Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 156579 Details for
Bug 243312
[RHEL5.1 IA64 Xen] kernel BUG at arch/ia64/kernel/irq_ia64.c:481!
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Console boot log from failed xen 3.1-based kernel-xen boot
ia64-xen3.1-bomb.txt (text/plain), 8.22 KB, created by
Jarod Wilson
on 2007-06-08 15:02:51 UTC
(
hide
)
Description:
Console boot log from failed xen 3.1-based kernel-xen boot
Filename:
MIME Type:
Creator:
Jarod Wilson
Created:
2007-06-08 15:02:51 UTC
Size:
8.22 KB
patch
obsolete
>ELILO boot: >Uncompressing Linux... done >Loading file initrd-2.6.18-20.el5.kraxel.5.xi1xen.img...done >Loading file vmlinuz-2.6.18-20.el5.kraxel.5.xi1xen...done >Uncompressing... done > __ __ _____ _ ___ > \ \/ /___ _ __ |___ / / | / _ \ > \ // _ \ '_ \ |_ \ | || | | | > / \ __/ | | | ___) || || |_| | > /_/\_\___|_| |_| |____(_)_(_)___/ > > http://www.cl.cam.ac.uk/netos/xen > University of Cambridge Computer Laboratory > > Xen version 3.1.0 (root@lab.boston.redhat.com) (gcc version 4.1.1 20070105 (Red Hat 4.1.1-52)) Thu Jun 7 17:44:06 EDT 2007 > Latest ChangeSet: unavailable > >(XEN) Xen command line: BOOT_IMAGE=scsi0:EFI\redhat\xen.gz-2.6.18-20.el5.kraxel.5.xi1 dom0_mem=2G dom0_max_vcpus=2 >(XEN) xen image pstart: 0x4000000, xenheap pend: 0x8000000 >(XEN) Xen patching physical address access by offset: 0x0 >(XEN) find_memory: efi_memmap_walk returns max_page=403fff9 >(XEN) Before xen_heap_start: f0000000041bb080 >(XEN) After xen_heap_start: f0000000049c8000 >(XEN) Init boot pages: 0x10000d8 -> 0x4000000. >(XEN) Init boot pages: 0x8000000 -> 0x3e860000. >(XEN) Init boot pages: 0x3eb88000 -> 0x3ee78000. >(XEN) Init boot pages: 0x3fc00000 -> 0x3fde4000. >(XEN) Init boot pages: 0x100000000 -> 0x3ffffc000. >(XEN) Init boot pages: 0x10040000000 -> 0x100fdfda000. >(XEN) Init boot pages: 0x100fe9cb4e0 -> 0x100fed00010. >(XEN) Init boot pages: 0x100fed008b0 -> 0x100fed02010. >(XEN) Init boot pages: 0x100fed02070 -> 0x100fed05f8b. >(XEN) Init boot pages: 0x100fed05fe8 -> 0x100fed09000. >(XEN) Init boot pages: 0x100fef8b855 -> 0x100feffc000. >(XEN) Init boot pages: 0x100ff000000 -> 0x100ffccc000. >(XEN) Init boot pages: 0x100ffd38000 -> 0x100ffe40000. >(XEN) Init boot pages: 0x100ffe80000 -> 0x100fffe4000. >(XEN) System RAM: 16348MB (16740752kB) >(XEN) size of virtual frame_table: 40976kB >(XEN) virtual machine to physical table: f3ffffffdfe00038 size: 8272kB >(XEN) max_page: 0x403fff9 >(XEN) allocating frame table/mpt table at mfn 0. >(XEN) Domain heap initialised: DMA width 32 bits >(XEN) Xen heap: 54MB (55520kB) >(XEN) avail:0x3170074000000000, status:0x74000000000,control:0x3170000000000000, vm?0x10000000000 >(XEN) WARNING: no opcode provided from hardware(0)!!! >(XEN) vm buffer size: 1048576, order: 6 >(XEN) cpu_init: current=f000000004118000 >(XEN) vm_buffer: 0xf000000007e00000 >(XEN) vhpt_init: vhpt paddr=0x100fc280000, end=0x100fc28ffff >(XEN) Using scheduler: SMP Credit Scheduler (credit) >(XEN) Time init: >(XEN) .... System Time: 37836ns >(XEN) .... scale: 28156C191 >(XEN) num_online_cpus=1, max_cpus=64 >(XEN) cpu_init: current=f000000007ff0000 >(XEN) vhpt_init: vhpt paddr=0x100fc270000, end=0x100fc27ffff >(XEN) Brought up 2 CPUs >(XEN) xenoprof: using perfmon. >(XEN) perfmon: version 2.0 IRQ 238 >(XEN) perfmon: Montecito PMU detected, 27 PMCs, 35 PMDs, 12 counters (47 bits) >(XEN) Maximum number of domains: 63; 18 RID bits per domain >(XEN) *** LOADING DOMAIN 0 *** >(XEN) elf_parse_binary: phdr: paddr=0x4000000 memsz=0x7bd280 >(XEN) elf_parse_binary: phdr: paddr=0x47c0000 memsz=0x75f0 >(XEN) elf_parse_binary: phdr: paddr=0x47d0000 memsz=0x4a3de0 >(XEN) elf_parse_binary: memory: 0x4000000 -> 0x4c73de0 >(XEN) elf_xen_addr_calc_check: VIRT_BASE unset, using 0x0 >(XEN) elf_xen_addr_calc_check: ELF_PADDR_OFFSET unset, using 0x0 >(XEN) elf_xen_addr_calc_check: addresses: >(XEN) virt_base = 0x0 >(XEN) elf_paddr_offset = 0x0 >(XEN) virt_offset = 0x0 >(XEN) virt_kstart = 0x4000000 >(XEN) virt_kend = 0x4c73de0 >(XEN) virt_entry = 0x400ff20 >(XEN) Dom0 kernel: 64-bit, lsb, paddr 0x4000000 -> 0x4c73de0 >(XEN) METAPHYSICAL MEMORY ARRANGEMENT: >(XEN) Kernel image: 4000000->4c73de0 >(XEN) Entry address: 400ff20 >(XEN) Init. ramdisk: 4c78000 len 282855 >(XEN) Start info.: 4c74000->4c78000 >(XEN) Dom0 max_vcpus=2 >(XEN) Dom0: 0xf000000007c80080 >(XEN) enable lsapic entry: 0xf00000003fdf6b78 >(XEN) enable lsapic entry: 0xf00000003fdf6b84 >(XEN) Domain0 EFI passthrough: ACPI 2.0=0x3fde6000 SMBIOS=0x3ee7c000 >(XEN) Scrubbing Free RAM: ...............................................................................................................................................done. >(XEN) Xen trace buffers: disabled >(XEN) Std. Loglevel: Errors and warnings >(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings) >(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen). >(XEN) Linux version 2.6.18-20.el5.kraxel.5.xi1xen (root@hp-rx2660-01.lab.boston.redhat.com) (gcc version 4.1.1 20070105 (Red Hat 4.1.1-52)) #1 SMP Thu Jun 7 17:51:01 EDT 2007 >EFI v1.00 by Xen/ia64: SALsystab=0x2178 ACPI 2.0=0x3fde6000 SMBIOS=0x3ee7c000 >rsvd_region[0]: [0xe000000000002228, 0xe0000000000026b0) >rsvd_region[1]: [0xe000000004000000, 0xe000000004c73de0) >rsvd_region[2]: [0xe000000004c74000, 0xe000000004efa855) >rsvd_region[3]: [0xffffffffffffffff, 0xffffffffffffffff) >Initial ramdisk at: 0xe000000004c78000 (2631765 bytes) >SAL 0.1: Xen/ia64 Xen/ia64 version 0.0 >SAL: AP wakeup using external interrupt vector 0xf3 >No logical to physical processor mapping available >vcpu_set_itc: Setting ar.itc is currently disabled (this message is only displayed once) >(XEN) ACPI: Local APIC address c0000000fee00000 ><G><2>mm.c:979:d0 efi_mmio: physaddr 0x100000000 size = 0xa000000100063a20 >(XEN) ACPI: Error parsing MADT - no IOSAPIC entries >2 CPUs available, 2 CPUs total >Running on Xen! start_info_pfn=0x131d nr_pages=131072 flags=0x3 >MCA related initialization done >SMP: Allowing 2 CPUs, 0 hotplug CPUs >Built 1 zonelists. Total pages: 327680 >Kernel command line: root=LABEL=/ crashkernel=512M@256M ro >kernel BUG at arch/ia64/kernel/irq_ia64.c:481! >swapper[0]: bugcheck! 0 [1] >Modules linked in: >(XEN) >Pid: 0, CPU 0, comm: swapper >psr : 00001010084a2010 ifs : 0000000000000000 ip : [<a0000001007008e0>] Not tainted >ip is at init_IRQ+0xc0/0x180 >unat: 0000000000000000 pfs : 8000000000000186 rsc : 000000000000000b >rnat: 0000000000000000 bsps: 0000000000000000 pr : 0000000000009549 >ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70433f >csd : 0000000000000000 ssd : 0000000000000000 >b0 : a0000001007008e0 b6 : a0000001004bf8c0 b7 : 0000000000000000 >f6 : 0fffbccccccccc8c00000 f7 : 0ffdba200000000000000 >f8 : 100018000000000000000 f9 : 10002a000000000000000 >f10 : 0fffdccccccccc8c00000 f11 : 1003e0000000000000000 >r1 : a000000100bc9e30 r2 : a0000001009e0890 r3 : a0000001009ca588 >r8 : 0000000000000032 r9 : 0000000000000000 r10 : a0000001009e08c0 >r11 : a0000001009e08c0 r12 : a00000010073fe10 r13 : a000000100738000 >r14 : a0000001009e0890 r15 : 0000000000000000 r16 : fffffffffff00001 >r17 : a0000001006e2a88 r18 : a0000001004bf8c0 r19 : a000000100b6fce8 >r20 : 0000000000000000 r21 : a0000001009ca430 r22 : 0000000000020000 >r23 : a00000010078ca00 r24 : a0000001009ca430 r25 : a0000001009e0898 >r26 : a0000001009e0898 r27 : 0000000000000000 r28 : 0000000000000034 >r29 : 0000000000000034 r30 : 0000000000000000 r31 : a0000001009e0c58 >Unable to handle kernel NULL pointer dereference (address 0000000000000000) >swapper[0]: Oops 11012296146944 [2] >Modules linked in: >(XEN) >Pid: 0, CPU 0, comm: swapper >psr : 0000121008022018 ifs : 8000000000000308 ip : [<a00000010014ad41>] Not tainted >ip is at kmem_cache_alloc+0xe1/0x2c0 >unat: 0000000000000000 pfs : 8000000000000610 rsc : 000000000000000b >rnat: 0000000000000000 bsps: 0000000000000000 pr : 00000000000099a5 >ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f >csd : 0000000000000000 ssd : 0000000000000000 >b0 : a0000001000485c0 b6 : a000000100048800 b7 : a0000001000140b0 >f6 : 1003e3a91cc0681515084 f7 : 1003e9e3779b97f4a7c16 >f8 : 1003e0a00000010001c06 f9 : 100038000000000000000 >f10 : 0fffe9ffffffff6000000 f11 : 1003e0000000000000000 >r1 : a000000100bc9e30 r2 : a0000001009e0b80 r3 : 0000000000000001 >r8 : fffffffffff00001 r9 : fffffffffff04c18 r10 : a00000010073f304 >r11 : 0000000000000000 r12 : a00000010073f290 r13 : a000000100738000 >r14 : 0000000000000001 r15 : fffffffffff00001 r16 : 0000000000000001 >r17 : a0000001009d6ee8 r18 : a0000001007f2528 r19 : a00000010073f300 >r20 : 0000000000000000 r21 : 0000000000000000 r22 : a000000100738fd4 >r23 : a00000010073f304 r24 : 000000000000000c r25 : a00000010073f310 >r26 : a00000010073f304 r27 : 0000000000000000 r28 : 0000000000000000 >r29 : a00000010073f308 r30 : 000000007fffffff r31 : a0000001009cac10 >(XEN)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 243312
: 156579