WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

RE: [Xen-devel] Kernel BUG atarch/x86_64/mm/../../i386/mm/hypervisor.c:1

Am Dienstag, den 03.10.2006, 23:39 +0200 schrieb Christophe Saout:

> > Can you repro using the 2.6.16 kernel that came with 3.0.3 rather than
> > the Fedora one? I suspect not.
> 
> Well, I can not reproduce these bugs, but the same test case is able to
> kill the whole machine as well. CPU lockups on Dom0 or any DomU
> (depending on where the load was) that spread to the other domains until
> everything locks up. At some point the Dom0 even stops answering to
> pings.

Well, with the 2.6.16.29-based Xen, I just noticed that I was getting
similar "bad page state" and weird occurences as well, just a bit more
down in the list of kernel messages. Notice that there are soft lockups
that seem to go away, turn up again and then there's a bad page state
followed by other nasty stuff. I'm not sure how it works exactly, but
they always seem to be stuck in some memory-management related
hypervisor calls.

As stated before, without running any DomU's, everything is just fine,
Dom0 can run compile jobs for hours. But running a DomU with network and
disk I/O causes the same types of kernel BUGs/lockups not only in an
DomU but also in the Dom0 when causing some load there.

Here's an excerpt of a domU log when it happens. I always see some
combination of these before the system goes down entirely (assuming it
doesn't do that so fast that I don't see anything before everything
locks up):

Oct  3 23:24:26 tuek BUG: soft lockup detected on CPU#0!
Oct  3 23:24:26 tuek CPU 0:
Oct  3 23:24:26 tuek Modules linked in: nfsd exportfs
Oct  3 23:24:26 tuek Pid: 3998, comm: gmetad Not tainted 2.6.16.29-xen-xenU #2
Oct  3 23:24:26 tuek RIP: e030:[<ffffffff80107348>] 
<ffffffff80107348>{hypercall_page+840}
Oct  3 23:24:26 tuek RSP: e02b:ffff88003db47900  EFLAGS: 00000246
Oct  3 23:24:26 tuek RAX: 000000000000001a RBX: ffff88000007cb78 RCX: 
ffffffff8010734a
Oct  3 23:24:26 tuek RDX: 0000000000000000 RSI: 0000000080000001 RDI: 
ffff88003db47918
Oct  3 23:24:26 tuek RBP: ffff88003db47938 R08: 0000000000000001 R09: 
ffffffff80453440
Oct  3 23:24:26 tuek R10: 0000000000007ff0 R11: 0000000000000246 R12: 
80000001aa074167
Oct  3 23:24:26 tuek R13: ffff880003b59ce0 R14: 00002aaaaef9c000 R15: 
0000000000000ce0
Oct  3 23:24:26 tuek FS:  00002aea16c0ffe0(0063) GS:ffffffff804bf000(0000) 
knlGS:0000000000000000
Oct  3 23:24:26 tuek CS:  e033 DS: 0000 ES: 0000
Oct  3 23:24:26 tuek 
Oct  3 23:24:26 tuek Call Trace: <ffffffff80117c4a>{xen_invlpg_mask+58} 
<ffffffff801123a3>{flush_tlb_page+19}
Oct  3 23:24:26 tuek <ffffffff8015c479>{__handle_mm_fault+3753} 
<ffffffff8010722a>{hypercall_page+554}
Oct  3 23:24:26 tuek <ffffffff803d57a7>{do_page_fault+3527} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:24:26 tuek <ffffffff8010b6fb>{error_exit+0} 
<ffffffff8014f50e>{file_read_actor+62}
Oct  3 23:24:26 tuek <ffffffff8014f57c>{file_read_actor+172} 
<ffffffff8014d19c>{do_generic_mapping_read+412}
Oct  3 23:24:26 tuek <ffffffff8014f4d0>{file_read_actor+0} 
<ffffffff8014dce8>{__generic_file_aio_read+424}
Oct  3 23:24:26 tuek <ffffffff8014dd98>{generic_file_aio_read+56} 
<ffffffff801f8f51>{nfs_file_read+129}
Oct  3 23:24:26 tuek <ffffffff80172dd0>{do_sync_read+240} 
<ffffffff80161981>{vma_link+129}
Oct  3 23:24:26 tuek <ffffffff80140500>{autoremove_wake_function+0} 
<ffffffff80162b02>{do_mmap_pgoff+1458}
Oct  3 23:24:26 tuek <ffffffff8017381b>{vfs_read+187} 
<ffffffff80173ce0>{sys_read+80}
Oct  3 23:24:26 tuek <ffffffff8010afbe>{system_call+134} 
<ffffffff8010af38>{system_call+0}

Oct  3 23:24:49 tuek BUG: soft lockup detected on CPU#1!
Oct  3 23:24:49 tuek CPU 1:
Oct  3 23:24:49 tuek Modules linked in: nfsd exportfs
Oct  3 23:24:49 tuek Pid: 3998, comm: gmetad Not tainted 2.6.16.29-xen-xenU #2
Oct  3 23:24:49 tuek RIP: e030:[<ffffffff8010722a>] 
<ffffffff8010722a>{hypercall_page+554}
Oct  3 23:24:49 tuek RSP: e02b:ffff88003db479e0  EFLAGS: 00000246
Oct  3 23:24:49 tuek RAX: 0000000000030000 RBX: ffff880001df9b98 RCX: 
ffffffff8010722a
Oct  3 23:24:49 tuek RDX: ffffffffff5fd000 RSI: 0000000000000000 RDI: 
0000000000000000
Oct  3 23:24:49 tuek RBP: ffff88003db479f8 R08: 0000000000000000 R09: 
0000000000000001
Oct  3 23:24:49 tuek R10: 0000000000000060 R11: 0000000000000246 R12: 
0000000000000f18
Oct  3 23:24:49 tuek R13: ffff88003db47d38 R14: 0000000000006000 R15: 
0000000000000002
Oct  3 23:24:49 tuek FS:  00002aea16c0ffe0(0063) GS:ffffffff804bf080(0000) 
knlGS:0000000000000000
Oct  3 23:24:49 tuek CS:  e033 DS: 0000 ES: 0000
Oct  3 23:24:49 tuek Call Trace: <ffffffff802dc47e>{force_evtchn_callback+14}
Oct  3 23:24:49 tuek <ffffffff803d4ab6>{do_page_fault+214} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:24:49 tuek <ffffffff8010b6fb>{error_exit+0} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:24:49 tuek <ffffffff8014f50e>{file_read_actor+62} 
<ffffffff8014f57c>{file_read_actor+172}
Oct  3 23:24:49 tuek <ffffffff8014d19c>{do_generic_mapping_read+412} 
<ffffffff8014f4d0>{file_read_actor+0}
Oct  3 23:24:49 tuek <ffffffff8014dce8>{__generic_file_aio_read+424} 
<ffffffff8014dd98>{generic_file_aio_read+56}
Oct  3 23:24:49 tuek <ffffffff801f8f51>{nfs_file_read+129} 
<ffffffff80172dd0>{do_sync_read+240}
Oct  3 23:24:49 tuek <ffffffff80161981>{vma_link+129} 
<ffffffff80140500>{autoremove_wake_function+0}
Oct  3 23:24:49 tuek <ffffffff80162b02>{do_mmap_pgoff+1458} 
<ffffffff8017381b>{vfs_read+187}
Oct  3 23:24:49 tuek <ffffffff80173ce0>{sys_read+80} 
<ffffffff8010afbe>{system_call+134}
Oct  3 23:24:49 tuek <ffffffff8010af38>{system_call+0}

Oct  3 23:27:28 tuek BUG: soft lockup detected on CPU#0!
Oct  3 23:27:28 tuek CPU 0:
Oct  3 23:27:28 tuek Modules linked in: nfsd exportfs
Oct  3 23:27:28 tuek Pid: 3988, comm: gmetad Not tainted 2.6.16.29-xen-xenU #2
Oct  3 23:27:28 tuek RIP: e030:[<ffffffff8010722a>] 
<ffffffff8010722a>{hypercall_page+554}
Oct  3 23:27:28 tuek RSP: e02b:ffff88003e32f9e0  EFLAGS: 00000246
Oct  3 23:27:28 tuek RAX: 0000000000030000 RBX: ffff8800017ea448 RCX: 
ffffffff8010722a
Oct  3 23:27:28 tuek RDX: ffffffffff5fd000 RSI: 0000000000000000 RDI: 
0000000000000000
Oct  3 23:27:28 tuek RBP: ffff88003e32f9f8 R08: 0000000000000000 R09: 
0000000000000000
Oct  3 23:27:28 tuek R10: 0000000000007ff0 R11: 0000000000000246 R12: 
0000000000001000
Oct  3 23:27:28 tuek R13: ffff88003e32fd38 R14: 0000000000005000 R15: 
0000000000000002
Oct  3 23:27:28 tuek FS:  00002aeaaa684b00(0000) GS:ffffffff804bf000(0000) 
knlGS:0000000000000000
Oct  3 23:27:28 tuek CS:  e033 DS: 0000 ES: 0000
Oct  3 23:27:28 tuek 
Oct  3 23:27:28 tuek Call Trace: <ffffffff802dc47e>{force_evtchn_callback+14}
Oct  3 23:27:28 tuek <ffffffff803d4ab6>{do_page_fault+214} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:27:28 tuek <ffffffff8010b6fb>{error_exit+0} 
<ffffffff8014f50e>{file_read_actor+62}
Oct  3 23:27:28 tuek <ffffffff8014f57c>{file_read_actor+172} 
<ffffffff8014d19c>{do_generic_mapping_read+412}
Oct  3 23:27:28 tuek <ffffffff8014f4d0>{file_read_actor+0} 
<ffffffff8014dce8>{__generic_file_aio_read+424}
Oct  3 23:27:28 tuek <ffffffff8014dd98>{generic_file_aio_read+56} 
<ffffffff801f8f51>{nfs_file_read+129}
Oct  3 23:27:28 tuek <ffffffff80172dd0>{do_sync_read+240} 
<ffffffff80161981>{vma_link+129}
Oct  3 23:27:28 tuek <ffffffff80140500>{autoremove_wake_function+0} 
<ffffffff80162b02>{do_mmap_pgoff+1458}
Oct  3 23:27:28 tuek <ffffffff8017381b>{vfs_read+187} 
<ffffffff80173ce0>{sys_read+80}
Oct  3 23:27:28 tuek <ffffffff8010afbe>{system_call+134} 
<ffffffff8010af38>{system_call+0}

Oct  3 23:27:52 tuek Bad page state in process 'bash'
Oct  3 23:27:52 tuek page:ffff880001c72bc8 flags:0x0000000000000000 
mapping:0000000000000000 mapcount:1 count:1
Oct  3 23:27:52 tuek Trying to fix it up, but a reboot is needed
Oct  3 23:27:52 tuek Backtrace:
Oct  3 23:27:52 tuek 
Oct  3 23:27:52 tuek Call Trace: <ffffffff801512ad>{bad_page+93} 
<ffffffff80151d57>{get_page_from_freelist+775}
Oct  3 23:27:52 tuek <ffffffff80151f1d>{__alloc_pages+157} 
<ffffffff80152249>{get_zeroed_page+73}
Oct  3 23:27:52 tuek <ffffffff80158cf4>{__pmd_alloc+36} 
<ffffffff8015e55e>{copy_page_range+1262}
Oct  3 23:27:52 tuek <ffffffff802a6bea>{rb_insert_color+250} 
<ffffffff80127cb7>{copy_process+3079}
Oct  3 23:27:52 tuek <ffffffff80128c8e>{do_fork+238} 
<ffffffff801710d6>{fd_install+54}
Oct  3 23:27:52 tuek <ffffffff80134e8c>{sigprocmask+220} 
<ffffffff8010afbe>{system_call+134}
Oct  3 23:27:52 tuek <ffffffff801094b3>{sys_clone+35} 
<ffffffff8010b3e9>{ptregscall_common+61}

Oct  3 23:27:52 tuek ----------- [cut here ] --------- [please bite here ] 
---------
Oct  3 23:27:52 tuek Kernel BUG at arch/x86_64/mm/../../i386/mm/hypervisor.c:198
Oct  3 23:27:52 tuek invalid opcode: 0000 [1] SMP 
Oct  3 23:27:52 tuek CPU 3 
Oct  3 23:27:52 tuek Modules linked in: nfsd exportfs
Oct  3 23:27:52 tuek Pid: 4617, comm: bash Tainted: G    B 2.6.16.29-xen-xenU #2
Oct  3 23:27:52 tuek RIP: e030:[<ffffffff80117cb5>] 
<ffffffff80117cb5>{xen_pgd_pin+85}
Oct  3 23:27:52 tuek RSP: e02b:ffff880038ed9d58  EFLAGS: 00010282
Oct  3 23:27:52 tuek RAX: 00000000ffffffea RBX: ffff880000e098c0 RCX: 
000000000001dc48
Oct  3 23:27:52 tuek RDX: 0000000000000000 RSI: 0000000000000001 RDI: 
ffff880038ed9d58
Oct  3 23:27:52 tuek RBP: ffff880038ed9d78 R08: ffff880038e7fff8 R09: 
ffff880038e7fff8
Oct  3 23:27:52 tuek R10: 0000000000007ff0 R11: ffff880002d39008 R12: 
0000000000000000
Oct  3 23:27:52 tuek R13: ffff8800006383c0 R14: 0000000001200011 R15: 
ffff8800006383c0
Oct  3 23:27:52 tuek FS:  00002afecc63ae60(0000) GS:ffffffff804bf180(0000) 
knlGS:0000000000000000
Oct  3 23:27:52 tuek CS:  e033 DS: 0000 ES: 0000
Oct  3 23:27:52 tuek Process bash (pid: 4617, threadinfo ffff880038ed8000, task 
ffff88003f9e0180)
Oct  3 23:27:52 tuek Stack: 0000000000000003 00000000001b3aa7 0000000001200011 
ffff880002d39008 
Oct  3 23:27:52 tuek ffff880038ed9d98 ffffffff80117543 0000000000000000 
ffff88003ca4ea28 
Oct  3 23:27:52 tuek ffff880038ed9da8 ffffffff801175f2 
Oct  3 23:27:52 tuek Call Trace: <ffffffff80117543>{mm_pin+387} 
<ffffffff801175f2>{_arch_dup_mmap+18}
Oct  3 23:27:52 tuek <ffffffff80127cf6>{copy_process+3142} 
<ffffffff80128c8e>{do_fork+238}
Oct  3 23:27:52 tuek <ffffffff801710d6>{fd_install+54} 
<ffffffff80134e8c>{sigprocmask+220}
Oct  3 23:27:52 tuek <ffffffff8010afbe>{system_call+134} 
<ffffffff801094b3>{sys_clone+35}
Oct  3 23:27:52 tuek <ffffffff8010b3e9>{ptregscall_common+61}
Oct  3 23:27:52 tuek 
Oct  3 23:27:52 tuek Code: 0f 0b 68 38 d7 3f 80 c2 c6 00 90 c9 c3 0f 1f 80 00 
00 00 00 
Oct  3 23:27:52 tuek RIP <ffffffff80117cb5>{xen_pgd_pin+85} RSP 
<ffff880038ed9d58>

Oct  3 23:27:55 tuek <3>BUG: soft lockup detected on CPU#0!
Oct  3 23:27:55 tuek CPU 0:
Oct  3 23:27:55 tuek Modules linked in: nfsd exportfs
Oct  3 23:27:55 tuek Pid: 3998, comm: gmetad Tainted: G    B 2.6.16.29-xen-xenU 
#2
Oct  3 23:27:55 tuek RIP: e030:[<ffffffff8010734a>] 
<ffffffff8010734a>{hypercall_page+842}
Oct  3 23:27:55 tuek RSP: e02b:ffff88003db47900  EFLAGS: 00000246
Oct  3 23:27:55 tuek RAX: 0000000000000000 RBX: ffff88000007cb78 RCX: 
ffffffff8010734a
Oct  3 23:27:55 tuek RDX: 0000000000000000 RSI: 0000000000000001 RDI: 
ffff88003db47918
Oct  3 23:27:55 tuek RBP: ffff88003db47938 R08: 0000000000000001 R09: 
0000000000000000
Oct  3 23:27:55 tuek R10: 0000000000007ff0 R11: 0000000000000246 R12: 
80000001c8bac167
Oct  3 23:27:55 tuek R13: ffff88003a80ab68 R14: 00002aaaaf16d000 R15: 
0000000000000b68
Oct  3 23:27:55 tuek FS:  0000000000000000(0063) GS:ffffffff804bf000(0000) 
knlGS:0000000000000000
Oct  3 23:27:55 tuek CS:  e033 DS: 0000 ES: 0000
Oct  3 23:27:55 tuek 
Oct  3 23:27:55 tuek Call Trace: <ffffffff80117c4a>{xen_invlpg_mask+58} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:27:55 tuek <ffffffff801123a3>{flush_tlb_page+19} 
<ffffffff8015c479>{__handle_mm_fault+3753}
Oct  3 23:27:55 tuek <ffffffff8010722a>{hypercall_page+554} 
<ffffffff803d57a7>{do_page_fault+3527}
Oct  3 23:27:55 tuek <ffffffff8010b6fb>{error_exit+0} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:27:55 tuek <ffffffff8014f50e>{file_read_actor+62} 
<ffffffff8014f57c>{file_read_actor+172}
Oct  3 23:27:55 tuek <ffffffff8014d19c>{do_generic_mapping_read+412} 
<ffffffff8014f4d0>{file_read_actor+0}
Oct  3 23:27:55 tuek <ffffffff8014dce8>{__generic_file_aio_read+424} 
<ffffffff8014dd98>{generic_file_aio_read+56}
Oct  3 23:27:55 tuek <ffffffff801f8f51>{nfs_file_read+129} 
<ffffffff80172dd0>{do_sync_read+240}
Oct  3 23:27:55 tuek <ffffffff80161981>{vma_link+129} 
<ffffffff80140500>{autoremove_wake_function+0}
Oct  3 23:27:55 tuek <ffffffff80162b02>{do_mmap_pgoff+1458} 
<ffffffff8017381b>{vfs_read+187}
Oct  3 23:27:55 tuek <ffffffff80173ce0>{sys_read+80} 
<ffffffff8010afbe>{system_call+134}
Oct  3 23:27:55 tuek <ffffffff8010af38>{system_call+0}

Information about the system:

 __  __            _____  ___                     _        _     _      
 \ \/ /___ _ __   |___ / / _ \    _   _ _ __  ___| |_ __ _| |__ | | ___ 
  \  // _ \ '_ \    |_ \| | | |__| | | | '_ \/ __| __/ _` | '_ \| |/ _ \
  /  \  __/ | | |  ___) | |_| |__| |_| | | | \__ \ || (_| | |_) | |  __/
 /_/\_\___|_| |_| |____(_)___/    \__,_|_| |_|___/\__\__,_|_.__/|_|\___|
                                                                        
 http://www.cl.cam.ac.uk/netos/xen
 University of Cambridge Computer Laboratory

 Xen version 3.0-unstable (chtephan@intern) (gcc-Version 4.1.1 (Gentoo Hardened 
4.1.1-r1, pie-8.7.8)) Wed Oct  4 00:07:24 CEST 2006
 Latest ChangeSet: Wed Sep 27 14:30:36 2006 +0100 11633:000aa9510e55

(XEN) Command line: xen-3.0.3.gz dom0_mem=1024M console=com2,vga com2=19200,8n1 
(XEN) Physical RAM map:
(XEN)  0000000000000000 - 000000000009fc00 (usable)
(XEN)  000000000009fc00 - 00000000000a0000 (reserved)
(XEN)  00000000000e8000 - 0000000000100000 (reserved)
(XEN)  0000000000100000 - 00000000bfff0000 (usable)
(XEN)  00000000bfff0000 - 00000000bffff000 (ACPI data)
(XEN)  00000000bffff000 - 00000000c0000000 (ACPI NVS)
(XEN)  00000000ff780000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 000000030e000000 (usable)
(XEN) System RAM: 11487MB (11763260kB)
(XEN) Xen heap: 13MB (14108kB)
(XEN) found SMP MP-table at 000ff780
(XEN) DMI 2.3 present.
(XEN) Using APIC driver default
(XEN) ACPI: RSDP (v002 ACPIAM                                ) @ 
0x00000000000f9870
(XEN) ACPI: XSDT (v001 A M I  OEMXSDT  0x05000622 MSFT 0x00000097) @ 
0x00000000bfff0100
(XEN) ACPI: FADT (v003 A M I  OEMFACP  0x05000622 MSFT 0x00000097) @ 
0x00000000bfff0281
(XEN) ACPI: MADT (v001 A M I  OEMAPIC  0x05000622 MSFT 0x00000097) @ 
0x00000000bfff0380
(XEN) ACPI: SRAT (v001 A M I  OEMSRAT  0x05000622 MSFT 0x00000097) @ 
0x00000000bfff38d0
(XEN) ACPI: DSDT (v001  H8DA8 H8DA8010 0x00000000 INTL 0x02002026) @ 
0x0000000000000000
(XEN) ACPI: Local APIC address 0xfee00000
(XEN) ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled)
(XEN) Processor #0 15:1 APIC version 16
(XEN) ACPI: LAPIC (acpi_id[0x02] lapic_id[0x01] enabled)
(XEN) Processor #1 15:1 APIC version 16
(XEN) ACPI: LAPIC (acpi_id[0x03] lapic_id[0x02] enabled)
(XEN) Processor #2 15:1 APIC version 16
(XEN) ACPI: LAPIC (acpi_id[0x04] lapic_id[0x03] enabled)
(XEN) Processor #3 15:1 APIC version 16
(XEN) ACPI: IOAPIC (id[0x04] address[0xfec00000] gsi_base[0])
(XEN) IOAPIC[0]: apic_id 4, version 17, address 0xfec00000, GSI 0-23
(XEN) ACPI: IOAPIC (id[0x05] address[0xfebfe000] gsi_base[24])
(XEN) IOAPIC[1]: apic_id 5, version 17, address 0xfebfe000, GSI 24-27
(XEN) ACPI: IOAPIC (id[0x06] address[0xfebff000] gsi_base[28])
(XEN) IOAPIC[2]: apic_id 6, version 17, address 0xfebff000, GSI 28-31
(XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
(XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
(XEN) ACPI: IRQ0 used by override.
(XEN) ACPI: IRQ2 used by override.
(XEN) Enabling APIC mode:  Flat.  Using 3 I/O APICs
(XEN) Using ACPI (MADT) for SMP configuration information
(XEN) Using scheduler: SMP Credit Scheduler (credit)
(XEN) Initializing CPU#0
(XEN) Detected 1994.337 MHz processor.
(XEN) CPU0: AMD Flush Filter disabled
(XEN) CPU: L1 I Cache: 64K (64 bytes/line), D cache 64K (64 bytes/line)
(XEN) CPU: L2 Cache: 1024K (64 bytes/line)
(XEN) CPU 0(2) -> Core 0
(XEN) Intel machine check architecture supported.
(XEN) Intel machine check reporting enabled on CPU#0.
(XEN) CPU0: AMD Dual Core AMD Opteron(tm) Processor 270 stepping 02
(XEN) Booting processor 1/1 eip 90000
(XEN) Initializing CPU#1
(XEN) CPU1: AMD Flush Filter disabled
(XEN) CPU: L1 I Cache: 64K (64 bytes/line), D cache 64K (64 bytes/line)
(XEN) CPU: L2 Cache: 1024K (64 bytes/line)
(XEN) CPU 1(2) -> Core 1
(XEN) AMD: Disabling C1 Clock Ramping Node #0
(XEN) AMD: Disabling C1 Clock Ramping Node #1
(XEN) Intel machine check architecture supported.
(XEN) Intel machine check reporting enabled on CPU#1.
(XEN) CPU1: AMD Dual Core AMD Opteron(tm) Processor 270 stepping 02
(XEN) Booting processor 2/2 eip 90000
(XEN) Initializing CPU#2
(XEN) CPU2: AMD Flush Filter disabled
(XEN) CPU: L1 I Cache: 64K (64 bytes/line), D cache 64K (64 bytes/line)
(XEN) CPU: L2 Cache: 1024K (64 bytes/line)
(XEN) CPU 2(2) -> Core 0
(XEN) Intel machine check architecture supported.
(XEN) Intel machine check reporting enabled on CPU#2.
(XEN) CPU2: AMD Dual Core AMD Opteron(tm) Processor 270 stepping 02
(XEN) Booting processor 3/3 eip 90000
(XEN) Initializing CPU#3
(XEN) CPU3: AMD Flush Filter disabled
(XEN) CPU: L1 I Cache: 64K (64 bytes/line), D cache 64K (64 bytes/line)
(XEN) CPU: L2 Cache: 1024K (64 bytes/line)
(XEN) CPU 3(2) -> Core 1
(XEN) Intel machine check architecture supported.
(XEN) Intel machine check reporting enabled on CPU#3.
(XEN) CPU3: AMD Dual Core AMD Opteron(tm) Processor 270 stepping 02
(XEN) Total of 4 processors activated.
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using new ACK method
(XEN) ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=0 pin2=0
(XEN) checking TSC synchronization across 4 CPUs: passed.
(XEN) Platform timer is 1.193MHz PIT
(XEN) Brought up 4 CPUs
(XEN) Machine check exception polling timer started.
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Domain 0 kernel supports features = { 0000001f }.
(XEN) Domain 0 kernel requires features = { 00000000 }.
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   000000000b000000->000000000c000000 (258048 pages to be 
allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: ffffffff80200000->ffffffff807cb448
(XEN)  Init. ramdisk: ffffffff807cc000->ffffffff807cc000
(XEN)  Phys-Mach map: ffffffff807cc000->ffffffff809cc000
(XEN)  Start info:    ffffffff809cc000->ffffffff809cc49c
(XEN)  Page tables:   ffffffff809cd000->ffffffff809d6000
(XEN)  Boot stack:    ffffffff809d6000->ffffffff809d7000
(XEN)  TOTAL:         ffffffff80000000->ffffffff80c00000
(XEN)  ENTRY ADDRESS: ffffffff80200000
(XEN) Dom0 has maximum 4 VCPUs
(XEN) Scrubbing Free RAM: 
..............................................................................................................................done.
(XEN) Xen trace buffers: disabled
(XEN) Xen is relinquishing VGA console.
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to 
Xen).



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel