From nobody Thu Jun 02 10:37:47 2022 X-Original-To: freebsd-xen@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 34BE21B5B0C4 for ; Thu, 2 Jun 2022 10:38:27 +0000 (UTC) (envelope-from prvs=1458da55d=roger.pau@citrix.com) Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com [216.71.155.168]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.hc3370-68.iphmx.com", Issuer "HydrantID Server CA O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4LDMtV0RL4z3pJL for ; Thu, 2 Jun 2022 10:38:25 +0000 (UTC) (envelope-from prvs=1458da55d=roger.pau@citrix.com) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1654166305; h=date:from:to:cc:subject:message-id:references: in-reply-to:mime-version; bh=7BgHEbjj+yXUv6aW9bZyEf6+ykMSyhoJg6Bo5hqqmH4=; b=iX+IjO9yM4gZqdYOzbyGCUtCJhyMoLYINvqRpsxVnfT59nKKF3mlXGTQ 9bxg05jrwffv1EEr3N94IUGZkUA8tfzeRHsWhDI2fC5TKGPOfYUVFulVd +Cxam3SGcl5r6eAToNVPqESp82zLr+A/JNqVo6Ll+UmnLvAtl70fUgqwV w=; X-IronPort-RemoteIP: 104.47.58.102 X-IronPort-MID: 72053765 X-IronPort-Reputation: None X-IronPort-Listener: OutboundMail X-IronPort-SenderGroup: RELAY_O365 X-IronPort-MailFlowPolicy: $RELAYED IronPort-Data: A9a23:lWuU1aMMrU2C/8zvrR3+lsFynXyQoLVcMsEvi/4bfWQNrUoh32FRn TcZWW+APvyNYWGhfo8lOo7k8h4BscKGxtFlHQto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFYMpBsJ00o5wbZn2tcw3bBVPivW0 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z4 shHqLywW0QTOvfiqbg4aAd7Mj5YFPgTkFPHCSDXXc276WTjKiOp79AwSUY8MMsf5/p9BnxI+ boAMjcRYxufhuWwhrWmVu1rgcdlJ87uVG8dkig4kXeFUrB7EdaaG/+iCdxwhV/cguhUGvnTf YwBYCdHZxXceRxffFwQDfrSmc/33CGiKGIG9Tp5o4Ib0Wf00RBN7ISwavWOX/+sGJtTkBmx8 zeuE2PRR0ty2Mak4TCY8mirmcfJkynwUYZUE6e3ntZkmlCezHcfTQ0bU3O1u/S0gFWyHdVFJ CQpFjEGqKEz8AmnS4f7Vhjh+Hqc5EdEAZxXDvEw7xyLxuzM+QGFC2MYTzlHLts7qMsxQj9s3 ViM9z/0OQFSXHSuYSr13t+pQfmaZUD58Udqifc4cDY4 IronPort-HdrOrdr: A9a23:eB8Ug6u0AdyS4V8kG5JvQTox7skC6oMji2hC6mlwRA09TyXGra 2TdaUgvyMc1gx7ZJhBo7+90We7MBbhHLpOkPEs1NaZLXDbUQ6TQL2KgrGD/9SNIVycygcZ79 YaT0EcMqyNMbEZt7ec3ODQKb9Jrri6GeKT9IHjJh9WPHxXgspbnmNE42igYy9LrF4sP+tCKH PQ3LswmxOQPVAsKuirDHgMWObO4/XNiZLdeBYDQzoq8hOHgz+E4KPzV0Hw5GZXbxp/hZMZtU TVmQ3w4auu99m91x/nzmfWq7BbgsHoxNdvDNGFzuIVNjLvoAC1Y5kJYczKgBkF5MWUrHo6mt jFpBkte+x19nPqZ2mw5SDg3gHxuQxenkPK+Bu9uz/OsMb5TDU1B45qnoRCaCbU7EImoZVVzL 9L93jxjesaMTrw2ADGo/TYXRBjkUS55VA4l/QIsnBZWYwCLJdMsI0k+l9PGptoJlO21GkeKp ghMCjg3ocWTbvDBEqp/lWHgebcFEjbJy32DXTr4aeuontrdHMQ9Tpr+CVQpAZDyHsHceg72w 31CNUWqFhwdL5mUUtcPpZ0fSLlMB27ffrzWFjiUWjPJeUgB0/njaLRzfEc2NyKEaZ4v6fa3q 6xG29liQ== X-IronPort-AV: E=Sophos;i="5.91,270,1647316800"; d="scan'208";a="72053765" Received: from mail-dm6nam10lp2102.outbound.protection.outlook.com (HELO NAM10-DM6-obe.outbound.protection.outlook.com) ([104.47.58.102]) by ob1.hc3370-68.iphmx.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 02 Jun 2022 06:38:00 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L6XOn2eHWdNruxfxiZa+IQdKMvetxbFLcvv6rQ6ZjZzqBNC0wBxtfdXNJdoBhLXer9KDw2eyefBNPKvH7aG20oE+RfpHuSgTY7L6DmPfHuJWWBrDEokio0xqQh4DFOeUZc4WTC2HvVkBIWOTytgV+m18Wti8d0pKgD38NB1kK+ggAPNeZXygcln93wwtMOorvtdF2hjj+Kl4OMZG3tHVd6EDRz/P/PxqYl6FlMwzgMAiA5Q1lWBUexlwe+sdOBJ4RLaHMPPfCZGbwYDRMFDsjAUepJIHsgnCmDUYu1i6b05Gz4WY2cka34Gx50nfmhiACIge5ZZ/DlXlLAhiE/udeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=zRdUi/O/YKuqh+OXdfywGukFsq7OPDokC/eEW52CwpQ=; b=a0QKCud1zwWW6Cx9yqmlVTHRhuEUCvOUm+1lBnTCU7w8sc58Jc5X2tu4AeXJi/rCssOVRaqQv73rCnTw6Gz601KZn3gFYYzo0Ur15OwBAl9tOkev5meIIhBr9Okx8YWQbSxHSjFKUCKxUMR87p3fQIET8TFFa8QGdONaeBbZgnUwXL+S7IHEn5Nl01ijWBW4ncdHcaIgRAxi09fqnba8BDhEx3vMCLzvuVITUsCIoJdxSKQmMR/KzH0krngTos58jozvMim2VanP1aPzXBKZePwLT/WXYBywwKwtyjUMI3GNppmjk/LtCKZV9r2ZkugFE072DHSxLkyRN5fvoK4YVQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zRdUi/O/YKuqh+OXdfywGukFsq7OPDokC/eEW52CwpQ=; b=JYAYCNCgxz258Q5EeuelrK2WOVTxKqH+KF4JsuMADXoOvLuvGrZumZ6sXqbF5REQoeJ9Lsl/bmQaLQAuZvhKSDC88BOJLnj6698qu9Umuy9YWK+vbF4sSRJxgUXscd9m4wVff/RjXcqmumywnQh4aa5b2mHc41UgwkuZEAwU5/M= Received: from DS7PR03MB5608.namprd03.prod.outlook.com (2603:10b6:5:2c9::18) by SJ0PR03MB5774.namprd03.prod.outlook.com (2603:10b6:a03:2da::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5314.13; Thu, 2 Jun 2022 10:37:51 +0000 Received: from DS7PR03MB5608.namprd03.prod.outlook.com ([fe80::5df3:95ce:4dfd:134e]) by DS7PR03MB5608.namprd03.prod.outlook.com ([fe80::5df3:95ce:4dfd:134e%4]) with mapi id 15.20.5314.015; Thu, 2 Jun 2022 10:37:51 +0000 Date: Thu, 2 Jun 2022 12:37:47 +0200 From: Roger Pau =?utf-8?B?TW9ubsOp?= To: Brian Buhrow Cc: freebsd-xen@freebsd.org Subject: Re: FreeBSD-13.1 and Xen-4.15.0 crash formerly working NetBSD-99.77 domu's Message-ID: References: <202206020916.2529Gbgx002408@nfbcal.org> Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <202206020916.2529Gbgx002408@nfbcal.org> X-ClientProxiedBy: LO2P265CA0070.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:60::34) To DS7PR03MB5608.namprd03.prod.outlook.com (2603:10b6:5:2c9::18) List-Id: Discussion List-Archive: https://lists.freebsd.org/archives/freebsd-xen List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-xen@freebsd.org X-BeenThere: freebsd-xen@freebsd.org MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 101a7c1e-76df-4cf4-e436-08da4483f18a X-MS-TrafficTypeDiagnostic: SJ0PR03MB5774:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6512007)(26005)(9686003)(6666004)(186003)(4326008)(66476007)(66946007)(66556008)(6916009)(8676002)(85182001)(5660300002)(8936002)(508600001)(966005)(6486002)(38100700002)(86362001)(6506007)(83380400001)(33716001)(2906002)(316002)(82960400001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?VkZ5R2hmUzZxanNkT0x0VUdlU2Rmb3dBallQb3ZmQUVxcWwxRlVCd2dIQzFL?= =?utf-8?B?NW1EcG9OWFhla0g2YTAyVTlKK0s3UDZtWnNzSDFzRmVtdE1hcGpLZTM4QUZP?= =?utf-8?B?aTA0Kzg5ZmZOV0RyRGZhR3F2Q3dKWTd6ZGFscFBlSVFObmwweU96VTlCZGlW?= =?utf-8?B?WDNiaXZ3ejg4by9SUnl3NnJDenZTMmdEM1FBL0liSWZsVlh5cWFOWVdHenl6?= =?utf-8?B?VURFV3R6R0NFRk5HSUZYbUFiSFhJTlRVU0UvQmNBOWozNy9nYUJGeSs2ZjdI?= =?utf-8?B?VVFhWEoyMmExN1hZbGpWYjd4dldzZXNjZEZjbWoyQ0g3clA4UThsUkdNV2hu?= =?utf-8?B?RVhLNTNsSW82dlJSMGZOVXlYeWVNTkNTWHZCTks0N3hDSzZUdmlTSXhnb1JL?= =?utf-8?B?MWpIdXhFS0tVczh4aEVpUDZadUZUZVJVQm16aFQyOCttdllPWXMxNzNMaGxO?= =?utf-8?B?dzczOHlJTlVlU1g4dTNSWFo2ZDlFbVdjTzUwTmFtanc0UW1aaWJYdy9WMVkx?= =?utf-8?B?ZzhveTJzYkFoY2dPV05CTmVMamoyVGlCTDBsbFVOeFJta3VZc2QxdXhnOG5u?= =?utf-8?B?NFZPdFFEMUZnYnl5dzFna25LaDh5R1E0VzlYNnFlSlNIdEgzMW0zdUZ5dFZQ?= =?utf-8?B?TkVYc2liVUp5N1JScXlyRnQ4TCt2MEJJVy90azhVQUtCVEx4WjVNNVVQWURp?= =?utf-8?B?czFRdlgwam5uTW9Sd0pZZTlZb1hnWGJ1SDZtSGFrZlQrK1ByVEJ6cXpUblFn?= =?utf-8?B?cHF1WWJGYlZwOWFRcGxVSTRNOVFrTVBVVVJ6RzB1c1ErRjJqMVpMempjV2Zn?= =?utf-8?B?SkF4cGozVE1hR0RoRTVZeFpzcjlXa2RJRGZDd1YxZWNLSDNiVVNQMXNmRith?= =?utf-8?B?UklLU2k5Z25Pb0krOU5WTjBNMTlvYnFYbFZvVXZ5MHZYczlPL0xIVm91VWla?= =?utf-8?B?N2pJdmVldE1qWXFOdk9NWXRWNHVnR04rQ2lYS2xUUm5zNmR0aGl4MEhPK25m?= =?utf-8?B?LzgvenZXS3pGVHk3UzlFN0w0ZnlBd01MK256QkpUa1JpWS9aK3JPaWI0eDNQ?= =?utf-8?B?d0NldUtNS0JMRisybkJPQjg2Z0pMaG5WYUtYcmZwTjRnL29VWkk3cThTNUQ1?= =?utf-8?B?aGowbVd6Y1pLUVg4MDdXMy9Xell5R0FWVGdnb1kyYldDL3pWRENxR2ErZ05m?= =?utf-8?B?Z1RQaGpQczV4cEVrNUxzakdKQVJ2Y0FEZk1wWEdLQXhPN0xTc3g0SmtZOExw?= =?utf-8?B?MGF4Qm5qNGp0YmxMQzUzdHIreHBjbzB5VU9FS1ZhOFBMV1pxaTlvOEoyTHN5?= =?utf-8?B?czVDWFlCZzNpNFBPSFphYW1NNkQvOThjTDV3cEJFZFEwRklRSlJteEVVckJH?= =?utf-8?B?dCt1YytMUDN4UXg1WEtDRU53bWlRSkNqVmV4MXhqOXU1T01VS2I4ekZESzFO?= =?utf-8?B?eXEyMWpuWmFLa3dwaFVIMThvZlZkdTJZc1Z1a3VaeHFISTdGaTFMbVhLRUI2?= =?utf-8?B?Zy9KWWhlSlBEdGNXN0RvckhLeFBPaEtQb2FKV2FnS0wyTDdwY2F5Q0R3R2JZ?= =?utf-8?B?bHd0a3Zyb2Q4RUZOVTUzWG5lblNZcVdydTFtMk55ZmM5eVhDVU5nVnA0RFlF?= =?utf-8?B?ZDA1blhTaGg4Sll1clppMHZ3eWZBa0s1b1VyZUNRZnBLWWI0a243Rm10QkRq?= =?utf-8?B?RURBQXp5ZmNZMVFRMW1ENzhrbDBlWmxpRjlSd0N1Z2JjZVR1YzgzeTRTby9H?= =?utf-8?B?R09ZWWhRbWhpMEVPTU5vMEVvOFZoS3ZUMmhVVnBwdFRHdU1hcUhYZ3MwbEtl?= =?utf-8?B?K3poQW05RGxjNVE4VHUrSFhJUVhmNWVweFJxZjhMMXB3QzZlUmZ6S2pOWWhs?= =?utf-8?B?UFdoQzhyNFo2aXVtVUZLK3hZL0Zuc0hiZ0pqWU9OTExOVFExNmZsRFNpMXVn?= =?utf-8?B?eUVwbzIwdXBrYTZ5VDlEbjNUS00zZk5qNWk5a1VHZmtGMHJ0UjN3OSt1M3Iv?= =?utf-8?B?YlNwVGM0L0lrRGVPd1dBT0E4MXZpcnQ5azROa0pnbHFUUVNobENJc1lqYy82?= =?utf-8?B?bXVuK0hUdjkxNml2dnNUYlIvS0RjUERDSmJWbHRWSXJndDc0NktYdnZlbjRQ?= =?utf-8?B?UVA4dzg4NmRxdGRmeXNlS3dOaEx1YTV3TmJlbVZJdjZ3bkFtdEhTN1BwWHV4?= =?utf-8?B?UUlyZ2NSdmg4akNQNjZ2M0dqY2o3MDBPTVZvWVdPZGxGLzRQeE41R1drbUlE?= =?utf-8?B?RzBCeFhVS3F5SkJ5YnEvdXI2REZXMCtSc2pHMmo1d1IyazVVa0hoMUFjYTlY?= =?utf-8?B?bXh0d0NTdzV6UVYycTg3VU40Vk5aVm4rV2FMTDdqQXRoY1VuOEpFNEhqTklB?= =?utf-8?Q?9/ERcsRzr57dtZ+Y=3D?= X-OriginatorOrg: citrix.com X-MS-Exchange-CrossTenant-Network-Message-Id: 101a7c1e-76df-4cf4-e436-08da4483f18a X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Jun 2022 10:37:51.1412 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: QctdjC0aGihgybDiRDUXpLEE+mosIskgRsRgMFoBEaZpOQo6G1mJ9F0UDRLZLhVJvhxp8sNWGWOz2tCxMJDKFg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB5774 X-Rspamd-Queue-Id: 4LDMtV0RL4z3pJL X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=citrix.com header.s=securemail header.b=iX+IjO9y; dkim=pass header.d=citrix.onmicrosoft.com header.s=selector2-citrix-onmicrosoft-com header.b=JYAYCNCg; arc=pass ("microsoft.com:s=arcselector9901:i=1"); dmarc=pass (policy=reject) header.from=citrix.com; spf=pass (mx1.freebsd.org: domain of "prvs=1458da55d=roger.pau@citrix.com" designates 216.71.155.168 as permitted sender) smtp.mailfrom="prvs=1458da55d=roger.pau@citrix.com" X-Spamd-Result: default: False [-6.20 / 15.00]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+exists:216.71.155.168.spf.hc3370-68.iphmx.com]; RCVD_DKIM_ARC_DNSWL_MED(-0.50)[]; RCVD_COUNT_THREE(0.00)[4]; RCVD_IN_DNSWL_MED(-0.20)[216.71.155.168:from]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[citrix.com,reject]; DKIM_TRACE(0.00)[citrix.com:+,citrix.onmicrosoft.com:+]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:16417, ipnet:216.71.154.0/23, country:US]; FROM_NEQ_ENVFROM(0.00)[roger.pau@citrix.com,prvs=1458da55d=roger.pau@citrix.com]; ARC_ALLOW(-1.00)[microsoft.com:s=arcselector9901:i=1]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; R_DKIM_ALLOW(-0.20)[citrix.com:s=securemail,citrix.onmicrosoft.com:s=selector2-citrix-onmicrosoft-com]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_SHORT(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[text/plain]; FORGED_SENDER_VERP_SRS(0.00)[]; DWL_DNSWL_LOW(-1.00)[citrix.com:dkim]; TO_MATCH_ENVRCPT_SOME(0.00)[]; MLMMJ_DEST(0.00)[freebsd-xen]; MID_RHS_NOT_FQDN(0.50)[] X-ThisMailContainsUnwantedMimeParts: N On Thu, Jun 02, 2022 at 02:16:35AM -0700, Brian Buhrow wrote: > hello. I just finished updating one of my FreeBSD Xen servers from 12.2-stable to > 13.1-release. After a very painful upgrade process, which I'll detail in another e-mail, I > discovered that my domu's running NetBSD-99.77, which had been running without any trouble > whatsoever in pv mode, are failing with an unhandled general protection fault. Is this a known > issue, a configuration error on my part, a bug in the NetBSD kernel, or something completely > unknown? The details from xen from a sample crash are listed below. I'm happy to get more > details, if they would be helpful. Just tell me what you would like to see and how I might go > about getting it. Any light anyone can shed on this issue would be helpful. > > -thanks > -Brian > > Xen host details: > > %uname -a > FreeBSD xen-lothlorien.nfbcal.org 13.1-RELEASE FreeBSD 13.1-RELEASE releng/13.1-n250148-fc952ac2212 GENERIC amd64 > > Xen dmesg output: > > BC85DEB0, 0038 (r1 INTEL DQ67SW 1072009 AMI. 4) > (XEN) ACPI: ASF! BC85DEE8, 00A0 (r32 INTEL DQ67SW 1 TFSM F4240) > (XEN) ACPI: DMAR BC85DF88, 00E8 (r1 INTEL DQ67SW 1 INTL 1) > (XEN) System RAM: 32683MB (33467896kB) > (XEN) Domain heap initialised > (XEN) ACPI: 32/64X FACS address mismatch in FADT - bcbdbf80/0000000000000000, using 32 > (XEN) IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 > (XEN) Enabling APIC mode: Flat. Using 1 I/O APICs > (XEN) PCI: Not using MCFG for segment 0000 bus 00-3f > (XEN) Switched to APIC driver x2apic_cluster > (XEN) CPU0: 1600 ... 3100 MHz > (XEN) xstate: size: 0x340 and states: 0x7 > (XEN) Speculative mitigation facilities: > (XEN) Hardware features: IBRS/IBPB STIBP L1D_FLUSH SSBD > (XEN) Compiled-in support: SHADOW_PAGING > (XEN) Xen settings: BTI-Thunk N/A, SPEC_CTRL: IBRS+ SSBD-, Other: IBPB L1D_FLUSH BRANCH_HARDEN > (XEN) L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 36, Safe address 1000000000 > (XEN) Support for HVM VMs: MSR_SPEC_CTRL RSB EAGER_FPU > (XEN) Support for PV VMs: MSR_SPEC_CTRL RSB EAGER_FPU > (XEN) XPTI (64-bit PV only): Dom0 enabled, DomU enabled (without PCID) > (XEN) PV L1TF shadowing: Dom0 disabled, DomU disabled > (XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2) > (XEN) Initializing Credit2 scheduler > (XEN) Platform timer is 14.318MHz HPET > (XEN) Detected 3093.000 MHz processor. > (XEN) Intel VT-d iommu 0 supported page sizes: 4kB > (XEN) Intel VT-d iommu 1 supported page sizes: 4kB > (XEN) Intel VT-d Snoop Control not enabled. > (XEN) Intel VT-d Dom0 DMA Passthrough not enabled. > (XEN) Intel VT-d Queued Invalidation enabled. > (XEN) Intel VT-d Interrupt Remapping enabled. > (XEN) Intel VT-d Posted Interrupt not enabled. > (XEN) Intel VT-d Shared EPT tables not enabled. > (XEN) I/O virtualisation enabled > (XEN) - Dom0 mode: Relaxed > (XEN) Interrupt remapping enabled > (XEN) Enabled directed EOI with ioapic_ack_old on! > (XEN) ENABLING IO-APIC IRQs > (XEN) -> Using old ACK method > (XEN) Allocated console ring of 16 KiB. > (XEN) VMX: Supported advanced features: > (XEN) - APIC MMIO access virtualisation > (XEN) - APIC TPR shadow > (XEN) - Extended Page Tables (EPT) > (XEN) - Virtual-Processor Identifiers (VPID) > (XEN) - Virtual NMI > (XEN) - MSR direct-access bitmap > (XEN) - Unrestricted Guest > (XEN) HVM: ASIDs enabled. > (XEN) VMX: Disabling executable EPT superpages due to CVE-2018-12207 > (XEN) HVM: VMX enabled > (XEN) HVM: Hardware Assisted Paging (HAP) detected > (XEN) HVM: HAP page sizes: 4kB, 2MB > (XEN) Brought up 4 CPUs > (XEN) Scheduling granularity: cpu, 1 CPU per sched-resource > (XEN) Dom0 has maximum 440 PIRQs > (XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0 > (XEN) WARNING: PVH is an experimental mode with limited functionality > (XEN) Initial low memory virq threshold set at 0x4000 pages. > (XEN) Scrubbing Free RAM in background > (XEN) Std. Loglevel: Errors and warnings > (XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings) > (XEN) Xen is relinquishing VGA console. > (XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input) > (XEN) Freed 604kB init memory > > > > (XEN) d2v0 Unhandled general protection fault fault/trap [#13, ec=0000] > (XEN) domain_crash_sync called from entry.S: fault at ffff82d040300b58 x86_64/entry.S#create_bounce_frame+0x14f/0x167 > (XEN) Domain 2 (vcpu#0) crashed on cpu#1: > (XEN) ----[ Xen-4.15.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 1 > (XEN) RIP: e033:[] > (XEN) RFLAGS: 0000000000000202 EM: 1 CONTEXT: pv guest (d2v0) > (XEN) rax: 0000000000070106 rbx: 000000000197d000 rcx: 0000000000000277 This is NetBSD trying to write to CR_PAT MSR (see rcx being 0x277). You will need to boot the guest with: msr_related=1 In the xl.cfg config file. This has been fixed in NetBSD HEAD, but the fix hasn't made it to any release IIRC: http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/arch/x86/x86/pmap.c See Revision 1.410. This is because of a change in Xen 4.15 that made the handling of MSRs accesses more strict, as a hardening effort resulting from XSA-351: https://xenbits.xen.org/xsa/advisory-351.html Thanks, Roger.