Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 160884 Details for
Bug 251288
booting a rhel3u9 HVM guest with "apic = 0" in the guest config file causes kernel panic on guest.
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
guest kernel backtrace
panic.txt (text/plain), 4.09 KB, created by
Gurhan Ozen
on 2007-08-08 07:09:10 UTC
(
hide
)
Description:
guest kernel backtrace
Filename:
MIME Type:
Creator:
Gurhan Ozen
Created:
2007-08-08 07:09:10 UTC
Size:
4.09 KB
patch
obsolete
>[root@amd-tyan-10 ~]# virsh console 26 >ok >Bootdata ok (command line is console=tty0 console=ttyS0 ro root=LABEL=/) >Linux version 2.4.21-50.EL (brewbuilder@ls20-bc2-14.build.redhat.com) (gcc version 3.2.3 20030502 (Red Hat Linux 3.2.3-58)) #1 Tue May 8 17:17:08 EDT 2007 >BIOS-provided physical RAM map: > BIOS-e820: 0000000000000000 - 000000000009fc00 (usable) > BIOS-e820: 000000000009fc00 - 00000000000a0000 (reserved) > BIOS-e820: 00000000000e0000 - 0000000000100000 (reserved) > BIOS-e820: 0000000000100000 - 000000001fffac00 (usable) > BIOS-e820: 000000001fffac00 - 0000000020000000 (reserved) >kernel direct mapping tables upto 10020000000 @ 8000-a000 >On node 0 totalpages: 131066 >zone(0): 4096 pages. >zone(1): 126970 pages. >zone(2): 0 pages. >DMI 2.4 present. >10 structures occupying 291 bytes. >DMI table at 0x000E901F. >BIOS Vendor: Xen >BIOS Version: 3.1.0-37.el5 >BIOS Release: >System Vendor: Xen >Product Name: HVM domU >Version: 3.1.0-37.el5 >Serial Number: 74dd08ed-52c0-5a9d-9e4d-1970b0fc06df >ACPI: RSDP (v002 Xen ) @ 0x00000000000eb010 >ACPI: XSDT (v001 Xen HVM 00000.00000) @ 0x00000000000eafa0 >ACPI: FADT (v004 Xen HVM 00000.00000) @ 0x00000000000eae30 >ACPI: HPET (v001 Xen HVM 00000.00000) @ 0x00000000000eaf30 >ACPI: SSDT (v002 Xen HVM 00000.00000) @ 0x00000000000eaf68 >ACPI: DSDT (v002 Xen HVM 00000.00000) @ 0x0000000000000000 >ACPI: BIOS passes blacklist >ACPI: MADT not present >No local APIC present or hardware disabled >Kernel command line: console=tty0 console=ttyS0 ro root=LABEL=/ >Initializing CPU#0 >time.c: Detected 1.193182 MHz PIT timer. >time.c: Detected 2593.620 MHz TSC timer. >Console: colour VGA+ 80x25 >Calibrating delay loop... 5164.23 BogoMIPS >Page-cache hash table entries: 131072 (order: 8, 1024 KB) >Page-pin hash table entries: 32768 (order: 5, 128 KB) >Dentry cache hash table entries: 65536 (order: 8, 1024 KB) >Inode cache hash table entries: 32768 (order: 7, 512 KB) >Buffer cache hash table entries: 32768 (order: 6, 256 KB) >Memory: 500380k/524264k available (1683k kernel code, 21320k reserved, 1581k data, 188k init) >Mount cache hash table entries: 256 (order: 0, 4096 bytes) >CPU: L1 I Cache: 64K (64 bytes/line/2 way), D cache 64K (64 bytes/line/2 way) >CPU: L2 Cache: 1024K (64 bytes/line/8 way) >Machine Check Reporting enabled for CPU#0 >POSIX conformance testing by UNIFIX >Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018 > printing rip: >ffffffff80516ff2 >PML4 0 >Oops: 0000 >CPU 0 >Pid: 1, comm: swapper Not tainted >RIP: 0010:[<ffffffff80516ff2>]{setup_local_APIC+18} >RSP: 0000:000001001fff9f28 EFLAGS: 00010246 >RAX: 0000000000000000 RBX: 00000000000000ff RCX: 0000000000ff00ff >RDX: 0000000000ff00ff RSI: 0000000000000000 RDI: 0000000000000000 >RBP: 0000000000000000 R08: 000000000000000d R09: 0000000000000000 >R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 >R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 >FS: 0000000000000000(0000) GS:ffffffff80506cc0(0000) knlGS:0000000000000000 >CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b >CR2: 0000000000000018 CR3: 0000000000101000 CR4: 00000000000006e0 > >Call Trace: [<ffffffff8010c036>]{init+6} [<ffffffff80110909>]{child_rip+8} > [<ffffffff8010c030>]{init+0} [<ffffffff80110901>]{child_rip+0} > >Process swapper (pid: 1, stackpage=1001fff9000) >Stack: 000001001fff9f28 0000000000000000 000001001fff8000 0000000000000000 > ffffffff8051754c 000001001fff8000 ffffffff8010c036 0000000000000000 > ffffffff80110909 0000000000000000 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 0000000000000000 0000000000000000 > 00000000ffffffff 0000000000000000 000000000000000d 0000000000000000 > ffffffff8050e000 0000000000000e00 0000000000000000 ffffffff8010c030 > 0000000000000000 ffffffff80110901 0000000000000010 0000000000000200 > 000001001fff9f58 0000000000000000 >Call Trace: [<ffffffff8010c036>]{init+6} [<ffffffff80110909>]{child_rip+8} > [<ffffffff8010c030>]{init+0} [<ffffffff80110901>]{child_rip+0} > > >Code: ff 50 18 85 c0 75 0c 0f 0b fd 3d 2b 80 ff ff ff ff 21 01 48 > >Kernel panic: Fatal exception >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 251288
: 160884