This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-bugs] [Bug 543] domU: BUG: soft lockup detected on CPU#1!

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 543] domU: BUG: soft lockup detected on CPU#1!
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Mon, 27 Mar 2006 09:38:40 +0000
Delivery-date: Mon, 27 Mar 2006 09:40:59 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx

------- Additional Comments From wolfipa@xxxxxx  2006-03-27 09:38 -------
I'm using Fedora Core 5 - kernel 2.6.15-1.2054_FC5xen0 on Domain0 and 2.6.15-
1.2054_FC5xenU on the virtual partition.
I also get this error message. eg. when running IBM's java 1.4.2:

# java --version.
java version "1.4.2"
Java(TM) 2 Runtime Environment, Standard Edition (build 1.4.2)
Classic VM (build 1.4.2, J2RE 1.4.2 IBM build cxia321420-20040626 (JIT 
enabled: jitc))
BUG: soft lockup detected on CPU#0!

Pid: 1154, comm:                 java
EIP: 0061:[<c01050b4>] CPU: 0
EIP is at check_lazy_exec_limit+0xdd/0x1e5
 EFLAGS: 00000206    Not tainted  (2.6.15-1.2054_FC5xenU #1)
EAX: 0000ffff EBX: c1517070 ECX: d5dfc268 EDX: 00000000
ESI: d5dfc268 EDI: d4dfe000 EBP: c0359270 DS: 007b ES: 007b
CR0: 80050033 CR2: 0930d014 CR3: 16a33000 CR4: 00000240
 [<c01060b1>] do_general_protection+0x1e/0x125
 [<c0104cec>] hypervisor_callback+0x2c/0x34
 [<c0106093>] do_general_protection+0x0/0x125
 [<c0104cbb>] error_code+0x2b/0x30
 [<c0104d6e>] failsafe_callback+0x2/0x24
 [<c010fd60>] write_ldt_entry+0xbc/0xc3
 [<c0108aeb>] write_ldt+0x187/0x1a9
 [<c0104b15>] syscall_call+0x7/0xb

Configure bugmail: 
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Xen-bugs mailing list