WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 896] New: BUG: soft lockup detected on CPU#0!

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 896] New: BUG: soft lockup detected on CPU#0!
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Mon, 12 Feb 2007 18:12:05 -0800
Delivery-date: Mon, 12 Feb 2007 18:13:00 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=896

           Summary: BUG: soft lockup detected on CPU#0!
           Product: Xen
           Version: 3.0.2
          Platform: x86
        OS/Version: Linux-2.6
            Status: NEW
          Severity: major
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: larrylud@xxxxxxxxx


get this message in dom0 with stress testing in a domU.

Feb 12 21:00:01 node01 kernel: BUG: soft lockup detected on CPU#0!
Feb 12 21:00:01 node01 kernel: 
Feb 12 21:00:01 node01 kernel: Pid: 16, comm:            kblockd/0
Feb 12 21:00:01 node01 kernel: EIP: 0061:[<c0101227>] CPU: 0
Feb 12 21:00:01 node01 kernel: EIP is at 0xc0101227
Feb 12 21:00:01 node01 kernel: EFLAGS: 00000246    Tainted: GF     
(2.6.16.33-xen_3.0.4.1 #1)
Feb 12 21:00:01 node01 kernel: EAX: 00030000 EBX: 00000000 ECX: 00000000 EDX:
00000000
Feb 12 21:00:01 node01 kernel: ESI: 00000000 EDI: cbb24fc4 EBP: 00000000 DS:
007b ES: 007b
Feb 12 21:00:01 node01 kernel: CR0: 8005003b CR2: b7f8e070 CR3: 0b73e000 CR4:
00000660
Feb 12 21:00:01 node01 kernel: [<c023f9ca>] force_evtchn_callback+0xa/0x10
Feb 12 21:00:01 node01 kernel: [<c012e466>] group_send_sig_info+0xb6/0xc0
Feb 12 21:00:01 node01 kernel: [<c012e8d9>] send_group_sig_info+0x29/0x40
Feb 12 21:00:01 node01 kernel: [<c0126870>] it_real_fn+0x0/0x60
Feb 12 21:00:01 node01 kernel: [<c012688d>] it_real_fn+0x1d/0x60
Feb 12 21:00:01 node01 kernel: [<c013b063>] hrtimer_run_queues+0xc3/0x170
Feb 12 21:00:01 node01 kernel: [<c012c582>] run_timer_softirq+0x22/0x210
Feb 12 21:00:01 node01 kernel: [<c0127a82>] __do_softirq+0x92/0x130
Feb 12 21:00:01 node01 kernel: [<c0127ba5>] do_softirq+0x85/0xa0
Feb 12 21:00:01 node01 kernel: [<c0106f9c>] do_IRQ+0x3c/0x70
Feb 12 21:00:01 node01 kernel: [<c023fa62>] evtchn_do_upcall+0x92/0x100
Feb 12 21:00:01 node01 kernel: [<c0105755>] hypervisor_callback+0x3d/0x48
Feb 12 21:00:01 node01 kernel: [<c023f9ca>] force_evtchn_callback+0xa/0x10
Feb 12 21:00:01 node01 kernel: [<cd045ff5>] scsi_request_fn+0x3a5/0x3f0
[scsi_mod]
Feb 12 21:00:01 node01 kernel: [<c03d2e00>] pcifront_x86_stub_init+0x0/0x80
Feb 12 21:00:01 node01 kernel: [<c01dcf3c>] cfq_kick_queue+0x5c/0xf0
Feb 12 21:00:01 node01 kernel: [<c03d2e98>] pci_fixup_nforce2+0x18/0x70
Feb 12 21:00:01 node01 kernel: [<c03d2e98>] pci_fixup_nforce2+0x18/0x70
Feb 12 21:00:01 node01 kernel: [<c03d2e9c>] pci_fixup_nforce2+0x1c/0x70
Feb 12 21:00:01 node01 kernel: [<c0133c78>] run_workqueue+0x78/0xf0
Feb 12 21:00:01 node01 kernel: [<c01dcee0>] cfq_kick_queue+0x0/0xf0
Feb 12 21:00:01 node01 kernel: [<c0133e17>] worker_thread+0x127/0x150
Feb 12 21:00:01 node01 kernel: [<c011c560>] default_wake_function+0x0/0x10
Feb 12 21:00:01 node01 kernel: [<c011c560>] default_wake_function+0x0/0x10
Feb 12 21:00:01 node01 kernel: [<c011c6fd>] complete+0x3d/0x60
Feb 12 21:00:01 node01 kernel: [<c0133cf0>] worker_thread+0x0/0x150
Feb 12 21:00:01 node01 kernel: [<c0137955>] kthread+0xa5/0xf0
Feb 12 21:00:01 node01 kernel: [<c01378b0>] kthread+0x0/0xf0
Feb 12 21:00:01 node01 kernel: [<c010348d>] kernel_thread_helper+0x5/0x18


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>