[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 1185] New: CPU soft lock up with xen 3.2.0
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1185 Summary: CPU soft lock up with xen 3.2.0 Product: Xen Version: unspecified Platform: x86 OS/Version: Linux-2.6 Status: NEW Severity: normal Priority: P2 Component: Unspecified AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx ReportedBy: apoorva@xxxxxxxxx Hardware: 4 Dual-Core AMD Opteron(tm) Processor 2216 HE cpu MHz : 2400.028 cache size : 1024 KB 4GB RAM Software: Xen 3.2.0 with credit scheduler 32 bit CentOS 5.1 Dom0 with 64-bit Hypervisor Started 32 bit Linux DomUs in all 32 of them with 64MB RAM each. Started 16 iperf servers and 16 iperf clients for 400 seconds. BUG: Output of /var/log/messages: Feb 28 14:15:00 rktst-srv1 kernel: BUG: soft lockup detected on CPU#0! Feb 28 14:15:00 rktst-srv1 kernel: [<c0105522>] show_trace+0x12/0x20 Feb 28 14:15:00 rktst-srv1 kernel: [<c0105649>] dump_stack+0x19/0x20 Feb 28 14:15:00 rktst-srv1 kernel: [<c013b7e3>] softlockup_tick+0x83/0xa0 Feb 28 14:18:33 rktst-srv1 kernel: [<c0126612>] run_local_timers+0x12/0x20 Feb 28 14:18:33 rktst-srv1 kernel: [<c0108c50>] timer_interrupt+0x3e0/0x530 Feb 28 14:18:33 rktst-srv1 kernel: [<c013c01a>] handle_IRQ_event+0x5a/0x90 Feb 28 14:18:33 rktst-srv1 kernel: [<c013c0b4>] __do_IRQ+0x64/0xd0 Feb 28 14:18:41 rktst-srv1 kernel: [<c0106ac2>] do_IRQ+0x32/0x70 Feb 28 14:18:41 rktst-srv1 kernel: [<c020962f>] evtchn_do_upcall+0x9f/0x150 Feb 28 14:18:41 rktst-srv1 kernel: [<c01052c1>] hypervisor_callback+0x3d/0x45 Feb 28 14:18:41 rktst-srv1 kernel: [<d904368a>] scsi_request_fn+0x33a/0x380 [scsi_mod] Feb 28 14:18:42 rktst-srv1 kernel: [<c01a8085>] __generic_unplug_device+0x25/0x30 Feb 28 14:18:43 rktst-srv1 kernel: [<c01a80a2>] generic_unplug_device+0x12/0x30 Feb 28 14:23:24 rktst-srv1 kernel: [<d90c3cb2>] dm_table_unplug_all+0x42/0x50 [dm_mod] Feb 28 14:23:24 rktst-srv1 VRM: TP_SKT.c(1461): m_skt_write(): Write failed - Connection aborted unexpectedly, err=Connection reset by peer Feb 28 14:25:14 rktst-srv1 kernel: [<d90c1a1a>] dm_unplug_all+0x1a/0x30 [dm_mod] Feb 28 14:25:15 rktst-srv1 VRM: TP_SKT.c(1363): m_skt_read(): Read failed - Connection aborted unexpectedly, err=Connection reset by peer Xen Config file: # Kernel image file. kernel = "/boot/vmlinuz-2.6.16.33-xenU" # Optional ramdisk. ramdisk = "/boot/initrd-2.6.16.33-xenU.img" memory = 64 vif = [ 'mac=00:16:3e:00:00:01, bridge=xenbr0' ] disk = [ 'phy:/dev/loop0,hda1,w','phy:/dev/loop32,hda2,w' ] # Set root device. root = "/dev/hda1 ro" # Sets runlevel 4. extra = "4" on_poweroff = 'destroy' on_reboot = 'restart' on_crash = 'restart' -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |