|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 490] New: 32-bit calls lock x86-64 system hard
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=490
Summary: 32-bit calls lock x86-64 system hard
Product: Xen
Version: unstable
Platform: x86-64
OS/Version: Linux
Status: NEW
Severity: blocker
Priority: P1
Component: Guest-OS
AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
ReportedBy: grantma@xxxxxxxxxxxxxxx
Found this one when executing linux-2.6-xen.hg kernel under 3.0 testing
hypervisor. Whenever I tried to execute chrooted 32-bit progams, the system
would lock solid. Doing a 'Chroot /' worked so I don't suspect the chroot call.
I also ahd AGP enabled.
Hardware is a shuttle x86-64 machine with a AMD 64 3200+ processor
(under 2.6.15.1 linux vanilla kernel.org)
grantma@sharon:~$ cat /proc/cpuinfo
processor : 0
vendor_id : AuthenticAMD
cpu family : 15
model : 31
model name : AMD Athlon(tm) 64 Processor 3200+
stepping : 0
cpu MHz : 1004.906
cache size : 512 KB
fpu : yes
fpu_exception : yes
cpuid level : 1
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov
pat pse36 clflush mmx fxsr sse sse2 syscall nx mmxext fxsr_opt lm 3dnowext 3dnow
lahf_lm
bogomips : 2011.09
TLB size : 1024 4K pages
clflush size : 64
cache_alignment : 64
address sizes : 40 bits physical, 48 bits virtual
power management: ts fid vid ttp
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-bugs] [Bug 490] New: 32-bit calls lock x86-64 system hard,
bugzilla-daemon <=
|
|
|
|
|