|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 1542] New: PAE Pv_ops Dom0 can not boot up
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1542
Summary: PAE Pv_ops Dom0 can not boot up
Product: Xen
Version: unstable
Platform: x86
OS/Version: Linux
Status: NEW
Severity: major
Priority: P1
Component: Hypervisor
AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
ReportedBy: jiajun.xu@xxxxxxxxx
Environment:
------------
Service Arch (ia32/ia32e/IA64): ia32pae
Guest Arch (ia32/ia32e/IA64):
Guest OS Type (Linux/Windows):
Change Set: 20453
Hardware: All
Other:
xen-changeset: 20453:bec27eb6f72c
pvops git:
commit b9160b12ecc7148aa080b8d4ecf35f75d257f9d9
Merge: 69003a1... aa228e3...
Author: Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx>
ioemu git:
commit f72b6e0ffc3bb84d4442c5a7493bffbdce2a4468
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date: Wed Nov 4 17:07:57 2009 +0000
tboot changeset:
changeset: 176:e57acd4d1460
tag: tip
user: Shane Wang <shane.wang@xxxxxxxxx>
date: Fri Oct 16 04:03:14 2009 -0700
summary: Fixed a timeout bug in 163
Bug detailed description:
--------------------------
With latest xen, ia32pae pv_ops dom0 can not boot up. The bug is related to xen
pcpu expose patch. After we revert the following patch, dom0 can boot up.
commit b910efa9a5434cbb43460dcdbad165ce4494b9b7
Author: Jiang, Yunhong <yunhong.jiang@xxxxxxxxx>
Date: Fri Nov 13 16:56:01 2009 -0800
xen/acpi: Export host physical CPU information to dom0
This patch expose host's physical CPU information to dom0 in sysfs, so that
dom0's management tools can control the physical CPU if needed.
It also provides interface in sysfs to logical online/offline a physical
CPU.
Notice: The information in dom0 is synced with xen hypervisor
asynchronously.
Signed-off-by: Jiang, Yunhong <yunhong.jiang@xxxxxxxxx>
Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx>
[ 0.099627] BUG: unable to handle kernel NULL pointer dereference at
0000050f
[ 0.099627] IP: [<c11a3c65>] kobject_uevent_env+0x3f/0x345
[ 0.099627] *pdpt = 0000000039790001
[ 0.099627] Oops: 0000 [#1] SMP
[ 0.099627] last sysfs file:
[ 0.099627] Modules linked in:
[ 0.099627]
[ 0.099627] Pid: 1, comm: swapper Not tainted (2.6.31.5 #1) X7DWA
[ 0.099627] EIP: 0061:[<c11a3c65>] EFLAGS: 00010202 CPU: 0
[ 0.099627] EIP is at kobject_uevent_env+0x3f/0x345
[ 0.099627] EAX: c1839ad0 EBX: 00000000 ECX: 000004df EDX: 000004df
[ 0.099627] ESI: c171dbf8 EDI: 00000000 EBP: ec82defc ESP: ec82dec0
[ 0.099627] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: e021
[ 0.099627] Process swapper (pid: 1, ti=ec82c000 task=ec848000
task.ti=ec82c000)
[ 0.099627] Stack:
[ 0.099627] 00000004 c1839ad0 000004df c163f585 c16a02e0 00000001 c16a02e0
ec82dee4
[ 0.099627] <0> c1049f8e ec82deec c1049fa0 ec82def4 c1839ac0 c171dbf8
00000000 ec82df04
[ 0.099627] <0> c11a3f75 ec82dfa8 c1203675 00000007 00000000 00000037
03000001 00000000
[ 0.099627] Call Trace:
[ 0.099627] [<c1049f8e>] ? need_resched+0x14/0x1e
[ 0.099627] [<c1049fa0>] ? should_resched+0x8/0x24
[ 0.099627] [<c11a3f75>] ? kobject_uevent+0xa/0xc
[ 0.099627] [<c1203675>] ? xen_sync_pcpus+0x221/0x342
[ 0.099627] [<c17483d4>] ? xen_pcpu_init+0x0/0x94
[ 0.099627] [<c1748426>] ? xen_pcpu_init+0x52/0x94
[ 0.099627] [<c1003099>] ? do_one_initcall+0x4c/0x138
[ 0.099627] [<c172453e>] ? kernel_init+0x124/0x175
[ 0.099627] [<c172441a>] ? kernel_init+0x0/0x175
[ 0.099627] [<c1026737>] ? kernel_thread_helper+0x7/0x10
[ 0.099627] Code: c1 89 55 c4 89 45 d0 8b 45 c8 8b 50 10 85 d2 89 55 cc 75
11 8b 40 0c 85 c0 75 ef be ea ff ff ff e9 02 03 00 00 8b 4d cc 8b 45 c8 <8b> 49
30 89 4d dc f6 40 20 10 0f 85 d5 02 00 00 85 c9 74 2b 8b
[ 0.099627] EIP: [<c11a3c65>] kobject_uevent_env+0x3f/0x345 SS:ESP
e021:ec82dec0
[ 0.099627] CR2: 000000000000050f
[ 0.099627] ---[ end trace 4eaa2a86a8e2da22 ]---
[ 0.099995] Kernel panic - not syncing: Attempted to kill init!
[ 0.100002] Pid: 1, comm: swapper Tainted: G D 2.6.31.5 #1
[ 0.100008] Call Trace:
[ 0.100017] [<c1055fea>] panic+0x3f/0xec
[ 0.100024] [<c1058881>] do_exit+0x5c/0x55a
[ 0.100032] [<c1055dc6>] ? print_oops_end_marker+0x1e/0x23
[ 0.100042] [<c1466712>] oops_end+0xa8/0xb0
[ 0.100059] [<c1056ad8>] ? printk+0x15/0x17
[ 0.100068] [<c10415d1>] no_context+0x151/0x15b
[ 0.100077] [<c1041766>] __bad_area_nosemaphore+0xe8/0xf0
[ 0.100085] [<c10417d2>] bad_area_nosemaphore+0xd/0x10
[ 0.100093] [<c146775f>] do_page_fault+0x144/0x289
[ 0.100101] [<c146761b>] ? do_page_fault+0x0/0x289
[ 0.100111] [<c1465e2e>] error_code+0x66/0x6c
[ 0.100119] [<c104007b>] ? apply_microcode_amd+0x81/0xb9
[ 0.100128] [<c10200d8>] ? xen_setup_vcpu_info_placement+0x52/0x77
[ 0.100137] [<c146761b>] ? do_page_fault+0x0/0x289
[ 0.100145] [<c11a3c65>] ? kobject_uevent_env+0x3f/0x345
[ 0.100155] [<c1049f8e>] ? need_resched+0x14/0x1e
[ 0.100168] [<c1049fa0>] ? should_resched+0x8/0x24
[ 0.100177] [<c11a3f75>] kobject_uevent+0xa/0xc
[ 0.100185] [<c1203675>] xen_sync_pcpus+0x221/0x342
[ 0.100194] [<c17483d4>] ? xen_pcpu_init+0x0/0x94
[ 0.100202] [<c1748426>] xen_pcpu_init+0x52/0x94
[ 0.100210] [<c1003099>] do_one_initcall+0x4c/0x138
[ 0.100218] [<c172453e>] kernel_init+0x124/0x175
[ 0.100227] [<c172441a>] ? kernel_init+0x0/0x175
[ 0.100238] [<c1026737>] kernel_thread_helper+0x7/0x10
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-bugs] [Bug 1542] New: PAE Pv_ops Dom0 can not boot up,
bugzilla-daemon <=
|
|
|
|
|