[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] Kernel BUG atarch/x86_64/mm/../../i386/mm/hypervisor.c:197



Am Dienstag, den 03.10.2006, 23:39 +0200 schrieb Christophe Saout:

> > Can you repro using the 2.6.16 kernel that came with 3.0.3 rather than
> > the Fedora one? I suspect not.
> 
> Well, I can not reproduce these bugs, but the same test case is able to
> kill the whole machine as well. CPU lockups on Dom0 or any DomU
> (depending on where the load was) that spread to the other domains until
> everything locks up. At some point the Dom0 even stops answering to
> pings.

Well, with the 2.6.16.29-based Xen, I just noticed that I was getting
similar "bad page state" and weird occurences as well, just a bit more
down in the list of kernel messages. Notice that there are soft lockups
that seem to go away, turn up again and then there's a bad page state
followed by other nasty stuff. I'm not sure how it works exactly, but
they always seem to be stuck in some memory-management related
hypervisor calls.

As stated before, without running any DomU's, everything is just fine,
Dom0 can run compile jobs for hours. But running a DomU with network and
disk I/O causes the same types of kernel BUGs/lockups not only in an
DomU but also in the Dom0 when causing some load there.

Here's an excerpt of a domU log when it happens. I always see some
combination of these before the system goes down entirely (assuming it
doesn't do that so fast that I don't see anything before everything
locks up):

Oct  3 23:24:26 tuek BUG: soft lockup detected on CPU#0!
Oct  3 23:24:26 tuek CPU 0:
Oct  3 23:24:26 tuek Modules linked in: nfsd exportfs
Oct  3 23:24:26 tuek Pid: 3998, comm: gmetad Not tainted 2.6.16.29-xen-xenU #2
Oct  3 23:24:26 tuek RIP: e030:[<ffffffff80107348>] 
<ffffffff80107348>{hypercall_page+840}
Oct  3 23:24:26 tuek RSP: e02b:ffff88003db47900  EFLAGS: 00000246
Oct  3 23:24:26 tuek RAX: 000000000000001a RBX: ffff88000007cb78 RCX: 
ffffffff8010734a
Oct  3 23:24:26 tuek RDX: 0000000000000000 RSI: 0000000080000001 RDI: 
ffff88003db47918
Oct  3 23:24:26 tuek RBP: ffff88003db47938 R08: 0000000000000001 R09: 
ffffffff80453440
Oct  3 23:24:26 tuek R10: 0000000000007ff0 R11: 0000000000000246 R12: 
80000001aa074167
Oct  3 23:24:26 tuek R13: ffff880003b59ce0 R14: 00002aaaaef9c000 R15: 
0000000000000ce0
Oct  3 23:24:26 tuek FS:  00002aea16c0ffe0(0063) GS:ffffffff804bf000(0000) 
knlGS:0000000000000000
Oct  3 23:24:26 tuek CS:  e033 DS: 0000 ES: 0000
Oct  3 23:24:26 tuek 
Oct  3 23:24:26 tuek Call Trace: <ffffffff80117c4a>{xen_invlpg_mask+58} 
<ffffffff801123a3>{flush_tlb_page+19}
Oct  3 23:24:26 tuek <ffffffff8015c479>{__handle_mm_fault+3753} 
<ffffffff8010722a>{hypercall_page+554}
Oct  3 23:24:26 tuek <ffffffff803d57a7>{do_page_fault+3527} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:24:26 tuek <ffffffff8010b6fb>{error_exit+0} 
<ffffffff8014f50e>{file_read_actor+62}
Oct  3 23:24:26 tuek <ffffffff8014f57c>{file_read_actor+172} 
<ffffffff8014d19c>{do_generic_mapping_read+412}
Oct  3 23:24:26 tuek <ffffffff8014f4d0>{file_read_actor+0} 
<ffffffff8014dce8>{__generic_file_aio_read+424}
Oct  3 23:24:26 tuek <ffffffff8014dd98>{generic_file_aio_read+56} 
<ffffffff801f8f51>{nfs_file_read+129}
Oct  3 23:24:26 tuek <ffffffff80172dd0>{do_sync_read+240} 
<ffffffff80161981>{vma_link+129}
Oct  3 23:24:26 tuek <ffffffff80140500>{autoremove_wake_function+0} 
<ffffffff80162b02>{do_mmap_pgoff+1458}
Oct  3 23:24:26 tuek <ffffffff8017381b>{vfs_read+187} 
<ffffffff80173ce0>{sys_read+80}
Oct  3 23:24:26 tuek <ffffffff8010afbe>{system_call+134} 
<ffffffff8010af38>{system_call+0}

Oct  3 23:24:49 tuek BUG: soft lockup detected on CPU#1!
Oct  3 23:24:49 tuek CPU 1:
Oct  3 23:24:49 tuek Modules linked in: nfsd exportfs
Oct  3 23:24:49 tuek Pid: 3998, comm: gmetad Not tainted 2.6.16.29-xen-xenU #2
Oct  3 23:24:49 tuek RIP: e030:[<ffffffff8010722a>] 
<ffffffff8010722a>{hypercall_page+554}
Oct  3 23:24:49 tuek RSP: e02b:ffff88003db479e0  EFLAGS: 00000246
Oct  3 23:24:49 tuek RAX: 0000000000030000 RBX: ffff880001df9b98 RCX: 
ffffffff8010722a
Oct  3 23:24:49 tuek RDX: ffffffffff5fd000 RSI: 0000000000000000 RDI: 
0000000000000000
Oct  3 23:24:49 tuek RBP: ffff88003db479f8 R08: 0000000000000000 R09: 
0000000000000001
Oct  3 23:24:49 tuek R10: 0000000000000060 R11: 0000000000000246 R12: 
0000000000000f18
Oct  3 23:24:49 tuek R13: ffff88003db47d38 R14: 0000000000006000 R15: 
0000000000000002
Oct  3 23:24:49 tuek FS:  00002aea16c0ffe0(0063) GS:ffffffff804bf080(0000) 
knlGS:0000000000000000
Oct  3 23:24:49 tuek CS:  e033 DS: 0000 ES: 0000
Oct  3 23:24:49 tuek Call Trace: <ffffffff802dc47e>{force_evtchn_callback+14}
Oct  3 23:24:49 tuek <ffffffff803d4ab6>{do_page_fault+214} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:24:49 tuek <ffffffff8010b6fb>{error_exit+0} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:24:49 tuek <ffffffff8014f50e>{file_read_actor+62} 
<ffffffff8014f57c>{file_read_actor+172}
Oct  3 23:24:49 tuek <ffffffff8014d19c>{do_generic_mapping_read+412} 
<ffffffff8014f4d0>{file_read_actor+0}
Oct  3 23:24:49 tuek <ffffffff8014dce8>{__generic_file_aio_read+424} 
<ffffffff8014dd98>{generic_file_aio_read+56}
Oct  3 23:24:49 tuek <ffffffff801f8f51>{nfs_file_read+129} 
<ffffffff80172dd0>{do_sync_read+240}
Oct  3 23:24:49 tuek <ffffffff80161981>{vma_link+129} 
<ffffffff80140500>{autoremove_wake_function+0}
Oct  3 23:24:49 tuek <ffffffff80162b02>{do_mmap_pgoff+1458} 
<ffffffff8017381b>{vfs_read+187}
Oct  3 23:24:49 tuek <ffffffff80173ce0>{sys_read+80} 
<ffffffff8010afbe>{system_call+134}
Oct  3 23:24:49 tuek <ffffffff8010af38>{system_call+0}

Oct  3 23:27:28 tuek BUG: soft lockup detected on CPU#0!
Oct  3 23:27:28 tuek CPU 0:
Oct  3 23:27:28 tuek Modules linked in: nfsd exportfs
Oct  3 23:27:28 tuek Pid: 3988, comm: gmetad Not tainted 2.6.16.29-xen-xenU #2
Oct  3 23:27:28 tuek RIP: e030:[<ffffffff8010722a>] 
<ffffffff8010722a>{hypercall_page+554}
Oct  3 23:27:28 tuek RSP: e02b:ffff88003e32f9e0  EFLAGS: 00000246
Oct  3 23:27:28 tuek RAX: 0000000000030000 RBX: ffff8800017ea448 RCX: 
ffffffff8010722a
Oct  3 23:27:28 tuek RDX: ffffffffff5fd000 RSI: 0000000000000000 RDI: 
0000000000000000
Oct  3 23:27:28 tuek RBP: ffff88003e32f9f8 R08: 0000000000000000 R09: 
0000000000000000
Oct  3 23:27:28 tuek R10: 0000000000007ff0 R11: 0000000000000246 R12: 
0000000000001000
Oct  3 23:27:28 tuek R13: ffff88003e32fd38 R14: 0000000000005000 R15: 
0000000000000002
Oct  3 23:27:28 tuek FS:  00002aeaaa684b00(0000) GS:ffffffff804bf000(0000) 
knlGS:0000000000000000
Oct  3 23:27:28 tuek CS:  e033 DS: 0000 ES: 0000
Oct  3 23:27:28 tuek 
Oct  3 23:27:28 tuek Call Trace: <ffffffff802dc47e>{force_evtchn_callback+14}
Oct  3 23:27:28 tuek <ffffffff803d4ab6>{do_page_fault+214} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:27:28 tuek <ffffffff8010b6fb>{error_exit+0} 
<ffffffff8014f50e>{file_read_actor+62}
Oct  3 23:27:28 tuek <ffffffff8014f57c>{file_read_actor+172} 
<ffffffff8014d19c>{do_generic_mapping_read+412}
Oct  3 23:27:28 tuek <ffffffff8014f4d0>{file_read_actor+0} 
<ffffffff8014dce8>{__generic_file_aio_read+424}
Oct  3 23:27:28 tuek <ffffffff8014dd98>{generic_file_aio_read+56} 
<ffffffff801f8f51>{nfs_file_read+129}
Oct  3 23:27:28 tuek <ffffffff80172dd0>{do_sync_read+240} 
<ffffffff80161981>{vma_link+129}
Oct  3 23:27:28 tuek <ffffffff80140500>{autoremove_wake_function+0} 
<ffffffff80162b02>{do_mmap_pgoff+1458}
Oct  3 23:27:28 tuek <ffffffff8017381b>{vfs_read+187} 
<ffffffff80173ce0>{sys_read+80}
Oct  3 23:27:28 tuek <ffffffff8010afbe>{system_call+134} 
<ffffffff8010af38>{system_call+0}

Oct  3 23:27:52 tuek Bad page state in process 'bash'
Oct  3 23:27:52 tuek page:ffff880001c72bc8 flags:0x0000000000000000 
mapping:0000000000000000 mapcount:1 count:1
Oct  3 23:27:52 tuek Trying to fix it up, but a reboot is needed
Oct  3 23:27:52 tuek Backtrace:
Oct  3 23:27:52 tuek 
Oct  3 23:27:52 tuek Call Trace: <ffffffff801512ad>{bad_page+93} 
<ffffffff80151d57>{get_page_from_freelist+775}
Oct  3 23:27:52 tuek <ffffffff80151f1d>{__alloc_pages+157} 
<ffffffff80152249>{get_zeroed_page+73}
Oct  3 23:27:52 tuek <ffffffff80158cf4>{__pmd_alloc+36} 
<ffffffff8015e55e>{copy_page_range+1262}
Oct  3 23:27:52 tuek <ffffffff802a6bea>{rb_insert_color+250} 
<ffffffff80127cb7>{copy_process+3079}
Oct  3 23:27:52 tuek <ffffffff80128c8e>{do_fork+238} 
<ffffffff801710d6>{fd_install+54}
Oct  3 23:27:52 tuek <ffffffff80134e8c>{sigprocmask+220} 
<ffffffff8010afbe>{system_call+134}
Oct  3 23:27:52 tuek <ffffffff801094b3>{sys_clone+35} 
<ffffffff8010b3e9>{ptregscall_common+61}

Oct  3 23:27:52 tuek ----------- [cut here ] --------- [please bite here ] 
---------
Oct  3 23:27:52 tuek Kernel BUG at arch/x86_64/mm/../../i386/mm/hypervisor.c:198
Oct  3 23:27:52 tuek invalid opcode: 0000 [1] SMP 
Oct  3 23:27:52 tuek CPU 3 
Oct  3 23:27:52 tuek Modules linked in: nfsd exportfs
Oct  3 23:27:52 tuek Pid: 4617, comm: bash Tainted: G    B 2.6.16.29-xen-xenU #2
Oct  3 23:27:52 tuek RIP: e030:[<ffffffff80117cb5>] 
<ffffffff80117cb5>{xen_pgd_pin+85}
Oct  3 23:27:52 tuek RSP: e02b:ffff880038ed9d58  EFLAGS: 00010282
Oct  3 23:27:52 tuek RAX: 00000000ffffffea RBX: ffff880000e098c0 RCX: 
000000000001dc48
Oct  3 23:27:52 tuek RDX: 0000000000000000 RSI: 0000000000000001 RDI: 
ffff880038ed9d58
Oct  3 23:27:52 tuek RBP: ffff880038ed9d78 R08: ffff880038e7fff8 R09: 
ffff880038e7fff8
Oct  3 23:27:52 tuek R10: 0000000000007ff0 R11: ffff880002d39008 R12: 
0000000000000000
Oct  3 23:27:52 tuek R13: ffff8800006383c0 R14: 0000000001200011 R15: 
ffff8800006383c0
Oct  3 23:27:52 tuek FS:  00002afecc63ae60(0000) GS:ffffffff804bf180(0000) 
knlGS:0000000000000000
Oct  3 23:27:52 tuek CS:  e033 DS: 0000 ES: 0000
Oct  3 23:27:52 tuek Process bash (pid: 4617, threadinfo ffff880038ed8000, task 
ffff88003f9e0180)
Oct  3 23:27:52 tuek Stack: 0000000000000003 00000000001b3aa7 0000000001200011 
ffff880002d39008 
Oct  3 23:27:52 tuek ffff880038ed9d98 ffffffff80117543 0000000000000000 
ffff88003ca4ea28 
Oct  3 23:27:52 tuek ffff880038ed9da8 ffffffff801175f2 
Oct  3 23:27:52 tuek Call Trace: <ffffffff80117543>{mm_pin+387} 
<ffffffff801175f2>{_arch_dup_mmap+18}
Oct  3 23:27:52 tuek <ffffffff80127cf6>{copy_process+3142} 
<ffffffff80128c8e>{do_fork+238}
Oct  3 23:27:52 tuek <ffffffff801710d6>{fd_install+54} 
<ffffffff80134e8c>{sigprocmask+220}
Oct  3 23:27:52 tuek <ffffffff8010afbe>{system_call+134} 
<ffffffff801094b3>{sys_clone+35}
Oct  3 23:27:52 tuek <ffffffff8010b3e9>{ptregscall_common+61}
Oct  3 23:27:52 tuek 
Oct  3 23:27:52 tuek Code: 0f 0b 68 38 d7 3f 80 c2 c6 00 90 c9 c3 0f 1f 80 00 
00 00 00 
Oct  3 23:27:52 tuek RIP <ffffffff80117cb5>{xen_pgd_pin+85} RSP 
<ffff880038ed9d58>

Oct  3 23:27:55 tuek <3>BUG: soft lockup detected on CPU#0!
Oct  3 23:27:55 tuek CPU 0:
Oct  3 23:27:55 tuek Modules linked in: nfsd exportfs
Oct  3 23:27:55 tuek Pid: 3998, comm: gmetad Tainted: G    B 2.6.16.29-xen-xenU 
#2
Oct  3 23:27:55 tuek RIP: e030:[<ffffffff8010734a>] 
<ffffffff8010734a>{hypercall_page+842}
Oct  3 23:27:55 tuek RSP: e02b:ffff88003db47900  EFLAGS: 00000246
Oct  3 23:27:55 tuek RAX: 0000000000000000 RBX: ffff88000007cb78 RCX: 
ffffffff8010734a
Oct  3 23:27:55 tuek RDX: 0000000000000000 RSI: 0000000000000001 RDI: 
ffff88003db47918
Oct  3 23:27:55 tuek RBP: ffff88003db47938 R08: 0000000000000001 R09: 
0000000000000000
Oct  3 23:27:55 tuek R10: 0000000000007ff0 R11: 0000000000000246 R12: 
80000001c8bac167
Oct  3 23:27:55 tuek R13: ffff88003a80ab68 R14: 00002aaaaf16d000 R15: 
0000000000000b68
Oct  3 23:27:55 tuek FS:  0000000000000000(0063) GS:ffffffff804bf000(0000) 
knlGS:0000000000000000
Oct  3 23:27:55 tuek CS:  e033 DS: 0000 ES: 0000
Oct  3 23:27:55 tuek 
Oct  3 23:27:55 tuek Call Trace: <ffffffff80117c4a>{xen_invlpg_mask+58} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:27:55 tuek <ffffffff801123a3>{flush_tlb_page+19} 
<ffffffff8015c479>{__handle_mm_fault+3753}
Oct  3 23:27:55 tuek <ffffffff8010722a>{hypercall_page+554} 
<ffffffff803d57a7>{do_page_fault+3527}
Oct  3 23:27:55 tuek <ffffffff8010b6fb>{error_exit+0} 
<ffffffff8010b6fb>{error_exit+0}
Oct  3 23:27:55 tuek <ffffffff8014f50e>{file_read_actor+62} 
<ffffffff8014f57c>{file_read_actor+172}
Oct  3 23:27:55 tuek <ffffffff8014d19c>{do_generic_mapping_read+412} 
<ffffffff8014f4d0>{file_read_actor+0}
Oct  3 23:27:55 tuek <ffffffff8014dce8>{__generic_file_aio_read+424} 
<ffffffff8014dd98>{generic_file_aio_read+56}
Oct  3 23:27:55 tuek <ffffffff801f8f51>{nfs_file_read+129} 
<ffffffff80172dd0>{do_sync_read+240}
Oct  3 23:27:55 tuek <ffffffff80161981>{vma_link+129} 
<ffffffff80140500>{autoremove_wake_function+0}
Oct  3 23:27:55 tuek <ffffffff80162b02>{do_mmap_pgoff+1458} 
<ffffffff8017381b>{vfs_read+187}
Oct  3 23:27:55 tuek <ffffffff80173ce0>{sys_read+80} 
<ffffffff8010afbe>{system_call+134}
Oct  3 23:27:55 tuek <ffffffff8010af38>{system_call+0}

Information about the system:

 __  __            _____  ___                     _        _     _      
 \ \/ /___ _ __   |___ / / _ \    _   _ _ __  ___| |_ __ _| |__ | | ___ 
  \  // _ \ '_ \    |_ \| | | |__| | | | '_ \/ __| __/ _` | '_ \| |/ _ \
  /  \  __/ | | |  ___) | |_| |__| |_| | | | \__ \ || (_| | |_) | |  __/
 /_/\_\___|_| |_| |____(_)___/    \__,_|_| |_|___/\__\__,_|_.__/|_|\___|
                                                                        
 http://www.cl.cam.ac.uk/netos/xen
 University of Cambridge Computer Laboratory

 Xen version 3.0-unstable (chtephan@intern) (gcc-Version 4.1.1 (Gentoo Hardened 
4.1.1-r1, pie-8.7.8)) Wed Oct  4 00:07:24 CEST 2006
 Latest ChangeSet: Wed Sep 27 14:30:36 2006 +0100 11633:000aa9510e55

(XEN) Command line: xen-3.0.3.gz dom0_mem=1024M console=com2,vga com2=19200,8n1 
(XEN) Physical RAM map:
(XEN)  0000000000000000 - 000000000009fc00 (usable)
(XEN)  000000000009fc00 - 00000000000a0000 (reserved)
(XEN)  00000000000e8000 - 0000000000100000 (reserved)
(XEN)  0000000000100000 - 00000000bfff0000 (usable)
(XEN)  00000000bfff0000 - 00000000bffff000 (ACPI data)
(XEN)  00000000bffff000 - 00000000c0000000 (ACPI NVS)
(XEN)  00000000ff780000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 000000030e000000 (usable)
(XEN) System RAM: 11487MB (11763260kB)
(XEN) Xen heap: 13MB (14108kB)
(XEN) found SMP MP-table at 000ff780
(XEN) DMI 2.3 present.
(XEN) Using APIC driver default
(XEN) ACPI: RSDP (v002 ACPIAM                                ) @ 
0x00000000000f9870
(XEN) ACPI: XSDT (v001 A M I  OEMXSDT  0x05000622 MSFT 0x00000097) @ 
0x00000000bfff0100
(XEN) ACPI: FADT (v003 A M I  OEMFACP  0x05000622 MSFT 0x00000097) @ 
0x00000000bfff0281
(XEN) ACPI: MADT (v001 A M I  OEMAPIC  0x05000622 MSFT 0x00000097) @ 
0x00000000bfff0380
(XEN) ACPI: SRAT (v001 A M I  OEMSRAT  0x05000622 MSFT 0x00000097) @ 
0x00000000bfff38d0
(XEN) ACPI: DSDT (v001  H8DA8 H8DA8010 0x00000000 INTL 0x02002026) @ 
0x0000000000000000
(XEN) ACPI: Local APIC address 0xfee00000
(XEN) ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled)
(XEN) Processor #0 15:1 APIC version 16
(XEN) ACPI: LAPIC (acpi_id[0x02] lapic_id[0x01] enabled)
(XEN) Processor #1 15:1 APIC version 16
(XEN) ACPI: LAPIC (acpi_id[0x03] lapic_id[0x02] enabled)
(XEN) Processor #2 15:1 APIC version 16
(XEN) ACPI: LAPIC (acpi_id[0x04] lapic_id[0x03] enabled)
(XEN) Processor #3 15:1 APIC version 16
(XEN) ACPI: IOAPIC (id[0x04] address[0xfec00000] gsi_base[0])
(XEN) IOAPIC[0]: apic_id 4, version 17, address 0xfec00000, GSI 0-23
(XEN) ACPI: IOAPIC (id[0x05] address[0xfebfe000] gsi_base[24])
(XEN) IOAPIC[1]: apic_id 5, version 17, address 0xfebfe000, GSI 24-27
(XEN) ACPI: IOAPIC (id[0x06] address[0xfebff000] gsi_base[28])
(XEN) IOAPIC[2]: apic_id 6, version 17, address 0xfebff000, GSI 28-31
(XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
(XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
(XEN) ACPI: IRQ0 used by override.
(XEN) ACPI: IRQ2 used by override.
(XEN) Enabling APIC mode:  Flat.  Using 3 I/O APICs
(XEN) Using ACPI (MADT) for SMP configuration information
(XEN) Using scheduler: SMP Credit Scheduler (credit)
(XEN) Initializing CPU#0
(XEN) Detected 1994.337 MHz processor.
(XEN) CPU0: AMD Flush Filter disabled
(XEN) CPU: L1 I Cache: 64K (64 bytes/line), D cache 64K (64 bytes/line)
(XEN) CPU: L2 Cache: 1024K (64 bytes/line)
(XEN) CPU 0(2) -> Core 0
(XEN) Intel machine check architecture supported.
(XEN) Intel machine check reporting enabled on CPU#0.
(XEN) CPU0: AMD Dual Core AMD Opteron(tm) Processor 270 stepping 02
(XEN) Booting processor 1/1 eip 90000
(XEN) Initializing CPU#1
(XEN) CPU1: AMD Flush Filter disabled
(XEN) CPU: L1 I Cache: 64K (64 bytes/line), D cache 64K (64 bytes/line)
(XEN) CPU: L2 Cache: 1024K (64 bytes/line)
(XEN) CPU 1(2) -> Core 1
(XEN) AMD: Disabling C1 Clock Ramping Node #0
(XEN) AMD: Disabling C1 Clock Ramping Node #1
(XEN) Intel machine check architecture supported.
(XEN) Intel machine check reporting enabled on CPU#1.
(XEN) CPU1: AMD Dual Core AMD Opteron(tm) Processor 270 stepping 02
(XEN) Booting processor 2/2 eip 90000
(XEN) Initializing CPU#2
(XEN) CPU2: AMD Flush Filter disabled
(XEN) CPU: L1 I Cache: 64K (64 bytes/line), D cache 64K (64 bytes/line)
(XEN) CPU: L2 Cache: 1024K (64 bytes/line)
(XEN) CPU 2(2) -> Core 0
(XEN) Intel machine check architecture supported.
(XEN) Intel machine check reporting enabled on CPU#2.
(XEN) CPU2: AMD Dual Core AMD Opteron(tm) Processor 270 stepping 02
(XEN) Booting processor 3/3 eip 90000
(XEN) Initializing CPU#3
(XEN) CPU3: AMD Flush Filter disabled
(XEN) CPU: L1 I Cache: 64K (64 bytes/line), D cache 64K (64 bytes/line)
(XEN) CPU: L2 Cache: 1024K (64 bytes/line)
(XEN) CPU 3(2) -> Core 1
(XEN) Intel machine check architecture supported.
(XEN) Intel machine check reporting enabled on CPU#3.
(XEN) CPU3: AMD Dual Core AMD Opteron(tm) Processor 270 stepping 02
(XEN) Total of 4 processors activated.
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using new ACK method
(XEN) ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=0 pin2=0
(XEN) checking TSC synchronization across 4 CPUs: passed.
(XEN) Platform timer is 1.193MHz PIT
(XEN) Brought up 4 CPUs
(XEN) Machine check exception polling timer started.
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Domain 0 kernel supports features = { 0000001f }.
(XEN) Domain 0 kernel requires features = { 00000000 }.
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   000000000b000000->000000000c000000 (258048 pages to be 
allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: ffffffff80200000->ffffffff807cb448
(XEN)  Init. ramdisk: ffffffff807cc000->ffffffff807cc000
(XEN)  Phys-Mach map: ffffffff807cc000->ffffffff809cc000
(XEN)  Start info:    ffffffff809cc000->ffffffff809cc49c
(XEN)  Page tables:   ffffffff809cd000->ffffffff809d6000
(XEN)  Boot stack:    ffffffff809d6000->ffffffff809d7000
(XEN)  TOTAL:         ffffffff80000000->ffffffff80c00000
(XEN)  ENTRY ADDRESS: ffffffff80200000
(XEN) Dom0 has maximum 4 VCPUs
(XEN) Scrubbing Free RAM: 
..............................................................................................................................done.
(XEN) Xen trace buffers: disabled
(XEN) Xen is relinquishing VGA console.
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to 
Xen).



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.