Advertisement
Guest User

hypervisor.log

a guest
Apr 4th, 2016
107
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 46.22 KB | None | 0 0
  1. (XEN) [ 0.000000] Command line: placeholder loglvl=all guest_loglvl=all watchdog dom0_max_vcpus=4 cpuid_mask_xsave_eax=0 dom0_mem=2048M,max:2048M reboot=t,c com1=115200,8n1 console=com1,vga introspection_extn=true
  2. (XEN) [ 0.000000] Video information:
  3. (XEN) [ 0.000000] VGA is text mode 80x25, font 8x16
  4. (XEN) [ 0.000000] VBE/DDC methods: none; EDID transfer time: 0 seconds
  5. (XEN) [ 0.000000] EDID info not retrieved because no DDC retrieval method detected
  6. (XEN) [ 0.000000] Disc information:
  7. (XEN) [ 0.000000] Found 1 MBR signatures
  8. (XEN) [ 0.000000] Found 1 EDD information structures
  9. (XEN) [ 0.000000] Xen-e820 RAM map:
  10. (XEN) [ 0.000000] 0000000000000000 - 0000000000091800 (usable)
  11. (XEN) [ 0.000000] 0000000000091800 - 00000000000a0000 (reserved)
  12. (XEN) [ 0.000000] 00000000000e0000 - 0000000000100000 (reserved)
  13. (XEN) [ 0.000000] 0000000000100000 - 00000000d1b7d000 (usable)
  14. (XEN) [ 0.000000] 00000000d1b7d000 - 00000000d1b84000 (ACPI NVS)
  15. (XEN) [ 0.000000] 00000000d1b84000 - 00000000d1fb4000 (usable)
  16. (XEN) [ 0.000000] 00000000d1fb4000 - 00000000d2437000 (reserved)
  17. (XEN) [ 0.000000] 00000000d2437000 - 00000000d7eeb000 (usable)
  18. (XEN) [ 0.000000] 00000000d7eeb000 - 00000000d8000000 (reserved)
  19. (XEN) [ 0.000000] 00000000d8000000 - 00000000d8761000 (usable)
  20. (XEN) [ 0.000000] 00000000d8761000 - 00000000d8800000 (reserved)
  21. (XEN) [ 0.000000] 00000000d8800000 - 00000000d8fb1000 (usable)
  22. (XEN) [ 0.000000] 00000000d8fb1000 - 00000000d9000000 (ACPI data)
  23. (XEN) [ 0.000000] 00000000d9000000 - 00000000da71c000 (usable)
  24. (XEN) [ 0.000000] 00000000da71c000 - 00000000da800000 (ACPI NVS)
  25. (XEN) [ 0.000000] 00000000da800000 - 00000000dbe12000 (usable)
  26. (XEN) [ 0.000000] 00000000dbe12000 - 00000000dc000000 (reserved)
  27. (XEN) [ 0.000000] 00000000dd000000 - 00000000df200000 (reserved)
  28. (XEN) [ 0.000000] 00000000f8000000 - 00000000fc000000 (reserved)
  29. (XEN) [ 0.000000] 00000000fec00000 - 00000000fec01000 (reserved)
  30. (XEN) [ 0.000000] 00000000fed00000 - 00000000fed04000 (reserved)
  31. (XEN) [ 0.000000] 00000000fed1c000 - 00000000fed20000 (reserved)
  32. (XEN) [ 0.000000] 00000000fee00000 - 00000000fee01000 (reserved)
  33. (XEN) [ 0.000000] 00000000ff000000 - 0000000100000000 (reserved)
  34. (XEN) [ 0.000000] 0000000100000000 - 000000041ee00000 (usable)
  35. (XEN) [ 0.000000] ACPI: RSDP 000F0490, 0024 (r2 DELL )
  36. (XEN) [ 0.000000] ACPI: XSDT D8FEE088, 008C (r1 DELL CBX3 1072009 AMI 10013)
  37. (XEN) [ 0.000000] ACPI: FACP D8FF9460, 010C (r5 DELL CBX3 1072009 AMI 10013)
  38. (XEN) [ 0.000000] ACPI: DSDT D8FEE1A0, B2B9 (r2 DELL CBX3 14 INTL 20091112)
  39. (XEN) [ 0.000000] ACPI: FACS DA7FE080, 0040
  40. (XEN) [ 0.000000] ACPI: APIC D8FF9570, 0092 (r3 DELL CBX3 1072009 AMI 10013)
  41. (XEN) [ 0.000000] ACPI: FPDT D8FF9608, 0044 (r1 DELL CBX3 1072009 AMI 10013)
  42. (XEN) [ 0.000000] ACPI: LPIT D8FF9650, 005C (r1 DELL CBX3 0 AMI. 5)
  43. (XEN) [ 0.000000] ACPI: SSDT D8FF96B0, 0539 (r1 PmRef Cpu0Ist 3000 INTL 20120711)
  44. (XEN) [ 0.000000] ACPI: SSDT D8FF9BF0, 0AD8 (r1 PmRef CpuPm 3000 INTL 20120711)
  45. (XEN) [ 0.000000] ACPI: SSDT D8FFA6C8, 01C7 (r1 PmRef LakeTiny 3000 INTL 20120711)
  46. (XEN) [ 0.000000] ACPI: HPET D8FFA890, 0038 (r1 DELL CBX3 1072009 AMI. 5)
  47. (XEN) [ 0.000000] ACPI: SSDT D8FFA8C8, 036D (r1 SataRe SataTabl 1000 INTL 20120711)
  48. (XEN) [ 0.000000] ACPI: MCFG D8FFAC38, 003C (r1 DELL CBX3 1072009 MSFT 97)
  49. (XEN) [ 0.000000] ACPI: SSDT D8FFAC78, 34D6 (r1 SaSsdt SaSsdt 3000 INTL 20091112)
  50. (XEN) [ 0.000000] ACPI: ASF! D8FFE150, 00A5 (r32 INTEL HCG 1 TFSM F4240)
  51. (XEN) [ 0.000000] ACPI: DMAR D8FFE1F8, 00B8 (r1 INTEL HSW 1 INTL 1)
  52. (XEN) [ 0.000000] System RAM: 16292MB (16683208kB)
  53. (XEN) [ 0.000000] No NUMA configuration found
  54. (XEN) [ 0.000000] Faking a node at 0000000000000000-000000041ee00000
  55. (XEN) [ 0.000000] Domain heap initialised
  56. (XEN) [ 0.000000] found SMP MP-table at 000fd940
  57. (XEN) [ 0.000000] DMI 2.7 present.
  58. (XEN) [ 0.000000] Using APIC driver default
  59. (XEN) [ 0.000000] ACPI: PM-Timer IO Port: 0x1808
  60. (XEN) [ 0.000000] ACPI: v5 SLEEP INFO: control[0:0], status[0:0]
  61. (XEN) [ 0.000000] ACPI: SLEEP INFO: pm1x_cnt[1:1804,1:0], pm1x_evt[1:1800,1:0]
  62. (XEN) [ 0.000000] ACPI: 32/64X FACS address mismatch in FADT - da7fe080/0000000000000000, using 32
  63. (XEN) [ 0.000000] ACPI: wakeup_vec[da7fe08c], vec_size[20]
  64. (XEN) [ 0.000000] ACPI: Local APIC address 0xfee00000
  65. (XEN) [ 0.000000] ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled)
  66. (XEN) [ 0.000000] ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled)
  67. (XEN) [ 0.000000] ACPI: LAPIC (acpi_id[0x03] lapic_id[0x04] enabled)
  68. (XEN) [ 0.000000] ACPI: LAPIC (acpi_id[0x04] lapic_id[0x06] enabled)
  69. (XEN) [ 0.000000] ACPI: LAPIC (acpi_id[0x05] lapic_id[0x01] enabled)
  70. (XEN) [ 0.000000] ACPI: LAPIC (acpi_id[0x06] lapic_id[0x03] enabled)
  71. (XEN) [ 0.000000] ACPI: LAPIC (acpi_id[0x07] lapic_id[0x05] enabled)
  72. (XEN) [ 0.000000] ACPI: LAPIC (acpi_id[0x08] lapic_id[0x07] enabled)
  73. (XEN) [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0xff] high edge lint[0x1])
  74. (XEN) [ 0.000000] ACPI: IOAPIC (id[0x08] address[0xfec00000] gsi_base[0])
  75. (XEN) [ 0.000000] IOAPIC[0]: apic_id 8, version 32, address 0xfec00000, GSI 0-23
  76. (XEN) [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
  77. (XEN) [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
  78. (XEN) [ 0.000000] ACPI: IRQ0 used by override.
  79. (XEN) [ 0.000000] ACPI: IRQ2 used by override.
  80. (XEN) [ 0.000000] ACPI: IRQ9 used by override.
  81. (XEN) [ 0.000000] Enabling APIC mode: Flat. Using 1 I/O APICs
  82. (XEN) [ 0.000000] ACPI: HPET id: 0x8086a701 base: 0xfed00000
  83. (XEN) [ 0.000000] ERST table was not found
  84. (XEN) [ 0.000000] Using ACPI (MADT) for SMP configuration information
  85. (XEN) [ 0.000000] SMP: Allowing 8 CPUs (0 hotplug CPUs)
  86. (XEN) [ 0.000000] NR_CPUS:512 nr_cpumask_bits:64
  87. (XEN) [ 0.000000] IRQ limits: 24 GSI, 1528 MSI/MSI-X
  88. (XEN) [ 0.000000] Switched to APIC driver x2apic_cluster.
  89. (XEN) [ 0.000000] xstate_init: using cntxt_size: 0x340 and states: 0x7
  90. (XEN) [ 0.000000] mce_intel.c:735: MCA Capability: BCAST 1 SER 0 CMCI 1 firstbank 0 extended MCE MSR 0
  91. (XEN) [ 0.000000] Intel machine check reporting enabled
  92. (XEN) [ 0.000000] Using scheduler: SMP Credit Scheduler (credit)
  93. (XEN) [ 1.065768] Detected 3392.243 MHz processor.
  94. (XEN) [ 1.074868] Initing memory sharing.
  95. (XEN) [ 1.079152] alt table ffff82d08031a468 -> ffff82d08031b86c
  96. (XEN) [ 1.085453] spurious 8259A interrupt: IRQ7.
  97. (XEN) [ 1.090448] PCI: MCFG configuration 0: base f8000000 segment 0000 buses 00 - 3f
  98. (XEN) [ 1.098866] PCI: MCFG area at f8000000 reserved in E820
  99. (XEN) [ 1.104880] PCI: Using MCFG for segment 0000 bus 00-3f
  100. (XEN) [ 1.111154] Intel VT-d iommu 0 supported page sizes: 4kB.
  101. (XEN) [ 1.117345] Intel VT-d iommu 1 supported page sizes: 4kB.
  102. (XEN) [ 1.123531] Intel VT-d Snoop Control not enabled.
  103. (XEN) [ 1.129030] Intel VT-d Dom0 DMA Passthrough not enabled.
  104. (XEN) [ 1.135131] Intel VT-d Queued Invalidation enabled.
  105. (XEN) [ 1.140808] Intel VT-d Interrupt Remapping enabled.
  106. (XEN) [ 1.146484] Intel VT-d Shared EPT tables not enabled.
  107. (XEN) [ 1.158364] I/O virtualisation enabled
  108. (XEN) [ 1.162907] - Dom0 mode: Relaxed
  109. (XEN) [ 1.167028] Interrupt remapping enabled
  110. (XEN) [ 1.171663] nr_sockets: 1
  111. (XEN) [ 1.175084] Enabled directed EOI with ioapic_ack_old on!
  112. (XEN) [ 1.181423] ENABLING IO-APIC IRQs
  113. (XEN) [ 1.185534] -> Using old ACK method
  114. (XEN) [ 1.190228] ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=0 pin2=0
  115. (XEN) [ 1.405758] TSC deadline timer enabled
  116. (XEN) [ 1.875892] Platform timer is 14.318MHz HPET
  117. (XEN) [ 1.880632] Allocated console ring of 64 KiB.
  118. (XEN) [ 1.881169] mwait-idle: MWAIT substates: 0x42120
  119. (XEN) [ 1.881658] mwait-idle: v0.4 model 0x3c
  120. (XEN) [ 1.882142] mwait-idle: lapic_timer_reliable_states 0xffffffff
  121. (XEN) [ 1.882688] VMX: Supported advanced features:
  122. (XEN) [ 1.883175] - APIC MMIO access virtualisation
  123. (XEN) [ 1.883663] - APIC TPR shadow
  124. (XEN) [ 1.884187] - Extended Page Tables (EPT)
  125. (XEN) [ 1.884671] - Virtual-Processor Identifiers (VPID)
  126. (XEN) [ 1.885161] - Virtual NMI
  127. (XEN) [ 1.885687] - MSR direct-access bitmap
  128. (XEN) [ 1.886171] - Unrestricted Guest
  129. (XEN) [ 1.886651] - VMCS shadowing
  130. (XEN) [ 1.887176] - VM Functions
  131. (XEN) [ 1.887655] HVM: ASIDs enabled.
  132. (XEN) [ 1.888135] HVM: VMX enabled
  133. (XEN) [ 1.888656] HVM: Hardware Assisted Paging (HAP) detected
  134. (XEN) [ 1.889150] HVM: HAP page sizes: 4kB, 2MB, 1GB
  135. (XEN) [ 1.889770] [VT-D]INTR-REMAP: Request device [0000:f0:1f.0] fault index 0, iommu reg = ffff82c000203000
  136. (XEN) [ 1.890790] [VT-D]INTR-REMAP: reason 22 - Present field in the IRTE entry is clear
  137. (XEN) [ 1.892497] Brought up 8 CPUs
  138. (XEN) [ 1.892977] Testing NMI watchdog on all CPUs: ok
  139. (XEN) [ 1.935986] ACPI sleep modes: S3
  140. (XEN) [ 1.936468] VPMU: disabled
  141. (XEN) [ 1.936945] mcheck_poll: Machine check polling timer started.
  142. (XEN) [ 1.937495] Dom0 has maximum 792 PIRQs
  143. (XEN) [ 1.938043] csched_dom_init: setting dom 0 as the privileged domain
  144. (XEN) [ 1.938549] NX (Execute Disable) protection active
  145. (XEN) [ 1.939084] *** LOADING DOMAIN 0 ***
  146. (XEN) [ 2.069769] elf_parse_binary: phdr: paddr=0x1000000 memsz=0xb56000
  147. (XEN) [ 2.070312] elf_parse_binary: phdr: paddr=0x1c00000 memsz=0x11f0f0
  148. (XEN) [ 2.070807] elf_parse_binary: phdr: paddr=0x1d20000 memsz=0x13e80
  149. (XEN) [ 2.071304] elf_parse_binary: phdr: paddr=0x1d34000 memsz=0x6d0000
  150. (XEN) [ 2.071844] elf_parse_binary: memory: 0x1000000 -> 0x2404000
  151. (XEN) [ 2.072341] elf_xen_parse_note: GUEST_OS = "linux"
  152. (XEN) [ 2.072829] elf_xen_parse_note: GUEST_VERSION = "2.6"
  153. (XEN) [ 2.073362] elf_xen_parse_note: XEN_VERSION = "xen-3.0"
  154. (XEN) [ 2.073854] elf_xen_parse_note: VIRT_BASE = 0xffffffff80000000
  155. (XEN) [ 2.074348] elf_xen_parse_note: ENTRY = 0xffffffff81d341f0
  156. (XEN) [ 2.074881] elf_xen_parse_note: HYPERCALL_PAGE = 0xffffffff81001000
  157. (XEN) [ 2.075378] elf_xen_parse_note: FEATURES = "!writable_page_tables|pae_pgdir_above_4gb"
  158. (XEN) [ 2.076386] elf_xen_parse_note: PAE_MODE = "yes"
  159. (XEN) [ 2.076872] elf_xen_parse_note: LOADER = "generic"
  160. (XEN) [ 2.077360] elf_xen_parse_note: unknown xen elf note (0xd)
  161. (XEN) [ 2.077899] elf_xen_parse_note: SUSPEND_CANCEL = 0x1
  162. (XEN) [ 2.078387] elf_xen_parse_note: HV_START_LOW = 0xffff800000000000
  163. (XEN) [ 2.078882] elf_xen_parse_note: PADDR_OFFSET = 0x0
  164. (XEN) [ 2.079415] elf_xen_addr_calc_check: addresses:
  165. (XEN) [ 2.079901] virt_base = 0xffffffff80000000
  166. (XEN) [ 2.080389] elf_paddr_offset = 0x0
  167. (XEN) [ 2.080913] virt_offset = 0xffffffff80000000
  168. (XEN) [ 2.081402] virt_kstart = 0xffffffff81000000
  169. (XEN) [ 2.081890] virt_kend = 0xffffffff82404000
  170. (XEN) [ 2.082426] virt_entry = 0xffffffff81d341f0
  171. (XEN) [ 2.082914] p2m_base = 0xffffffffffffffff
  172. (XEN) [ 2.083404] Xen kernel: 64-bit, lsb, compat32
  173. (XEN) [ 2.083933] Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x2404000
  174. (XEN) [ 2.085350] PHYSICAL MEMORY ARRANGEMENT:
  175. (XEN) [ 2.085833] Dom0 alloc.: 0000000408000000->000000040c000000 (494409 pages to be allocated)
  176. (XEN) [ 2.086800] Init. ramdisk: 000000041b949000->000000041edff600
  177. (XEN) [ 2.087340] VIRTUAL MEMORY ARRANGEMENT:
  178. (XEN) [ 2.087821] Loaded kernel: ffffffff81000000->ffffffff82404000
  179. (XEN) [ 2.088315] Init. ramdisk: ffffffff82404000->ffffffff858ba600
  180. (XEN) [ 2.088808] Phys-Mach map: ffffffff858bb000->ffffffff85cbb000
  181. (XEN) [ 2.089302] Start info: ffffffff85cbb000->ffffffff85cbb4b4
  182. (XEN) [ 2.089795] Page tables: ffffffff85cbc000->ffffffff85cef000
  183. (XEN) [ 2.090289] Boot stack: ffffffff85cef000->ffffffff85cf0000
  184. (XEN) [ 2.090782] TOTAL: ffffffff80000000->ffffffff86000000
  185. (XEN) [ 2.091326] ENTRY ADDRESS: ffffffff81d341f0
  186. (XEN) [ 2.093464] Dom0 has maximum 4 VCPUs
  187. (XEN) [ 2.093960] elf_load_binary: phdr 0 at 0xffffffff81000000 -> 0xffffffff81b56000
  188. (XEN) [ 2.096664] elf_load_binary: phdr 1 at 0xffffffff81c00000 -> 0xffffffff81d1f0f0
  189. (XEN) [ 2.097832] elf_load_binary: phdr 2 at 0xffffffff81d20000 -> 0xffffffff81d33e80
  190. (XEN) [ 2.098801] elf_load_binary: phdr 3 at 0xffffffff81d34000 -> 0xffffffff81e77000
  191. (XEN) [ 3.305347] Bogus DMIBAR 0xfed18001 on 0000:00:00.0
  192. (XEN) [ 3.308158] Scrubbing Free RAM on 1 nodes using 4 CPUs
  193. (XEN) [ 3.337283] .................................done.
  194. (XEN) [ 4.100667] Initial low memory virq threshold set at 0x4000 pages.
  195. (XEN) [ 4.101166] Std. Loglevel: All
  196. (XEN) [ 4.101690] Guest Loglevel: All
  197. (XEN) [ 4.102169] Xen is relinquishing VGA console.
  198. (XEN) [ 4.103235] *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen)
  199. (XEN) [ 4.103645] Freed 364kB init memory.
  200. (XEN) [ 4.311641] d0: Forcing write emulation on MFNs f8000-fbfff
  201. (XEN) [ 4.365797] Bogus DMIBAR 0xfed18001 on 0000:00:00.0
  202. (XEN) [ 4.365799] PCI add device 0000:00:00.0
  203. (XEN) [ 4.365941] PCI add device 0000:00:02.0
  204. (XEN) [ 4.366071] PCI add device 0000:00:03.0
  205. (XEN) [ 4.366401] PCI add device 0000:00:14.0
  206. (XEN) [ 4.366655] PCI add device 0000:00:16.0
  207. (XEN) [ 4.366955] PCI add device 0000:00:16.3
  208. (XEN) [ 4.367293] PCI add device 0000:00:19.0
  209. (XEN) [ 4.367617] PCI add device 0000:00:1a.0
  210. (XEN) [ 4.367898] PCI add device 0000:00:1c.0
  211. (XEN) [ 4.368171] PCI add device 0000:00:1c.1
  212. (XEN) [ 4.368555] PCI add device 0000:00:1d.0
  213. (XEN) [ 4.368795] PCI add device 0000:00:1f.0
  214. (XEN) [ 4.369086] PCI add device 0000:00:1f.2
  215. (XEN) [ 4.369252] PCI add device 0000:00:1f.3
  216. (XEN) [ 4.369925] PCI add device 0000:02:00.0
  217. (XEN) [ 4.509661] d0: Forcing read-only access to MFN fed00
  218. (XEN) [ 49.300548] HVM1 restore: CPU 0
  219. (XEN) [ 49.300559] HVM1 restore: CPU 1
  220. (XEN) [ 49.300566] HVM1 restore: CPU 2
  221. (XEN) [ 49.300573] HVM1 restore: CPU 3
  222. (XEN) [ 49.300579] HVM1 restore: PIC 0
  223. (XEN) [ 49.300580] HVM1 restore: PIC 1
  224. (XEN) [ 49.300581] HVM1 restore: IOAPIC 0
  225. (XEN) [ 49.300582] HVM1 restore: LAPIC 0
  226. (XEN) [ 49.300587] HVM1 restore: LAPIC 1
  227. (XEN) [ 49.300591] HVM1 restore: LAPIC 2
  228. (XEN) [ 49.300595] HVM1 restore: LAPIC 3
  229. (XEN) [ 49.300599] HVM1 restore: LAPIC_REGS 0
  230. (XEN) [ 49.300601] HVM1 restore: LAPIC_REGS 1
  231. (XEN) [ 49.300602] HVM1 restore: LAPIC_REGS 2
  232. (XEN) [ 49.300603] HVM1 restore: LAPIC_REGS 3
  233. (XEN) [ 49.300604] HVM1 restore: PCI_IRQ 0
  234. (XEN) [ 49.300605] HVM1 restore: ISA_IRQ 0
  235. (XEN) [ 49.300606] HVM1 restore: PCI_LINK 0
  236. (XEN) [ 49.300608] HVM1 restore: PIT 0
  237. (XEN) [ 49.300610] HVM1 restore: RTC 0
  238. (XEN) [ 49.300612] HVM1 restore: HPET 0
  239. (XEN) [ 49.300616] HVM1 restore: PMTIMER 0
  240. (XEN) [ 49.300617] HVM1 restore: MTRR 0
  241. (XEN) [ 49.300619] HVM1 restore: MTRR 1
  242. (XEN) [ 49.300621] HVM1 restore: MTRR 2
  243. (XEN) [ 49.300622] HVM1 restore: MTRR 3
  244. (XEN) [ 49.300624] HVM1 restore: CPU_XSAVE 0
  245. (XEN) [ 49.300626] HVM1 restore: CPU_XSAVE 1
  246. (XEN) [ 49.300627] HVM1 restore: CPU_XSAVE 2
  247. (XEN) [ 49.300628] HVM1 restore: CPU_XSAVE 3
  248. (XEN) [ 49.300629] HVM1 restore: VMCE_VCPU 0
  249. (XEN) [ 49.300630] HVM1 restore: VMCE_VCPU 1
  250. (XEN) [ 49.300631] HVM1 restore: VMCE_VCPU 2
  251. (XEN) [ 49.300631] HVM1 restore: VMCE_VCPU 3
  252. (XEN) [ 49.300632] HVM1 restore: TSC_ADJUST 0
  253. (XEN) [ 49.300633] HVM1 restore: TSC_ADJUST 1
  254. (XEN) [ 49.300634] HVM1 restore: TSC_ADJUST 2
  255. (XEN) [ 49.300635] HVM1 restore: TSC_ADJUST 3
  256. (d2) [ 71.911399] HVM Loader
  257. (d2) [ 71.911423] Detected Xen v4.6.1
  258. (d2) [ 71.911451] Xenbus rings @0xfeffc000, event channel 1
  259. (d2) [ 71.911529] System requested ROMBIOS
  260. (d2) [ 71.911541] CPU speed is 3392 MHz
  261. (d2) [ 71.911612] Relocating guest memory for lowmem MMIO space enabled
  262. (XEN) [ 71.913679] irq.c:275: Dom2 PCI link 0 changed 0 -> 5
  263. (d2) [ 71.913699] PCI-ISA link 0 routed to IRQ5
  264. (XEN) [ 71.914015] irq.c:275: Dom2 PCI link 1 changed 0 -> 10
  265. (d2) [ 71.914036] PCI-ISA link 1 routed to IRQ10
  266. (XEN) [ 71.914066] irq.c:275: Dom2 PCI link 2 changed 0 -> 11
  267. (d2) [ 71.914086] PCI-ISA link 2 routed to IRQ11
  268. (XEN) [ 71.914126] irq.c:275: Dom2 PCI link 3 changed 0 -> 5
  269. (d2) [ 71.914148] PCI-ISA link 3 routed to IRQ5
  270. (d2) [ 71.916706] pci dev 01:2 INTD->IRQ5
  271. (d2) [ 71.917399] pci dev 01:3 INTA->IRQ10
  272. (d2) [ 71.919213] pci dev 03:0 INTA->IRQ5
  273. (d2) [ 71.931805] No RAM in high memory; setting high_mem resource base to 100000000
  274. (d2) [ 71.931871] pci dev 02:0 bar 10 size 002000000: 0f0000008
  275. (d2) [ 71.931979] pci dev 03:0 bar 14 size 001000000: 0f2000008
  276. (d2) [ 71.932114] pci dev 02:0 bar 14 size 000001000: 0f3000000
  277. (d2) [ 71.932311] pci dev 03:0 bar 10 size 000000100: 00000c001
  278. (d2) [ 71.932397] pci dev 01:2 bar 20 size 000000020: 00000c101
  279. (d2) [ 71.932494] pci dev 01:1 bar 20 size 000000010: 00000c121
  280. (d2) [ 71.932583] Multiprocessor initialisation:
  281. (d2) [ 71.932629] - CPU0 ... 39-bit phys ... fixed MTRRs ... var MTRRs [1/8] ... done.
  282. (d2) [ 71.932737] - CPU1 ... 39-bit phys ... fixed MTRRs ... var MTRRs [1/8] ... done.
  283. (d2) [ 71.932764] Testing HVM environment:
  284. (d2) [ 71.944490] - REP INSB across page boundaries ... passed
  285. (d2) [ 71.952823] - GS base MSRs and SWAPGS ... passed
  286. (d2) [ 71.952834] Passed 2 of 2 tests
  287. (d2) [ 71.952849] Writing SMBIOS tables ...
  288. (d2) [ 71.953167] Loading ROMBIOS ...
  289. (d2) [ 71.953201] 16764 bytes of ROMBIOS high-memory extensions:
  290. (d2) [ 71.953247] Relocating to 0xfc001000-0xfc00517c ... done
  291. (d2) [ 71.953450] Creating MP tables ...
  292. (d2) [ 71.953620] Loading Cirrus VGABIOS ...
  293. (d2) [ 71.966590] Option ROMs:
  294. (d2) [ 71.966603] c0000-c8fff: VGA BIOS
  295. (d2) [ 71.966652] Loading ACPI ...
  296. (d2) [ 71.967420] vm86 TSS at fc011400
  297. (d2) [ 71.967570] BIOS map:
  298. (d2) [ 71.967583] f0000-fffff: Main BIOS
  299. (d2) [ 71.967591] E820 table:
  300. (d2) [ 71.967616] [00]: 00000000:00000000 - 00000000:0009e000: RAM
  301. (d2) [ 71.967645] [01]: 00000000:0009e000 - 00000000:000a0000: RESERVED
  302. (d2) [ 71.967668] HOLE: 00000000:000a0000 - 00000000:000e0000
  303. (d2) [ 71.967697] [02]: 00000000:000e0000 - 00000000:00100000: RESERVED
  304. (d2) [ 71.967723] [03]: 00000000:00100000 - 00000000:3fc00000: RAM
  305. (d2) [ 71.967747] HOLE: 00000000:3fc00000 - 00000000:fc000000
  306. (d2) [ 71.967775] [04]: 00000000:fc000000 - 00000001:00000000: RESERVED
  307. (d2) [ 71.967823] Invoking ROMBIOS ...
  308. (XEN) [ 71.968428] stdvga.c:173:d2v0 entering stdvga mode
  309. (XEN) [ 71.968429] stdvga.c:117:d2v0 entering caching mode
  310. (d2) [ 71.968487] VGABios $Id: vgabios.c,v 1.67 2008/01/27 09:44:12 vruppert Exp $
  311. (XEN) [ 71.980204] stdvga.c:126:d2v0 leaving caching mode
  312. (d2) [ 71.988421] Processor 1: Xen(R) Virtual CPU
  313. (d2) [ 71.990713] XS Virtual IDE Controller Hard Drive (10000MB)
  314. (d2) [ 71.991369]
  315. (d2) [ 71.991757]
  316. (d2) [ 71.991818]
  317. (d2) [ 71.992653] Press F12 for boot menu.
  318. (d2) [ 71.992713]
  319. (d2) [ 71.994036] Boot device: Hard Disk - success.
  320. (XEN) [ 72.201024] stdvga.c:178:d2v0 leaving stdvga mode
  321. (XEN) [ 117.539624] irq.c:275: Dom2 PCI link 0 changed 5 -> 0
  322. (XEN) [ 117.539676] irq.c:275: Dom2 PCI link 1 changed 10 -> 0
  323. (XEN) [ 117.539755] irq.c:275: Dom2 PCI link 2 changed 11 -> 0
  324. (XEN) [ 117.539812] irq.c:275: Dom2 PCI link 3 changed 5 -> 0
  325. (XEN) [ 133.650807] mem access resume, eip: 0x0000000082645f3e, gfn: 0x0000000000002735
  326. (XEN) [ 133.650850] emulating @ eip: 0x0000000082645f3e, kind: 0
  327. (XEN) [ 133.650860] Mem event emulating: d2v0 32bit @ 0008:82645f3e -> c2 04 00 8d 49 00 8b c6 8b d7 8b 4c 24 0c 8b 74
  328. (XEN) [ 133.650862] emulated successfully
  329. (XEN) [ 133.650908] mem access resume, eip: 0x0000000082a27117, gfn: 0x0000000000002735
  330. (XEN) [ 133.650925] emulating @ eip: 0x0000000082a27117, kind: 0
  331. (XEN) [ 133.650943] Mem event emulating: d2v0 32bit @ 0008:82a27117 -> 8b 0d 34 cf a3 82 8b 15 38 cf a3 82 8b 1d 30 cf
  332. (XEN) [ 133.650945] emulated successfully
  333. (XEN) [ 133.651009] mem access resume, eip: 0x0000000082a2711d, gfn: 0x0000000000002735
  334. (XEN) [ 133.651024] emulating @ eip: 0x0000000082a2711d, kind: 0
  335. (XEN) [ 133.651028] Mem event emulating: d2v0 32bit @ 0008:82a2711d -> 8b 15 38 cf a3 82 8b 1d 30 cf a3 82 3b d9 75 ea
  336. (XEN) [ 133.651029] emulated successfully
  337. (XEN) [ 133.651070] mem access resume, eip: 0x0000000082a27123, gfn: 0x0000000000002735
  338. (XEN) [ 133.651093] emulating @ eip: 0x0000000082a27123, kind: 0
  339. (XEN) [ 133.651100] Mem event emulating: d2v0 32bit @ 0008:82a27123 -> 8b 1d 30 cf a3 82 3b d9 75 ea 3b fa 75 c0 3b f1
  340. (XEN) [ 133.651101] emulated successfully
  341. (XEN) [ 133.651114] mem access resume, eip: 0x0000000082a27129, gfn: 0x0000000000002735
  342. (XEN) [ 133.651137] emulating @ eip: 0x0000000082a27129, kind: 0
  343. (XEN) [ 133.651143] Mem event emulating: d2v0 32bit @ 0008:82a27129 -> 3b d9 75 ea 3b fa 75 c0 3b f1 75 bc 8b 0d 44 cf
  344. (XEN) [ 133.651144] emulated successfully
  345. (XEN) [ 133.651158] mem access resume, eip: 0x0000000082a2712b, gfn: 0x0000000000002735
  346. (XEN) [ 133.651180] emulating @ eip: 0x0000000082a2712b, kind: 0
  347. (XEN) [ 133.651186] Mem event emulating: d2v0 32bit @ 0008:82a2712b -> 75 ea 3b fa 75 c0 3b f1 75 bc 8b 0d 44 cf a3 82
  348. (XEN) [ 133.651187] emulated successfully
  349. (XEN) [ 133.651201] mem access resume, eip: 0x0000000082a2712d, gfn: 0x0000000000002735
  350. (XEN) [ 133.651224] emulating @ eip: 0x0000000082a2712d, kind: 0
  351. (XEN) [ 133.651229] Mem event emulating: d2v0 32bit @ 0008:82a2712d -> 3b fa 75 c0 3b f1 75 bc 8b 0d 44 cf a3 82 8b 15
  352. (XEN) [ 133.651231] emulated successfully
  353. (XEN) [ 133.651244] mem access resume, eip: 0x0000000082a2712f, gfn: 0x0000000000002735
  354. (XEN) [ 133.651250] emulating @ eip: 0x0000000082a2712f, kind: 0
  355. (XEN) [ 133.651253] Mem event emulating: d2v0 32bit @ 0008:82a2712f -> 75 c0 3b f1 75 bc 8b 0d 44 cf a3 82 8b 15 48 cf
  356. (XEN) [ 133.651254] emulated successfully
  357. (XEN) [ 133.651265] mem access resume, eip: 0x0000000082a27131, gfn: 0x0000000000002735
  358. (XEN) [ 133.651287] emulating @ eip: 0x0000000082a27131, kind: 0
  359. (XEN) [ 133.651292] Mem event emulating: d2v0 32bit @ 0008:82a27131 -> 3b f1 75 bc 8b 0d 44 cf a3 82 8b 15 48 cf a3 82
  360. (XEN) [ 133.651294] emulated successfully
  361. (XEN) [ 133.651307] mem access resume, eip: 0x0000000082a27133, gfn: 0x0000000000002735
  362. (XEN) [ 133.651313] emulating @ eip: 0x0000000082a27133, kind: 0
  363. (XEN) [ 133.651316] Mem event emulating: d2v0 32bit @ 0008:82a27133 -> 75 bc 8b 0d 44 cf a3 82 8b 15 48 cf a3 82 8b 1d
  364. (XEN) [ 133.651318] emulated successfully
  365. (XEN) [ 133.651328] mem access resume, eip: 0x0000000082a27135, gfn: 0x0000000000002735
  366. (XEN) [ 133.651350] emulating @ eip: 0x0000000082a27135, kind: 0
  367. (XEN) [ 133.651357] Mem event emulating: d2v0 32bit @ 0008:82a27135 -> 8b 0d 44 cf a3 82 8b 15 48 cf a3 82 8b 1d 40 cf
  368. (XEN) [ 133.651358] emulated successfully
  369. (XEN) [ 133.651371] mem access resume, eip: 0x0000000082a2713b, gfn: 0x0000000000002735
  370. (XEN) [ 133.651389] emulating @ eip: 0x0000000082a2713b, kind: 0
  371. (XEN) [ 133.651393] Mem event emulating: d2v0 32bit @ 0008:82a2713b -> 8b 15 48 cf a3 82 8b 1d 40 cf a3 82 3b d9 75 ea
  372. (XEN) [ 133.651394] emulated successfully
  373. (XEN) [ 133.651405] mem access resume, eip: 0x0000000082a27141, gfn: 0x0000000000002735
  374. (XEN) [ 133.651421] emulating @ eip: 0x0000000082a27141, kind: 0
  375. (XEN) [ 133.651425] Mem event emulating: d2v0 32bit @ 0008:82a27141 -> 8b 1d 40 cf a3 82 3b d9 75 ea 3b 55 f8 75 86 3b
  376. (XEN) [ 133.651426] emulated successfully
  377. (XEN) [ 133.651437] mem access resume, eip: 0x0000000082a27147, gfn: 0x0000000000002735
  378. (XEN) [ 133.651454] emulating @ eip: 0x0000000082a27147, kind: 0
  379. (XEN) [ 133.651457] Mem event emulating: d2v0 32bit @ 0008:82a27147 -> 3b d9 75 ea 3b 55 f8 75 86 3b 4d fc 75 81 3b c7
  380. (XEN) [ 133.651459] emulated successfully
  381. (XEN) [ 133.651469] mem access resume, eip: 0x0000000082a27149, gfn: 0x0000000000002735
  382. (XEN) [ 133.651473] emulating @ eip: 0x0000000082a27149, kind: 0
  383. (XEN) [ 133.651475] Mem event emulating: d2v0 32bit @ 0008:82a27149 -> 75 ea 3b 55 f8 75 86 3b 4d fc 75 81 3b c7 73 01
  384. (XEN) [ 133.651477] emulated successfully
  385. (XEN) [ 133.651486] mem access resume, eip: 0x0000000082a2714b, gfn: 0x0000000000002735
  386. (XEN) [ 133.651490] emulating @ eip: 0x0000000082a2714b, kind: 0
  387. (XEN) [ 133.651493] Mem event emulating: d2v0 32bit @ 0008:82a2714b -> 3b 55 f8 75 86 3b 4d fc 75 81 3b c7 73 01 46 03
  388. (XEN) [ 133.651494] emulated successfully
  389. (XEN) [ 133.651504] mem access resume, eip: 0x0000000082a2714e, gfn: 0x0000000000002735
  390. (XEN) [ 133.651508] emulating @ eip: 0x0000000082a2714e, kind: 0
  391. (XEN) [ 133.651510] Mem event emulating: d2v0 32bit @ 0008:82a2714e -> 75 86 3b 4d fc 75 81 3b c7 73 01 46 03 d0 5f 13
  392. (XEN) [ 133.651511] emulated successfully
  393. (XEN) [ 133.651521] mem access resume, eip: 0x0000000082a27150, gfn: 0x0000000000002735
  394. (XEN) [ 133.651525] emulating @ eip: 0x0000000082a27150, kind: 0
  395. (XEN) [ 133.651528] Mem event emulating: d2v0 32bit @ 0008:82a27150 -> 3b 4d fc 75 81 3b c7 73 01 46 03 d0 5f 13 ce 5e
  396. (XEN) [ 133.651529] emulated successfully
  397. (XEN) [ 133.651539] mem access resume, eip: 0x0000000082a27153, gfn: 0x0000000000002735
  398. (XEN) [ 133.651543] emulating @ eip: 0x0000000082a27153, kind: 0
  399. (XEN) [ 133.651545] Mem event emulating: d2v0 32bit @ 0008:82a27153 -> 75 81 3b c7 73 01 46 03 d0 5f 13 ce 5e 8b c2 8b
  400. (XEN) [ 133.651546] emulated successfully
  401. (XEN) [ 133.651556] mem access resume, eip: 0x0000000082a27155, gfn: 0x0000000000002735
  402. (XEN) [ 133.651560] emulating @ eip: 0x0000000082a27155, kind: 0
  403. (XEN) [ 133.651562] Mem event emulating: d2v0 32bit @ 0008:82a27155 -> 3b c7 73 01 46 03 d0 5f 13 ce 5e 8b c2 8b d1 5b
  404. (XEN) [ 133.651563] emulated successfully
  405. (XEN) [ 133.651573] mem access resume, eip: 0x0000000082a27157, gfn: 0x0000000000002735
  406. (XEN) [ 133.651577] emulating @ eip: 0x0000000082a27157, kind: 0
  407. (XEN) [ 133.651579] Mem event emulating: d2v0 32bit @ 0008:82a27157 -> 73 01 46 03 d0 5f 13 ce 5e 8b c2 8b d1 5b c9 c3
  408. (XEN) [ 133.651580] emulated successfully
  409. (XEN) [ 133.651590] mem access resume, eip: 0x0000000082a2715a, gfn: 0x0000000000002735
  410. (XEN) [ 133.651594] emulating @ eip: 0x0000000082a2715a, kind: 0
  411. (XEN) [ 133.651596] Mem event emulating: d2v0 32bit @ 0008:82a2715a -> 03 d0 5f 13 ce 5e 8b c2 8b d1 5b c9 c3 cc cc cc
  412. (XEN) [ 133.651598] emulated successfully
  413. (XEN) [ 133.651607] mem access resume, eip: 0x0000000082a2715c, gfn: 0x0000000000002735
  414. (XEN) [ 133.651611] emulating @ eip: 0x0000000082a2715c, kind: 0
  415. (XEN) [ 133.651614] Mem event emulating: d2v0 32bit @ 0008:82a2715c -> 5f 13 ce 5e 8b c2 8b d1 5b c9 c3 cc cc cc cc cc
  416. (XEN) [ 133.651615] emulated successfully
  417. (XEN) [ 133.651625] mem access resume, eip: 0x0000000082a2715d, gfn: 0x0000000000002735
  418. (XEN) [ 133.651629] emulating @ eip: 0x0000000082a2715d, kind: 0
  419. (XEN) [ 133.651631] Mem event emulating: d2v0 32bit @ 0008:82a2715d -> 13 ce 5e 8b c2 8b d1 5b c9 c3 cc cc cc cc cc a1
  420. (XEN) [ 133.651633] emulated successfully
  421. (XEN) [ 133.651643] mem access resume, eip: 0x0000000082a2715f, gfn: 0x0000000000002735
  422. (XEN) [ 133.651646] emulating @ eip: 0x0000000082a2715f, kind: 0
  423. (XEN) [ 133.651649] Mem event emulating: d2v0 32bit @ 0008:82a2715f -> 5e 8b c2 8b d1 5b c9 c3 cc cc cc cc cc a1 9c cf
  424. (XEN) [ 133.651650] emulated successfully
  425. (XEN) [ 133.651660] mem access resume, eip: 0x0000000082a27160, gfn: 0x0000000000002735
  426. (XEN) [ 133.651664] emulating @ eip: 0x0000000082a27160, kind: 0
  427. (XEN) [ 133.651666] Mem event emulating: d2v0 32bit @ 0008:82a27160 -> 8b c2 8b d1 5b c9 c3 cc cc cc cc cc a1 9c cf a3
  428. (XEN) [ 133.651667] emulated successfully
  429. (XEN) [ 133.651677] mem access resume, eip: 0x0000000082a27162, gfn: 0x0000000000002735
  430. (XEN) [ 133.651681] emulating @ eip: 0x0000000082a27162, kind: 0
  431. (XEN) [ 133.651683] Mem event emulating: d2v0 32bit @ 0008:82a27162 -> 8b d1 5b c9 c3 cc cc cc cc cc a1 9c cf a3 82 05
  432. (XEN) [ 133.651684] emulated successfully
  433. (XEN) [ 133.651694] mem access resume, eip: 0x0000000082a27164, gfn: 0x0000000000002735
  434. (XEN) [ 133.651697] emulating @ eip: 0x0000000082a27164, kind: 0
  435. (XEN) [ 133.651701] Mem event emulating: d2v0 32bit @ 0008:82a27164 -> 5b c9 c3 cc cc cc cc cc a1 9c cf a3 82 05 f0 00
  436. (XEN) [ 133.651702] emulated successfully
  437. (XEN) [ 133.651712] mem access resume, eip: 0x0000000082a27165, gfn: 0x0000000000002735
  438. (XEN) [ 133.651716] emulating @ eip: 0x0000000082a27165, kind: 0
  439. (XEN) [ 133.651719] Mem event emulating: d2v0 32bit @ 0008:82a27165 -> c9 c3 cc cc cc cc cc a1 9c cf a3 82 05 f0 00 00
  440. (XEN) [ 133.651720] emulated successfully
  441. (XEN) [ 133.651730] mem access resume, eip: 0x0000000082a27166, gfn: 0x0000000000002735
  442. (XEN) [ 133.651734] emulating @ eip: 0x0000000082a27166, kind: 0
  443. (XEN) [ 133.651737] Mem event emulating: d2v0 32bit @ 0008:82a27166 -> c3 cc cc cc cc cc a1 9c cf a3 82 05 f0 00 00 00
  444. (XEN) [ 133.651738] emulated successfully
  445. (XEN) [ 133.651748] mem access resume, eip: 0x0000000082a277a1, gfn: 0x0000000000002735
  446. (XEN) [ 133.651751] emulating @ eip: 0x0000000082a277a1, kind: 0
  447. (XEN) [ 133.651754] Mem event emulating: d2v0 32bit @ 0008:82a277a1 -> 5d c2 04 00 cc cc cc cc cc 8b ff 55 8b ec 51 51
  448. (XEN) [ 133.651756] emulated successfully
  449. (XEN) [ 133.651766] mem access resume, eip: 0x0000000082a277a2, gfn: 0x0000000000002735
  450. (XEN) [ 133.651769] emulating @ eip: 0x0000000082a277a2, kind: 0
  451. (XEN) [ 133.651772] Mem event emulating: d2v0 32bit @ 0008:82a277a2 -> c2 04 00 cc cc cc cc cc 8b ff 55 8b ec 51 51 6a
  452. (XEN) [ 133.651773] emulated successfully
  453. (XEN) [ 133.651783] mem access resume, eip: 0x0000000082a2bb53, gfn: 0x0000000000002735
  454. (XEN) [ 133.651787] emulating @ eip: 0x0000000082a2bb53, kind: 0
  455. (XEN) [ 133.651790] Mem event emulating: d2v0 32bit @ 0008:82a2bb53 -> eb 1f 8d 45 f8 50 e8 96 6f 00 00 eb 14 8d 45 f8
  456. (XEN) [ 133.651791] emulated successfully
  457. (XEN) [ 133.651801] mem access resume, eip: 0x0000000082a2bb74, gfn: 0x0000000000002735
  458. (XEN) [ 133.651804] emulating @ eip: 0x0000000082a2bb74, kind: 0
  459. (XEN) [ 133.651808] Mem event emulating: d2v0 32bit @ 0008:82a2bb74 -> 8b 0d c0 c4 a3 82 56 57 3b 0d c4 c4 a3 82 74 1d
  460. (XEN) [ 133.651809] emulated successfully
  461. (XEN) [ 133.651819] mem access resume, eip: 0x0000000082a2bb7a, gfn: 0x0000000000002735
  462. (XEN) [ 133.651822] emulating @ eip: 0x0000000082a2bb7a, kind: 0
  463. (XEN) [ 133.651826] Mem event emulating: d2v0 32bit @ 0008:82a2bb7a -> 56 57 3b 0d c4 c4 a3 82 74 1d 8b 35 dc c4 a3 82
  464. (XEN) [ 133.651828] emulated successfully
  465. (XEN) [ 133.651838] mem access resume, eip: 0x0000000082a2bb7b, gfn: 0x0000000000002735
  466. (XEN) [ 133.651841] emulating @ eip: 0x0000000082a2bb7b, kind: 0
  467. (XEN) [ 133.651844] Mem event emulating: d2v0 32bit @ 0008:82a2bb7b -> 57 3b 0d c4 c4 a3 82 74 1d 8b 35 dc c4 a3 82 8b
  468. (XEN) [ 133.651845] emulated successfully
  469. (XEN) [ 133.651855] mem access resume, eip: 0x0000000082a2bb7c, gfn: 0x0000000000002735
  470. (XEN) [ 133.651868] emulating @ eip: 0x0000000082a2bb7c, kind: 0
  471. (XEN) [ 133.651872] Mem event emulating: d2v0 32bit @ 0008:82a2bb7c -> 3b 0d c4 c4 a3 82 74 1d 8b 35 dc c4 a3 82 8b 3d
  472. (XEN) [ 133.651873] emulated successfully
  473. (XEN) [ 133.651892] mem access resume, eip: 0x0000000082a2bb82, gfn: 0x0000000000002735
  474. (XEN) [ 133.651896] emulating @ eip: 0x0000000082a2bb82, kind: 0
  475. (XEN) [ 133.651898] Mem event emulating: d2v0 32bit @ 0008:82a2bb82 -> 74 1d 8b 35 dc c4 a3 82 8b 3d d8 c4 a3 82 56 57
  476. (XEN) [ 133.651900] emulated successfully
  477. (XEN) [ 133.651909] mem access resume, eip: 0x0000000082a2bba1, gfn: 0x0000000000002735
  478. (XEN) [ 133.651913] emulating @ eip: 0x0000000082a2bba1, kind: 0
  479. (XEN) [ 133.651916] Mem event emulating: d2v0 32bit @ 0008:82a2bba1 -> 8b 7d f8 8b 75 fc 8b 4d 08 85 c9 74 05 89 39 89
  480. (XEN) [ 133.651917] emulated successfully
  481. (XEN) [ 133.651927] mem access resume, eip: 0x0000000082a2bba4, gfn: 0x0000000000002735
  482. (XEN) [ 133.651930] emulating @ eip: 0x0000000082a2bba4, kind: 0
  483. (XEN) [ 133.651934] Mem event emulating: d2v0 32bit @ 0008:82a2bba4 -> 8b 75 fc 8b 4d 08 85 c9 74 05 89 39 89 71 04 5f
  484. (XEN) [ 133.651935] emulated successfully
  485. (XEN) [ 133.651945] mem access resume, eip: 0x0000000082a2bba7, gfn: 0x0000000000002735
  486. (XEN) [ 133.651948] emulating @ eip: 0x0000000082a2bba7, kind: 0
  487. (XEN) [ 133.651951] Mem event emulating: d2v0 32bit @ 0008:82a2bba7 -> 8b 4d 08 85 c9 74 05 89 39 89 71 04 5f 5e c9 c2
  488. (XEN) [ 133.651953] emulated successfully
  489. (XEN) [ 133.651963] mem access resume, eip: 0x0000000082a2bbaa, gfn: 0x0000000000002735
  490. (XEN) [ 133.651966] emulating @ eip: 0x0000000082a2bbaa, kind: 0
  491. (XEN) [ 133.651969] Mem event emulating: d2v0 32bit @ 0008:82a2bbaa -> 85 c9 74 05 89 39 89 71 04 5f 5e c9 c2 04 00 cc
  492. (XEN) [ 133.651970] emulated successfully
  493. (XEN) [ 133.651980] mem access resume, eip: 0x0000000082a2bbac, gfn: 0x0000000000002735
  494. (XEN) [ 133.651983] emulating @ eip: 0x0000000082a2bbac, kind: 0
  495. (XEN) [ 133.651985] Mem event emulating: d2v0 32bit @ 0008:82a2bbac -> 74 05 89 39 89 71 04 5f 5e c9 c2 04 00 cc cc cc
  496. (XEN) [ 133.651987] emulated successfully
  497. (XEN) [ 133.651997] mem access resume, eip: 0x0000000082a2bbb3, gfn: 0x0000000000002735
  498. (XEN) [ 133.652000] emulating @ eip: 0x0000000082a2bbb3, kind: 0
  499. (XEN) [ 133.652003] Mem event emulating: d2v0 32bit @ 0008:82a2bbb3 -> 5f 5e c9 c2 04 00 cc cc cc cc cc a1 c0 c4 a3 82
  500. (XEN) [ 133.652004] emulated successfully
  501. (XEN) [ 133.652014] mem access resume, eip: 0x0000000082a2bbb4, gfn: 0x0000000000002735
  502. (XEN) [ 133.652018] emulating @ eip: 0x0000000082a2bbb4, kind: 0
  503. (XEN) [ 133.652021] Mem event emulating: d2v0 32bit @ 0008:82a2bbb4 -> 5e c9 c2 04 00 cc cc cc cc cc a1 c0 c4 a3 82 48
  504. (XEN) [ 133.652022] emulated successfully
  505. (XEN) [ 133.652032] mem access resume, eip: 0x0000000082a2bbb5, gfn: 0x0000000000002735
  506. (XEN) [ 133.652035] emulating @ eip: 0x0000000082a2bbb5, kind: 0
  507. (XEN) [ 133.652038] Mem event emulating: d2v0 32bit @ 0008:82a2bbb5 -> c9 c2 04 00 cc cc cc cc cc a1 c0 c4 a3 82 48 48
  508. (XEN) [ 133.652040] emulated successfully
  509. (XEN) [ 133.652049] mem access resume, eip: 0x0000000082a2bbb6, gfn: 0x0000000000002735
  510. (XEN) [ 133.652053] emulating @ eip: 0x0000000082a2bbb6, kind: 0
  511. (XEN) [ 133.652056] Mem event emulating: d2v0 32bit @ 0008:82a2bbb6 -> c2 04 00 cc cc cc cc cc a1 c0 c4 a3 82 48 48 74
  512. (XEN) [ 133.652057] emulated successfully
  513. (XEN) [ 133.652077] mem access resume, eip: 0x000000008269165d, gfn: 0x0000000000002735
  514. (XEN) [ 133.652080] emulating @ eip: 0x000000008269165d, kind: 0
  515. (XEN) [ 133.652083] Mem event emulating: d2v0 32bit @ 0008:8269165d -> eb 25 64 8b 35 20 00 00 00 8d 55 f8 33 c9 e8 9f
  516. (XEN) [ 133.652084] emulated successfully
  517. (XEN) [ 133.652094] mem access resume, eip: 0x0000000082691684, gfn: 0x0000000000002735
  518. (XEN) [ 133.652098] emulating @ eip: 0x0000000082691684, kind: 0
  519. (XEN) [ 133.652101] Mem event emulating: d2v0 32bit @ 0008:82691684 -> 5e c9 c3 90 90 90 90 90 8b ff 55 8b ec 83 ec 10
  520. (XEN) [ 133.652102] emulated successfully
  521. (XEN) [ 133.652122] mem access resume, eip: 0x0000000082691685, gfn: 0x0000000000002735
  522. (XEN) [ 133.652125] emulating @ eip: 0x0000000082691685, kind: 0
  523. (XEN) [ 133.652128] Mem event emulating: d2v0 32bit @ 0008:82691685 -> c9 c3 90 90 90 90 90 8b ff 55 8b ec 83 ec 10 8b
  524. (XEN) [ 133.652130] emulated successfully
  525. (XEN) [ 133.652140] mem access resume, eip: 0x0000000082691686, gfn: 0x0000000000002735
  526. (XEN) [ 133.652143] emulating @ eip: 0x0000000082691686, kind: 0
  527. (XEN) [ 133.652146] Mem event emulating: d2v0 32bit @ 0008:82691686 -> c3 90 90 90 90 90 8b ff 55 8b ec 83 ec 10 8b 4d
  528. (XEN) [ 133.652147] emulated successfully
  529. (XEN) [ 133.652157] mem access resume, eip: 0x000000008268d408, gfn: 0x0000000000002735
  530. (XEN) [ 133.652160] emulating @ eip: 0x000000008268d408, kind: 0
  531. (XEN) [ 133.652164] Mem event emulating: d2v0 32bit @ 0008:8268d408 -> 2b 44 24 30 1b 54 24 34 89 87 a8 33 00 00 89 97
  532. (XEN) [ 133.652165] emulated successfully
  533. (XEN) [ 133.652175] mem access resume, eip: 0x000000008268d40c, gfn: 0x0000000000002735
  534. (XEN) [ 133.652178] emulating @ eip: 0x000000008268d40c, kind: 0
  535. (XEN) [ 133.652182] Mem event emulating: d2v0 32bit @ 0008:8268d40c -> 1b 54 24 34 89 87 a8 33 00 00 89 97 ac 33 00 00
  536. (XEN) [ 133.652183] emulated successfully
  537. (XEN) [ 133.652193] mem access resume, eip: 0x000000008268d410, gfn: 0x0000000000002735
  538. (XEN) [ 133.652196] emulating @ eip: 0x000000008268d410, kind: 0
  539. (XEN) [ 133.652199] Mem event emulating: d2v0 32bit @ 0008:8268d410 -> 89 87 a8 33 00 00 89 97 ac 33 00 00 33 c9 38 4c
  540. (XEN) [ 133.652200] emulated successfully
  541. (XEN) [ 133.652210] mem access resume, eip: 0x000000008268d416, gfn: 0x0000000000002735
  542. (XEN) [ 133.652213] emulating @ eip: 0x000000008268d416, kind: 0
  543. (XEN) [ 133.652217] Mem event emulating: d2v0 32bit @ 0008:8268d416 -> 89 97 ac 33 00 00 33 c9 38 4c 24 12 74 52 8b 87
  544. (XEN) [ 133.652218] emulated successfully
  545. (XEN) [ 133.652228] mem access resume, eip: 0x000000008268d41c, gfn: 0x0000000000002735
  546. (XEN) [ 133.652231] emulating @ eip: 0x000000008268d41c, kind: 0
  547. (XEN) [ 133.652233] Mem event emulating: d2v0 32bit @ 0008:8268d41c -> 33 c9 38 4c 24 12 74 52 8b 87 cc 03 00 00 8b 04
  548. (XEN) [ 133.652234] emulated successfully
  549. (XEN) [ 133.652244] mem access resume, eip: 0x000000008268d41e, gfn: 0x0000000000002735
  550. (XEN) [ 133.652248] emulating @ eip: 0x000000008268d41e, kind: 0
  551. (XEN) [ 133.652251] Mem event emulating: d2v0 32bit @ 0008:8268d41e -> 38 4c 24 12 74 52 8b 87 cc 03 00 00 8b 04 85 80
  552. (XEN) [ 133.652252] emulated successfully
  553. (XEN) [ 133.652262] mem access resume, eip: 0x000000008268d422, gfn: 0x0000000000002735
  554. (XEN) [ 133.652265] emulating @ eip: 0x000000008268d422, kind: 0
  555. (XEN) [ 133.652268] Mem event emulating: d2v0 32bit @ 0008:8268d422 -> 74 52 8b 87 cc 03 00 00 8b 04 85 80 2b 77 82 8b
  556. (XEN) [ 133.652269] emulated successfully
  557. (XEN) [ 133.652279] mem access resume, eip: 0x000000008268d476, gfn: 0x0000000000002735
  558. (XEN) [ 133.652282] emulating @ eip: 0x000000008268d476, kind: 0
  559. (XEN) [ 133.652286] Mem event emulating: d2v0 32bit @ 0008:8268d476 -> 5f 5e 5b 8b e5 5d c3 90 90 90 90 90 a1 80 c4 73
  560. (XEN) [ 133.652287] emulated successfully
  561. (XEN) [ 133.652331] mem access resume, eip: 0x000000008268d477, gfn: 0x0000000000002735
  562. (XEN) [ 133.652335] emulating @ eip: 0x000000008268d477, kind: 0
  563. (XEN) [ 133.652338] Mem event emulating: d2v0 32bit @ 0008:8268d477 -> 5e 5b 8b e5 5d c3 90 90 90 90 90 a1 80 c4 73 82
  564. (XEN) [ 133.652339] emulated successfully
  565. (XEN) [ 133.652349] mem access resume, eip: 0x000000008268d478, gfn: 0x0000000000002735
  566. (XEN) [ 133.652352] emulating @ eip: 0x000000008268d478, kind: 0
  567. (XEN) [ 133.652355] Mem event emulating: d2v0 32bit @ 0008:8268d478 -> 5b 8b e5 5d c3 90 90 90 90 90 a1 80 c4 73 82 56
  568. (XEN) [ 133.652356] emulated successfully
  569. (XEN) [ 133.652366] mem access resume, eip: 0x000000008268d479, gfn: 0x0000000000002735
  570. (XEN) [ 133.652369] emulating @ eip: 0x000000008268d479, kind: 0
  571. (XEN) [ 133.652372] Mem event emulating: d2v0 32bit @ 0008:8268d479 -> 8b e5 5d c3 90 90 90 90 90 a1 80 c4 73 82 56 3d
  572. (XEN) [ 133.652373] emulated successfully
  573. (XEN) [ 133.652383] mem access resume, eip: 0x000000008268d47b, gfn: 0x0000000000002735
  574. (XEN) [ 133.652386] emulating @ eip: 0x000000008268d47b, kind: 0
  575. (XEN) [ 133.652389] Mem event emulating: d2v0 32bit @ 0008:8268d47b -> 5d c3 90 90 90 90 90 a1 80 c4 73 82 56 3d 00 04
  576. (XEN) [ 133.652390] emulated successfully
  577. (XEN) [ 133.652400] mem access resume, eip: 0x000000008268d47c, gfn: 0x0000000000002735
  578. (XEN) [ 133.652404] emulating @ eip: 0x000000008268d47c, kind: 0
  579. (XEN) [ 133.652407] Mem event emulating: d2v0 32bit @ 0008:8268d47c -> c3 90 90 90 90 90 a1 80 c4 73 82 56 3d 00 04 00
  580. (XEN) [ 133.652408] emulated successfully
  581. (XEN) [ 133.652418] mem access resume, eip: 0x0000000082684e0d, gfn: 0x0000000000002735
  582. (XEN) [ 133.652421] emulating @ eip: 0x0000000082684e0d, kind: 0
  583. (XEN) [ 133.652425] Mem event emulating: d2v0 32bit @ 0008:82684e0d -> 80 3d 8f 79 77 82 00 74 02 f3 90 fb 90 90 fa f6
  584. (XEN) [ 133.652426] emulated successfully
  585. (XEN) [ 133.652436] mem access resume, eip: 0x0000000082684e14, gfn: 0x0000000000002735
  586. (XEN) [ 133.652439] emulating @ eip: 0x0000000082684e14, kind: 0
  587. (XEN) [ 133.652442] Mem event emulating: d2v0 32bit @ 0008:82684e14 -> 74 02 f3 90 fb 90 90 fa f6 83 54 1a 00 00 3f 74
  588. (XEN) [ 133.652443] emulated successfully
  589. (XEN) [ 133.652453] mem access resume, eip: 0x0000000082684e16, gfn: 0x0000000000002735
  590. (XEN) [ 133.652456] emulating @ eip: 0x0000000082684e16, kind: 0
  591. (XEN) [ 133.652458] Mem event emulating: d2v0 32bit @ 0008:82684e16 -> f3 90 fb 90 90 fa f6 83 54 1a 00 00 3f 74 13 b1
  592. (XEN) [ 133.652459] emulated successfully
  593. (XEN) [ 133.652469] mem access resume, eip: 0x0000000082684e18, gfn: 0x0000000000002735
  594. (XEN) [ 133.652472] emulating @ eip: 0x0000000082684e18, kind: 0
  595. (XEN) [ 133.652475] Mem event emulating: d2v0 32bit @ 0008:82684e18 -> fb 90 90 fa f6 83 54 1a 00 00 3f 74 13 b1 02 ff
  596. (XEN) [ 133.652476] emulated successfully
  597. (XEN) [ 133.652486] mem access resume, eip: 0x0000000082684e19, gfn: 0x0000000000002735
  598. (XEN) [ 133.652490] emulating @ eip: 0x0000000082684e19, kind: 0
  599. (XEN) [ 133.652492] Mem event emulating: d2v0 32bit @ 0008:82684e19 -> 90 90 fa f6 83 54 1a 00 00 3f 74 13 b1 02 ff 15
  600. (XEN) [ 133.652493] emulated successfully
  601. (XEN) [ 133.652503] mem access resume, eip: 0x0000000082684e1a, gfn: 0x0000000000002735
  602. (XEN) [ 133.652506] emulating @ eip: 0x0000000082684e1a, kind: 0
  603. (XEN) [ 133.652509] Mem event emulating: d2v0 32bit @ 0008:82684e1a -> 90 fa f6 83 54 1a 00 00 3f 74 13 b1 02 ff 15 a0
  604. (XEN) [ 133.652510] emulated successfully
  605. (XEN) [ 133.652519] mem access resume, eip: 0x0000000082684e1b, gfn: 0x0000000000002735
  606. (XEN) [ 133.652523] emulating @ eip: 0x0000000082684e1b, kind: 0
  607. (XEN) [ 133.652525] Mem event emulating: d2v0 32bit @ 0008:82684e1b -> fa f6 83 54 1a 00 00 3f 74 13 b1 02 ff 15 a0 e0
  608. (XEN) [ 133.652526] emulated successfully
  609. (XEN) [ 133.652528] Failed vm entry (exit reason 0x80000021) caused by invalid guest state (0).
  610. (XEN) [ 133.652529] ************* VMCS Area **************
  611. (XEN) [ 133.652530] *** Guest State ***
  612. (XEN) [ 133.652532] CR0: actual=0x000000008001003b, shadow=0x000000008001003b, gh_mask=ffffffffffffffff
  613. (XEN) [ 133.652533] CR4: actual=0x00000000000426f9, shadow=0x00000000000406f9, gh_mask=ffffffffffffffff
  614. (XEN) [ 133.652534] CR3 = 0x0000000000185000
  615. (XEN) [ 133.652535] PDPTE0 = 0x0000000000186001 PDPTE1 = 0x0000000000187001
  616. (XEN) [ 133.652536] PDPTE2 = 0x0000000000188001 PDPTE3 = 0x0000000000189001
  617. (XEN) [ 133.652538] RSP = 0x0000000082735c28 (0x0000000082735c28) RIP = 0x0000000082684e1c (0x0000000082684e1c)
  618. (XEN) [ 133.652539] RFLAGS=0x00000002 (0x00000002) DR7 = 0x0000000000000400
  619. (XEN) [ 133.652540] Sysenter RSP=000000008078b000 CS:RIP=0008:000000008264b0c0
  620. (XEN) [ 133.652541] sel attr limit base
  621. (XEN) [ 133.652543] CS: 0008 0c09b ffffffff 0000000000000000
  622. (XEN) [ 133.652544] DS: 0023 0c0f3 ffffffff 0000000000000000
  623. (XEN) [ 133.652545] SS: 0010 0c093 ffffffff 0000000000000000
  624. (XEN) [ 133.652546] ES: 0023 0c0f3 ffffffff 0000000000000000
  625. (XEN) [ 133.652547] FS: 0030 04093 00003748 0000000082738c00
  626. (XEN) [ 133.652548] GS: 0000 1c000 ffffffff 0000000000000000
  627. (XEN) [ 133.652549] GDTR: 000003ff 0000000080b95000
  628. (XEN) [ 133.652550] LDTR: 0000 1c000 ffffffff 0000000000000000
  629. (XEN) [ 133.652551] IDTR: 000007ff 0000000080b95400
  630. (XEN) [ 133.652552] TR: 0028 0008b 000020ab 00000000801da000
  631. (XEN) [ 133.652553] EFER = 0x0000000000000000 PAT = 0x0007010600070106
  632. (XEN) [ 133.652554] PreemptionTimer = 0x00000000 SM Base = 0x00000000
  633. (XEN) [ 133.652556] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000
  634. (XEN) [ 133.652557] Interruptibility = 00000000 ActivityState = 00000000
  635. (XEN) [ 133.652557] *** Host State ***
  636. (XEN) [ 133.652561] RIP = 0xffff82d080202150 (vmx_asm_vmexit_handler) RSP = 0xffff83041a037f90
  637. (XEN) [ 133.652563] CS=e008 SS=0000 DS=0000 ES=0000 FS=0000 GS=0000 TR=e040
  638. (XEN) [ 133.652564] FSBase=0000000000000000 GSBase=0000000000000000 TRBase=ffff83041a03cd00
  639. (XEN) [ 133.652565] GDTBase=ffff83041a02c000 IDTBase=ffff83041a038000
  640. (XEN) [ 133.652566] CR0=000000008005003b CR3=0000000406d5e000 CR4=00000000001526e0
  641. (XEN) [ 133.652568] Sysenter RSP=ffff83041a037fc0 CS:RIP=e008:ffff82d08024aa80
  642. (XEN) [ 133.652569] EFER = 0x0000000000000000 PAT = 0x0000050100070406
  643. (XEN) [ 133.652570] *** Control State ***
  644. (XEN) [ 133.652571] PinBased=0000003f CPUBased=b6a065fa SecondaryExec=000054eb
  645. (XEN) [ 133.652572] EntryControls=000051ff ExitControls=000fefff
  646. (XEN) [ 133.652573] ExceptionBitmap=00060002 PFECmask=00000000 PFECmatch=00000000
  647. (XEN) [ 133.652574] VMEntry: intr_info=800000d1 errcode=00000000 ilen=00000000
  648. (XEN) [ 133.652575] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003
  649. (XEN) [ 133.652576] reason=80000021 qualification=0000000000000000
  650. (XEN) [ 133.652577] IDTVectoring: info=800000d1 errcode=00000000
  651. (XEN) [ 133.652578] TSC Offset = 0xffffff926f9c2562
  652. (XEN) [ 133.652579] TPR Threshold = 0x00 PostedIntrVec = 0x00
  653. (XEN) [ 133.652580] EPT pointer = 0x0000000406d4401e EPTP index = 0x0000
  654. (XEN) [ 133.652581] PLE Gap=00000080 Window=00001000
  655. (XEN) [ 133.652582] Virtual processor ID = 0x0502 VMfunc controls = 0000000000000000
  656. (XEN) [ 133.652583] **************************************
  657. (XEN) [ 133.652584] domain_crash called from vmx.c:2771
  658. (XEN) [ 133.652585] Domain 2 (vcpu#0) crashed on cpu#1:
  659. (XEN) [ 133.652588] ----[ Xen-4.6.1 x86_64 debug=y Not tainted ]----
  660. (XEN) [ 133.652589] CPU: 1
  661. (XEN) [ 133.652590] RIP: 0008:[<0000000082684e1c>]
  662. (XEN) [ 133.652591] RFLAGS: 0000000000000002 CONTEXT: hvm guest (d2v0)
  663. (XEN) [ 133.652593] rax: 00000000000fcad0 rbx: 0000000082738c00 rcx: 0000000000000000
  664. (XEN) [ 133.652594] rdx: 0000000000000000 rsi: 0000000082742380 rdi: 0000000084779170
  665. (XEN) [ 133.652595] rbp: 0000000083d2cd08 rsp: 0000000082735c28 r8: 0000000000000000
  666. (XEN) [ 133.652596] r9: 0000000000000000 r10: 0000000000000000 r11: 0000000000000000
  667. (XEN) [ 133.652597] r12: 0000000000000000 r13: 0000000000000000 r14: 0000000000000000
  668. (XEN) [ 133.652598] r15: 0000000000000000 cr0: 000000008001003b cr4: 00000000000406f9
  669. (XEN) [ 133.652599] cr3: 0000000000185000 cr2: 000000007ffda000
  670. (XEN) [ 133.652601] ds: 0023 es: 0023 fs: 0030 gs: 0000 ss: 0010 cs: 0008
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement