[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 543] domU: BUG: soft lockup detected on CPU#1!



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=543


xiao.zhang@xxxxxxxxx changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |xiao.zhang@xxxxxxxxx




------- Additional Comments From xiao.zhang@xxxxxxxxx  2006-03-24 09:32 -------
Also met this problem in VMX test.

xen_unstable:9425
Dom0:      64-bit, SMP, 2.6.16
VMX guest: 64-bit,  UP, 2.6.9-1.667

I t doesn't happen every run, but likely to happen when there are already 
several VMX guests in Dom0.

Serial output:

BUG: soft lockup detected on CPU#0!
CPU 0:
Modules linked in: video thermal processor fan button battery ac
Pid: 0, comm: swapper Not tainted 2.6.16-xen0 #1
RIP: e030:[<ffffffff8010722a>] <ffffffff8010722a>{hypercall_page+554}
RSP: e02b:ffffffff805e9698  EFLAGS: 00000246
RAX: 0000000000030000 RBX: ffff880014e67f80 RCX: ffffffff8010722a
RDX: ffff880014e67f80 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffffff805e96b0 R08: ffffffff806b4020 R09: 0000000000000040
R10: 000000000000012c R11: 0000000000000246 R12: 0000000000000000
R13: ffffffff805e97c8 R14: 0000000000000011 R15: 0000000000000000
FS:  00002b3fe107e3e0(0000) GS:ffffffff8064e000(0000) knlGS:0000000000000000
CS:  e033 DS: 0000 ES: 0000

Call Trace: <IRQ> <ffffffff802fe4ee>{force_evtchn_callback+14}
       <ffffffff8014e669>{handle_IRQ_event+73} <ffffffff8014e783>{__do_IRQ+179}
       <ffffffff8010daab>{do_IRQ+75} <ffffffff802fe5be>{evtchn_do_upcall+206}
       <ffffffff8010b9d9>{do_hypervisor_callback+37} <ffffffff8010722a>
{hypercall_page+554}
       <ffffffff8010722a>{hypercall_page+554} <ffffffff802fe4ee>
{force_evtchn_callback+14}
       <ffffffff8014e669>{handle_IRQ_event+73} <ffffffff80143251>
{autoremove_wake_function+17}
       <ffffffff8014e783>{__do_IRQ+179} <ffffffff8010daab>{do_IRQ+75}
       <ffffffff802fe5be>{evtchn_do_upcall+206} <ffffffff8010b9d9>
{do_hypervisor_callback+37}
       <ffffffff802469fa>{__delay+10} <ffffffff80246a3c>{__const_udelay+44}
       <ffffffff802c63ad>{tg3_readphy+109} <ffffffff802c85cb>
{tg3_setup_phy+4059}
       <ffffffff801457d4>{ktime_get_ts+100} <ffffffff802c9770>{tg3_poll+96}
       <ffffffff8025c9d7>{acpi_ev_gpe_detect+262} <ffffffff8041efa7>
{net_rx_action+199}
       <ffffffff801327ae>{__do_softirq+142} <ffffffff8010be72>{call_softirq+30}
       <ffffffff8010db0f>{do_softirq+79} <ffffffff80132938>{irq_exit+72}
       <ffffffff8010dab0>{do_IRQ+80} <ffffffff802fe5be>{evtchn_do_upcall+206}
       <ffffffff8010b9d9>{do_hypervisor_callback+37} <EOI>
       <ffffffff801070ca>{hypercall_page+202} <ffffffff801070ca>
{hypercall_page+202}
       <ffffffff80108f18>{xen_idle+120} <ffffffff80108f99>{cpu_idle+89}
       <ffffffff80108026>{rest_init+38} <ffffffff806677a5>{start_kernel+501}
       <ffffffff806671bd>{_sinittext+445}


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.