    0: 0x0002f800 -> 0x0002f800
On node 0 totalpages: 192512
free_area_init_node: node 0, pgdat c04eb180, node_mem_map c1002000
  DMA zone: 32 pages used for memmap
  DMA zone: 0 pages reserved
  DMA zone: 4064 pages, LIFO batch:0
  Normal zone: 1488 pages used for memmap
  Normal zone: 186928 pages, LIFO batch:31
ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled)
ACPI: LAPIC (acpi_id[0x20] lapic_id[0x40] enabled)
ACPI: LAPIC (acpi_id[0x10] lapic_id[0x20] enabled)
ACPI: LAPIC (acpi_id[0x30] lapic_id[0x60] enabled)
ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled)
ACPI: LAPIC (acpi_id[0x22] lapic_id[0x42] enabled)
ACPI: LAPIC (acpi_id[0x12] lapic_id[0x22] enabled)
ACPI: LAPIC (acpi_id[0x32] lapic_id[0x62] enabled)
ACPI: LAPIC (acpi_id[0x04] lapic_id[0x04] enabled)
ACPI: LAPIC (acpi_id[0x24] lapic_id[0x44] enabled)
ACPI: LAPIC (acpi_id[0x14] lapic_id[0x24] enabled)
ACPI: LAPIC (acpi_id[0x34] lapic_id[0x64] enabled)
ACPI: LAPIC (acpi_id[0x06] lapic_id[0x06] enabled)
ACPI: LAPIC (acpi_id[0x26] lapic_id[0x46] enabled)
ACPI: LAPIC (acpi_id[0x16] lapic_id[0x26] enabled)
ACPI: LAPIC (acpi_id[0x36] lapic_id[0x66] enabled)
ACPI: LAPIC (acpi_id[0x08] lapic_id[0x10] enabled)
ACPI: LAPIC (acpi_id[0x28] lapic_id[0x50] enabled)
ACPI: LAPIC (acpi_id[0x18] lapic_id[0x30] enabled)
ACPI: LAPIC (acpi_id[0x38] lapic_id[0x70] enabled)
ACPI: LAPIC (acpi_id[0x0a] lapic_id[0x12] enabled)
ACPI: LAPIC (acpi_id[0x2a] lapic_id[0x52] enabled)
ACPI: LAPIC (acpi_id[0x1a] lapic_id[0x32] enabled)
ACPI: LAPIC (acpi_id[0x3a] lapic_id[0x72] enabled)
ACPI: LAPIC (acpi_id[0x0c] lapic_id[0x14] enabled)
ACPI: LAPIC (acpi_id[0x2c] lapic_id[0x54] enabled)
ACPI: LAPIC (acpi_id[0x1c] lapic_id[0x34] enabled)
ACPI: LAPIC (acpi_id[0x3c] lapic_id[0x74] enabled)
ACPI: LAPIC (acpi_id[0x0e] lapic_id[0x16] enabled)
ACPI: LAPIC (acpi_id[0x2e] lapic_id[0x56] enabled)
ACPI: LAPIC (acpi_id[0x1e] lapic_id[0x36] enabled)
ACPI: LAPIC (acpi_id[0x3e] lapic_id[0x76] enabled)
ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled)
ACPI: LAPIC (acpi_id[0x21] lapic_id[0x41] enabled)
ACPI: LAPIC (acpi_id[0x11] lapic_id[0x21] enabled)
ACPI: LAPIC (acpi_id[0x31] lapic_id[0x61] enabled)
ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled)
ACPI: LAPIC (acpi_id[0x23] lapic_id[0x43] enabled)
ACPI: LAPIC (acpi_id[0x13] lapic_id[0x23] enabled)
ACPI: LAPIC (acpi_id[0x33] lapic_id[0x63] enabled)
ACPI: LAPIC (acpi_id[0x05] lapic_id[0x05] enabled)
ACPI: LAPIC (acpi_id[0x25] lapic_id[0x45] enabled)
ACPI: LAPIC (acpi_id[0x15] lapic_id[0x25] enabled)
ACPI: LAPIC (acpi_id[0x35] lapic_id[0x65] enabled)
ACPI: LAPIC (acpi_id[0x07] lapic_id[0x07] enabled)
ACPI: LAPIC (acpi_id[0x27] lapic_id[0x47] enabled)
ACPI: LAPIC (acpi_id[0x17] lapic_id[0x27] enabled)
ACPI: LAPIC (acpi_id[0x37] lapic_id[0x67] enabled)
ACPI: LAPIC (acpi_id[0x09] lapic_id[0x11] enabled)
ACPI: LAPIC (acpi_id[0x29] lapic_id[0x51] enabled)
ACPI: LAPIC (acpi_id[0x19] lapic_id[0x31] enabled)
ACPI: LAPIC (acpi_id[0x39] lapic_id[0x71] enabled)
ACPI: LAPIC (acpi_id[0x0b] lapic_id[0x13] enabled)
ACPI: LAPIC (acpi_id[0x2b] lapic_id[0x53] enabled)
ACPI: LAPIC (acpi_id[0x1b] lapic_id[0x33] enabled)
ACPI: LAPIC (acpi_id[0x3b] lapic_id[0x73] enabled)
ACPI: LAPIC (acpi_id[0x0d] lapic_id[0x15] enabled)
ACPI: LAPIC (acpi_id[0x2d] lapic_id[0x55] enabled)
ACPI: LAPIC (acpi_id[0x1d] lapic_id[0x35] enabled)
ACPI: LAPIC (acpi_id[0x3d] lapic_id[0x75] enabled)
ACPI: LAPIC (acpi_id[0x0f] lapic_id[0x17] enabled)
ACPI: LAPIC (acpi_id[0x2f] lapic_id[0x57] enabled)
ACPI: LAPIC (acpi_id[0x1f] lapic_id[0x37] enabled)
ACPI: LAPIC (acpi_id[0x3f] lapic_id[0x77] enabled)
ACPI: LAPIC_NMI (acpi_id[0x00] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x01] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x02] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x03] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x04] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x05] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x06] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x07] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x08] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x09] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0a] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0b] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0c] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0d] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0e] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0f] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x10] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x11] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x12] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x13] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x14] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x13] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x14] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x15] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x16] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x17] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x18] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x19] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1a] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1b] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1c] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1d] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1e] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1f] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x20] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x21] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x22] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x23] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x24] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x25] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x26] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x27] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x28] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x29] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2a] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2b] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2c] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2d] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2e] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2f] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x30] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x31] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x32] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x33] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x34] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x35] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x36] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x37] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x38] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x39] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x3a] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x3b] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x3c] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x3d] high level lint[0x1])
ACPI: IOAPIC (id[0x08] address[0xfec00000] gsi_base[0])
IOAPIC[0]: apic_id 8, version 32, address 0xfec00000, GSI 0-23
ACPI: IOAPIC (id[0x09] address[0xfec01000] gsi_base[24])
IOAPIC[1]: apic_id 9, version 32, address 0xfec01000, GSI 24-47
ACPI: IOAPIC (id[0x0a] address[0xfec04000] gsi_base[48])
IOAPIC[2]: apic_id 10, version 32, address 0xfec04000, GSI 48-71
ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
ACPI: IRQ0 used by override.
ACPI: IRQ2 used by override.
ACPI: IRQ9 used by override.
Using ACPI (MADT) for SMP configuration information
Allocating PCI resources starting at 90000000 (gap: 90000000:6c000000)
NR_CPUS:32 nr_cpumask_bits:32 nr_cpu_ids:32 nr_node_ids:1
PERCPU: Embedded 9 pages/cpu @c16ba000 s13720 r0 d23144 u65536
pcpu-alloc: s13720 r0 d23144 u65536 alloc=16*4096
pcpu-alloc: [0] 00 [0] 01 [0] 02 [0] 03 [0] 04 [0] 05 [0] 06 [0] 07 
pcpu-alloc: [0] 08 [0] 09 [0] 10 [0] 11 [0] 12 [0] 13 [0] 14 [0] 15 
pcpu-alloc: [0] 16 [0] 17 [0] 18 [0] 19 [0] 20 [0] 21 [0] 22 [0] 23 
pcpu-alloc: [0] 24 [0] 25 [0] 26 [0] 27 [0] 28 [0] 29 [0] 30 [0] 31 
Swapping MFNs for PFN 540 and 16bc (MFN 77540 and 100003b)
Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 190992
Kernel command line: root=LABEL=root-dlymifpo apic=debug debug ro console=tty0 xencons=hvc console=hvc0
PID hash table entries: 4096 (order: 2, 16384 bytes)
Dentry cache hash table entries: 131072 (order: 7, 524288 bytes)
Inode-cache hash table entries: 65536 (order: 6, 262144 bytes)
Enabling fast FPU save and restore... done.
Enabling unmasked SIMD FPU exception support... done.
Initializing CPU#0
Software IO TLB enabled: 
 Aperture:     64 megabytes
 Address size: 28 bits
 Kernel range: c1973000 - c5973000
PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Initializing HighMem for node 0 (00000000:00000000)
Memory: 681532k/778240k available (2585k kernel code, 87892k reserved, 1455k data, 316k init, 0k highmem)
virtual kernel memory layout:
    fixmap  : 0xf9877000 - 0xf9bff000   (3616 kB)
    pkmap   : 0xf9400000 - 0xf9600000   (2048 kB)
    vmalloc : 0xf0000000 - 0xf93fe000   ( 147 MB)
    lowmem  : 0xc0000000 - 0xef800000   ( 760 MB)
      .init : 0xc04f3000 - 0xc0542000   ( 316 kB)
      .data : 0xc03865a7 - 0xc04f2578   (1455 kB)
      .text : 0xc0100000 - 0xc03865a7   (2585 kB)
Checking if this processor honours the WP bit even in supervisor mode...Ok.
Hierarchical RCU implementation.
NR_IRQS:2048
Extended CMOS year: 2000
Xen reported: 1995.038 MHz processor.
Console: colour VGA+ 80x25
console [tty0] enabled
console [hvc0] enabled
Calibrating delay using timer specific routine.. 4016.91 BogoMIPS (lpj=20084556)
pid_max: default: 32768 minimum: 301
Security Framework initialized
Mount-cache hash table entries: 512
mce: CPU supports 22 MCE banks
Checking 'hlt' instruction... OK.
SMP alternatives: switching to UP code
ACPI: Core revision 20090903
ENABLING IO-APIC IRQs
init IO_APIC IRQs
 8-0 (apicid-pin) not connected
IOAPIC[0]: Set routing entry (8-1 -> 0x1 -> IRQ 1 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-2 -> 0x0 -> IRQ 0 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-3 -> 0x3 -> IRQ 3 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-4 -> 0x4 -> IRQ 4 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-5 -> 0x5 -> IRQ 5 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-6 -> 0x6 -> IRQ 6 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-7 -> 0x7 -> IRQ 7 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-8 -> 0x8 -> IRQ 8 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-9 -> 0x9 -> IRQ 9 Mode:1 Active:0)
IOAPIC[0]: Set routing entry (8-10 -> 0xa -> IRQ 10 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-11 -> 0xb -> IRQ 11 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-12 -> 0xc -> IRQ 12 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-13 -> 0xd -> IRQ 13 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-14 -> 0xe -> IRQ 14 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-15 -> 0xf -> IRQ 15 Mode:0 Active:0)
 8-16 8-17 8-18 8-19 8-20 8-21 8-22 8-23 9-0 9-1 9-2 9-3 9-4 9-5 9-6 9-7 9-8 9-9 9-10 9-11 9-12 9-13 9-14 9-15 9-16 9-17 9-18 9-19 9-20 9-21 9-22 9-23 10-0 10-1 10-2 10-3 10-4 10-5 10-6 10-7 10-8 10-9 10-10 10-11 10-12 10-13 10-14 10-15 10-16 10-17 10-18 10-19 10-20 10-21 10-22 10-23 (apicid-pin) not connected
SMP alternatives: switching to SMP code
Initializing CPU#1
Initializing CPU#2
Initializing CPU#3
Initializing CPU#4
Initializing CPU#5
Initializing CPU#6
Initializing CPU#7
Initializing CPU#8
Initializing CPU#9
Initializing CPU#10
Initializing CPU#11
Initializing CPU#12
Initializing CPU#13
Initializing CPU#14
Initializing CPU#15
Initializing CPU#16
Initializing CPU#17
Initializing CPU#18
Initializing CPU#19
Initializing CPU#20
Initializing CPU#21
Initializing CPU#22
Initializing CPU#23
Initializing CPU#24
Initializing CPU#26
Initializing CPU#25
Initializing CPU#27
Initializing CPU#28
Initializing CPU#29
Initializing CPU#30
Brought up 32 CPUs
Initializing CPU#31
Grant table version 2
NET: Registered protocol family 16
ACPI FADT declares the system doesn't support PCIe ASPM, so disable it
ACPI: bus type pci registered
PCI: MCFG configuration 0: base 80000000 segment 0 buses 0 - 255
PCI: MCFG area at 80000000 reserved in E820
PCI: Using MMCONFIG for extended config space
PCI: Using configuration type 1 for base access
bio: create slab <bio-0> at 0
IOAPIC[0]: Set routing entry (8-9 -> 0x9 -> IRQ 9 Mode:1 Active:0)
ACPI: EC: Look up EC in DSDT
ACPI Error: Field [CPB3] at 96 exceeds Buffer [NULL] size 64 (bits) (20090903/dsopcode-596)
ACPI Error (psparse-0537): Method parse/execution failed [\_SB_._OSC] (Node ee854b80), AE_AML_BUFFER_LIMIT
ACPI: Interpreter enabled
ACPI: (supports S0 S5)
ACPI: Using IOAPIC for interrupt routing
ACPI: No dock devices found.
PCI: Ignoring host bridge windows from ACPI; if necessary, use "pci=use_crs" and report a bug
ACPI: PCI Root Bridge [IOH0] (0000:00)
pci 0000:00:00.0: PME# supported from D0 D3hot D3cold
pci 0000:00:00.0: PME# disabled
pci 0000:00:01.0: PME# supported from D0 D3hot D3cold
pci 0000:00:01.0: PME# disabled
pci 0000:00:02.0: PME# supported from D0 D3hot D3cold
pci 0000:00:02.0: PME# disabled
pci 0000:00:03.0: PME# supported from D0 D3hot D3cold
pci 0000:00:03.0: PME# disabled
pci 0000:00:05.0: PME# supported from D0 D3hot D3cold
pci 0000:00:05.0: PME# disabled
pci 0000:00:07.0: PME# supported from D0 D3hot D3cold
pci 0000:00:07.0: PME# disabled
pci 0000:00:09.0: PME# supported from D0 D3hot D3cold
pci 0000:00:09.0: PME# disabled
pci 0000:00:0a.0: PME# supported from D0 D3hot D3cold
pci 0000:00:0a.0: PME# disabled
pci 0000:00:13.0: reg 10 32bit mmio: [0x9bc02000-0x9bc02fff]
pci 0000:00:13.0: PME# supported from D0 D3hot D3cold
pci 0000:00:13.0: PME# disabled
pci 0000:00:16.0: reg 10 64bit mmio: [0xcff1c000-0xcff1ffff]
pci 0000:00:16.1: reg 10 64bit mmio: [0xcff18000-0xcff1bfff]
pci 0000:00:16.2: reg 10 64bit mmio: [0xcff14000-0xcff17fff]
pci 0000:00:16.3: reg 10 64bit mmio: [0xcff10000-0xcff13fff]
pci 0000:00:16.4: reg 10 64bit mmio: [0xcff0c000-0xcff0ffff]
pci 0000:00:16.5: reg 10 64bit mmio: [0xcff08000-0xcff0bfff]
pci 0000:00:16.6: reg 10 64bit mmio: [0xcff04000-0xcff07fff]
pci 0000:00:16.7: reg 10 64bit mmio: [0xcff00000-0xcff03fff]
pci 0000:00:1a.0: reg 20 io port: [0x60c0-0x60df]
pci 0000:00:1a.1: reg 20 io port: [0x60a0-0x60bf]
pci 0000:00:1a.2: reg 20 io port: [0x6080-0x609f]
pci 0000:00:1a.7: reg 10 32bit mmio: [0x9bc01000-0x9bc013ff]
pci 0000:00:1a.7: PME# supported from D0 D3hot D3cold
pci 0000:00:1a.7: PME# disabled
pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold
pci 0000:00:1c.0: PME# disabled
pci 0000:00:1c.4: PME# supported from D0 D3hot D3cold
pci 0000:00:1c.4: PME# disabled
pci 0000:00:1d.0: reg 20 io port: [0x6060-0x607f]
pci 0000:00:1d.1: reg 20 io port: [0x6040-0x605f]
pci 0000:00:1d.2: reg 20 io port: [0x6020-0x603f]
pci 0000:00:1d.7: reg 10 32bit mmio: [0x9bc00000-0x9bc003ff]
pci 0000:00:1d.7: PME# supported from D0 D3hot D3cold
pci 0000:00:1d.7: PME# disabled
pci 0000:00:1f.0: quirk: region 0400-047f claimed by ICH6 ACPI/GPIO/TCO
pci 0000:00:1f.0: quirk: region 0500-053f claimed by ICH6 GPIO
pci 0000:00:1f.0: ICH7 LPC Generic IO decode 1 PIO at 0680 (mask 000f)
pci 0000:00:1f.0: ICH7 LPC Generic IO decode 2 PIO at 0ca0 (mask 000f)
pci 0000:00:1f.0: ICH7 LPC Generic IO decode 3 PIO at 0600 (mask 001f)
pci 0000:00:1f.2: reg 10 io port: [0x6138-0x613f]
pci 0000:00:1f.2: reg 14 io port: [0x614c-0x614f]
pci 0000:00:1f.2: reg 18 io port: [0x6130-0x6137]
pci 0000:00:1f.2: reg 1c io port: [0x6148-0x614b]
pci 0000:00:1f.2: reg 20 io port: [0x6110-0x611f]
pci 0000:00:1f.2: reg 24 io port: [0x6100-0x610f]
pci 0000:00:1f.3: reg 10 64bit mmio: [0xcff20000-0xcff200ff]
pci 0000:00:1f.3: reg 20 io port: [0x6000-0x601f]
pci 0000:00:1f.5: reg 10 io port: [0x6128-0x612f]
pci 0000:00:1f.5: reg 14 io port: [0x6144-0x6147]
pci 0000:00:1f.5: reg 18 io port: [0x6120-0x6127]
pci 0000:00:1f.5: reg 1c io port: [0x6140-0x6143]
pci 0000:00:1f.5: reg 20 io port: [0x60f0-0x60ff]
pci 0000:00:1f.5: reg 24 io port: [0x60e0-floppy0: no floppy controllers found
brd: module loaded
loop: module loaded
Xen virtual console successfully installed as hvc0
Event-channel device installed.
blktap_device_init: blktap device major 253
blktap_ring_init: blktap ring major: 253
netfront: Initialising virtual ethernet driver.
Uniform Multi-Platform E-IDE driver
(XEN) PCI add device 00:1f.2
(XEN) PCI add device 00:1f.5
PNP: No PS/2 controller found. Probing ports directly.
i8042.c: No controller found.
mice: PS/2 mouse device common for all mice
NET: Registered protocol family 17
registered taskstats version 1
PCI IO multiplexer device installed.
BIOS EDD facility v0.16 2004-Jun-25, 1 devices found
Freeing unused kernel memory: 316k freed
Red Hat nash version 5.1.19.6 starting
Mounting proc filesystem
Mounting sysfs filesystem
Creating /dev
Creating initial device nodes
bootsplash is disabled
Setting up hotplug.
Creating block device nodes.
Loading usbcore.ko module
usbcore: registered new interface driver usbfs
usbcore: registered new interface driver hub
usbcore: registered new device driver usb
Loading ehci-hcd.ko module
ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
(XEN) PCI add device 00:1a.7
IOAPIC[0]: Set routing entry (8-18 -> 0x12 -> IRQ 18 Mode:1 Active:1)
(XEN) allocated vector 61 for irq 18
ehci_hcd 0000:00:1a.7: PCI INT C -> GSI 18 (level, low) -> IRQ 18
ehci_hcd 0000:00:1a.7: setting latency timer to 64
ehci_hcd 0000:00:1a.7: EHCI Host Controller
ehci_hcd 0000:00:1a.7: new USB bus registered, assigned bus number 1
ehci_hcd 0000:00:1a.7: debug port 1
ehci_hcd 0000:00:1a.7: cache line size of 32 is not supported
ehci_hcd 0000:00:1a.7: irq 18, io mem 0x9bc01000
ehci_hcd 0000:00:1a.7: USB 2.0 started, EHCI 1.00
usb usb1: configuration #1 chosen from 1 choice
hub 1-0:1.0: USB hub found
hub 1-0:1.0: 6 ports detected
(XEN) PCI add device 00:1d.7
IOAPIC[0]: Set routing entry (8-23 -> 0x17 -> IRQ 23 Mode:1 Active:1)
(XEN) allocated vector 71 for irq 23
ehci_hcd 0000:00:1d.7: PCI INT A -> GSI 23 (level, low) -> IRQ 23
ehci_hcd 0000:00:1d.7: setting latency timer to 64
ehci_hcd 0000:00:1d.7: EHCI Host Controller
ehci_hcd 0000:00:1d.7: new USB bus registered, assigned bus number 2
ehci_hcd 0000:00:1d.7: debug port 1
ehci_hcd 0000:00:1d.7: cache line size of 32 is not supported
ehci_hcd 0000:00:1d.7: irq 23, io mem 0x9bc00000
ehci_hcd 0000:00:1d.7: USB 2.0 started, EHCI 1.00
usb usb2: configuration #1 chosen from 1 choice
hub 2-0:1.0: USB hub found
hub 2-0:1.0: 6 ports detected
Loading ohci-hcd.ko module
ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Loading uhci-hcd.ko module
uhci_hcd: USB Universal Host Controller Interface driver
(XEN) PCI add device 00:1a.0
uhci_hcd 0000:00:1a.0: PCI INT A -> GSI 16 (level, low) -> IRQ 16
uhci_hcd 0000:00:1a.0: setting latency timer to 64
uhci_hcd 0000:00:1a.0: UHCI Host Controller
uhci_hcd 0000:00:1a.0: new USB bus registered, assigned bus number 3
uhci_hcd 0000:00:1a.0: irq 16, io base 0x000060c0
usb usb3: configuration #1 chosen from 1 choice
hub 3-0:1.0: USB hub found
hub 3-0:1.0: 2 ports detected
(XEN) PCI add device 00:1a.1
IOAPIC[0]: Set routing entry (8-21 -> 0x15 -> IRQ 21 Mode:1 Active:1)
(XEN) allocated vector 89 for irq 21
uhci_hcd 0000:00:1a.1: PCI INT B -> GSI 21 (level, low) -> IRQ 21
uhci_hcd 0000:00:1a.1: setting latency timer to 64
uhci_hcd 0000:00:1a.1: UHCI Host Controller
uhci_hcd 0000:00:1a.1: new USB bus registered, assigned bus number 4
uhci_hcd 0000:00:1a.1: irq 21, io base 0x000060a0
usb usb4: configuration #1 chosen from 1 choice
hub 4-0:1.0: USB hub found
hub 4-0:1.0: 2 ports detected
(XEN) PCI add device 00:1a.2
IOAPIC[0]: Set routing entry (8-19 -> 0x13 -> IRQ 19 Mode:1 Active:1)
(XEN) allocated vector 99 for irq 19
uhci_hcd 0000:00:1a.2: PCI INT D -> GSI 19 (level, low) -> IRQ 19
uhci_hcd 0000:00:1a.2: setting latency timer to 64
uhci_hcd 0000:00:1a.2: UHCI Host Controller
uhci_hcd 0000:00:1a.2: new USB bus registered, assigned bus number 5
uhci_hcd 0000:00:1a.2: irq 19, io base 0x00006080
usb usb5: configuration #1 chosen from 1 choice
hub 5-0:1.0: USB hub found
hub 5-0:1.0: 2 ports detected
(XEN) PCI add device 00:1d.0
uhci_hcd 0000:00:1d.0: PCI INT A -> GSI 23 (level, low) -> IRQ 23
uhci_hcd 0000:00:1d.0: setting latency timer to 64
uhci_hcd 0000:00:1d.0: UHCI Host Controller
uhci_hcd 0000:00:1d.0: new USB bus registered, assigned bus number 6
uhci_hcd 0000:00:1d.0: irq 23, io base 0x00006060
usb usb6: configuration #1 chosen from 1 choice
hub 6-0:1.0: USB hub found
hub 6-0:1.0: 2 ports detected
(XEN) PCI add device 00:1d.1
uhci_hcd 0000:00:1d.1: PCI INT B -> GSI 19 (level, low) -> IRQ 19
uhci_hcd 0000:00:1d.1: setting latency timer to 64
uhci_hcd 0000:00:1d.1: UHCI Host Controller
uhci_hcd 0000:00:1d.1: new USB bus registered, assigned bus number 7
uhci_hcd 0000:00:1d.1: irq 19, io base 0x00006040
usb usb7: configuration #1 chosen from 1 choice
hub 7-0:1.0: USB hub found
hub 7-0:1.0: 2 ports detected
(XEN) PCI add device 00:1d.2
uhci_hcd 0000:00:1d.2: PCI INT C -> GSI 18 (level, low) -> IRQ 18
uhci_hcd 0000:00:1d.2: setting latency timer to 64
uhci_hcd 0000:00:1d.2: UHCI Host Controller
uhci_hcd 0000:00:1d.2: new USB bus registered, assigned bus number 8
uhci_hcd 0000:00:1d.2: irq 18, io base 0x00006020
usb usb8: configuration #1 chosen from 1 choice
hub 8-0:1.0: USB hub found
hub 8-0:1.0: 2 ports detected
Loading jbd.ko module
Loading ext3.ko module
Loading scsi_mod.ko module
SCSI subsystem initialized
Loading sd_mod.ko module
Loading megaraid_sas.ko module
megasas: 00.00.05.33 Tue. Feb. 15 17:00:00 PDT 2011
(XEN) PCI add device 07:00.0
megasas: 0x1000:0x0079:0x8086:0x9261: bus 7:slot 0:func 0
megaraid_sas 0000:07:00.0: PCI INT A -> GSI 24 (level, low) -> IRQ 24
megaraid_sas 0000:07:00.0: setting latency timer to 64
megaraid_sas 0000:07:00.0: irq 1279 (327) for MSI/MSI-X
megasas: FW now in Ready state
megasas: cpx is not supported.
megasas: INIT adapter done 
scsi0 : LSI SAS based MegaRAID driver
scsi 0:0:20:0: Direct-Access     SEAGATE  ST9146802SS      0003 PQ: 0 ANSI: 5
scsi 0:0:21:0: Direct-Access     SEAGATE  ST9146802SS      0003 PQ: 0 ANSI: 5
scsi 0:2:0:0: Direct-Access     Intel    RS2BL080         2.0. PQ: 0 ANSI: 5
sd 0:2:0:0: [sda] 571342848 512-byte logical blocks: (292 GB/272 GiB)
sd 0:2:0:0: [sda] Write Protect is off
sd 0:2:0:0: [sda] Mode Sense: 1f 00 10 08
sd 0:2:0:0: [sda] Write cache: disabled, read cache: disabled, supports DPO and FUA
 sda: sda1 sda2 sda3
sd 0:2:0:0: [sda] Attached SCSI disk
Loading dm-mod.ko module
device-mapper: ioctl: 4.15.0-ioctl (2009-04-01) initialised: dm-devel@redhat.com
Loading dm-log.ko module
Loading dm-region-hash.ko module
Loading dm-region-hash.ko module
insmod: error inserting '/lib/dm-region-hash.ko': -1 File exists
Waiting for driver initialization.
usb 4-1: new full speed USB device using uhci_hcd and address 2
usb 4-1: configuration #1 chosen from 1 choice
usb 8-1: new low speed USB device using uhci_hcd and address 2
usb 8-1: configuration #1 chosen from 1 choice
Scanning and configuring dmraid supported devices
Creating root device.
Mounting root filesystem.
kjournald starting.  Commit interval 15 seconds
Setting up other filesystems.
Setting up new root fs
EXT3-fs: mounted filesystem with ordered data mode.
no fstab.sys, mounting internal defaults
Switching to new root and running init.
unmounting old /dev
unmounting old /proc
unmounting old /sys
INIT: version 2.86 booting
		Welcome to XenServer
		Press 'I' to enter interactive startup.
Setting clock  (utc): Mon Jun  6 13:50:21 UTC 2011 [  OK  ]
Starting udev: (XEN) PCI add device 00:1f.3
(XEN) PCI add device 00:1f.2
(XEN) PCI add device 00:1f.5
(XEN) PCI add device 00:1f.2
(XEN) PCI add device 00:1f.5
(XEN) PCI add device 01:00.0
(XEN) PCI add Virtual Function 01:10.0
(XEN) PCI add Virtual Function 01:10.2
(XEN) PCI add Virtual Function 01:10.4
(XEN) PCI add Virtual Function 01:10.6
(XEN) PCI add Virtual Function 01:11.0
(XEN) PCI add Virtual Function 01:11.2
(XEN) PCI add Virtual Function 01:11.4
(XEN) PCI add device 01:00.1
(XEN) allocated vector 32 for irq 40
(XEN) PCI add Virtual Function 01:10.1
(XEN) PCI add Virtual Function 01:10.3
(XEN) PCI add Virtual Function 01:10.5
(XEN) PCI add Virtual Function 01:10.7
(XEN) PCI add Virtual Function 01:11.1
(XEN) PCI add Virtual Function 01:11.3
(XEN) PCI add Virtual Function 01:11.5
(XEN) PCI add device 04:00.0
(XEN) PCI add Virtual Function 04:10.0
(XEN) PCI add Virtual Function 04:10.2
(XEN) PCI add Virtual Function 04:10.4
(XEN) PCI add Virtual Function 04:10.6
(XEN) PCI add Virtual Function 04:11.0
(XEN) PCI add Virtual Function 04:11.2
(XEN) PCI add Virtual Function 04:11.4
(XEN) PCI add device 04:00.1
(XEN) allocated vector 72 for irq 41
(XEN) PCI add Virtual Function 04:10.1
(XEN) PCI add Virtual Function 04:10.3
(XEN) PCI add Virtual Function 04:10.5
(XEN) PCI add Virtual Function 04:10.7
(XEN) PCI add Virtual Function 04:11.1
(XEN) PCI add Virtual Function 04:11.3
(XEN) PCI add Virtual Function 04:11.5
[  OK  ]
Loading default keymap (us): [  OK  ]
Setting hostname localhost.localdomain:  [  OK  ]
Checking filesystems
Checking all file systems.
[/sbin/fsck.ext3 (1) -- /] fsck.ext3 -a /dev/sda1 
root-dlymifpo: clean, 26628/524288 files, 473987/1048324 blocks
[  OK  ]
Remounting root filesystem in read-write mode:  [  OK  ]
Mounting local filesystems:  [  OK  ]
Enabling /etc/fstab swaps:  [  OK  ]
Running interface-rename: [  OK  ]
INIT: Entering runlevel: 3
Entering non-interactive startup
Applying Intel CPU microcode update: (XEN) microcode: CPU0 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU2 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU4 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU6 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU8 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU10 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU12 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU14 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU16 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU18 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU20 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU22 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU24 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU26 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU28 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU30 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU32 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU34 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU36 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU38 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU40 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU42 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU44 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU46 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU48 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU50 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU52 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU54 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU56 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU58 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU60 updated from revision 0x1 to 0x2, date = 2009-12-08 
(XEN) microcode: CPU62 updated from revision 0x1 to 0x2, date = 2009-12-08 
[  OK  ]
Loading crash kernel: [  OK  ]
Applying iptables firewall rules: [  OK  ]
Inserting llc module [  OK  ]
Inserting openvswitch module [  OK  ]
Starting ovsdb-server [  OK  ]
Configuring Open vSwitch system IDs [  OK  ]
Starting ovs-vswitchd [  OK  ]
Bringing up loopback interface:  [  OK  ]
Starting system logger: [  OK  ]
Starting kernel logger: [  OK  ]
Starting irqbalance: [  OK  ]
Bringing up management interface xenbr0:  
Determining IP information for xenbr0... done.
[  OK  ]
Bringing up additional interface xenbr3:  [  OK  ]
Bringing up additional interface xenbr1:  [  OK  ]
Bringing up additional interface xenbr2:  [  OK  ]
Starting multipathd:  Starting multipathd daemon: [  OK  ]
[  OK  ]
Starting portmap: [  OK  ]
Starting NFS statd: [  OK  ]
Starting lwsmd:  Starting lwsmd: [  OK  ][  OK  ]
[  OK  ]
Starting RPC idmapd: [  OK  ]
ntpd: Synchronizing with time server: [  OK  ]
Starting ntpd: [  OK  ]
Domain 0 configured for 4 VCPUs
Unplugging extra VCPUs: 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 [  OK  ]
Starting the fork/exec daemon: [  OK  ]
Starting the v6 licensing daemon: [  OK  ]
Starting xenstored: 
Starting the memory ballooning daemon: [  OK  ]
Starting xapi: ......start-of-day complete.[  OK  ]
Performing remaining startup actions: [  OK  ]
Starting snapwatchd daemon: [  OK  ][  OK  ]
Mounting other filesystems:  [  OK  ]
Starting sshd: [  OK  ]
Starting crond: [  OK  ]
Starting atd: [  OK  ][  OK  ]
Starting perfmon: [  OK  ]
Adjusting memory target: [  OK  ]

Citrix XenServer Host 5.9.950-47791p

System Booted: 2011-06-06 13:51

Your XenServer Host has now finished booting. 
To manage this server please use the Citrix XenCenter application. 
You can install XenCenter for Windows from the XenServer installation media.

You can connect to this system using one of the following network
addresses:

10.220.3.56

XenServer Host SSL certificate fingerprint:
91:98:7C:5A:52:3D:D9:F9:59:B0:51:94:44:C3:E6:48:14:76:6F:18

ohno login: root
Password: 
Last login: Mon Jun  6 13:44:08 on hvc0
Type "xsconsole" for access to the management console.
[root@ohno ~]# echo s > /proc/sysrq-trigger 
SysRq : Emergency Sync
[root@ohno ~]# echo c > /proc/sysrq-trigger 
SysRq : Trigger a crash
BUG: unable to handle kernel NULL pointer dereference at (null)
IP: [<c0288122>] sysrq_handle_crash+0x12/0x20
*pdpt = 000000103ab29027 *pde = 0000000000000000 
Oops: 0002 [#1] SMP 
last sysfs file: /sys/class/net/lo/carrier
Modules linked in: nfs nfs_acl auth_rpcgss lockd sunrpc 8021q openvswitch_mod llc ipt_REJECT nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack xt_tcpudp iptable_filter ip_tables x_tables binfmt_misc nls_utf8 isofs dm_mirror video output sbs sbshc fan battery ac parport_pc lp parport nvram sr_mod cdrom evdev sg usbhid processor rtc_cmos rtc_core tpm_tis tpm rtc_lib 8250_pnp 8250 tpm_bios serial_core thermal thermal_sys container button pata_acpi igb ata_piix ata_generic libata i2c_i801 i2c_core pcspkr dm_region_hash dm_log dm_mod megaraid_sas sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd usbcore fbcon font tileblit bitblit softcursor [last unloaded: microcode]

Pid: 13193, comm: bash Not tainted (2.6.32.12-0.7.1.xs5.9.950.478.170651xen #1) QSSC-S4R
EIP: 0061:[<c0288122>] EFLAGS: 00010086 CPU: 0
EIP is at sysrq_handle_crash+0x12/0x20
EAX: 00000063 EBX: c04e17f0 ECX: c0555030 EDX: 00000000
ESI: 00000000 EDI: 00000063 EBP: ee0bdf04 ESP: ee0bdf04
 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0069
Process bash (pid: 13193, ti=ee0bc000 task=ede0c470 task.ti=ee0bc000)
Stack:
 ee0bdf2c c02882b3 c044311c c04489dc 00000000 00000004 00000000 b78c3000
<0> 00000002 c0288360 ee0bdf3c c02883a7 ecf39540 ecf39588 ee0bdf64 c01d7629
<0> ee0bdf98 00000002 b78c3000 eb1bf340 fffffffb eb1bf340 b78c3000 00000002
Call Trace:
 [<c02882b3>] ? __handle_sysrq+0x73/0x120
 [<c0288360>] ? write_sysrq_trigger+0x0/0x50
 [<c02883a7>] ? write_sysrq_trigger+0x47/0x50
 [<c01d7629>] ? proc_reg_write+0x69/0xc0
 [<c0196aa6>] ? vfs_write+0x96/0x150
 [<c01d75c0>] ? proc_reg_write+0x0/0xc0
 [<c01970fd>] ? sys_write+0x3d/0x70
 [<c0104501>] ? syscall_call+0x7/0xb
Code: cf c1 e0 04 09 c2 88 51 03 5d c3 8d b4 26 00 00 00 00 8d bc 27 00 00 00 00 55 89 e5 c7 05 d0 4b 55 c0 01 00 00 00 0f ae f8 89 f6 <c6> 05 00 00 00 00 01 5d c3 90 8d 74 26 00 89 c2 8d 40 d0 55 83 
EIP: [<c0288122>] sysrq_handle_crash+0x12/0x20 SS:ESP 0069:ee0bdf04
CR2: 0000000000000000
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: Returning APIC to xapic
(XEN) DBG: About to suspend and disable IR
(XEN) DBG: in iommu_disable_IR
(XEN) DBG: in disable_intremap
(XEN) DBG: written to DMAR
(XEN) DBG: in disable_intremap
(XEN) DBG: written to DMAR
(XEN) DBG: Done suspending and disabling IR
Linux version 2.6.32.12-0.7.1.xs5.9.950.478.170651kdump (geeko@buildhost) (gcc version 4.1.2 20080704 (Red Hat 4.1.2-48)) #1 SMP Fri Jun 3 10:39:34 EDT 2011
KERNEL supported cpus:
  Intel GenuineIntel
  AMD AuthenticAMD
  NSC Geode by NSC
  Cyrix CyrixInstead
  Centaur CentaurHauls
  Transmeta GenuineTMx86
  Transmeta TransmetaCPU
  UMC UMC UMC UMC
BIOS-provided physical RAM map:
 BIOS-e820: 0000000000000100 - 000000000009b400 (usable)
 BIOS-e820: 000000000009b400 - 00000000000a0000 (reserved)
 BIOS-e820: 00000000000e0000 - 0000000000100000 (reserved)
 BIOS-e820: 0000000000100000 - 0000000078c7f000 (usable)
 BIOS-e820: 0000000078c7f000 - 0000000078e93000 (ACPI NVS)
 BIOS-e820: 0000000078e93000 - 0000000079250000 (ACPI data)
 BIOS-e820: 0000000079250000 - 00000000792c4000 (reserved)
 BIOS-e820: 00000000792c4000 - 00000000792d1000 (ACPI data)
 BIOS-e820: 00000000792d1000 - 00000000792e6000 (reserved)
 BIOS-e820: 00000000792e6000 - 0000000079302000 (ACPI data)
 BIOS-e820: 0000000079302000 - 000000007930f000 (reserved)
 BIOS-e820: 000000007930f000 - 0000000079311000 (ACPI data)
 BIOS-e820: 0000000079311000 - 0000000079316000 (reserved)
 BIOS-e820: 0000000079316000 - 0000000079338000 (ACPI data)
 BIOS-e820: 0000000079338000 - 000000007935a000 (reserved)
 BIOS-e820: 000000007935a000 - 000000007938a000 (ACPI data)
 BIOS-e820: 000000007938a000 - 00000000793cb000 (reserved)
 BIOS-e820: 00000000793cb000 - 000000007968b000 (ACPI data)
 BIOS-e820: 000000007968b000 - 00000000796b7000 (reserved)
 BIOS-e820: 00000000796b7000 - 00000000799e1000 (ACPI data)
 BIOS-e820: 00000000799e1000 - 0000000079be1000 (ACPI NVS)
 BIOS-e820: 0000000079be1000 - 0000000079d85000 (ACPI data)
 BIOS-e820: 0000000079d85000 - 0000000079d86000 (reserved)
 BIOS-e820: 0000000079d86000 - 0000000079d88000 (ACPI data)
 BIOS-e820: 0000000079d88000 - 0000000079d8b000 (reserved)
 BIOS-e820: 0000000079d8b000 - 0000000079e1c000 (ACPI data)
 BIOS-e820: 0000000079e1c000 - 0000000079e87000 (reserved)
 BIOS-e820: 0000000079e87000 - 000000007bd5f000 (ACPI data)
 BIOS-e820: 000000007bd5f000 - 000000007be4f000 (reserved)
 BIOS-e820: 000000007be4f000 - 000000007bf87000 (ACPI data)
 BIOS-e820: 000000007bf87000 - 000000007bfcf000 (ACPI NVS)
 BIOS-e820: 000000007bfcf000 - 000000007bfff000 (ACPI data)
 BIOS-e820: 000000007bfff000 - 0000000090000000 (reserved)
 BIOS-e820: 00000000fc000000 - 00000000fd000000 (reserved)
 BIOS-e820: 00000000fec00000 - 00000000fec02000 (reserved)
 BIOS-e820: 00000000fec04000 - 00000000fec05000 (reserved)
 BIOS-e820: 00000000fed1c000 - 00000000fed20000 (reserved)
 BIOS-e820: 00000000fee00000 - 00000000fee01000 (reserved)
 BIOS-e820: 00000000ff000000 - 0000000100000000 (reserved)
 BIOS-e820: 0000000100000000 - 0000001880000000 (usable)
last_pfn = 0x1880000
user-defined physical RAM map:
 user: 0000000000000000 - 00000000000a0000 (usable)
 user: 0000000002000000 - 0000000005f5a000 (usable)
DMI 2.5 present.
last_pfn = 0x5f5a
MTRR default type: write-back
MTRR fixed ranges enabled:
  00000-9FFFF write-back
  A0000-DFFFF uncachable
  E0000-FFFFF write-protect
MTRR variable ranges enabled:
  0 base 00080000000 mask FFF80000000 uncachable
  1 base FC000000000 mask FFF00000000 uncachable
  2 disabled
  3 disabled
  4 disabled
  5 disabled
  6 disabled
  7 disabled
initial memory mapped : 0 - 02800000
init_memory_mapping: 0000000000000000-0000000005f5a000
NX (Execute Disable) protection: active
 0000000000 - 0000200000 page 4k
 0000200000 - 0005e00000 page 2M
 0005e00000 - 0005f5a000 page 4k
kernel direct mapping tables up to 5f5a000 @ 7000-17000
RAMDISK: 05c6a000 - 05f58323
ACPI: RSDP 000f0410 00024 (v02 QUANTA)
ACPI: XSDT 7bffe120 000BC (v01 QUANTA QSSC-S4R 00000000      01000013)
ACPI: FACP 7bffd000 000F4 (v04 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: DSDT 7bfe3000 19BAD (v02 QUANTA QSSC-S4R 00000003 MSFT 0100000D)
ACPI: FACS 7bf87000 00040
ACPI: APIC 7bfe2000 003E4 (v02 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: MSCT 7bfe1000 00090 (v01 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
ACPI: MCFG 7bfe0000 0003C (v01 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
ACPI: HPET 7bfdf000 00038 (v01 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
ACPI: SLIT 7bfde000 0003C (v01 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
ACPI: SRAT 7bfdd000 00930 (v02 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
ACPI: SPCR 7bfdc000 00050 (v01 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: WDDT 7bfdb000 00040 (v01 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: SSDT 7bf4a000 3CFA4 (v02 QUANTA QSSC-S4R 00004000 INTL 20061109)
ACPI: SSDT 7bfda000 00174 (v02 QUANTA QSSC-S4R 00004000 INTL 20061109)
ACPI: PMCT 7bfd9000 00064 (v01 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: MIGT 7bfd8000 00040 (v01 QUANTA QSSC-S4R 00000000 MSFT 0100000D)
ACPI: TCPA 7bfd5000 00032 (v00 QUANTA QSSC-S4R 00000000      00000000)
ACPI: HEST 7bfd4000 005D0 (v01 QUANTA QSSC-S4R 00000001 INTL 00000001)
ACPI: BERT 7bfd3000 00030 (v01 QUANTA QSSC-S4R 00000001 INTL 00000001)
ACPI: ERST 7bfd2000 00230 (v01 QUANTA QSSC-S4R 00000001 INTL 00000001)
ACPI: EINJ 7bfd1000 00130 (v01 QUANTA QSSC-S4R 00000001 INTL 00000001)
ACPI: DMAR 7bfd0000 00350 (v01 QUANTA QSSC-S4R 00000001 MSFT 0100000D)
ACPI: Local APIC address 0xfee00000
NUMA - single node, flat memory mode
Node: 0, start_pfn: 0, end_pfn: 5f5a
  Setting physnode_map array to node 0 for pfns:
  0 4000 
node 0 pfn: [0 - 5f5a]
Reserving 512 pages of KVA for lmem_map of node 0 at 5a00
remove_active_range (0, 23040, 23552)
Reserving total of 200 pages for numa KVA remap
kva_start_pfn ~ 5800 max_low_pfn ~ 5f5a
max_pfn = 5f5a
0MB HIGHMEM available.
95MB LOWMEM available.
max_low_pfn = 5f5a, highstart_pfn = 5f5a
Low memory ends at vaddr c5f5a000
node 0 will remap to vaddr c5800000 - c5a00000
allocate_pgdat: node 0 NODE_DATA c5800000
remap_numa_kva: node 0
remap_numa_kva: c5800000 to pfn 00005a00
High memory starts at vaddr c5f5a000
  mapped low ram: 0 - 05f5a000
  low ram: 0 - 05f5a000
  node 0 low ram: 00000000 - 05f5a000
  node 0 bootmap 00002000 - 00002bec
(11 early reservations) ==> bootmem [0000000000 - 0005f5a000]
  #0 [0000000000 - 0000001000]   BIOS data page ==> [0000000000 - 0000001000]
  #1 [0000001000 - 0000002000]    EX TRAMPOLINE ==> [0000001000 - 0000002000]
  #2 [0000006000 - 0000007000]       TRAMPOLINE ==> [0000006000 - 0000007000]
  #3 [0002000000 - 00023c8e54]    TEXT DATA BSS ==> [0002000000 - 00023c8e54]
  #4 [0005c6a000 - 0005f58323]          RAMDISK ==> [0005c6a000 - 0005f58323]
  #5 [000009f000 - 0000100000]    BIOS reserved ==> [000009f000 - 0000100000]
  #6 [00023c9000 - 00023dd28c]              BRK ==> [00023c9000 - 00023dd28c]
  #7 [0000007000 - 0000014000]          PGTABLE ==> [0000007000 - 0000014000]
  #8 [0005a00000 - 0005c00000]          KVA RAM ==> [0005a00000 - 0005c00000]
  #9 [0005800000 - 0005a00000]           KVA PG ==> [0005800000 - 0005a00000]
  #10 [0000002000 - 0000003000]          BOOTMAP ==> [0000002000 - 0000003000]
Scan SMP from c0000000 for 1024 bytes.
Scan SMP from c009fc00 for 1024 bytes.
Scan SMP from c00f0000 for 65536 bytes.
found SMP MP-table at [c00fdd80] fdd80
  mpc: 12-12
Zone PFN ranges:
  DMA      0x00000000 -> 0x00001000
  Normal   0x00001000 -> 0x00005f5a
  HighMem  0x00005f5a -> 0x00005f5a
Movable zone start PFN for each node
early_node_map[3] active PFN ranges
    0: 0x00000000 -> 0x000000a0
    0: 0x00002000 -> 0x00005a00
    0: 0x00005c00 -> 0x00005f5a
On node 0 totalpages: 15866
free_area_init_node: node 0, pgdat c5800000, node_mem_map c5803000
  DMA zone: 32 pages used for memmap
  DMA zone: 0 pages reserved
  DMA zone: 128 pages, LIFO batch:0
  Normal zone: 159 pages used for memmap
  Normal zone: 15547 pages, LIFO batch:3
Using APIC driver default
ACPI: PM-Timer IO Port: 0x408
ACPI: Local APIC address 0xfee00000
ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled)
ACPI: LAPIC (acpi_id[0x20] lapic_id[0x40] enabled)
ACPI: LAPIC (acpi_id[0x10] lapic_id[0x20] enabled)
ACPI: LAPIC (acpi_id[0x30] lapic_id[0x60] enabled)
ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled)
ACPI: LAPIC (acpi_id[0x22] lapic_id[0x42] enabled)
ACPI: LAPIC (acpi_id[0x12] lapic_id[0x22] enabled)
ACPI: LAPIC (acpi_id[0x32] lapic_id[0x62] enabled)
ACPI: LAPIC (acpi_id[0x04] lapic_id[0x04] enabled)
ACPI: LAPIC (acpi_id[0x24] lapic_id[0x44] enabled)
ACPI: LAPIC (acpi_id[0x14] lapic_id[0x24] enabled)
ACPI: LAPIC (acpi_id[0x34] lapic_id[0x64] enabled)
ACPI: LAPIC (acpi_id[0x06] lapic_id[0x06] enabled)
ACPI: LAPIC (acpi_id[0x26] lapic_id[0x46] enabled)
ACPI: LAPIC (acpi_id[0x16] lapic_id[0x26] enabled)
ACPI: LAPIC (acpi_id[0x36] lapic_id[0x66] enabled)
ACPI: LAPIC (acpi_id[0x08] lapic_id[0x10] enabled)
ACPI: LAPIC (acpi_id[0x28] lapic_id[0x50] enabled)
ACPI: LAPIC (acpi_id[0x18] lapic_id[0x30] enabled)
ACPI: LAPIC (acpi_id[0x38] lapic_id[0x70] enabled)
ACPI: LAPIC (acpi_id[0x0a] lapic_id[0x12] enabled)
ACPI: LAPIC (acpi_id[0x2a] lapic_id[0x52] enabled)
ACPI: LAPIC (acpi_id[0x1a] lapic_id[0x32] enabled)
ACPI: LAPIC (acpi_id[0x3a] lapic_id[0x72] enabled)
ACPI: LAPIC (acpi_id[0x0c] lapic_id[0x14] enabled)
ACPI: LAPIC (acpi_id[0x2c] lapic_id[0x54] enabled)
ACPI: LAPIC (acpi_id[0x1c] lapic_id[0x34] enabled)
ACPI: LAPIC (acpi_id[0x3c] lapic_id[0x74] enabled)
ACPI: LAPIC (acpi_id[0x0e] lapic_id[0x16] enabled)
ACPI: LAPIC (acpi_id[0x2e] lapic_id[0x56] enabled)
ACPI: LAPIC (acpi_id[0x1e] lapic_id[0x36] enabled)
ACPI: LAPIC (acpi_id[0x3e] lapic_id[0x76] enabled)
ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled)
ACPI: LAPIC (acpi_id[0x21] lapic_id[0x41] enabled)
ACPI: LAPIC (acpi_id[0x11] lapic_id[0x21] enabled)
ACPI: LAPIC (acpi_id[0x31] lapic_id[0x61] enabled)
ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled)
ACPI: LAPIC (acpi_id[0x23] lapic_id[0x43] enabled)
ACPI: LAPIC (acpi_id[0x13] lapic_id[0x23] enabled)
ACPI: LAPIC (acpi_id[0x33] lapic_id[0x63] enabled)
ACPI: LAPIC (acpi_id[0x05] lapic_id[0x05] enabled)
ACPI: LAPIC (acpi_id[0x25] lapic_id[0x45] enabled)
ACPI: LAPIC (acpi_id[0x15] lapic_id[0x25] enabled)
ACPI: LAPIC (acpi_id[0x35] lapic_id[0x65] enabled)
ACPI: LAPIC (acpi_id[0x07] lapic_id[0x07] enabled)
ACPI: LAPIC (acpi_id[0x27] lapic_id[0x47] enabled)
ACPI: LAPIC (acpi_id[0x17] lapic_id[0x27] enabled)
ACPI: LAPIC (acpi_id[0x37] lapic_id[0x67] enabled)
ACPI: LAPIC (acpi_id[0x09] lapic_id[0x11] enabled)
ACPI: LAPIC (acpi_id[0x29] lapic_id[0x51] enabled)
ACPI: LAPIC (acpi_id[0x19] lapic_id[0x31] enabled)
ACPI: LAPIC (acpi_id[0x39] lapic_id[0x71] enabled)
ACPI: LAPIC (acpi_id[0x0b] lapic_id[0x13] enabled)
ACPI: LAPIC (acpi_id[0x2b] lapic_id[0x53] enabled)
ACPI: LAPIC (acpi_id[0x1b] lapic_id[0x33] enabled)
ACPI: LAPIC (acpi_id[0x3b] lapic_id[0x73] enabled)
ACPI: LAPIC (acpi_id[0x0d] lapic_id[0x15] enabled)
ACPI: LAPIC (acpi_id[0x2d] lapic_id[0x55] enabled)
ACPI: LAPIC (acpi_id[0x1d] lapic_id[0x35] enabled)
ACPI: LAPIC (acpi_id[0x3d] lapic_id[0x75] enabled)
ACPI: LAPIC (acpi_id[0x0f] lapic_id[0x17] enabled)
ACPI: LAPIC (acpi_id[0x2f] lapic_id[0x57] enabled)
ACPI: LAPIC (acpi_id[0x1f] lapic_id[0x37] enabled)
ACPI: LAPIC (acpi_id[0x3f] lapic_id[0x77] enabled)
ACPI: LAPIC_NMI (acpi_id[0x00] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x01] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x02] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x03] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x04] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x05] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x06] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x07] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x08] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x09] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0a] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0b] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0c] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0d] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0e] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x0f] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x10] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x11] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x12] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x13] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x14] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x13] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x14] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x15] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x16] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x17] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x18] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x19] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1a] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1b] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1c] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1d] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1e] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x1f] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x20] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x21] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x22] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x23] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x24] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x25] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x26] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x27] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x28] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x29] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2a] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2b] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2c] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2d] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2e] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x2f] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x30] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x31] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x32] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x33] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x34] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x35] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x36] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x37] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x38] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x39] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x3a] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x3b] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x3c] high level lint[0x1])
ACPI: LAPIC_NMI (acpi_id[0x3d] high level lint[0x1])
ACPI: IOAPIC (id[0x08] address[0xfec00000] gsi_base[0])
IOAPIC[0]: apic_id 8, version 32, address 0xfec00000, GSI 0-23
ACPI: IOAPIC (id[0x09] address[0xfec01000] gsi_base[24])
IOAPIC[1]: apic_id 9, version 32, address 0xfec01000, GSI 24-47
ACPI: IOAPIC (id[0x0a] address[0xfec04000] gsi_base[48])
IOAPIC[2]: apic_id 10, version 32, address 0xfec04000, GSI 48-71
ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
ACPI: IRQ0 used by override.
ACPI: IRQ2 used by override.
ACPI: IRQ9 used by override.
Using ACPI (MADT) for SMP configuration information
SMP: Allowing 64 CPUs, 0 hotplug CPUs
mapped APIC to ffffb000 (fee00000)
mapped IOAPIC to ffffa000 (fec00000)
mapped IOAPIC to ffff9000 (fec01000)
mapped IOAPIC to ffff8000 (fec04000)
nr_irqs_gsi: 72
Allocating PCI resources starting at 5f5a000 (gap: 5f5a000:fa0a6000)
NR_CPUS:256 nr_cpumask_bits:256 nr_cpu_ids:64 nr_node_ids:8
PERCPU: Embedded 11 pages/cpu @c2400000 s21400 r0 d23656 u65536
pcpu-alloc: s21400 r0 d23656 u65536 alloc=1*2097152
pcpu-alloc: [0] 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 
pcpu-alloc: [0] 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 
Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 15675
Policy zone: Normal
Kernel command line: root=LABEL=root-dlymifpo apic=debug debug ro console=tty0 console=ttyS0,115200n8 irqpoll maxcpus=1 reset_devices kdump-xenversion=4.1.0 kdump-linuxversion=2.6.32.12-0.7.1.xs5.9.950.478.170651xen memmap=exactmap memmap=640K@0K memmap=64872K@32768K elfcorehdr=97640K
Misrouted IRQ fixup and polling support enabled
This may significantly impact system performance
PID hash table entries: 256 (order: -2, 1024 bytes)
Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)
Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)
Enabling fast FPU save and restore... done.
Enabling unmasked SIMD FPU exception support... done.
Initializing CPU#0
Initializing HighMem for node 0 (00000000:00000000)
Memory: 51488k/97640k available (2370k kernel code, 14020k reserved, 895k data, 356k init, 0k highmem)
virtual kernel memory layout:
    fixmap  : 0xfebb7000 - 0xfffff000   (20768 kB)
    pkmap   : 0xfe600000 - 0xfe800000   (2048 kB)
    vmalloc : 0xc675a000 - 0xfe5fe000   ( 894 MB)
    lowmem  : 0xc0000000 - 0xc5f5a000   (  95 MB)
      .init : 0xc2331000 - 0xc238a000   ( 356 kB)
      .data : 0xc2250b43 - 0xc2330998   ( 895 kB)
      .text : 0xc2000000 - 0xc2250b43   (2370 kB)
Checking if this processor honours the WP bit even in supervisor mode...Ok.
Hierarchical RCU implementation.
NR_IRQS:2304 nr_irqs:1736
Extended CMOS year: 2000
Console: colour VGA+ 80x25
console [tty0] enabled
console [ttyS0] enabled
Fast TSC calibration using PIT
Detected 1995.399 MHz processor.
Calibrating delay loop (skipped), value calculated using timer frequency.. 3990.79 BogoMIPS (lpj=19953990)
pid_max: default: 32768 minimum: 512
Security Framework initialized
Mount-cache hash table entries: 512
CPU: Physical Processor ID: 1
CPU: Processor Core ID: 3
using mwait in idle threads.
Checking 'hlt' instruction... OK.
SMP alternatives: switching to UP code
ACPI: Core revision 20090903
Not enabling x2apic, Intr-remapping init failed.
Overriding APIC driver with bigsmp
Enabling APIC mode:  Physflat.  Using 3 I/O APICs
Getting VERSION: 60015
Getting VERSION: 60015
Getting ID: 26000000
Getting ID: 26000000
enabled ExtINT on CPU#0
Leaving ESR disabled.
Mapping cpu 0 to node 0
ENABLING IO-APIC IRQs
init IO_APIC IRQs
 8-0 (apicid-pin) not connected
IOAPIC[0]: Set routing entry (8-1 -> 0x31 -> IRQ 1 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-2 -> 0x30 -> IRQ 0 Mode:0 Active:0)
IOAPIC[0]: Set routing entry (8-3[disconnect]
^[]0;root@ubuntu:~\a[root@ubuntu ~]# exit

Script done on Mon 06 Jun 2011 06:52:08 AM PDT

[-- Attachment #3: Type: text/plain, Size: 138 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: IOMMU Interrupt Remapping query
  2011-06-06 14:32 IOMMU Interrupt Remapping query Andrew Cooper
@ 2011-06-06 15:21 ` Keir Fraser
  2011-06-06 16:37   ` Andrew Cooper
  0 siblings, 1 reply; 6+ messages in thread
From: Keir Fraser @ 2011-06-06 15:21 UTC (permalink / raw)
  To: Andrew Cooper, xen-devel@lists.xensource.com; +Cc: weidong.han

On 06/06/2011 15:32, "Andrew Cooper" <andrew.cooper3@citrix.com> wrote:

> I am attempting to fix the kexec interactions with x2apic and iommu
> functionality.  Part of this involves ensuring that all IOMMU
> functionality is disabled, as the kdump kernels are not happy at having
> their interrupts remapped without their knowledge.
> 
> I have introduced iommu_disable_x2apic_IR() onto the kexec path, but it
> does not seem to actually disable interrupt remapping on Intel boxes
> (Specifically the two Intel Nehalem boxes I am testing on).
> 
> Specifying iommu=no-intremap on the commandline causes everything to
> work correctly, but leaving it out causes the kdump kernel to hang and
> eventually reboot, as can be seen on the attached serial log.
> 
> The lines starting DBG: are extra debugging I have put in which shows
> that the disable_IR() function is being called and writing to the registers.

Should have attached your patch as well. Noone else can know with certainty
where you put your debugging, and noone else is going to want to help debug
your code if they can't even see it. :-)

Also a good idea to Cc a likely person who can help (i.e., someone who wrote
the code that you are querying). 'hg annotate' is useful for this -- in this
case I am adding Weidong Han to the cc list.

On the bright side, this must have been got working for S3 suspend/resume to
work properly (indeed that's what the disable code was originally added
for). So it can't be an insurmountable problem.

 -- Keir

> This problem occurs with the XenServer version of 4.1.0 as well as on
> xen-unstable at the moment.
> 
> Is there any hardware state which is not taken down by the disable
> function, any subtle interactions which I have not taken account of?  I
> have looked through the source and nothing pops out, but I am out of ideas.
> 
> Thanks in advance,

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: IOMMU Interrupt Remapping query
  2011-06-06 15:21 ` Keir Fraser
@ 2011-06-06 16:37   ` Andrew Cooper
  2011-06-06 18:45     ` Keir Fraser
  2011-06-06 18:53     ` Keir Fraser
  0 siblings, 2 replies; 6+ messages in thread
From: Andrew Cooper @ 2011-06-06 16:37 UTC (permalink / raw)
  To: Keir Fraser; +Cc: xen-devel@lists.xensource.com, weidong.han@intel.com

[-- Attachment #1: Type: text/plain, Size: 2783 bytes --]



On 06/06/11 16:21, Keir Fraser wrote:
> On 06/06/2011 15:32, "Andrew Cooper" <andrew.cooper3@citrix.com> wrote:
>
>> I am attempting to fix the kexec interactions with x2apic and iommu
>> functionality.  Part of this involves ensuring that all IOMMU
>> functionality is disabled, as the kdump kernels are not happy at having
>> their interrupts remapped without their knowledge.
>>
>> I have introduced iommu_disable_x2apic_IR() onto the kexec path, but it
>> does not seem to actually disable interrupt remapping on Intel boxes
>> (Specifically the two Intel Nehalem boxes I am testing on).
>>
>> Specifying iommu=no-intremap on the commandline causes everything to
>> work correctly, but leaving it out causes the kdump kernel to hang and
>> eventually reboot, as can be seen on the attached serial log.
>>
>> The lines starting DBG: are extra debugging I have put in which shows
>> that the disable_IR() function is being called and writing to the registers.
> Should have attached your patch as well. Noone else can know with certainty
> where you put your debugging, and noone else is going to want to help debug
> your code if they can't even see it. :-)
>
> Also a good idea to Cc a likely person who can help (i.e., someone who wrote
> the code that you are querying). 'hg annotate' is useful for this -- in this
> case I am adding Weidong Han to the cc list.
>
> On the bright side, this must have been got working for S3 suspend/resume to
> work properly (indeed that's what the disable code was originally added
> for). So it can't be an insurmountable problem.
>
>  -- Keir
>
>> This problem occurs with the XenServer version of 4.1.0 as well as on
>> xen-unstable at the moment.
>>
>> Is there any hardware state which is not taken down by the disable
>> function, any subtle interactions which I have not taken account of?  I
>> have looked through the source and nothing pops out, but I am out of ideas.
>>
>> Thanks in advance,
>
Attached are the two relevant patches, and two which I don't think are
relevant but might be if I am wrong.  crash_shutdown was an attempt to
make an iommu_ops which shut down all iommu functionality without saving
state.  debug-wip shows where I have put in debug statements.

kdump-fix-x2apic and apic-record-boot-mode are also in the source, but I
believe them to be unrelated to the current problem.

I have done some further debugging on the assumption that the order of
shutting down interupt remapping matters with shutting down the lapics
and ioapics, but disable_qinval causes a panic (qinval.c:222 - "queue
invalidate wait descriptor was not executed\n") if it is run before both
the lapics and ioapics are shut down.

-- 
Andrew Cooper - Dom0 Kernel Engineer, Citrix XenServer
T: +44 (0)1223 225 900, http://www.citrix.com


[-- Attachment #2: crash_shutdown_iommu_ops.patch --]
[-- Type: text/x-patch, Size: 4409 bytes --]

IOMMU: add crash_shutdown iommu_op

The kdump kernel has problems booting with interrupt/dma
remapping enabled, so we need a new iommu_ops called
crash_shutdown which is basically suspend but doesn't
need to bother saving state.

We make sure that crash_shutdown is called on the kexec
path.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

diff -r 09344e4f7cde xen/arch/x86/crash.c
--- a/xen/arch/x86/crash.c	Thu May 26 16:51:35 2011 +0100
+++ b/xen/arch/x86/crash.c	Thu May 26 17:00:40 2011 +0100
@@ -89,6 +89,10 @@ void machine_crash_shutdown(void)
 
     nmi_shootdown_cpus();
 
+    /* Crash shutdown any IOMMU functionality as the crashdump kernel is not
+     * happy when booting if interrupt/dma remapping is still enabled */
+    iommu_crash_shutdown();
+
     info = kexec_crash_save_info();
     info->xen_phys_start = xen_phys_start;
     info->dom0_pfn_to_mfn_frame_list_list =
diff -r 09344e4f7cde xen/drivers/passthrough/amd/iommu_init.c
--- a/xen/drivers/passthrough/amd/iommu_init.c	Thu May 26 16:51:35 2011 +0100
+++ b/xen/drivers/passthrough/amd/iommu_init.c	Thu May 26 17:00:40 2011 +0100
@@ -923,6 +923,14 @@ void amd_iommu_suspend(void)
         disable_iommu(iommu);
 }
 
+void amd_iommu_crash_shutdown(void)
+{
+    struct amd_iommu *iommu;
+
+    for_each_amd_iommu ( iommu )
+        disable_iommu(iommu);
+}
+
 void amd_iommu_resume(void)
 {
     struct amd_iommu *iommu;
diff -r 09344e4f7cde xen/drivers/passthrough/amd/pci_amd_iommu.c
--- a/xen/drivers/passthrough/amd/pci_amd_iommu.c	Thu May 26 16:51:35 2011 +0100
+++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c	Thu May 26 17:00:40 2011 +0100
@@ -455,4 +455,5 @@ const struct iommu_ops amd_iommu_ops = {
     .read_msi_from_ire = amd_iommu_read_msi_from_ire,
     .suspend = amd_iommu_suspend,
     .resume = amd_iommu_resume,
+    .crash_shutdown = amd_iommu_crash_shutdown,
 };
diff -r 09344e4f7cde xen/drivers/passthrough/iommu.c
--- a/xen/drivers/passthrough/iommu.c	Thu May 26 16:51:35 2011 +0100
+++ b/xen/drivers/passthrough/iommu.c	Thu May 26 17:00:40 2011 +0100
@@ -419,6 +419,15 @@ void iommu_suspend(void)
         ops->suspend();
 }
 
+void iommu_crash_shutdown(void)
+{
+    const struct iommu_ops *ops = iommu_get_ops();
+    if ( ops && ops->crash_shutdown )
+        ops->crash_shutdown();
+}
+
+
+
 /*
  * Local variables:
  * mode: C
diff -r 09344e4f7cde xen/drivers/passthrough/vtd/iommu.c
--- a/xen/drivers/passthrough/vtd/iommu.c	Thu May 26 16:51:35 2011 +0100
+++ b/xen/drivers/passthrough/vtd/iommu.c	Thu May 26 17:00:40 2011 +0100
@@ -2261,6 +2261,25 @@ static void vtd_suspend(void)
     }
 }
 
+static void vtd_crash_shutdown(void)
+{
+    struct acpi_drhd_unit *drhd;
+    struct iommu *iommu;
+
+    if ( !iommu_enabled )
+        return;
+
+    iommu_flush_all();
+
+    for_each_drhd_unit ( drhd )
+    {
+        iommu = drhd->iommu;
+        iommu_disable_translation(iommu);
+    }
+
+    iommu_disable_IR();
+}
+
 static void vtd_resume(void)
 {
     struct acpi_drhd_unit *drhd;
@@ -2311,6 +2330,7 @@ const struct iommu_ops intel_iommu_ops =
     .read_msi_from_ire = msi_msg_read_remap_rte,
     .suspend = vtd_suspend,
     .resume = vtd_resume,
+    .crash_shutdown = vtd_crash_shutdown,
 };
 
 /*
diff -r 09344e4f7cde xen/include/asm-x86/hvm/svm/amd-iommu-proto.h
--- a/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h	Thu May 26 16:51:35 2011 +0100
+++ b/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h	Thu May 26 17:00:40 2011 +0100
@@ -91,6 +91,7 @@ unsigned int amd_iommu_read_ioapic_from_
 /* power management support */
 void amd_iommu_resume(void);
 void amd_iommu_suspend(void);
+void amd_iommu_crash_shutdown(void);
 
 static inline u32 get_field_from_reg_u32(u32 reg_value, u32 mask, u32 shift)
 {
diff -r 09344e4f7cde xen/include/xen/iommu.h
--- a/xen/include/xen/iommu.h	Thu May 26 16:51:35 2011 +0100
+++ b/xen/include/xen/iommu.h	Thu May 26 17:00:40 2011 +0100
@@ -133,6 +133,7 @@ struct iommu_ops {
     unsigned int (*read_apic_from_ire)(unsigned int apic, unsigned int reg);
     void (*suspend)(void);
     void (*resume)(void);
+    void (*crash_shutdown)(void);
 };
 
 void iommu_update_ire_from_apic(unsigned int apic, unsigned int reg, unsigned int value);
@@ -142,6 +143,7 @@ unsigned int iommu_read_apic_from_ire(un
 
 void iommu_suspend(void);
 void iommu_resume(void);
+void iommu_crash_shutdown(void);
 
 void iommu_set_dom0_mapping(struct domain *d);
 

[-- Attachment #3: debug-wip --]
[-- Type: text/plain, Size: 4505 bytes --]

# HG changeset patch
# Parent 80448ec3e90ba0a66a495cd6b42f6dec348b5e26

diff -r 80448ec3e90b xen/arch/x86/apic.c
--- a/xen/arch/x86/apic.c	Mon Jun 06 10:09:16 2011 +0100
+++ b/xen/arch/x86/apic.c	Mon Jun 06 14:06:31 2011 +0100
@@ -367,12 +367,15 @@ void disable_local_APIC(void)
         switch(apic_boot_mode)
         {
         case APIC_MODE_DISABLED:
+            printk("DBG: Returning APIC to disabled\n");
             break; /* Nothing to do - we did this above */
         case APIC_MODE_XAPIC:
+            printk("DBG: Returning APIC to xapic\n");
             msr_content |= MSR_IA32_APICBASE_ENABLE;
             wrmsrl(MSR_IA32_APICBASE, msr_content);
             break;
         case APIC_MODE_X2APIC:
+            printk("DBG: Returning APIC to x2apic\n");
             msr_content |= ( MSR_IA32_APICBASE_ENABLE | MSR_IA32_APICBASE_EXTD );
             wrmsrl(MSR_IA32_APICBASE, msr_content);
             break;
diff -r 80448ec3e90b xen/arch/x86/crash.c
--- a/xen/arch/x86/crash.c	Mon Jun 06 10:09:16 2011 +0100
+++ b/xen/arch/x86/crash.c	Mon Jun 06 14:06:31 2011 +0100
@@ -101,7 +101,15 @@ void machine_crash_shutdown(void)
 
     /* Crash shutdown any IOMMU functionality as the crashdump kernel is not
      * happy when booting if interrupt/dma remapping is still enabled */
-    iommu_crash_shutdown();
+    /* printk("DBG: About to attempt an iommu_crash_shutdown\n"); */
+    /* iommu_crash_shutdown(); */
+    /* printk("DBG: Supposedly done an iommu_crash_shutdown\n"); */
+
+    printk("DBG: About to suspend and disable IR\n");
+    iommu_suspend();
+    iommu_disable_IR();
+    printk("DBG: Done suspending and disabling IR\n");
+
 
     info = kexec_crash_save_info();
     info->xen_phys_start = xen_phys_start;
diff -r 80448ec3e90b xen/drivers/passthrough/amd/iommu_init.c
--- a/xen/drivers/passthrough/amd/iommu_init.c	Mon Jun 06 10:09:16 2011 +0100
+++ b/xen/drivers/passthrough/amd/iommu_init.c	Mon Jun 06 14:06:31 2011 +0100
@@ -927,6 +927,8 @@ void amd_iommu_crash_shutdown(void)
 {
     struct amd_iommu *iommu;
 
+    printk("DBG: In amd_iommu_crash_shutdown\n");
+
     for_each_amd_iommu ( iommu )
         disable_iommu(iommu);
 }
diff -r 80448ec3e90b xen/drivers/passthrough/iommu.c
--- a/xen/drivers/passthrough/iommu.c	Mon Jun 06 10:09:16 2011 +0100
+++ b/xen/drivers/passthrough/iommu.c	Mon Jun 06 14:06:31 2011 +0100
@@ -422,6 +422,7 @@ void iommu_suspend(void)
 void iommu_crash_shutdown(void)
 {
     const struct iommu_ops *ops = iommu_get_ops();
+    printk("DBG: In iommu_crash_shutdown\n");
     if ( ops && ops->crash_shutdown )
         ops->crash_shutdown();
 }
diff -r 80448ec3e90b xen/drivers/passthrough/vtd/intremap.c
--- a/xen/drivers/passthrough/vtd/intremap.c	Mon Jun 06 10:09:16 2011 +0100
+++ b/xen/drivers/passthrough/vtd/intremap.c	Mon Jun 06 14:06:31 2011 +0100
@@ -804,8 +804,13 @@ void disable_intremap(struct iommu *iomm
     u32 sts;
     unsigned long flags;
 
+    printk("DBG: in disable_intremap\n");
+n
     if ( !ecap_intr_remap(iommu->ecap) )
+    {
+        printk("DBG: BAIL - failed ecap\n");
         return;
+    }
 
     spin_lock_irqsave(&iommu->register_lock, flags);
     sts = dmar_readl(iommu->reg, DMAR_GSTS_REG);
@@ -813,7 +818,7 @@ void disable_intremap(struct iommu *iomm
         goto out;
 
     dmar_writel(iommu->reg, DMAR_GCMD_REG, sts & (~DMA_GCMD_IRE));
-
+    printk("DBG: written to DMAR\n");
     IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG, dmar_readl,
                   !(sts & DMA_GSTS_IRES), sts);
 out:
@@ -885,8 +890,14 @@ void iommu_disable_IR(void)
 {
     struct acpi_drhd_unit *drhd;
 
+    printk("DBG: in iommu_disable_IR\n");
+
     if ( !iommu_supports_eim() )
+    {
+        printk("DBG: BAIL - not supporting EIM\n");
         return;
+    }
+
 
     for_each_drhd_unit ( drhd )
         disable_intremap(drhd->iommu);
diff -r 80448ec3e90b xen/drivers/passthrough/vtd/iommu.c
--- a/xen/drivers/passthrough/vtd/iommu.c	Mon Jun 06 10:09:16 2011 +0100
+++ b/xen/drivers/passthrough/vtd/iommu.c	Mon Jun 06 14:06:31 2011 +0100
@@ -2266,13 +2266,19 @@ static void vtd_crash_shutdown(void)
     struct acpi_drhd_unit *drhd;
     struct iommu *iommu;
 
+    printk("DBG: Starting vtd_crash_shutdown\n");
+
     if ( !iommu_enabled )
         return;
 
+    printk("DBG: iommu_enabled was true\n");
+
     iommu_flush_all();
 
     for_each_drhd_unit ( drhd )
     {
+        printk("DBG: in for_each_drhd_unit\n");
+
         iommu = drhd->iommu;
         iommu_disable_translation(iommu);
     }

[-- Attachment #4: apic-record-boot-mode.patch --]
[-- Type: text/x-patch, Size: 4264 bytes --]

APIC: record local APIC state on boot

Xen does not store the boot local APIC state which leads to problems
when shutting down for a kexec jump.  This patch records the boot
state so we can return to the boot state when kexecing.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

diff -r b0efa9e0087a xen/arch/x86/apic.c
--- a/xen/arch/x86/apic.c	Fri Jun 03 13:22:33 2011 +0100
+++ b/xen/arch/x86/apic.c	Mon Jun 06 10:09:12 2011 +0100
@@ -74,6 +74,8 @@ int apic_verbosity;
 static bool_t __initdata opt_x2apic = 1;
 boolean_param("x2apic", opt_x2apic);
 
+enum apic_mode apic_boot_mode = APIC_MODE_INVALID;
+
 bool_t __read_mostly x2apic_enabled = 0;
 bool_t __read_mostly directed_eoi_enabled = 0;
 
@@ -1482,6 +1484,61 @@ int __init APIC_init_uniprocessor (void)
     return 0;
 }
 
+/* Needs to be called during startup.  It records the state the BIOS
+ * leaves the local APIC so we can undo upon kexec.
+ */
+void __init record_boot_APIC_mode(void)
+{
+    /* Sanity check - we should only ever run once, but could possibly be called
+     * several times */
+    if ( APIC_MODE_INVALID != apic_boot_mode )
+        return;
+
+    apic_boot_mode = current_local_apic_mode();
+
+    apic_printk(APIC_DEBUG, "APIC boot state is '%s'\n", apic_mode_to_str(apic_boot_mode));
+}
+
+/* Look at the bits in MSR_IA32_APICBASE and work out which APIC mode we are in */
+enum apic_mode current_local_apic_mode(void)
+{
+    u64 msr_contents;
+
+    rdmsrl(MSR_IA32_APICBASE, msr_contents);
+
+    /* Reading EXTD bit from the MSR is only valid if CPUID says so, else reserved */
+    if ( cpu_has(&current_cpu_data, X86_FEATURE_X2APIC)
+         && (msr_contents & MSR_IA32_APICBASE_EXTD) )
+        return APIC_MODE_X2APIC;
+    else
+        {
+            /* EN bit should always be valid as long as we can read the MSR
+             */
+            if ( msr_contents & MSR_IA32_APICBASE_ENABLE )
+                return APIC_MODE_XAPIC;
+            else
+                return APIC_MODE_DISABLED;
+        }
+}
+
+
+const char * apic_mode_to_str(const enum apic_mode mode)
+{
+    switch(mode)
+        {
+        case APIC_MODE_INVALID:
+            return "invalid";
+        case APIC_MODE_DISABLED:
+            return "disabled";
+        case APIC_MODE_XAPIC:
+            return "xapic";
+        case APIC_MODE_X2APIC:
+            return "x2apic";
+        default:
+            return "unrecognised";
+        }
+}
+
 void check_for_unexpected_msi(unsigned int vector)
 {
     unsigned long v = apic_read(APIC_ISR + ((vector & ~0x1f) >> 1));
diff -r b0efa9e0087a xen/arch/x86/genapic/probe.c
--- a/xen/arch/x86/genapic/probe.c	Fri Jun 03 13:22:33 2011 +0100
+++ b/xen/arch/x86/genapic/probe.c	Mon Jun 06 10:09:12 2011 +0100
@@ -61,6 +61,8 @@ void __init generic_apic_probe(void)
 { 
 	int i, changed;
 
+	record_boot_APIC_mode();
+
 	check_x2apic_preenabled();
 	cmdline_apic = changed = (genapic != NULL);
 
diff -r b0efa9e0087a xen/include/asm-x86/apic.h
--- a/xen/include/asm-x86/apic.h	Fri Jun 03 13:22:33 2011 +0100
+++ b/xen/include/asm-x86/apic.h	Mon Jun 06 10:09:12 2011 +0100
@@ -21,6 +21,21 @@
 #define IO_APIC_REDIR_DEST_LOGICAL	0x00800
 #define IO_APIC_REDIR_DEST_PHYSICAL	0x00000
 
+/* Possible APIC states */
+enum apic_mode { APIC_MODE_INVALID,  /* Not set yet */
+                 APIC_MODE_DISABLED, /* If uniprocessor, or smp in uniprocessor mode */
+                 APIC_MODE_XAPIC,    /* xAPIC mode - default upon chipset reset */
+                 APIC_MODE_X2APIC    /* x2APIC mode - common for large smp machines */
+};
+
+/* Bootstrap processor local APIC boot mode - so we can undo our changes to the APIC state */
+extern enum apic_mode apic_boot_mode;
+
+/* enum apic_mode -> str function for logging/debug */
+const char * apic_mode_to_str(const enum apic_mode);
+
+
+
 extern int apic_verbosity;
 extern bool_t x2apic_enabled;
 extern bool_t directed_eoi_enabled;
@@ -206,6 +221,8 @@ extern void disable_APIC_timer(void);
 extern void enable_APIC_timer(void);
 extern int lapic_suspend(void);
 extern int lapic_resume(void);
+extern void record_boot_APIC_mode(void);
+extern enum apic_mode current_local_apic_mode(void);
 
 extern int check_nmi_watchdog (void);
 extern void enable_NMI_through_LVT0 (void * dummy);

[-- Attachment #5: kexec-fix-x2apic.patch --]
[-- Type: text/x-patch, Size: 5347 bytes --]

KEXEC: correctly revert x2apic state when kexecing

Introduce the boolean variable 'kexecing' which indicates to
the more general functions whether we are on the kexec path
or not.  This is used by disable_local_APIC() to try and revert
the APIC mode back to how it was found on boot, and used by
hpet_disable_legacy_broadcast() to prevent it IPI'ing the
other processors after they have already been shot down.

We also need some fudging of the x2apic_enabled variable
to prevent a protection fault when disabling the IOAPICs.

Finally, make sure we dont jump into the purgatory code with
interupts enabled.  We dont want to be servicing stray
interupts once we are out of Xen.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

diff -r c656613b1e73 xen/arch/x86/apic.c
--- a/xen/arch/x86/apic.c	Fri Jun 03 13:22:33 2011 +0100
+++ b/xen/arch/x86/apic.c	Fri Jun 03 16:19:00 2011 +0100
@@ -37,6 +37,7 @@
 #include <asm/asm_defns.h> /* for BUILD_SMP_INTERRUPT */
 #include <mach_apic.h>
 #include <io_ports.h>
+#include <xen/kexec.h>
 
 static bool_t tdt_enabled __read_mostly;
 static bool_t tdt_enable __initdata = 1;
@@ -356,6 +357,32 @@ void disable_local_APIC(void)
         wrmsrl(MSR_IA32_APICBASE, msr_content &
                ~(MSR_IA32_APICBASE_ENABLE|MSR_IA32_APICBASE_EXTD));
     }
+
+    if (kexecing){
+        uint64_t msr_content;
+        rdmsrl(MSR_IA32_APICBASE, msr_content);
+        msr_content &= ~ ( MSR_IA32_APICBASE_ENABLE | MSR_IA32_APICBASE_EXTD );
+        wrmsrl(MSR_IA32_APICBASE, msr_content);
+
+        switch(apic_boot_mode)
+        {
+        case APIC_MODE_DISABLED:
+            break; /* Nothing to do - we did this above */
+        case APIC_MODE_XAPIC:
+            msr_content |= MSR_IA32_APICBASE_ENABLE;
+            wrmsrl(MSR_IA32_APICBASE, msr_content);
+            break;
+        case APIC_MODE_X2APIC:
+            msr_content |= ( MSR_IA32_APICBASE_ENABLE | MSR_IA32_APICBASE_EXTD );
+            wrmsrl(MSR_IA32_APICBASE, msr_content);
+            break;
+        default:
+            printk("Hit default case when reverting lapic to boot state on core #%d\n",
+                   smp_processor_id());
+            break;
+        }
+    }
+
 }
 
 extern int ioapic_ack_new;
diff -r c656613b1e73 xen/arch/x86/crash.c
--- a/xen/arch/x86/crash.c	Fri Jun 03 13:22:33 2011 +0100
+++ b/xen/arch/x86/crash.c	Fri Jun 03 16:19:00 2011 +0100
@@ -27,6 +27,7 @@
 #include <asm/hvm/support.h>
 #include <asm/apic.h>
 #include <asm/io_apic.h>
+#include <xen/iommu.h>
 
 static atomic_t waiting_for_crash_ipi;
 static unsigned int crashing_cpu;
@@ -78,6 +79,15 @@ static void nmi_shootdown_cpus(void)
     }
 
     __stop_this_cpu();
+
+    /* This is a bit of a hack due to the problems with the x2apic_enabled
+     * variable, but we can't do any better without a significant refactoring
+     * of the APIC code */
+    if ( current_local_apic_mode() == APIC_MODE_X2APIC )
+        x2apic_enabled = 1;
+    else
+        x2apic_enabled = 0;
+
     disable_IO_APIC();
 
     local_irq_restore(flags);
diff -r c656613b1e73 xen/arch/x86/hpet.c
--- a/xen/arch/x86/hpet.c	Fri Jun 03 13:22:33 2011 +0100
+++ b/xen/arch/x86/hpet.c	Fri Jun 03 16:19:00 2011 +0100
@@ -663,7 +663,8 @@ void hpet_disable_legacy_broadcast(void)
 
     spin_unlock_irqrestore(&legacy_hpet_event.lock, flags);
 
-    smp_send_event_check_mask(&cpu_online_map);
+    if (! kexecing)
+        smp_send_event_check_mask(&cpu_online_map);
 }
 
 void hpet_broadcast_enter(void)
diff -r c656613b1e73 xen/arch/x86/machine_kexec.c
--- a/xen/arch/x86/machine_kexec.c	Fri Jun 03 13:22:33 2011 +0100
+++ b/xen/arch/x86/machine_kexec.c	Fri Jun 03 16:19:00 2011 +0100
@@ -99,6 +99,11 @@ void machine_kexec(xen_kexec_image_t *im
     if ( hpet_broadcast_is_available() )
         hpet_disable_legacy_broadcast();
 
+    /* We are about to permenantly jump out of the Xen context into the kexec
+     * purgatory code.  We really dont want to be still servicing interupts.
+     */
+    local_irq_disable();
+
     /*
      * compat_machine_kexec() returns to idle pagetables, which requires us
      * to be running on a static GDT mapping (idle pagetables have no GDT
diff -r c656613b1e73 xen/common/kexec.c
--- a/xen/common/kexec.c	Fri Jun 03 13:22:33 2011 +0100
+++ b/xen/common/kexec.c	Fri Jun 03 16:19:00 2011 +0100
@@ -29,6 +29,8 @@
 #include <compat/kexec.h>
 #endif
 
+bool_t kexecing = FALSE;
+
 static DEFINE_PER_CPU_READ_MOSTLY(void *, crash_notes);
 
 static Elf_Note *xen_crash_note;
@@ -238,6 +240,8 @@ void kexec_crash(void)
     if ( !test_bit(KEXEC_IMAGE_CRASH_BASE + pos, &kexec_flags) )
         return;
 
+    kexecing = TRUE;
+
     kexec_common_shutdown();
     kexec_crash_save_cpu();
     machine_crash_shutdown();
@@ -250,6 +254,8 @@ static long kexec_reboot(void *_image)
 {
     xen_kexec_image_t *image = _image;
 
+    kexecing = TRUE;
+
     kexec_common_shutdown();
     machine_reboot_kexec(image);
 
diff -r c656613b1e73 xen/include/xen/kexec.h
--- a/xen/include/xen/kexec.h	Fri Jun 03 13:22:33 2011 +0100
+++ b/xen/include/xen/kexec.h	Fri Jun 03 16:19:00 2011 +0100
@@ -12,6 +12,8 @@ typedef struct xen_kexec_reserve {
 
 extern xen_kexec_reserve_t kexec_crash_area;
 
+extern bool_t kexecing;
+
 void set_kexec_crash_area_size(u64 system_ram);
 
 /* We have space for 4 images to support atomic update

[-- Attachment #6: Type: text/plain, Size: 138 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: IOMMU Interrupt Remapping query
  2011-06-06 16:37   ` Andrew Cooper
@ 2011-06-06 18:45     ` Keir Fraser
  2011-06-06 18:53     ` Keir Fraser
  1 sibling, 0 replies; 6+ messages in thread
From: Keir Fraser @ 2011-06-06 18:45 UTC (permalink / raw)
  To: Andrew Cooper; +Cc: xen-devel@lists.xensource.com, Kay, Allen M

On 06/06/2011 17:37, "Andrew Cooper" <andrew.cooper3@citrix.com> wrote:
> On 06/06/11 16:21, Keir Fraser wrote:
>> On 06/06/2011 15:32, "Andrew Cooper" <andrew.cooper3@citrix.com> wrote:
>> 
>>> I am attempting to fix the kexec interactions with x2apic and iommu
>>> functionality.  Part of this involves ensuring that all IOMMU
>>> functionality is disabled, as the kdump kernels are not happy at having
>>> their interrupts remapped without their knowledge.
>>> 
>>> I have introduced iommu_disable_x2apic_IR() onto the kexec path, but it
>>> does not seem to actually disable interrupt remapping on Intel boxes
>>> (Specifically the two Intel Nehalem boxes I am testing on).
>>> 
>>> Specifying iommu=no-intremap on the commandline causes everything to
>>> work correctly, but leaving it out causes the kdump kernel to hang and
>>> eventually reboot, as can be seen on the attached serial log.
>>> 
>>> The lines starting DBG: are extra debugging I have put in which shows
>>> that the disable_IR() function is being called and writing to the registers.
>> Should have attached your patch as well. Noone else can know with certainty
>> where you put your debugging, and noone else is going to want to help debug
>> your code if they can't even see it. :-)
>> 
>> Also a good idea to Cc a likely person who can help (i.e., someone who wrote
>> the code that you are querying). 'hg annotate' is useful for this -- in this
>> case I am adding Weidong Han to the cc list.
>> 
>> On the bright side, this must have been got working for S3 suspend/resume to
>> work properly (indeed that's what the disable code was originally added
>> for). So it can't be an insurmountable problem.
>> 
>>  -- Keir
>> 
>>> This problem occurs with the XenServer version of 4.1.0 as well as on
>>> xen-unstable at the moment.
>>> 
>>> Is there any hardware state which is not taken down by the disable
>>> function, any subtle interactions which I have not taken account of?  I
>>> have looked through the source and nothing pops out, but I am out of ideas.
>>> 
>>> Thanks in advance,
>> 
> Attached are the two relevant patches, and two which I don't think are
> relevant but might be if I am wrong.  crash_shutdown was an attempt to
> make an iommu_ops which shut down all iommu functionality without saving
> state.  debug-wip shows where I have put in debug statements.
> 
> kdump-fix-x2apic and apic-record-boot-mode are also in the source, but I
> believe them to be unrelated to the current problem.
> 
> I have done some further debugging on the assumption that the order of
> shutting down interupt remapping matters with shutting down the lapics
> and ioapics, but disable_qinval causes a panic (qinval.c:222 - "queue
> invalidate wait descriptor was not executed\n") if it is run before both
> the lapics and ioapics are shut down.

By the way, Weidong's email is dead. Cc'ing Allen Kay (the VT-d maintainer)
instead.

 -- Keir

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: IOMMU Interrupt Remapping query
  2011-06-06 16:37   ` Andrew Cooper
  2011-06-06 18:45     ` Keir Fraser
@ 2011-06-06 18:53     ` Keir Fraser
  2011-06-07  8:44       ` Andrew Cooper
  1 sibling, 1 reply; 6+ messages in thread
From: Keir Fraser @ 2011-06-06 18:53 UTC (permalink / raw)
  To: Andrew Cooper; +Cc: xen-devel@lists.xensource.com, Kay, Allen M

On 06/06/2011 17:37, "Andrew Cooper" <andrew.cooper3@citrix.com> wrote:

> On 06/06/11 16:21, Keir Fraser wrote:
>> On 06/06/2011 15:32, "Andrew Cooper" <andrew.cooper3@citrix.com> wrote:
>> 
>> 
>>> This problem occurs with the XenServer version of 4.1.0 as well as on
>>> xen-unstable at the moment.
>>> 
>>> Is there any hardware state which is not taken down by the disable
>>> function, any subtle interactions which I have not taken account of?  I
>>> have looked through the source and nothing pops out, but I am out of ideas.
>>> 
>>> Thanks in advance,
>> 
> Attached are the two relevant patches, and two which I don't think are
> relevant but might be if I am wrong.  crash_shutdown was an attempt to
> make an iommu_ops which shut down all iommu functionality without saving
> state.  debug-wip shows where I have put in debug statements.

I think what you need to do ought to be quite similar to the teardown we do
for S3 suspend. Have you considered reusing some of the mechanism in
arch/x86/acpi/power.c? The function device_power_down(), and possibly some
other bits in its caller, would be especially useful I should think. It
already shuts down iommu functionality, turns off x2apic, etc etc. Even if
it is not a perfect fit as is, perhaps it could be fixed up -- it sure looks
similar to what ypu're trying to do. :-)

 -- Keir

> kdump-fix-x2apic and apic-record-boot-mode are also in the source, but I
> believe them to be unrelated to the current problem.
> 
> I have done some further debugging on the assumption that the order of
> shutting down interupt remapping matters with shutting down the lapics
> and ioapics, but disable_qinval causes a panic (qinval.c:222 - "queue
> invalidate wait descriptor was not executed\n") if it is run before both
> the lapics and ioapics are shut down.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: IOMMU Interrupt Remapping query
  2011-06-06 18:53     ` Keir Fraser
@ 2011-06-07  8:44       ` Andrew Cooper
  0 siblings, 0 replies; 6+ messages in thread
From: Andrew Cooper @ 2011-06-07  8:44 UTC (permalink / raw)
  To: Keir Fraser; +Cc: xen-devel@lists.xensource.com, Kay, Allen M



On 06/06/11 19:53, Keir Fraser wrote:
> On 06/06/2011 17:37, "Andrew Cooper" <andrew.cooper3@citrix.com> wrote:
>
>> On 06/06/11 16:21, Keir Fraser wrote:
>>> On 06/06/2011 15:32, "Andrew Cooper" <andrew.cooper3@citrix.com> wrote:
>>>
>>>
>>>> This problem occurs with the XenServer version of 4.1.0 as well as on
>>>> xen-unstable at the moment.
>>>>
>>>> Is there any hardware state which is not taken down by the disable
>>>> function, any subtle interactions which I have not taken account of?  I
>>>> have looked through the source and nothing pops out, but I am out of ideas.
>>>>
>>>> Thanks in advance,
>> Attached are the two relevant patches, and two which I don't think are
>> relevant but might be if I am wrong.  crash_shutdown was an attempt to
>> make an iommu_ops which shut down all iommu functionality without saving
>> state.  debug-wip shows where I have put in debug statements.
> I think what you need to do ought to be quite similar to the teardown we do
> for S3 suspend. Have you considered reusing some of the mechanism in
> arch/x86/acpi/power.c? The function device_power_down(), and possibly some
> other bits in its caller, would be especially useful I should think. It
> already shuts down iommu functionality, turns off x2apic, etc etc. Even if
> it is not a perfect fit as is, perhaps it could be fixed up -- it sure looks
> similar to what ypu're trying to do. :-)
>
>  -- Keir
>
On a hunch, I tried that last night, and it resulted in the kdump kernel
hanging indefinitely (well - 14 hours now) on checking the hlt
instruction.  I will continue to play around with that area though, as
it does seem like a sensible idea.

~Andrew
>> kdump-fix-x2apic and apic-record-boot-mode are also in the source, but I
>> believe them to be unrelated to the current problem.
>>
>> I have done some further debugging on the assumption that the order of
>> shutting down interupt remapping matters with shutting down the lapics
>> and ioapics, but disable_qinval causes a panic (qinval.c:222 - "queue
>> invalidate wait descriptor was not executed\n") if it is run before both
>> the lapics and ioapics are shut down.
>

-- 
Andrew Cooper - Dom0 Kernel Engineer, Citrix XenServer
T: +44 (0)1223 225 900, http://www.citrix.com

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2011-06-07  8:44 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2011-06-06 14:32 IOMMU Interrupt Remapping query Andrew Cooper
2011-06-06 15:21 ` Keir Fraser
2011-06-06 16:37   ` Andrew Cooper
2011-06-06 18:45     ` Keir Fraser
2011-06-06 18:53     ` Keir Fraser
2011-06-07  8:44       ` Andrew Cooper

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).