NetBSD Problem Report #50446

From gson@gson.org  Thu Nov 19 06:10:23 2015
Return-Path: <gson@gson.org>
Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(Client CN "mail.netbsd.org", Issuer "Postmaster NetBSD.org" (verified OK))
	by mollari.NetBSD.org (Postfix) with ESMTPS id 7432CA6637
	for <gnats-bugs@gnats.NetBSD.org>; Thu, 19 Nov 2015 06:10:23 +0000 (UTC)
Message-Id: <20151119061017.A425D745889@guava.gson.org>
Date: Thu, 19 Nov 2015 08:10:17 +0200 (EET)
From: gson@gson.org (Andreas Gustafsson)
Reply-To: gson@gson.org (Andreas Gustafsson)
To: gnats-bugs@gnats.NetBSD.org
Subject: dom0 kernel panics at boot attaching agp
X-Send-Pr-Version: 3.95

>Number:         50446
>Category:       port-xen
>Synopsis:       dom0 kernel panics at boot attaching agp
>Confidential:   no
>Severity:       critical
>Priority:       medium
>Responsible:    port-xen-maintainer
>State:          closed
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Thu Nov 19 06:15:01 +0000 2015
>Closed-Date:    Sat Jul 07 09:14:49 +0000 2018
>Last-Modified:  Sun Sep 02 20:45:00 +0000 2018
>Originator:     Andreas Gustafsson
>Release:        NetBSD 7.0 + fix for PR 50060
>Organization:

>Environment:
System: NetBSD
Architecture: x86_64
Machine: amd64
>Description:

I'm trying to test NetBSD 7.0/Xen on a PC with a ASUS P5B-V
motherboard.  Since this machine is affected by PR 50060,
I have applied the fix for that bug to the 7.0 sources:

   cvs rdiff -u -r1.118 -r1.119 src/sys/dev/pci/agp_i810.c

With that patch, the machine sucessfully boots a non-Xen kernel.
However, attempting to boot a dom0 kernel under Xen 4.2.5 results
in a panic:

   pchb0 at pci0 dev 0 function 0: vendor 0x8086 product 0x29a0 (rev. 0x02)
   agp0 at pchb0: i965-family chipset
   xpq_flush_queue: 1 entries (0 successful) on cpu0 (0)
   cpu0 (0):
     0x000000009d5a2c78: 0x8000000000100017
    kpm_pdir[0]: 0xab009027
   panic: HYPERVISOR_mmu_update failed, ret: -16

   fatal breakpoint trap in supervisor mode
   trap type 1 code 0 rip ffffffff80206395 cs e030 rflags 246 cr2 0 ilevel 8 rsp ffffffff81003700
   curlwp 0xffffffff80c609e0 pid 0.1 lowest kstack 0xffffffff810012c0
   Stopped in pid 0.1 (system) at  netbsd:breakpoint+0x5:  leave
   breakpoint() at netbsd:breakpoint+0x5
   vpanic() at netbsd:vpanic+0x13c
   snprintf() at netbsd:snprintf
   xpq_queue_machphys_update() at netbsd:xpq_queue_machphys_update
   pmap_kenter_ma() at netbsd:pmap_kenter_ma+0xbe
   x86_mem_add_mapping() at netbsd:x86_mem_add_mapping+0xcb
   bus_space_alloc() at netbsd:bus_space_alloc+0x57
   agp_i810_attach() at netbsd:agp_i810_attach+0x7bb
   agpattach() at netbsd:agpattach+0xda
   config_attach_loc() at netbsd:config_attach_loc+0x16e
   pchbattach() at netbsd:pchbattach+0x119
   config_attach_loc() at netbsd:config_attach_loc+0x16e
   pci_probe_device() at netbsd:pci_probe_device+0x4ac
   pci_enumerate_bus() at netbsd:pci_enumerate_bus+0x168
   pcirescan() at netbsd:pcirescan+0x1c
   pciattach() at netbsd:pciattach+0x193
   config_attach_loc() at netbsd:config_attach_loc+0x16e
   mp_pci_scan() at netbsd:mp_pci_scan+0xa4
   hypervisor_attach() at netbsd:hypervisor_attach+0x186
   config_attach_loc() at netbsd:config_attach_loc+0x16e
   mainbus_attach() at netbsd:mainbus_attach+0xbf
   config_attach_loc() at netbsd:config_attach_loc+0x16e
   cpu_configure() at netbsd:cpu_configure+0x21
   main() at netbsd:main+0x2a3
   ds          36c8
   es          3710
   fs          8
   gs          a8ed
   rdi         8
   rsi         1
   rbp         ffffffff81003700
   rbx         104
   rdx         0
   rcx         0
   rax         1
   r8          ffffffff810036b0
   r9          0
   r10         7ff0
   r11         73
   r12         ffffffff80adb7e0
   r13         ffffffff81003738
   r14         ffffffff80d14530    xpq_queue_array+0x10
   r15         ffffa0000c18f000
   rip         ffffffff80206395    breakpoint+0x5
   cs          e030
   rflags      246
   rsp         ffffffff81003700
   ss          e02b
   netbsd:breakpoint+0x5:  leave
   db> 

I have scripts for reproducing this in an automated way,
so I can test patches easily.

>How-To-Repeat:

>Fix:

>Release-Note:

>Audit-Trail:
From: Manuel Bouyer <bouyer@antioche.eu.org>
To: gnats-bugs@netbsd.org
Cc: port-xen-maintainer@netbsd.org, gnats-admin@netbsd.org,
        netbsd-bugs@netbsd.org
Subject: Re: port-xen/50446: dom0 kernel panics at boot attaching agp
Date: Thu, 19 Nov 2015 09:31:10 +0100

 On Thu, Nov 19, 2015 at 06:15:01AM +0000, Andreas Gustafsson wrote:
 > System: NetBSD
 > Architecture: x86_64
 > Machine: amd64
 > >Description:
 > 
 > I'm trying to test NetBSD 7.0/Xen on a PC with a ASUS P5B-V
 > motherboard.  Since this machine is affected by PR 50060,
 > I have applied the fix for that bug to the 7.0 sources:
 > 
 >    cvs rdiff -u -r1.118 -r1.119 src/sys/dev/pci/agp_i810.c
 > 
 > With that patch, the machine sucessfully boots a non-Xen kernel.
 > However, attempting to boot a dom0 kernel under Xen 4.2.5 results
 > in a panic:
 > 
 >    pchb0 at pci0 dev 0 function 0: vendor 0x8086 product 0x29a0 (rev. 0x02)
 >    agp0 at pchb0: i965-family chipset
 >    xpq_flush_queue: 1 entries (0 successful) on cpu0 (0)
 >    cpu0 (0):
 >      0x000000009d5a2c78: 0x8000000000100017
 >     kpm_pdir[0]: 0xab009027
 >    panic: HYPERVISOR_mmu_update failed, ret: -16

 debug messages from the hypervisor would be usefull at this point.
 Unfortunably, I don't know a way to get theses without serial console.

 -- 
 Manuel Bouyer <bouyer@antioche.eu.org>
      NetBSD: 26 ans d'experience feront toujours la difference
 --

From: Andreas Gustafsson <gson@gson.org>
To: Manuel Bouyer <bouyer@antioche.eu.org>
Cc: gnats-bugs@NetBSD.org,
    port-xen-maintainer@netbsd.org
Subject: Re: port-xen/50446: dom0 kernel panics at boot attaching agp
Date: Thu, 19 Nov 2015 10:44:58 +0200

 Manuel Bouyer wrote:
 >  debug messages from the hypervisor would be usefull at this point.
 >  Unfortunably, I don't know a way to get theses without serial console.

 I do have a serial console.  How do I get the debug messages?
 -- 
 Andreas Gustafsson, gson@gson.org

From: Manuel Bouyer <bouyer@antioche.eu.org>
To: Andreas Gustafsson <gson@gson.org>
Cc: gnats-bugs@NetBSD.org, port-xen-maintainer@NetBSD.org
Subject: Re: port-xen/50446: dom0 kernel panics at boot attaching agp
Date: Thu, 19 Nov 2015 09:50:46 +0100

 On Thu, Nov 19, 2015 at 10:44:58AM +0200, Andreas Gustafsson wrote:
 > Manuel Bouyer wrote:
 > >  debug messages from the hypervisor would be usefull at this point.
 > >  Unfortunably, I don't know a way to get theses without serial console.
 > 
 > I do have a serial console.  How do I get the debug messages?

 just boot xen-debug.gz instead of xen.gz, I think it should be enough

 -- 
 Manuel Bouyer <bouyer@antioche.eu.org>
      NetBSD: 26 ans d'experience feront toujours la difference
 --

From: Andreas Gustafsson <gson@gson.org>
To: Manuel Bouyer <bouyer@antioche.eu.org>
Cc: gnats-bugs@NetBSD.org,
    port-xen-maintainer@netbsd.org
Subject: Re: port-xen/50446: dom0 kernel panics at boot attaching agp
Date: Thu, 19 Nov 2015 15:17:43 +0200

 Manuel Bouyer wrote:
 >  just boot xen-debug.gz instead of xen.gz, I think it should be enough

 Here's the full console output from xen-debug.gz.

 >> NetBSD/x86 BIOS Boot, Revision 5.10 (from NetBSD 7.0)
 >> Memory: 639/2873920 k

      1. Xen
      2. Boot normally
      3. Boot single user
      4. Disable ACPI
      5. Disable ACPI and SMP
      6. Drop to boot prompt

 Choose an option; RETURN for default; SPACE to stop countdown.
 Option 1 will be chosen in 0 seconds.     
 1793336+352968=0x20c0c0
 Loading /netbsd-XEN3_DOM0.gz  
  __  __            _  _    ____    ____  
  \ \/ /___ _ __   | || |  |___ \  | ___| 
   \  // _ \ '_ \  | || |_   __) | |___ \ 
   /  \  __/ | | | |__   _| / __/ _ ___) |
  /_/\_\___|_| |_|    |_|(_)_____(_)____/ 

 (XEN) Xen version 4.2.5 (pbulk@) (gcc (nb2 20150115) 4.8.4) Thu Nov  5 17:57:02 UTC 2015
 (XEN) Latest ChangeSet: unavailable
 (XEN) Bootloader: unknown
 (XEN) Command line: dom0_mem=256M console=com1 com1=9600,8n1
 (XEN) Video information:
 (XEN)  VGA is text mode 80x25, font 8x16
 (XEN)  VBE/DDC methods: none; EDID transfer time: 0 seconds
 (XEN)  EDID info not retrieved because no DDC retrieval method detected
 (XEN) Disc information:
 (XEN)  Found 1 MBR signatures
 (XEN)  Found 1 EDD information structures
 (XEN) Xen-e820 RAM map:
 (XEN)  0000000000000000 - 000000000009fc00 (usable)
 (XEN)  000000000009fc00 - 00000000000a0000 (reserved)
 (XEN)  00000000000e4000 - 0000000000100000 (reserved)
 (XEN)  0000000000100000 - 00000000af790000 (usable)
 (XEN)  00000000af790000 - 00000000af79e000 (ACPI data)
 (XEN)  00000000af79e000 - 00000000af7e0000 (ACPI NVS)
 (XEN)  00000000af7e0000 - 00000000af800000 (reserved)
 (XEN)  00000000fee00000 - 00000000fee01000 (reserved)
 (XEN)  00000000ffb00000 - 0000000100000000 (reserved)
 (XEN) System RAM: 2807MB (2874556kB)
 (XEN) ACPI: RSDP 000FAD70, 0014 (r0 ACPIAM)
 (XEN) ACPI: RSDT AF790000, 0040 (r1 MSTEST TESTONLY 11000726 MSFT       97)
 (XEN) ACPI: FACP AF790200, 0084 (r2 MSTEST OEMFACP  11000726 MSFT       97)
 (XEN) ACPI: DSDT AF7905C0, 9C85 (r1  A0579 A0579000        0 INTL 20060113)
 (XEN) ACPI: FACS AF79E000, 0040
 (XEN) ACPI: APIC AF790390, 006C (r1 MSTEST OEMAPIC  11000726 MSFT       97)
 (XEN) ACPI: MCFG AF790400, 003C (r1 MSTEST OEMMCFG  11000726 MSFT       97)
 (XEN) ACPI: OEMB AF79E040, 007B (r1 MSTEST AMI_OEM  11000726 MSFT       97)
 (XEN) ACPI: HPET AF79A250, 0038 (r1 MSTEST OEMHPET  11000726 MSFT       97)
 (XEN) ACPI: ASF! AF79A288, 0099 (r32 LEGEND I865PASF        1 INTL 20060113)
 (XEN) ACPI: GSCI AF79E0C0, 2024 (r1 MSTEST GMCHSCI  11000726 MSFT       97)
 (XEN) No NUMA configuration found
 (XEN) Faking a node at 0000000000000000-00000000af790000
 (XEN) Domain heap initialised
 (XEN) found SMP MP-table at 000ff780
 (XEN) DMI 2.4 present.
 (XEN) Using APIC driver default
 (XEN) ACPI: PM-Timer IO Port: 0x808
 (XEN) ACPI: ACPI SLEEP INFO: pm1x_cnt[804,0], pm1x_evt[800,0]
 (XEN) ACPI:                  wakeup_vec[af79e00c], vec_size[20]
 (XEN) ACPI: Local APIC address 0xfee00000
 (XEN) ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled)
 (XEN) Processor #0 6:15 APIC version 20
 (XEN) ACPI: LAPIC (acpi_id[0x02] lapic_id[0x01] enabled)
 (XEN) Processor #1 6:15 APIC version 20
 (XEN) ACPI: LAPIC (acpi_id[0x03] lapic_id[0x02] enabled)
 (XEN) Processor #2 6:15 APIC version 20
 (XEN) ACPI: LAPIC (acpi_id[0x04] lapic_id[0x03] enabled)
 (XEN) Processor #3 6:15 APIC version 20
 (XEN) ACPI: IOAPIC (id[0x04] address[0xfec00000] gsi_base[0])
 (XEN) IOAPIC[0]: apic_id 4, version 32, address 0xfec00000, GSI 0-23
 (XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
 (XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
 (XEN) ACPI: IRQ0 used by override.
 (XEN) ACPI: IRQ2 used by override.
 (XEN) ACPI: IRQ9 used by override.
 (XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
 (XEN) ACPI: HPET id: 0x8086a202 base: 0xfed00000
 (XEN) ERST table was not found
 (XEN) Using ACPI (MADT) for SMP configuration information
 (XEN) SMP: Allowing 4 CPUs (0 hotplug CPUs)
 (XEN) IRQ limits: 24 GSI, 760 MSI/MSI-X
 (XEN) Using scheduler: SMP Credit Scheduler (credit)
 (XEN) Detected 2400.086 MHz processor.
 (XEN) Initing memory sharing.
 (XEN) mce_intel.c:1246: MCA Capability: BCAST 1 SER 0 CMCI 0 firstbank 1 extended MCE MSR 0
 (XEN) Intel machine check reporting enabled
 (XEN) PCI: MCFG configuration 0: base e0000000 segment 0000 buses 00 - ff
 (XEN) PCI: Not using MCFG for segment 0000 bus 00-ff
 (XEN) I/O virtualisation disabled
 (XEN) ENABLING IO-APIC IRQs
 (XEN)  -> Using new ACK method
 (XEN) ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=-1 pin2=-1
 (XEN) Platform timer is 14.318MHz HPET
 (XEN) Allocated console ring of 32 KiB.
 (XEN) VMX: Supported advanced features:
 (XEN)  - APIC TPR shadow
 (XEN)  - MSR direct-access bitmap
 (XEN) HVM: ASIDs disabled.
 (XEN) HVM: VMX enabled
 (XEN) Brought up 4 CPUs
 (XEN) HPET: 3 timers (0 will be used for broadcast)
 (XEN) ACPI sleep modes: S3
 (XEN) mcheck_poll: Machine check polling timer started.
 (XEN) *** LOADING DOMAIN 0 ***
 (XEN) elf_parse_binary: phdr: paddr=0xffffffff80000000 memsz=0xe2b000
 (XEN) elf_parse_binary: memory: 0xffffffff80000000 -> 0xffffffff80e2b000
 (XEN) elf_xen_parse: __xen_guest: "GUEST_OS=NetBSD,GUEST_VER=4.99,XEN_VER=xen-3.0,LOADER=generic,VIRT_BASE=0xffffffff80000000,ELF_PADDR_OFFSET=0xffffffff80000000,VIRT_ENTRY=0xffffffff80100000,HYPERCALL_PAGE=0x00000101,BSD_SYMTAB=yes"
 (XEN) elf_xen_parse_guest_info: GUEST_OS="NetBSD"
 (XEN) elf_xen_parse_guest_info: GUEST_VER="4.99"
 (XEN) elf_xen_parse_guest_info: XEN_VER="xen-3.0"
 (XEN) elf_xen_parse_guest_info: LOADER="generic"
 (XEN) elf_xen_parse_guest_info: VIRT_BASE="0xffffffff80000000"
 (XEN) elf_xen_parse_guest_info: ELF_PADDR_OFFSET="0xffffffff80000000"
 (XEN) elf_xen_parse_guest_info: VIRT_ENTRY="0xffffffff80100000"
 (XEN) elf_xen_parse_guest_info: HYPERCALL_PAGE="0x00000101"
 (XEN) elf_xen_parse_guest_info: BSD_SYMTAB="yes"
 (XEN) elf_xen_addr_calc_check: addresses:
 (XEN)     virt_base        = 0xffffffff80000000
 (XEN)     elf_paddr_offset = 0xffffffff80000000
 (XEN)     virt_offset      = 0x0
 (XEN)     virt_kstart      = 0xffffffff80000000
 (XEN)     virt_kend        = 0xffffffff80f5a430
 (XEN)     virt_entry       = 0xffffffff80100000
 (XEN)     p2m_base         = 0xffffffffffffffff
 (XEN)  Xen  kernel: 64-bit, lsb, compat32
 (XEN)  Dom0 kernel: 64-bit, lsb, paddr 0xffffffff80000000 -> 0xffffffff80e2b000
 (XEN)  Dom0 symbol map 0xffffffff80e2b000 -> 0xffffffff80f5a430
 (XEN) PHYSICAL MEMORY ARRANGEMENT:
 (XEN)  Dom0 alloc.:   00000000aa000000->00000000ac000000 (57344 pages to be allocated)
 (XEN) VIRTUAL MEMORY ARRANGEMENT:
 (XEN)  Loaded kernel: ffffffff80000000->ffffffff80f5a430
 (XEN)  Init. ramdisk: ffffffff80f5b000->ffffffff80f5b000
 (XEN)  Phys-Mach map: ffffffff80f5b000->ffffffff80fdb000
 (XEN)  Start info:    ffffffff80fdb000->ffffffff80fdb4b4
 (XEN)  Page tables:   ffffffff80fdc000->ffffffff80fe9000
 (XEN)  Boot stack:    ffffffff80fe9000->ffffffff80fea000
 (XEN)  TOTAL:         ffffffff80000000->ffffffff81400000
 (XEN)  ENTRY ADDRESS: ffffffff80100000
 (XEN) Dom0 has maximum 4 VCPUs
 (XEN) elf_load_binary: phdr 0 at 0xffffffff80000000 -> 0xffffffff80c76938
 (XEN) elf_load_bsdsyms: shdr 28 at 0xffff8300af0d06a8 -> 0xffffffff80e2b808
 (XEN) elf_load_bsdsyms: shdr 29 at 0xffff8300af0d1018 -> 0xffffffff80e2b9b8
 (XEN) elf_load_bsdsyms: shdr 30 at 0xffff8300af186b78 -> 0xffffffff80ee1518
 (XEN) Scrubbing Free RAM: .........................done.
 (XEN) Initial low memory virq threshold set at 0x4000 pages.
 (XEN) Std. Loglevel: All
 (XEN) Guest Loglevel: All
 (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen)
 (XEN) Freed 244kB init memory.
 Copyright (c) 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
     2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015
     The NetBSD Foundation, Inc.  All rights reserved.
 Copyright (c) 1982, 1986, 1989, 1991, 1993
     The Regents of the University of California.  All rights reserved.

 NetBSD 7.0 (XEN3_DOM0) #0: Wed Nov 18 01:20:09 EET 2015
         gson@guido.araneus.fi:/bracket/prod/7.0gson1/amd64/obj/sys/arch/amd64/compile/XEN3_DOM0
 total memory = 256 MB
 avail memory = 232 MB
 kern.module.path=/stand/amd64/7.0/modules
 mainbus0 (root)
 ACPI: RSDP 0xfad70 000014 (v00 ACPIAM)
 ACPI: RSDT 0xaf790000 000040 (v01 MSTEST TESTONLY 11000726 MSFT 00000097)
 ACPI: FACP 0xaf790200 000084 (v02 MSTEST OEMFACP  11000726 MSFT 00000097)
 ACPI: DSDT 0xaf7905c0 009C85 (v01  A0579 A0579000 00000000 INTL 20060113)
 ACPI: FACS 0xaf79e000 000040
 ACPI: APIC 0xaf790390 00006C (v01 MSTEST OEMAPIC  11000726 MSFT 00000097)
 ACPI: MCFG 0xaf790400 00003C (v01 MSTEST OEMMCFG  11000726 MSFT 00000097)
 ACPI: OEMB 0xaf79e040 00007B (v01 MSTEST AMI_OEM  11000726 MSFT 00000097)
 ACPI: HPET 0xaf79a250 000038 (v01 MSTEST OEMHPET  11000726 MSFT 00000097)
 ACPI: ASF! 0xaf79a288 000099 (v32 LEGEND I865PASF 00000001 INTL 20060113)
 ACPI: GSCI 0xaf79e0c0 002024 (v01 MSTEST GMCHSCI  11000726 MSFT 00000097)
 ACPI: All ACPI Tables successfully acquired
 ioapic0 at mainbus0 apid 4
 (XEN) io_apic.c:2390: 
 (XEN) ioapic_guest_write: apic=0, pin=0, irq=0
 (XEN) ioapic_guest_write: new_entry=000109f0
 (XEN) ioapic_guest_write: old_entry=00010000 pirq=0
 (XEN) ioapic_guest_write: Attempt to modify IO-APIC pin for in-use IRQ!
 (XEN) io_apic.c:2390: 
 (XEN) ioapic_guest_write: apic=0, pin=2, irq=0
 (XEN) ioapic_guest_write: new_entry=000109f0
 (XEN) ioapic_guest_write: old_entry=000009f0 pirq=0
 (XEN) ioapic_guest_write: Attempt to modify IO-APIC pin for in-use IRQ!
 (XEN) irq.c:1879: dom0: pirq 0 or irq 3 already mapped
 (XEN) io_apic.c:2390: 
 (XEN) ioapic_guest_write: apic=0, pin=4, irq=4
 (XEN) ioapic_guest_write: new_entry=000109f1
 (XEN) ioapic_guest_write: old_entry=000009f1 pirq=0
 (XEN) ioapic_guest_write: Attempt to modify IO-APIC pin for in-use IRQ!
 (XEN) irq.c:1879: dom0: pirq 0 or irq 5 already mapped
 (XEN) irq.c:1879: dom0: pirq 0 or irq 6 already mapped
 (XEN) irq.c:1879: dom0: pirq 0 or irq 7 already mapped
 (XEN) irq.c:1879: dom0: pirq 0 or irq 8 already mapped
 (XEN) irq.c:1879: dom0: pirq 0 or irq 9 already mapped
 (XEN) irq.c:1879: dom0: pirq 0 or irq 10 already mapped
 (XEN) irq.c:1879: dom0: pirq 0 or irq 11 already mapped
 (XEN) irq.c:1879: dom0: pirq 0 or irq 12 already mapped
 (XEN) irq.c:1879: dom0: pirq 0 or irq 13 already mapped
 (XEN) irq.c:1879: dom0: pirq 0 or irq 14 already mapped
 (XEN) irq.c:1879: dom0: pirq 0 or irq 15 already mapped
 (XEN) allocated vector 98 for irq 16
 (XEN) irq.c:1879: dom0: pirq 0 or irq 16 already mapped
 (XEN) allocated vector a0 for irq 17
 (XEN) irq.c:1879: dom0: pirq 0 or irq 17 already mapped
 (XEN) allocated vector a8 for irq 18
 (XEN) irq.c:1879: dom0: pirq 0 or irq 18 already mapped
 (XEN) allocated vector b0 for irq 19
 (XEN) irq.c:1879: dom0: pirq 0 or irq 19 already mapped
 (XEN) allocated vector b8 for irq 20
 (XEN) irq.c:1879: dom0: pirq 0 or irq 20 already mapped
 (XEN) allocated vector c0 for irq 21
 (XEN) irq.c:1879: dom0: pirq 0 or irq 21 already mapped
 (XEN) allocated vector c8 for irq 22
 (XEN) irq.c:1879: dom0: pirq 0 or irq 22 already mapped
 (XEN) allocated vector d0 for irq 23
 (XEN) irq.c:1879: dom0: pirq 0 or irq 23 already mapped
 cpu0 at mainbus0 apid 0
 cpu1 at mainbus0 apid 1
 cpu2 at mainbus0 apid 2
 cpu3 at mainbus0 apid 3
 hypervisor0 at mainbus0: Xen version 4.2.5
 vcpu0 at hypervisor0: Intel(R) Core(TM)2 Quad CPU           @ 2.40GHz, id 0x6f7
 xenbus0 at hypervisor0: Xen Virtual Bus Interface
 xencons0 at hypervisor0: Xen Virtual Console Driver
 acpi0 at hypervisor0: Intel ACPICA 20131218
 MCH (PNP0C01) at acpi0 not configured
 TMR (PNP0100) at acpi0 not configured
 pcppi0 at acpi0 (SPKR, PNP0800): io 0x61
 UAR1 (PNP0501) at acpi0 not configured
 FDC (PNP0700) at acpi0 not configured
 SIOR (PNP0C02) at acpi0 not configured
 RMSC (PNP0C02) at acpi0 not configured
 aibs0 at acpi0 (ASOC, ATK0110-16843024): ASUSTeK AI Booster
 HPET (PNP0103) at acpi0 not configured
 OMSC (PNP0C02) at acpi0 not configured
 PCIE (PNP0C02) at acpi0 not configured
 RMEM (PNP0C01) at acpi0 not configured
 acpibut0 at acpi0 (PWRB, PNP0C0C-170): ACPI Power Button
 ACPI: Enabled 3 GPEs in block 00 to 1F
 ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20131218/hwxface-646)
 pci0 at hypervisor0 bus 0: configuration mode 1
 pchb0 at pci0 dev 0 function 0: vendor 0x8086 product 0x29a0 (rev. 0x02)
 agp0 at pchb0: i965-family chipset
 (XEN) mm.c:912:d0 pg_owner 0 l1e_owner 0, but real_pg_owner -1
 (XEN) mm.c:983:d0 Error getting mfn 100 (pfn ffffffffffffffff) from L1 entry 8000000000100017 for l1e_owner=0, pg_owner=0
 xpq_flush_queue: 1 entries (0 successful) on cpu0 (0)
 cpu0 (0):
   0x00000000af043c78: 0x8000000000100017
  kpm_pdir[0]: 0xab009027
 panic: HYPERVISOR_mmu_update failed, ret: -16

 fatal breakpoint trap in supervisor mode
 trap type 1 code 0 rip ffffffff80206395 cs e030 rflags 246 cr2 0 ilevel 8 rsp ffffffff81003700
 curlwp 0xffffffff80c609e0 pid 0.1 lowest kstack 0xffffffff810012c0
 Stopped in pid 0.1 (system) at  netbsd:breakpoint+0x5:  leave
 breakpoint() at netbsd:breakpoint+0x5
 vpanic() at netbsd:vpanic+0x13c
 snprintf() at netbsd:snprintf
 xpq_queue_machphys_update() at netbsd:xpq_queue_machphys_update
 pmap_kenter_ma() at netbsd:pmap_kenter_ma+0xbe
 x86_mem_add_mapping() at netbsd:x86_mem_add_mapping+0xcb
 bus_space_alloc() at netbsd:bus_space_alloc+0x57
 agp_i810_attach() at netbsd:agp_i810_attach+0x7bb
 agpattach() at netbsd:agpattach+0xda
 config_attach_loc() at netbsd:config_attach_loc+0x16e
 pchbattach() at netbsd:pchbattach+0x119
 config_attach_loc() at netbsd:config_attach_loc+0x16e
 pci_probe_device() at netbsd:pci_probe_device+0x4ac
 pci_enumerate_bus() at netbsd:pci_enumerate_bus+0x168
 pcirescan() at netbsd:pcirescan+0x1c
 pciattach() at netbsd:pciattach+0x193
 config_attach_loc() at netbsd:config_attach_loc+0x16e
 mp_pci_scan() at netbsd:mp_pci_scan+0xa4
 hypervisor_attach() at netbsd:hypervisor_attach+0x186
 config_attach_loc() at netbsd:config_attach_loc+0x16e
 mainbus_attach() at netbsd:mainbus_attach+0xbf
 config_attach_loc() at netbsd:config_attach_loc+0x16e
 cpu_configure() at netbsd:cpu_configure+0x21
 main() at netbsd:main+0x2a3
 ds          36c8
 es          3710
 fs          8
 gs          a8ed
 rdi         8
 rsi         deadbeef
 rbp         ffffffff81003700
 rbx         104
 rdx         0
 rcx         0
 rax         1
 r8          ffffffff810036b0
 r9          0
 r10         deadbeef
 r11         73
 r12         ffffffff80adb7e0
 r13         ffffffff81003738
 r14         ffffffff80d14530    xpq_queue_array+0x10
 r15         ffffa0000c18f000
 rip         ffffffff80206395    breakpoint+0x5
 cs          e030
 rflags      246
 rsp         ffffffff81003700
 ss          e02b
 netbsd:breakpoint+0x5:  leave
 db>

 -- 
 Andreas Gustafsson, gson@gson.org

From: Andreas Gustafsson <gson@gson.org>
To: gnats-bugs@NetBSD.org
Cc: 
Subject: Re: port-xen/50446: dom0 kernel panics at boot attaching agp
Date: Sun, 28 Feb 2016 12:15:21 +0200

 For lack of progress towards an actual fix, I have worked around
 the problem locally with the following patch:

 Index: src/sys/arch/amd64/conf/XEN3_DOM0
 ===================================================================
 RCS file: /bracket/repo/src/sys/arch/amd64/conf/XEN3_DOM0,v
 retrieving revision 1.103.2.4
 diff -u -r1.103.2.4 XEN3_DOM0
 --- src/sys/arch/amd64/conf/XEN3_DOM0	22 Jul 2015 16:53:34 -0000	1.103.2.4
 +++ src/sys/arch/amd64/conf/XEN3_DOM0	27 Feb 2016 20:14:15 -0000
 @@ -258,7 +258,7 @@
  # XXX 'puc's aren't really bridges, but there's no better place for them here
  puc*	at pci? dev ? function ?	# PCI "universal" comm. cards

 -agp*	at pchb?
 +#agp*	at pchb?

  # ISA bus support
  isa0	at ichlpcib?

 -- 
 Andreas Gustafsson, gson@gson.org

From: ML <mathieu@lubrano.at>
To: gnats-bugs@NetBSD.org
Cc: mathieu@lubrano.at
Subject: Re: port-xen/50446: dom0 kernel panics at boot attaching agp
Date: Sun, 05 Jun 2016 20:03:55 +0200

 --=-NUKBKS0aYpUCLWMC825t
 Content-Type: text/plain; charset="UTF-8"
 Content-Transfer-Encoding: quoted-printable

 Hi,

 are you still interrested in debug informations about it ?

 I have the same issue here, with netbsd amd64 v7.0.1...
 Pretty much the same boot log.

 Bye
 Mat


 >From: Manuel Bouyer <bouyer <at> antioche.eu.org>
 >Subject: Re: port-xen/50446: dom0 kernel panics at boot attaching agp
 >Newsgroups: gmane.os.netbsd.bugs
 >Date: 2015-11-19 08:55:00 GMT (28 weeks, 3 days and 9 hours ago)
 >
 >The following reply was made to PR port-xen/50446; it has been noted by
 >GNATS.
 >
 >From: Manuel Bouyer <bouyer <at> antioche.eu.org>
 >To: Andreas Gustafsson <gson <at> gson.org>
 >Cc: gnats-bugs <at> NetBSD.org, port-xen-maintainer <at> NetBSD.org
 >Subject: Re: port-xen/50446: dom0 kernel panics at boot attaching agp
 >Date: Thu, 19 Nov 2015 09:50:46 +0100
 >
 > On Thu, Nov 19, 2015 at 10:44:58AM +0200, Andreas Gustafsson wrote:
 > > Manuel Bouyer wrote:
 > > >  debug messages from the hypervisor would be usefull at this
 >point.
 > > >  Unfortunably, I don't know a way to get theses without serial
 >console.
 > >=20
 > > I do have a serial console.  How do I get the debug messages?
 >
 > just boot xen-debug.gz instead of xen.gz, I think it should be enough
 >
 > --=20
 > Manuel Bouyer <bouyer <at> antioche.eu.org>
 >      NetBSD: 26 ans d'experience feront toujours la difference
 > --


 --=-NUKBKS0aYpUCLWMC825t
 Content-Type: application/x-pkcs7-signature; name="smime.p7s"
 Content-Disposition: attachment; filename="smime.p7s"
 Content-Transfer-Encoding: base64

 MIAGCSqGSIb3DQEHAqCAMIACAQExDzANBglghkgBZQMEAgEFADCABgkqhkiG9w0BBwEAAKCCDGAw
 ggYkMIIFDKADAgECAgMOmLMwDQYJKoZIhvcNAQELBQAwgYwxCzAJBgNVBAYTAklMMRYwFAYDVQQK
 Ew1TdGFydENvbSBMdGQuMSswKQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWdu
 aW5nMTgwNgYDVQQDEy9TdGFydENvbSBDbGFzcyAxIFByaW1hcnkgSW50ZXJtZWRpYXRlIENsaWVu
 dCBDQTAeFw0xNTA3MDUwNDAyNDNaFw0xNjA3MDUwMzIzMjFaMEAxGzAZBgNVBAMMEm1hdGhpZXVA
 bHVicmFuby5hdDEhMB8GCSqGSIb3DQEJARYSbWF0aGlldUBsdWJyYW5vLmF0MIIBIjANBgkqhkiG
 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuDjBpXuvf/R39xCZ99q4gUTk7eWRYoqLGzAD9r065rlgY+7V
 DDeAIRBntchjkSg7/DNhDDPWA6/c6W4rUxPs0wojo9xIkJL9n1XPzOtVVEeIxkrh6NAL8z6MsmyV
 9CD2KQpZudX/vOYR4/RWw3mFaLBTjOw6OxRqG1cHjiEPxWWHZfuy9SCxwMH7S0O38eYaclhlzvLK
 ZamsZemrQMqQa/vjqHqEPFsArC6jv+MgxJNdXE9QPOQdWOoWTe/HZRI4u9fdS/C0+X4V5+EyX7Dd
 8B5/FlvlcKBMZl/tyFMxyd7LZjKdwU7/ZfGO0+A8lg1tuu5veI1qN+kru4cJB6smOwIDAQABo4IC
 2DCCAtQwCQYDVR0TBAIwADALBgNVHQ8EBAMCBLAwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUF
 BwMEMB0GA1UdDgQWBBQZ6SJGlYezo8UpZGujwfISgtYyqDAfBgNVHSMEGDAWgBRTcu2SnODaywFc
 fH6WNU7y1LhRgjAdBgNVHREEFjAUgRJtYXRoaWV1QGx1YnJhbm8uYXQwggFMBgNVHSAEggFDMIIB
 PzCCATsGCysGAQQBgbU3AQIDMIIBKjAuBggrBgEFBQcCARYiaHR0cDovL3d3dy5zdGFydHNzbC5j
 b20vcG9saWN5LnBkZjCB9wYIKwYBBQUHAgIwgeowJxYgU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBB
 dXRob3JpdHkwAwIBARqBvlRoaXMgY2VydGlmaWNhdGUgd2FzIGlzc3VlZCBhY2NvcmRpbmcgdG8g
 dGhlIENsYXNzIDEgVmFsaWRhdGlvbiByZXF1aXJlbWVudHMgb2YgdGhlIFN0YXJ0Q29tIENBIHBv
 bGljeSwgcmVsaWFuY2Ugb25seSBmb3IgdGhlIGludGVuZGVkIHB1cnBvc2UgaW4gY29tcGxpYW5j
 ZSBvZiB0aGUgcmVseWluZyBwYXJ0eSBvYmxpZ2F0aW9ucy4wNgYDVR0fBC8wLTAroCmgJ4YlaHR0
 cDovL2NybC5zdGFydHNzbC5jb20vY3J0dTEtY3JsLmNybDCBjgYIKwYBBQUHAQEEgYEwfzA5Bggr
 BgEFBQcwAYYtaHR0cDovL29jc3Auc3RhcnRzc2wuY29tL3N1Yi9jbGFzczEvY2xpZW50L2NhMEIG
 CCsGAQUFBzAChjZodHRwOi8vYWlhLnN0YXJ0c3NsLmNvbS9jZXJ0cy9zdWIuY2xhc3MxLmNsaWVu
 dC5jYS5jcnQwIwYDVR0SBBwwGoYYaHR0cDovL3d3dy5zdGFydHNzbC5jb20vMA0GCSqGSIb3DQEB
 CwUAA4IBAQBXX0l5n5lmhM2rGy7grE3gExGOhYJp3Cmquix/ZEZZFXp7jtqEPZxJFp1rJKoFOGM2
 FveJJIl+2fnvv1XCL7DbvOCrlG7hOWwVWtmIPurVJGW3hhlSIFRKV3T1Qpsrkjk4lcXT6ZcrYhjb
 CbEBD0ybUKhITtJ7RT5zh8CZVN+9ccU2q5NQeiiVK7CM60VPawKHob1Yh/Wi7fm8RiqJOLbVPdOH
 KqWhaRTMfqD87knrclziIh0b2NpSE05pu8nTZaSn9uza5jOw1z799HSGPiy1TmYH1TYDLJnaWMUj
 yX6HsMmorjaF8z098eGZXH0w+2+7JgRPtL0gl4ZL/+LaT7F3MIIGNDCCBBygAwIBAgIBHjANBgkq
 hkiG9w0BAQUFADB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UE
 CxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMgU3RhcnRDb20g
 Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDcxMDI0MjEwMTU1WhcNMTcxMDI0MjEwMTU1WjCB
 jDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBE
 aWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcxODA2BgNVBAMTL1N0YXJ0Q29tIENsYXNzIDEgUHJp
 bWFyeSBJbnRlcm1lZGlhdGUgQ2xpZW50IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
 AQEAxwmDzM4t2BqxKaQuE6uWvooyg4ymiEGWVUet1G8SD+rqvyNH4QrvnEIaFHxOhESip7vMz39S
 cLpNLbL1QpOlPW/tFIzNHS3qd2XRNYG5Sv9RcGE+T4qbLtsjjJbi6sL7Ls/f/X9ftTyhxvxWkf8K
 W37iKrueKsxw2HqolH7GM6FX5UfNAwAu4ZifkpmZzU1slBhyWwaQPEPPZRsWoTb7q8hmgv6Nv3Hg
 9rmA1/VPBIOQ6SKRkHXG0Hhmq1dOFoAFI411+a/9nWm5rcVjGcIWZ2v/43Yksq60jExipA4l5uv9
 /+Hm33mbgmCszdj/Dthf13tgAv2O83hLJ0exTqfrlwIDAQABo4IBrTCCAakwDwYDVR0TAQH/BAUw
 AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFFNy7ZKc4NrLAVx8fpY1TvLUuFGCMB8GA1Ud
 IwQYMBaAFE4L7xqkQFulF2mHMMo0aEPQQa7yMGYGCCsGAQUFBwEBBFowWDAnBggrBgEFBQcwAYYb
 aHR0cDovL29jc3Auc3RhcnRzc2wuY29tL2NhMC0GCCsGAQUFBzAChiFodHRwOi8vd3d3LnN0YXJ0
 c3NsLmNvbS9zZnNjYS5jcnQwWwYDVR0fBFQwUjAnoCWgI4YhaHR0cDovL3d3dy5zdGFydHNzbC5j
 b20vc2ZzY2EuY3JsMCegJaAjhiFodHRwOi8vY3JsLnN0YXJ0c3NsLmNvbS9zZnNjYS5jcmwwgYAG
 A1UdIAR5MHcwdQYLKwYBBAGBtTcBAgEwZjAuBggrBgEFBQcCARYiaHR0cDovL3d3dy5zdGFydHNz
 bC5jb20vcG9saWN5LnBkZjA0BggrBgEFBQcCARYoaHR0cDovL3d3dy5zdGFydHNzbC5jb20vaW50
 ZXJtZWRpYXRlLnBkZjANBgkqhkiG9w0BAQUFAAOCAgEACoMIfXirLAZcuGOMXq4cuSN3TaFx2H2G
 vD5VSy/6rV55BYHbWNaPeQn3oBSU8KgQZn/Kck1JxbLpAxVCNtsxeW1R87ifhsYZ0qjdrA9anrW2
 MAWCtosmAOT4OxK9QPoSjCMxM3HbkZCDJgnlE8jMopH21BbyAYr7b5EfGRQJNtgWcvqSXwKHnTut
 R08+Kkn0KAkXCzeQNLeA5LlYUzFyM7kPAp8pIRMQ+seHunmyG642S2+y/qHEdMuGIwpfz3eDF1Pd
 ctL04qYK/zu+Qg1Bw0RwgigVZs/0c5HP2/e9DBHh7eSwtzYlk4AUr6yxLlcwSjOfOmKEQ/Q8tzh0
 IFiNu9IPuTGAPBn4CPxD0+Ru8T2wg8/s43R/PT3kd1OEqOJUl7q+h+r6fpvU0Fzxd2tC8Ga6fDEP
 me+1Nbi+03pVjuZQKbGwKJ66gEn06WqaxVZC+J8hh/jR0k9mST1iAZPNYulcNJ8tKmVtjYsv0L1T
 Sm2+NwON58tO+pIVzu3DWwSEXSf+qkDavQam+QtEOZxLBXI++aMUEapSn+k3Lxm48ZCYfAWLb/Xj
 7F5JQMbZvCexglAbYR0kIHqW5DnsYSdMD/IplJMojx0NBrxJ3fN9dvX2Y6BIXRsF1du4qESm4/3C
 KuyUV7p9DW3mPlHTGLvYxnyKQy7VFBkoLINszBrOUeIxggIrMIICJwIBATCBlDCBjDELMAkGA1UE
 BhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENl
 cnRpZmljYXRlIFNpZ25pbmcxODA2BgNVBAMTL1N0YXJ0Q29tIENsYXNzIDEgUHJpbWFyeSBJbnRl
 cm1lZGlhdGUgQ2xpZW50IENBAgMOmLMwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG9w0BCQMxCwYJ
 KoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0xNjA2MDUxODAzNTVaMC8GCSqGSIb3DQEJBDEiBCAR
 Iegucr23E2h5Ao3YJsvMUMDrYuwxIjcMQZzJfDDXCzANBgkqhkiG9w0BAQEFAASCAQC0QDqrObtG
 5qA5o5jbpOWRRVOvMnZqElemDWOA57Oi/F6jKDlzyeKa4AVVZzOrn6lEwP14Y3MvrQkiwyjhc2Qj
 uI+bQm/lbBe/zo3lbXMwoRfjXn8uOfcOettsBrP+dvP+m6pDNCjULSY5dQtrr41aQQJ0R67TsFB/
 Xd2127/D3HcI3mUqxUtxulGXORKm4remG0bhjNnbtKKz/121usTg97UiIB7C+Z2XeEsTp+79zkfR
 IhE54pA6kOsUTqkAQUYnaa33qmzqcBp+Dn8HJLOQC+L/QLIcVm56SIBBclPxyP1HCYGrhrcGIDx4
 Mlz3A8zcRWX2+rPriVnULasg1LGtAAAAAAAA


 --=-NUKBKS0aYpUCLWMC825t--

From: Manuel Bouyer <bouyer@antioche.eu.org>
To: gnats-bugs@NetBSD.org
Cc: port-xen-maintainer@netbsd.org, gnats-admin@netbsd.org,
        netbsd-bugs@netbsd.org, Andreas Gustafsson <gson@gson.org>
Subject: Re: port-xen/50446: dom0 kernel panics at boot attaching agp
Date: Tue, 7 Jun 2016 11:41:03 +0200

 On Sun, Jun 05, 2016 at 06:05:01PM +0000, ML wrote:
 >  Hi,
 >  
 >  are you still interrested in debug informations about it ?
 >  
 >  I have the same issue here, with netbsd amd64 v7.0.1...
 >  Pretty much the same boot log.

 If it's the same issue, we already have debug informations.
 The problem is that nobody took the time to look at the issue in depth.
 (e.g. what does "pg_owner 0 but real_owner -1" means in Xen).

 -- 
 Manuel Bouyer <bouyer@antioche.eu.org>
      NetBSD: 26 ans d'experience feront toujours la difference
 --

State-Changed-From-To: open->feedback
State-Changed-By: darcy@NetBSD.org
State-Changed-When: Fri, 22 Jun 2018 02:47:28 +0000
State-Changed-Why:
As per discussions on the mailing list I have removed the AGP lines
in the XEN3_DOM0 config.  This is the common fix when people have problems.
If anyone ever fixes the code then they can consider putting the lines
back in.


From: "D'Arcy J.M. Cain" <darcy@netbsd.org>
To: gnats-bugs@gnats.NetBSD.org
Cc: 
Subject: PR/50446 CVS commit: src/sys/arch/amd64/conf
Date: Fri, 22 Jun 2018 02:51:17 +0000

 Module Name:	src
 Committed By:	darcy
 Date:		Fri Jun 22 02:51:17 UTC 2018

 Modified Files:
 	src/sys/arch/amd64/conf: XEN3_DOM0

 Log Message:
 PR port-xen/50446
 With approval from bouyer@ and acceptance, sometimes grudgingly, from
 others I have removed the AGP lines from the XEN3_DOM0 config.  I have
 left a note in the PR suggesting that if it ever gets a proper fix that
 those lines can be considered for re-inclusion.


 To generate a diff of this commit:
 cvs rdiff -u -r1.151 -r1.152 src/sys/arch/amd64/conf/XEN3_DOM0

 Please note that diffs are not public domain; they are subject to the
 copyright notices on the relevant files.

State-Changed-From-To: feedback->closed
State-Changed-By: gson@NetBSD.org
State-Changed-When: Sat, 07 Jul 2018 09:14:49 +0000
State-Changed-Why:
I'm not using any AGP system with Xen anymore, but as far as I'm
concerned, with AGP removed from the XEN3_DOM config, the issue is
fixed.


From: Greg Oster <oster@netbsd.org>
To: gnats-bugs@NetBSD.org
Cc: 
Subject: Re: port-xen/50446 (dom0 kernel panics at boot attaching agp)
Date: Sun, 2 Sep 2018 14:40:50 -0600

 On Sat,  7 Jul 2018 09:14:49 +0000 (UTC)
 gson@NetBSD.org wrote:

 > Synopsis: dom0 kernel panics at boot attaching agp
 > 
 > State-Changed-From-To: feedback->closed
 > State-Changed-By: gson@NetBSD.org
 > State-Changed-When: Sat, 07 Jul 2018 09:14:49 +0000
 > State-Changed-Why:
 > I'm not using any AGP system with Xen anymore, but as far as I'm
 > concerned, with AGP removed from the XEN3_DOM config, the issue is
 > fixed.
 > 

 Just ran into this on a netbsd-8 system...  removing: 

  agp*   at pchb?

 got the machine booting again.

 Perhaps we need to pullup to -8 too?

 Later...

 Greg Oster

>Unformatted:

 See also port-xen/51526 (closed as duplicate)

NetBSD Home
NetBSD PR Database Search

(Contact us) $NetBSD: query-full-pr,v 1.43 2018/01/16 07:36:43 maya Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2017 The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.