From nobody Thu Jun 02 09:42:30 2022 X-Original-To: freebsd-xen@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 47D231B491D8 for ; Thu, 2 Jun 2022 09:42:37 +0000 (UTC) (envelope-from buhrow@nfbcal.org) Received: from nfbcal.org (ns.NFBCAL.ORG [157.22.230.125]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "nfbcal.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4LDLf40MGrz3kXg for ; Thu, 2 Jun 2022 09:42:35 +0000 (UTC) (envelope-from buhrow@nfbcal.org) Received: from nfbcal.org (localhost [127.0.0.1]) by nfbcal.org (8.15.2/8.14.1-NFBNETBSD) with ESMTPS id 2529gVNt005892 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 2 Jun 2022 02:42:32 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.102.2 at lothlorien.nfbcal.org Received: (from buhrow@localhost) by nfbcal.org (8.15.2/8.12.11) id 2529gVZX005027; Thu, 2 Jun 2022 02:42:31 -0700 (PDT) Message-Id: <202206020942.2529gVZX005027@nfbcal.org> From: Brian Buhrow Date: Thu, 2 Jun 2022 02:42:30 -0700 X-Mailer: Mail User's Shell (7.2.6 beta(4.pl1)+dynamic 20000103) To: freebsd-xen@freebsd.org Subject: Upgrade from FreeBSD-12.2 to FreeBSD-13.1 with xen-4.14.0 is not straightforward. Cc: buhrow@nfbcal.org X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (nfbcal.org [127.0.0.1]); Thu, 02 Jun 2022 02:42:32 -0700 (PDT) X-Rspamd-Queue-Id: 4LDLf40MGrz3kXg X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of buhrow@nfbcal.org designates 157.22.230.125 as permitted sender) smtp.mailfrom=buhrow@nfbcal.org X-Spamd-Result: default: False [-3.30 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+a:ns.nfbcal.org:c]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[nfbcal.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-1.00)[-1.000]; RCPT_COUNT_TWO(0.00)[2]; MLMMJ_DEST(0.00)[freebsd-xen]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:7091, ipnet:157.22.0.0/16, country:US]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-ThisMailContainsUnwantedMimeParts: N List-Id: Discussion List-Archive: https://lists.freebsd.org/archives/freebsd-xen List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-xen@freebsd.org X-BeenThere: freebsd-xen@freebsd.org hello. In the process of updating one of my FreeBSD-xen servers from FreeBSD-12.2 to FreeBSD-13.1, I ran into what I think is a documentation omition. After I updated the operating system, but not the xen kernel or xen tools, I got the following error messages shown below. Essentially, the xen kernel claimed it couldn't find the FreeBSD kernel. After struggling for a long time to get the xen-4.15.0 tools built, I was able to boot the system and bring up some of the domu's, see my other recent message on this topic. However, I don't see anywhere in the documentation or the wiki pages that xen-4.14.0 doesn't work with FreeBSD-13.1. Nor do I see any warnings about this issue. It occurred to me that I'd probably done this the hard way and the real problem was that when I updated FreeBSD, I failed to update the gptboot file in the boot partition, which was originally installed with FreeBSD-12.1. When I updated the xen tools and kernel to 4.15.0, I also updated the gptboot file in the boot partition of the boot drive. my question is, is this a known issue? That is, FreeBSD-13 needs a new gptboot installed in order to boot xen at all? If that's right, can we get this documented somewhere, so folks dont run into this as they update from FreeBSD-12 to FreeBSD-13? If my theory is correct, a simple update of the gptboot file on the boot partition would have been sufficient to get xen 4.14.0 running and I wouldn't have had to spend the day rebuilding a ton of stuff to get the xen tools built for 4.15.0. Also, I wouldn't now be working on resolving the general protection fault error I wrote about elsewhere. Is this correct or was I required to update to 4.15.0 when I went to FreeBSD-13.1? -thanks -Brian /boot/config: -h BIOS drive C: is disk0 BIOS drive D: is disk1 BIOS drive E: is disk2 BIOS drive F: is disk3 |/-\|/-\|BIOS 614kB/523264kB available memory FreeBSD/x86 bootstrap loader, Revision 1.1 Loading /boot/defaults/loader.conf Loading /boot/device.hints Loading /boot/loader.conf Loading /boot/loader.conf.local /boot/xen data=0x26b9a8+0x146658 - Loading kernel... /boot/kernel/kernel /boot/entropy size=0x1000 /etc/hostid size=0x25 /boot/kernel/ipmi.ko size 0x11968 at 0x21b1000 loading required module 'smbus' /boot/kernel/smbus.ko size 0x3cb0 at 0x21c3000 /boot/kernel/tpm.ko |size 0xad70 at 0x21c7000 /boot/kernel/geom_mirror.ko /size 0x20c80 at 0x21d2000 /boot/firmware/intel-ucode.bin -\size=0x303800 Xen 4.14.0 (XEN) Xen version 4.14.0 (buhrow@) (FreeBSD clang version 8.0.1 (tags/RELEASE_801/final 366581) (based on LLVM 8.0.1)) debug=n Tue Nov 10 15:26:53 PST 2020 (XEN) Latest ChangeSet: (XEN) Bootloader: FreeBSD Loader (XEN) Command line: dom0_mem=8192m dom0_max_vcpus=2 dom0=pvh pv-l1tf=off,domu=off console=com1,vga com1=9600,8n1 (XEN) Xen image load base address: 0 (XEN) Video information: (XEN) VGA is text mode 80x25, font 8x16 (XEN) VBE/DDC methods: none; EDID transfer time: 0 seconds (XEN) EDID info not retrieved because no DDC retrieval method detected (XEN) Disc information: (XEN) Found 4 MBR signatures (XEN) Found 4 EDD information structures (XEN) Xen-e820 RAM map: (XEN) [0000000000000000, 00000000000997ff] (usable) (XEN) [0000000000099800, 000000000009ffff] (reserved) (XEN) [00000000000e0000, 00000000000fffff] (reserved) (XEN) [0000000000100000, 000000001fffffff] (usable) (XEN) [0000000020000000, 00000000201fffff] (reserved) (XEN) [0000000020200000, 000000003fffffff] (usable) (XEN) [0000000040000000, 00000000401fffff] (reserved) (XEN) [0000000040200000, 00000000bc855fff] (usable) (XEN) [00000000bc856000, 00000000bc85efff] (ACPI data) (XEN) [00000000bc85f000, 00000000bc8a9fff] (ACPI NVS) (XEN) [00000000bc8aa000, 00000000bc8b1fff] (usable) (XEN) [00000000bc8b2000, 00000000bc9a4fff] (reserved) (XEN) [00000000bc9a5000, 00000000bc9a6fff] (usable) (XEN) [00000000bc9a7000, 00000000bcbc5fff] (reserved) (XEN) [00000000bcbc6000, 00000000bcbc6fff] (usable) (XEN) [00000000bcbc7000, 00000000bcbd6fff] (reserved) (XEN) [00000000bcbd7000, 00000000bcbf4fff] (ACPI NVS) (XEN) [00000000bcbf5000, 00000000bcc18fff] (reserved) (XEN) [00000000bcc19000, 00000000bcc5bfff] (ACPI NVS) (XEN) [00000000bcc5c000, 00000000bce7bfff] (reserved) (XEN) [00000000bce7c000, 00000000bcffffff] (usable) (XEN) [00000000bd800000, 00000000bf9fffff] (reserved) (XEN) [00000000fed1c000, 00000000fed3ffff] (reserved) (XEN) [00000000ff000000, 00000000ffffffff] (reserved) (XEN) [0000000100000000, 000000083e5fffff] (usable) (XEN) New Xen image base address: 0xbc200000 (XEN) ACPI: RSDP 000F0450, 0024 (r2 INTEL) (XEN) ACPI: XSDT BC856070, 0064 (r1 INTEL DQ67SW 1072009 AMI 10013) (XEN) ACPI: FACP BC85DBC0, 00F4 (r4 INTEL DQ67SW 1072009 AMI 10013) (XEN) ACPI: DSDT BC856168, 7A54 (r2 INTEL DQ67SW 16 INTL 20051117) (XEN) ACPI: FACS BCBDBF80, 0040 (XEN) ACPI: APIC BC85DCB8, 0072 (r3 INTEL DQ67SW 1072009 AMI 10013) (XEN) ACPI: TCPA BC85DD30, 0032 (r2 INTEL DQ67SW 1 MSFT 1000013) (XEN) ACPI: SSDT BC85DD68, 0102 (r1 INTEL DQ67SW 1 MSFT 3000001) (XEN) ACPI: MCFG BC85DE70, 003C (r1 INTEL DQ67SW 1072009 MSFT 97) (XEN) ACPI: HPET BC85DEB0, 0038 (r1 INTEL DQ67SW 1072009 AMI. 4) (XEN) ACPI: ASF! BC85DEE8, 00A0 (r32 INTEL DQ67SW 1 TFSM F4240) (XEN) ACPI: DMAR BC85DF88, 00E8 (r1 INTEL DQ67SW 1 INTL 1) (XEN) System RAM: 32683MB (33467896kB) (XEN) Domain heap initialised (XEN) ACPI: 32/64X FACS address mismatch in FADT - bcbdbf80/0000000000000000, using 32 (XEN) IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 (XEN) Enabling APIC mode: Flat. Using 1 I/O APICs (XEN) PCI: Not using MCFG for segment 0000 bus 00-3f (XEN) Switched to APIC driver x2apic_cluster (XEN) CPU0: 1600..3100 MHz (XEN) xstate: size: 0x340 and states: 0x7 (XEN) Speculative mitigation facilities: (XEN) Hardware features: IBRS/IBPB STIBP L1D_FLUSH SSBD (XEN) Compiled-in support: SHADOW_PAGING (XEN) Xen settings: BTI-Thunk N/A, SPEC_CTRL: IBRS+ SSBD-, Other: IBPB L1D_FLUSH BRANCH_HARDEN (XEN) L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 36, Safe address 1000000000 (XEN) Support for HVM VMs: MSR_SPEC_CTRL RSB EAGER_FPU (XEN) Support for PV VMs: MSR_SPEC_CTRL RSB EAGER_FPU (XEN) XPTI (64-bit PV only): Dom0 enabled, DomU enabled (without PCID) (XEN) PV L1TF shadowing: Dom0 disabled, DomU disabled (XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2) (XEN) Initializing Credit2 scheduler (XEN) Platform timer is 14.318MHz HPET (XEN) Detected 3092.993 MHz processor. (XEN) Intel VT-d iommu 0 supported page sizes: 4kB (XEN) Intel VT-d iommu 1 supported page sizes: 4kB (XEN) Intel VT-d Snoop Control not enabled. (XEN) Intel VT-d Dom0 DMA Passthrough not enabled. (XEN) Intel VT-d Queued Invalidation enabled. (XEN) Intel VT-d Interrupt Remapping enabled. (XEN) Intel VT-d Posted Interrupt not enabled. (XEN) Intel VT-d Shared EPT tables not enabled. (XEN) I/O virtualisation enabled (XEN) - Dom0 mode: Relaxed (XEN) Interrupt remapping enabled (XEN) Enabled directed EOI with ioapic_ack_old on! (XEN) ENABLING IO-APIC IRQs (XEN) -> Using old ACK method (XEN) Allocated console ring of 16 KiB. (XEN) VMX: Supported advanced features: (XEN) - APIC MMIO access virtualisation (XEN) - APIC TPR shadow (XEN) - Extended Page Tables (EPT) (XEN) - Virtual-Processor Identifiers (VPID) (XEN) - Virtual NMI (XEN) - MSR direct-access bitmap (XEN) - Unrestricted Guest (XEN) HVM: ASIDs enabled. (XEN) VMX: Disabling executable EPT superpages due to CVE-2018-12207 (XEN) HVM: VMX enabled (XEN) HVM: Hardware Assisted Paging (HAP) detected (XEN) HVM: HAP page sizes: 4kB, 2MB (XEN) Brought up 4 CPUs (XEN) Scheduling granularity: cpu, 1 CPU per sched-resource (XEN) Dom0 has maximum 440 PIRQs (XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0 (XEN) WARNING: PVH is an experimental mode with limited functionality (XEN) Initial low memory virq threshold set at 0x4000 pages. (XEN) Scrubbing Free RAM in background (XEN) Std. Loglevel: Errors and warnings (XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings) (XEN) Xen is relinquishing VGA console. (XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input) (XEN) Freed 556kB init memory Unable to find kernel (XEN) Hardware Dom0 crashed: rebooting machine in 5 seconds. (XEN) Resetting with ACPI MEMORY or I/O RESET_REG.