[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 543] domU: BUG: soft lockup detected on CPU#1!



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=543


alex.shi@xxxxxxxxx changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |alex.shi@xxxxxxxxx




------- Additional Comments From alex.shi@xxxxxxxxx  2006-04-03 07:13 -------
The machine hung when rebooting xen0 and block our nightly test on IA-32e. 
But it not easy to be reproduced on our box.
Serial output is below:


INIT: Switching to runlevel: 6
INIT: Sending processes the TERM signal
Stopping cups-config-daemon: [  OK  ]
Stopping HAL daemon: [FAILED]
Stopping system message bus: [  OK  ]
Stopping atd: [  OK  ]
Stopping cups: [  OK  ]
Shutting down xfs: [  OK  ]
Stopping Canna server: [  OK  ]
Shutting down console mouse services: [  OK  ]
BUG: soft lockup detected on CPU#0!
CPU 0:
Modules linked in: video thermal processor fan button battery ac
Pid: 0, comm: swapper Not tainted 2.6.16-xen0 #1
RIP: e030:[<ffffffff8010722a>] <ffffffff8010722a>{hypercall_page+554}
RSP: e02b:ffffffff805e8438  EFLAGS: 00000246
RAX: 0000000000030000 RBX: ffff880000bf1380 RCX: ffffffff8010722a
RDX: ffff880000bf1380 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffffff805e8450 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000800 R11: 0000000000000246 R12: 0000000000000000
R13: ffffffff805e8568 R14: 0000000000000013 R15: 0000000000000000
FS:  00002b56f6f95de0(0000) GS:ffffffff80653000(0000) knlGS:0000000000000000
CS:  e033 DS: 0000 ES: 0000

Call Trace: <IRQ> <ffffffff802fe44e>{force_evtchn_callback+14}
       <ffffffff8014e649>{handle_IRQ_event+73} <ffffffff8014e763>{__do_IRQ+179}
       <ffffffff8010daab>{do_IRQ+75} <ffffffff802fe518>{evtchn_do_upcall+200}
       <ffffffff8010b9d9>{do_hypervisor_callback+37} <ffffffff8010722a>
{hypercall_page+554}
       <ffffffff8010722a>{hypercall_page+554} <ffffffff802fe44e>
{force_evtchn_callback+14}
       <ffffffff8014e649>{handle_IRQ_event+73} <ffffffff8014e763>{__do_IRQ+179}
       <ffffffff8010daab>{do_IRQ+75} <ffffffff802fe518>{evtchn_do_upcall+200}
       <ffffffff8010b9d9>{do_hypervisor_callback+37} <EOI>
       <ffffffff801070ca>{hypercall_page+202} <ffffffff801070ca>
{hypercall_page+202}
       <ffffffff80108f18>{xen_idle+120} <ffffffff80108f99>{cpu_idle+89}
       <ffffffff80108026>{rest_init+38} <ffffffff8066b795>{start_kernel+501}
       <ffffffff8066b1b3>{_sinittext+435}


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.