WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 58] New: assert on smp.c:300 with "nosmp"

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 58] New: assert on smp.c:300 with "nosmp"
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Thu, 26 May 2005 09:40:48 +0000
Delivery-date: Thu, 26 May 2005 09:40:52 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/cgi-bin/bugzilla/show_bug.cgi?id=58

           Summary: assert on smp.c:300 with "nosmp"
           Product: Xen
           Version: unstable
          Platform: x86-64
        OS/Version: n/a
            Status: NEW
          Severity: normal
          Priority: P4
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: srparish@xxxxxxxxxx
                CC: hohnbaum@xxxxxxxxxx


<snip>
(XEN) SMP mode deactivated, forcing use of dummy APIC emulation.
(XEN) Time init:
(XEN) .... cpu_freq:    00000000:82C2FF10
(XEN) .... scale:       00000001:D2C42BE0
(XEN) .... Wall Clock:  1117075883s 0us
(XEN) Brought up 1 CPUs
(XEN) Assertion 'local_irq_is_enabled()' failed, line 300, file smp.c
(XEN) BUG at smp.c:300
(XEN) (file=extable.c, line=76) Pre-exception: ffff830000139dfc -> 
0000000000000000
(XEN) CPU:    0
(XEN) EIP:    e010:[<ffff830000139dfc>]      
(XEN) EFLAGS: 0000000000010092
(XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx: 0000000000000000  
rdx: 0000000000000000
(XEN) rsi: 000000000000000a   rdi: ffff8300001744f1   rbp: 0000000000000001  
rsp: ffff830000107bb8
(XEN) r8:  0000000000000000   r9:  ffff8300000b8f00   r10: ffff8300000b8000  
r11: 0000000000000018
(XEN) r12: ffff83000013a090   r13: 0000000000000000   r14: ffff8300001889a0  
r15: ffff830000188988
(XEN) Xen stack trace from rsp=ffff830000107bb8:
(XEN)    0000000000000000 ffff8300001625d0 ffff8300001687e0 ffff830000168c60
ffff830000187a80 0000000000000097 ffff830000188988 0000000000000000 
(XEN)    ffff830000189c00 0000000000000020 ffff830000025160 [ffff830000139d29]
0000000000000000 [ffff830000152517] ffff8300001889a0 [ffff83000015138e] 
(XEN)    ffff830000188988 [ffff830000150e74] ffff830000000000 ffff830000032220
ffff830000162688 [ffff830000150805] 0000000001000000 0000000b00000000 
(XEN)    0000000000000000 000000000009dc00 0009dc0000000001 0000240000000000
0000000200000000 00000000000d0000 0000000000030000 0010000000000002 
(XEN)    dfe6000000000000 0000000100000000 00000000dff60000 0000000000012000
dff7200000000003 0000e00000000000 0000000400000000 00000000dff80000 
(XEN)    0000000000080000 fec0000000000002 0000040000000000 0000000200000000
00000000fee00000 0000000000001000 fff8000000000002 0008000000000000 
(XEN)    0000000200000000 0000000100000000 0000000080000000 0000000000000001
0000000000000000 0000000000000000 0000000000000000 0000000000000000 
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
0000000000000000 0000000000000000 0000000000000000 0000000000000000 
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
0000000000000000 0000000000000000 0000000000000000 0000000000000000 
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
0000000000000000 0000000000000000 0000000000000000 0000000000000000 
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
0000000000000000 0000000000000000 0000000000000000 0000000000000000 
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
0000000000000000 0000000000000000 0000000000000000 0000000000000000 
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
0000000000000000 0000000000000000 0000000000000000 0000000000000000 
(XEN)    0000000000000000 0000000000000405 0000000000067ed0 0000000000000000
0000000000000000 0000000000000000 0000000000000000 ffff8300001001b8 
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
0000000000000000 0000000000000000 0000000000000000 0000000000000000 
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
0000000000000000 0000000000000000 0000000000000000 0000000000000000 
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
0000000000000000 0000000000000000 0000000000000000 0000000000000000 
(XEN)    ffff830000166e80 
(XEN) Xen call trace from rsp=ffff830000107bb8:
(XEN)    [<ffff830000139d29>] [<ffff830000152517>] [<ffff83000015138e>]
[<ffff830000150e74>] [<ffff830000150805>] 
(XEN) ************************************
(XEN) CPU0 FATAL TRAP 6 (invalid operation), ERROR_CODE 0000, IN INTERRUPT 
CONTEXT.
(XEN) System shutting down -- need manual reset.
(XEN) ************************************


Making sure local_irq_enable() gets called doesn't fully help either--hangs:

<snip>
(XEN) Scrubbing Free RAM:
..............................................................done.
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to 
Xen).
<long pause>
(XEN) spurious 8259A interrupt: IRQ7.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-bugs] [Bug 58] New: assert on smp.c:300 with "nosmp", bugzilla-daemon <=