[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 490] New: 32-bit calls lock x86-64 system hard
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=490 Summary: 32-bit calls lock x86-64 system hard Product: Xen Version: unstable Platform: x86-64 OS/Version: Linux Status: NEW Severity: blocker Priority: P1 Component: Guest-OS AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx ReportedBy: grantma@xxxxxxxxxxxxxxx Found this one when executing linux-2.6-xen.hg kernel under 3.0 testing hypervisor. Whenever I tried to execute chrooted 32-bit progams, the system would lock solid. Doing a 'Chroot /' worked so I don't suspect the chroot call. I also ahd AGP enabled. Hardware is a shuttle x86-64 machine with a AMD 64 3200+ processor (under 2.6.15.1 linux vanilla kernel.org) grantma@sharon:~$ cat /proc/cpuinfo processor : 0 vendor_id : AuthenticAMD cpu family : 15 model : 31 model name : AMD Athlon(tm) 64 Processor 3200+ stepping : 0 cpu MHz : 1004.906 cache size : 512 KB fpu : yes fpu_exception : yes cpuid level : 1 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 syscall nx mmxext fxsr_opt lm 3dnowext 3dnow lahf_lm bogomips : 2011.09 TLB size : 1024 4K pages clflush size : 64 cache_alignment : 64 address sizes : 40 bits physical, 48 bits virtual power management: ts fid vid ttp -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |