[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 1671] New: Xen fail to bootup on Stoakley



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1671

           Summary: Xen fail to bootup  on Stoakley
           Product: Xen
           Version: unstable
          Platform: x86
        OS/Version: Linux
            Status: NEW
          Severity: blocker
          Priority: P1
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: yang.z.zhang@xxxxxxxxx


Environment:
------------
Service Arch (ia32/ia32e/IA64): ia32/ia32e
Guest Arch (ia32/ia32e/IA64): 
Guest OS Type (Linux/Windows):
Change Set: 22155
Hardware: Stoakley
Other:
xen-changeset:   22155:5393151a737b
xen-date:        Tue Sep 14 18:26:10 2010 +0100
xen-summary:     QEMU_TAG update

pvops git:
commit b297cdac0373625d3cd0e6f2b393570dcf2edba6
Merge: c6cfd01... 64392f6...
Author: Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx>
Date:   Mon Sep 13 14:27:24 2010 -0700

ioemu git:
commit f95d202ed6444dacb15fbea4dee185eb0e048d9a
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue Sep 14 17:31:43 2010 +0100

Bug detailed description:
--------------------------
We install latest xen c/s 22155 on Stoakley, System  bootup fail both on ia32e
and PAE. Following is the call trace:

[    2.556066] last sysfs file: 
[    2.556066] CPU 4 
[    2.556066] Modules linked in:
[    2.556066] Pid: 23, comm: events/4 Not tainted 2.6.32.21 #1 X7DWA
[    2.556066] RIP: e030:[<ffffffff812571a5>]  [<ffffffff812571a5>]
balloon_process+0x1e3/0x5a8
[    2.556066] RSP: e02b:ffff8801f191bdc0  EFLAGS: 00010206
[    2.556066] RAX: 0000000000191493 RBX: ffff88002c5dbae8 RCX:
ffff88002c5e2b10
[    2.556066] RDX: ffffffff819e2000 RSI: 00000000deadbeef RDI:
0000000000000ae9
[    2.556066] RBP: ffff8801f191be70 R08: dead000000200200 R09:
dead000000100100
[    2.556066] R10: ffff8801f18de368 R11: 0000000000000000 R12:
000000000015d27b
[    2.556066] R13: 0000000000228f55 R14: ffff88002c5e2ae8 R15:
ffffffff81256fc2
[    2.556066] FS:  0000000000000000(0000) GS:ffff8800280c3000(0000)
knlGS:0000000000000000
[    2.556066] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[    2.556066] CR2: 0000000000000000 CR3: 0000000001001000 CR4:
0000000000002660
[    2.556066] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[    2.556066] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[    2.556066] Process events/4 (pid: 23, threadinfo ffff8801f191a000, task
ffff8801f18de320)
[    2.556066] Stack:
[    2.556066]  00000000000002c0 0000000000000200 0000020000000000
0000000000000200
[    2.556066] <0> ffff8801f191be00 ffffffff81039f50 0000000000000134
0000000000000000
[    2.556066] <0> ffff8801f191be40 ffffffff8103a204 ffff8801f18de320
ffff8800280dad00
[    2.556066] Call Trace:
[    2.556066]  [<ffffffff81039f50>] ? __spin_time_accum+0x1b/0x3a
[    2.556066]  [<ffffffff8103a204>] ? __xen_spin_lock+0xae/0xc1
[    2.556066]  [<ffffffff81256fc2>] ? balloon_process+0x0/0x5a8
[    2.556066]  [<ffffffff8108c04d>] worker_thread+0x144/0x1e0
[    2.556066]  [<ffffffff8108f682>] ? autoremove_wake_function+0x0/0x38
[    2.556066]  [<ffffffff8108bf09>] ? worker_thread+0x0/0x1e0
[    2.556066]  [<ffffffff8108f431>] kthread+0x69/0x71
[    2.556066]  [<ffffffff8103dcea>] child_rip+0xa/0x20
[    2.556066]  [<ffffffff8103cea1>] ? int_ret_from_sys_call+0x7/0x1b
[    2.556066]  [<ffffffff8103d65d>] ? retint_restore_args+0x5/0x6
[    2.556066]  [<ffffffff8103dce0>] ? child_rip+0x0/0x20
[    2.556066] Code: 4c 0f af e0 80 3d 3d 58 62 00 00 48 8b 45 88 4c 8b 2c c5
80 40 9c 81 75 0d 4c 89 e7 e8 86 f4 dd ff 48 ff c0 75 05 45 31 ff eb 5a <0f> 0b
eb fe 4c 89 ee 48 89 df e8 65 00 de ff 48 3b 1d 8d 80 75 
[    2.556066] RIP  [<ffffffff812571a5>] balloon_process+0x1e3/0x5a8
[    2.556066]  RSP <ffff8801f191bdc0>
[    2.556066] ---[ end trace a7919e7f17c0a725 ]--


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.