[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 543] domU: BUG: soft lockup detected on CPU#1!
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=543 xiao.zhang@xxxxxxxxx changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |xiao.zhang@xxxxxxxxx ------- Additional Comments From xiao.zhang@xxxxxxxxx 2006-03-24 09:32 ------- Also met this problem in VMX test. xen_unstable:9425 Dom0: 64-bit, SMP, 2.6.16 VMX guest: 64-bit, UP, 2.6.9-1.667 I t doesn't happen every run, but likely to happen when there are already several VMX guests in Dom0. Serial output: BUG: soft lockup detected on CPU#0! CPU 0: Modules linked in: video thermal processor fan button battery ac Pid: 0, comm: swapper Not tainted 2.6.16-xen0 #1 RIP: e030:[<ffffffff8010722a>] <ffffffff8010722a>{hypercall_page+554} RSP: e02b:ffffffff805e9698 EFLAGS: 00000246 RAX: 0000000000030000 RBX: ffff880014e67f80 RCX: ffffffff8010722a RDX: ffff880014e67f80 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffffff805e96b0 R08: ffffffff806b4020 R09: 0000000000000040 R10: 000000000000012c R11: 0000000000000246 R12: 0000000000000000 R13: ffffffff805e97c8 R14: 0000000000000011 R15: 0000000000000000 FS: 00002b3fe107e3e0(0000) GS:ffffffff8064e000(0000) knlGS:0000000000000000 CS: e033 DS: 0000 ES: 0000 Call Trace: <IRQ> <ffffffff802fe4ee>{force_evtchn_callback+14} <ffffffff8014e669>{handle_IRQ_event+73} <ffffffff8014e783>{__do_IRQ+179} <ffffffff8010daab>{do_IRQ+75} <ffffffff802fe5be>{evtchn_do_upcall+206} <ffffffff8010b9d9>{do_hypervisor_callback+37} <ffffffff8010722a> {hypercall_page+554} <ffffffff8010722a>{hypercall_page+554} <ffffffff802fe4ee> {force_evtchn_callback+14} <ffffffff8014e669>{handle_IRQ_event+73} <ffffffff80143251> {autoremove_wake_function+17} <ffffffff8014e783>{__do_IRQ+179} <ffffffff8010daab>{do_IRQ+75} <ffffffff802fe5be>{evtchn_do_upcall+206} <ffffffff8010b9d9> {do_hypervisor_callback+37} <ffffffff802469fa>{__delay+10} <ffffffff80246a3c>{__const_udelay+44} <ffffffff802c63ad>{tg3_readphy+109} <ffffffff802c85cb> {tg3_setup_phy+4059} <ffffffff801457d4>{ktime_get_ts+100} <ffffffff802c9770>{tg3_poll+96} <ffffffff8025c9d7>{acpi_ev_gpe_detect+262} <ffffffff8041efa7> {net_rx_action+199} <ffffffff801327ae>{__do_softirq+142} <ffffffff8010be72>{call_softirq+30} <ffffffff8010db0f>{do_softirq+79} <ffffffff80132938>{irq_exit+72} <ffffffff8010dab0>{do_IRQ+80} <ffffffff802fe5be>{evtchn_do_upcall+206} <ffffffff8010b9d9>{do_hypervisor_callback+37} <EOI> <ffffffff801070ca>{hypercall_page+202} <ffffffff801070ca> {hypercall_page+202} <ffffffff80108f18>{xen_idle+120} <ffffffff80108f99>{cpu_idle+89} <ffffffff80108026>{rest_init+38} <ffffffff806677a5>{start_kernel+501} <ffffffff806671bd>{_sinittext+445} -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |