[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 1542] New: PAE Pv_ops Dom0 can not boot up
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1542 Summary: PAE Pv_ops Dom0 can not boot up Product: Xen Version: unstable Platform: x86 OS/Version: Linux Status: NEW Severity: major Priority: P1 Component: Hypervisor AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx ReportedBy: jiajun.xu@xxxxxxxxx Environment: ------------ Service Arch (ia32/ia32e/IA64): ia32pae Guest Arch (ia32/ia32e/IA64): Guest OS Type (Linux/Windows): Change Set: 20453 Hardware: All Other: xen-changeset: 20453:bec27eb6f72c pvops git: commit b9160b12ecc7148aa080b8d4ecf35f75d257f9d9 Merge: 69003a1... aa228e3... Author: Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx> ioemu git: commit f72b6e0ffc3bb84d4442c5a7493bffbdce2a4468 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Wed Nov 4 17:07:57 2009 +0000 tboot changeset: changeset: 176:e57acd4d1460 tag: tip user: Shane Wang <shane.wang@xxxxxxxxx> date: Fri Oct 16 04:03:14 2009 -0700 summary: Fixed a timeout bug in 163 Bug detailed description: -------------------------- With latest xen, ia32pae pv_ops dom0 can not boot up. The bug is related to xen pcpu expose patch. After we revert the following patch, dom0 can boot up. commit b910efa9a5434cbb43460dcdbad165ce4494b9b7 Author: Jiang, Yunhong <yunhong.jiang@xxxxxxxxx> Date: Fri Nov 13 16:56:01 2009 -0800 xen/acpi: Export host physical CPU information to dom0 This patch expose host's physical CPU information to dom0 in sysfs, so that dom0's management tools can control the physical CPU if needed. It also provides interface in sysfs to logical online/offline a physical CPU. Notice: The information in dom0 is synced with xen hypervisor asynchronously. Signed-off-by: Jiang, Yunhong <yunhong.jiang@xxxxxxxxx> Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx> [ 0.099627] BUG: unable to handle kernel NULL pointer dereference at 0000050f [ 0.099627] IP: [<c11a3c65>] kobject_uevent_env+0x3f/0x345 [ 0.099627] *pdpt = 0000000039790001 [ 0.099627] Oops: 0000 [#1] SMP [ 0.099627] last sysfs file: [ 0.099627] Modules linked in: [ 0.099627] [ 0.099627] Pid: 1, comm: swapper Not tainted (2.6.31.5 #1) X7DWA [ 0.099627] EIP: 0061:[<c11a3c65>] EFLAGS: 00010202 CPU: 0 [ 0.099627] EIP is at kobject_uevent_env+0x3f/0x345 [ 0.099627] EAX: c1839ad0 EBX: 00000000 ECX: 000004df EDX: 000004df [ 0.099627] ESI: c171dbf8 EDI: 00000000 EBP: ec82defc ESP: ec82dec0 [ 0.099627] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: e021 [ 0.099627] Process swapper (pid: 1, ti=ec82c000 task=ec848000 task.ti=ec82c000) [ 0.099627] Stack: [ 0.099627] 00000004 c1839ad0 000004df c163f585 c16a02e0 00000001 c16a02e0 ec82dee4 [ 0.099627] <0> c1049f8e ec82deec c1049fa0 ec82def4 c1839ac0 c171dbf8 00000000 ec82df04 [ 0.099627] <0> c11a3f75 ec82dfa8 c1203675 00000007 00000000 00000037 03000001 00000000 [ 0.099627] Call Trace: [ 0.099627] [<c1049f8e>] ? need_resched+0x14/0x1e [ 0.099627] [<c1049fa0>] ? should_resched+0x8/0x24 [ 0.099627] [<c11a3f75>] ? kobject_uevent+0xa/0xc [ 0.099627] [<c1203675>] ? xen_sync_pcpus+0x221/0x342 [ 0.099627] [<c17483d4>] ? xen_pcpu_init+0x0/0x94 [ 0.099627] [<c1748426>] ? xen_pcpu_init+0x52/0x94 [ 0.099627] [<c1003099>] ? do_one_initcall+0x4c/0x138 [ 0.099627] [<c172453e>] ? kernel_init+0x124/0x175 [ 0.099627] [<c172441a>] ? kernel_init+0x0/0x175 [ 0.099627] [<c1026737>] ? kernel_thread_helper+0x7/0x10 [ 0.099627] Code: c1 89 55 c4 89 45 d0 8b 45 c8 8b 50 10 85 d2 89 55 cc 75 11 8b 40 0c 85 c0 75 ef be ea ff ff ff e9 02 03 00 00 8b 4d cc 8b 45 c8 <8b> 49 30 89 4d dc f6 40 20 10 0f 85 d5 02 00 00 85 c9 74 2b 8b [ 0.099627] EIP: [<c11a3c65>] kobject_uevent_env+0x3f/0x345 SS:ESP e021:ec82dec0 [ 0.099627] CR2: 000000000000050f [ 0.099627] ---[ end trace 4eaa2a86a8e2da22 ]--- [ 0.099995] Kernel panic - not syncing: Attempted to kill init! [ 0.100002] Pid: 1, comm: swapper Tainted: G D 2.6.31.5 #1 [ 0.100008] Call Trace: [ 0.100017] [<c1055fea>] panic+0x3f/0xec [ 0.100024] [<c1058881>] do_exit+0x5c/0x55a [ 0.100032] [<c1055dc6>] ? print_oops_end_marker+0x1e/0x23 [ 0.100042] [<c1466712>] oops_end+0xa8/0xb0 [ 0.100059] [<c1056ad8>] ? printk+0x15/0x17 [ 0.100068] [<c10415d1>] no_context+0x151/0x15b [ 0.100077] [<c1041766>] __bad_area_nosemaphore+0xe8/0xf0 [ 0.100085] [<c10417d2>] bad_area_nosemaphore+0xd/0x10 [ 0.100093] [<c146775f>] do_page_fault+0x144/0x289 [ 0.100101] [<c146761b>] ? do_page_fault+0x0/0x289 [ 0.100111] [<c1465e2e>] error_code+0x66/0x6c [ 0.100119] [<c104007b>] ? apply_microcode_amd+0x81/0xb9 [ 0.100128] [<c10200d8>] ? xen_setup_vcpu_info_placement+0x52/0x77 [ 0.100137] [<c146761b>] ? do_page_fault+0x0/0x289 [ 0.100145] [<c11a3c65>] ? kobject_uevent_env+0x3f/0x345 [ 0.100155] [<c1049f8e>] ? need_resched+0x14/0x1e [ 0.100168] [<c1049fa0>] ? should_resched+0x8/0x24 [ 0.100177] [<c11a3f75>] kobject_uevent+0xa/0xc [ 0.100185] [<c1203675>] xen_sync_pcpus+0x221/0x342 [ 0.100194] [<c17483d4>] ? xen_pcpu_init+0x0/0x94 [ 0.100202] [<c1748426>] xen_pcpu_init+0x52/0x94 [ 0.100210] [<c1003099>] do_one_initcall+0x4c/0x138 [ 0.100218] [<c172453e>] kernel_init+0x124/0x175 [ 0.100227] [<c172441a>] ? kernel_init+0x0/0x175 [ 0.100238] [<c1026737>] kernel_thread_helper+0x7/0x10 -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |