[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 903] New: Xen Guest fails to boot when physical memory is not limited to less than 4 GB.
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=903 Summary: Xen Guest fails to boot when physical memory is not limited to less than 4 GB. Product: Xen Version: unstable Platform: x86 OS/Version: other Status: NEW Severity: normal Priority: P2 Component: Hypervisor AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx ReportedBy: hawklan@xxxxxxxxxxx I am using Xen 3.0.3 on Fedora Core 6 32-bit. The hardware is a Dell PowerEdge 2950, Xeon 5110 dual-processor, dual-core with 8GB of RAM. If I limit the memory available using mem=4000M in grub.conf, the guest OS will boot without a problem. If I use more than 4GB of RAM, the guest OS will not boot up. This is 100% reproducable, and has been verified with numberous guest OS images, although all of the guest images are Fedora Core 6 based and constucted with xenguest-install and virt-install on the Dom0. The information provided by the guest OS follows: ------------[ cut here ]------------ kernel BUG at arch/i386/mm/hypervisor.c:70! invalid opcode: 0000 [#1] SMP last sysfs file: /block/ram0/dev Modules linked in: dm_snapshot dm_zero dm_mirror dm_mod xenblk ext3 jbd ehci_hcd ohci_hcd uhci_hcd CPU: 0 EIP: 0061:[<c0414625>] Not tainted VLI EFLAGS: 00010282 (2.6.18-1.2798.fc6xen #1) EIP is at xen_l2_entry_update+0x7c/0x8b eax: ffffffea ebx: c0920d10 ecx: 00000001 edx: 00000000 esi: 00007ff0 edi: 00000000 ebp: 00000aed esp: c0920d08 ds: 007b es: 007b ss: 0069 Process lvm (pid: 248, ti=c0920000 task=c0923870 task.ti=c0920000) Stack: c7d84067 00000000 170c9df8 00000002 c7d84067 00000000 00000000 c7d84067 00000000 c045356c ffffffff ffffffff c09a8df8 c0764840 00000061 80000000 000009a8 00000000 00000000 00000001 c04537ad c115d365 c0cf6f40 00000063 Call Trace: [<c045356c>] __pte_alloc+0x1a2/0x21d [<c04537ad>] __handle_mm_fault+0x1c6/0x10bf [<c060a17f>] do_page_fault+0x6f6/0xc3c [<c040502b>] error_code+0x2b/0x30 DWARF2 unwinder stuck at error_code+0x2b/0x30 Leftover inexact backtrace: [<c041007b>] do_sys_vm86+0x26d/0x38b [<c04df660>] __copy_to_user_ll+0xcf/0xda [<c0482119>] seq_read+0x1e4/0x277 [<c0481f35>] seq_read+0x0/0x277 [<c04665ec>] vfs_read+0xa6/0x157 [<c0466a5b>] sys_read+0x41/0x67 [<c0404ea7>] syscall_call+0x7/0xb ======================= Code: 01 00 00 00 89 44 24 0c 8b 04 24 8d 5c 24 08 89 74 24 08 be f0 7f 00 00 89 54 24 14 31 d2 89 44 24 10 e8 ff c9 fe ff 85 c0 79 08 <0f> 0b 46 00 58 41 62 c0 83 c4 18 5b 5e 5f c3 57 05 00 00 00 40 EIP: [<c0414625>] xen_l2_entry_update+0x7c/0x8b SS:ESP 0069:c0920d08 <3>BUG: soft lockup detected on CPU#0! [<c040571a>] dump_trace+0x69/0x1af [<c0405878>] show_trace_log_lvl+0x18/0x2c [<c0405e18>] show_trace+0xf/0x11 [<c0405e47>] dump_stack+0x15/0x17 [<c0441961>] softlockup_tick+0xad/0xc4 [<c0409290>] timer_interrupt+0x54b/0x593 [<c0441be6>] handle_IRQ_event+0x27/0x51 [<c0441ca6>] __do_IRQ+0x96/0xf2 [<c0406ca8>] do_IRQ+0x9e/0xbc ======================= BUG: spinlock lockup on CPU#0, lvm/248, c0764894 (Not tainted) [<c040571a>] dump_trace+0x69/0x1af [<c0405878>] show_trace_log_lvl+0x18/0x2c [<c0405e18>] show_trace+0xf/0x11 [<c0405e47>] dump_stack+0x15/0x17 [<c04e04a7>] _raw_spin_lock+0xbf/0xdc [<c041195d>] mm_unpin+0x17/0x2b [<c0411adc>] _arch_exit_mmap+0x16b/0x173 [<c0457436>] exit_mmap+0x1c/0xf6 [<c041a441>] mmput+0x34/0x7a [<c041ee6d>] do_exit+0x20b/0x776 [<c0405db9>] die+0x289/0x2ae [<c04063c2>] do_invalid_op+0xa2/0xab [<c040502b>] error_code+0x2b/0x30 DWARF2 unwinder stuck at error_code+0x2b/0x30 Leftover inexact backtrace: [<c0414625>] xen_l2_entry_update+0x7c/0x8b [<c045356c>] __pte_alloc+0x1a2/0x21d [<c04537ad>] __handle_mm_fault+0x1c6/0x10bf [<c0608c2a>] _read_unlock_irq+0x5/0xa [<c044722f>] find_get_page+0x36/0x3b [<c0449d44>] filemap_nopage+0x19a/0x33e [<c060a17f>] do_page_fault+0x6f6/0xc3c [<c04b714a>] avc_has_perm+0x4e/0x58 [<c04b77cb>] inode_has_perm+0x5b/0x63 [<c047a3be>] __d_path+0xc5/0x156 [<c0609a89>] do_page_fault+0x0/0xc3c [<c040502b>] error_code+0x2b/0x30 [<c041007b>] do_sys_vm86+0x26d/0x38b [<c04df660>] __copy_to_user_ll+0xcf/0xda [<c0482119>] seq_read+0x1e4/0x277 [<c0481f35>] seq_read+0x0/0x277 [<c04665ec>] vfs_read+0xa6/0x157 [<c0466a5b>] sys_read+0x41/0x67 [<c0404ea7>] syscall_call+0x7/0xb ======================= -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |