Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 301754 Details for
Bug 441630
client kernel panic on RHEL5.1 host
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
xm create -c output
xencrash.log (text/plain), 5.07 KB, created by
Jeff Fearn 🐞
on 2008-04-09 06:48:05 UTC
(
hide
)
Description:
xm create -c output
Filename:
MIME Type:
Creator:
Jeff Fearn 🐞
Created:
2008-04-09 06:48:05 UTC
Size:
5.07 KB
patch
obsolete
>[root@obelisk ~]# uname -a >Linux obelisk 2.6.18-53.1.14.el5xen #1 SMP Tue Feb 19 07:33:17 EST 2008 x86_64 x86_64 x86_64 GNU/Linux > >[[root@obelisk ~]# cat /etc/redhat-release >Red Hat Enterprise Linux Server release 5.1 (Tikanga) > >[root@obelisk ~]# xm create -c RawHide2 >Using config file "/etc/xen/RawHide2". >Started domain RawHide2 >Reserving virtual address space above 0xf57fe000 >Initializing cgroup subsys cpuset >Initializing cgroup subsys cpu >Linux version 2.6.25-0.18.rc8.fc9.i686.xen (mockbuild@) (gcc version 4.3.0 20080404 (Red Hat 4.3.0-6) (GCC) ) #1 SMP Mon Apr 7 16:59:14 EDT 2008 >ACPI in unprivileged domain disabled >BIOS-provided physical RAM map: > Xen: 0000000000000000 - 000000000009f000 (usable) > Xen: 0000000000100000 - 0000000040000000 (usable) >296MB HIGHMEM available. >727MB LOWMEM available. >Scan SMP from c0000000 for 1024 bytes. >Scan SMP from c009fc00 for 1024 bytes. >Scan SMP from c00f0000 for 65536 bytes. >NX (Execute Disable) protection: active >Using x86 segment limits to approximate NX protection >Entering add_active_range(0, 0, 262144) 0 entries of 256 used >Zone PFN ranges: > DMA 0 -> 4096 > Normal 4096 -> 186366 > HighMem 186366 -> 262144 >Movable zone start PFN for each node >early_node_map[1] active PFN ranges > 0: 0 -> 262144 >On node 0 totalpages: 262144 > DMA zone: 56 pages used for memmap > DMA zone: 0 pages reserved > DMA zone: 4040 pages, LIFO batch:0 > Normal zone: 2491 pages used for memmap > Normal zone: 179779 pages, LIFO batch:31 > HighMem zone: 1036 pages used for memmap > HighMem zone: 74742 pages, LIFO batch:15 > Movable zone: 0 pages used for memmap >DMI not present or invalid. >Using APIC driver default >Allocating PCI resources starting at 50000000 (gap: 40000000:c0000000) >PM: Registered nosave memory: 000000000009f000 - 0000000000100000 >trying to map vcpu_info 0 at c2102014, mfn 1099f4, offset 20 >register_vcpu_info failed: err=-38 >Built 1 zonelists in Zone order, mobility grouping on. Total pages: 258561 >Kernel command line: ro root=/dev/VolGroup00/LogVol00 rhgb quiet >Local APIC disabled by BIOS -- you can enable it with "lapic" >mapped APIC to f57f9000 (02154000) >Enabling fast FPU save and restore... done. >Enabling unmasked SIMD FPU exception support... done. >Initializing CPU#0 >CPU 0 irqstacks, hard=c0834000 soft=c0814000 >PID hash table entries: 4096 (order: 12, 16384 bytes) >Detected 3191.998 MHz processor. >Console: colour dummy device 80x25 >console [tty0] enabled >console [hvc0] enabled >Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar >... MAX_LOCKDEP_SUBCLASSES: 8 >... MAX_LOCK_DEPTH: 48 >... MAX_LOCKDEP_KEYS: 2048 >... CLASSHASH_SIZE: 1024 >... MAX_LOCKDEP_ENTRIES: 8192 >... MAX_LOCKDEP_CHAINS: 16384 >... CHAINHASH_SIZE: 8192 > memory used by lock dependency info: 1024 kB > per task-struct memory footprint: 2688 bytes >Dentry cache hash table entries: 131072 (order: 7, 524288 bytes) >Inode-cache hash table entries: 65536 (order: 6, 262144 bytes) >Memory: 1015408k/1048576k available (2350k kernel code, 32260k reserved, 1204k data, 584k init, 303112k highmem) >virtual kernel memory layout: > fixmap : 0xf5451000 - 0xf57fd000 (3760 kB) > pkmap : 0xf5000000 - 0xf5200000 (2048 kB) > vmalloc : 0xee000000 - 0xf4ffe000 ( 111 MB) > lowmem : 0xc0000000 - 0xed7fe000 ( 727 MB) > .init : 0xc077e000 - 0xc0810000 ( 584 kB) > .data : 0xc064b918 - 0xc0778b70 (1204 kB) > .text : 0xc0400000 - 0xc064b918 (2350 kB) >Checking if this processor honours the WP bit even in supervisor mode...Ok. >CPA: page pool initialized 1 of 1 pages preallocated >SLUB: Genslabs=12, HWalign=128, Order=0-1, MinObjects=4, CPUs=1, Nodes=1 >Xen: using vcpuop timer interface >installing Xen timer for CPU 0 >------------[ cut here ]------------ >kernel BUG at arch/x86/xen/time.c:122! >invalid opcode: 0000 [#1] SMP >Modules linked in: > >Pid: 0, comm: swapper Not tainted (2.6.25-0.18.rc8.fc9.i686.xen #1) >EIP: e019:[<c0405eb3>] EFLAGS: 00010282 CPU: 0 >EIP is at xen_setup_timer+0xa2/0xae >EAX: fffffff2 EBX: 00000005 ECX: 00000000 EDX: c0779f80 >ESI: c0652548 EDI: 00000005 EBP: c0779f94 ESP: c0779f7c > DS: e021 ES: e021 FS: 00d8 GS: 0000 SS: e021 >Process swapper (pid: 0, ti=c0779000 task=c073c460 task.ti=c0779000) >Stack: c2102c18 c2102bac d6765d57 00000007 00000000 00000000 c0779fa8 c0784768 > 00000020 c080fa8c c2151a8c c0779fd4 c077e8ce 3f840000 00013ea3 c2154000 > 00052000 0004fa8c c07a780c 00ad6000 c07a77e4 c0740a88 c0779ffc c0784317 >Call Trace: > [<c0784768>] ? xen_time_init+0xd7/0xe4 > [<c077e8ce>] ? start_kernel+0x2df/0x36d > [<c0784317>] ? xen_start_kernel+0x32c/0x334 > ======================= >Code: 00 00 00 89 51 20 8d 55 ec 89 41 1c b8 ac 0b 7c c0 89 d9 03 04 9d 00 62 77 c0 89 fb 89 45 ec e8 54 d4 40 00 83 c4 0c 85 c0 74 04 <0f> 0b eb fe 8d 65 f4 5b 5e 5f 5d c3 55 b8 18 0c 7c c0 89 e5 57 >EIP: [<c0405eb3>] xen_setup_timer+0xa2/0xae SS:ESP e021:c0779f7c >---[ end trace ca143223eefdc828 ]--- >Kernel panic - not syncing: Attempted to kill the idle task! >[root@obelisk ~]# >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 441630
: 301754