WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 1185] New: CPU soft lock up with xen 3.2.0

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 1185] New: CPU soft lock up with xen 3.2.0
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Tue, 4 Mar 2008 21:29:42 -0800
Delivery-date: Tue, 04 Mar 2008 21:29:52 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1185

           Summary: CPU soft lock up with xen 3.2.0
           Product: Xen
           Version: unspecified
          Platform: x86
        OS/Version: Linux-2.6
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Unspecified
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: apoorva@xxxxxxxxx


Hardware:
4 Dual-Core AMD Opteron(tm) Processor 2216 HE
cpu MHz : 2400.028
cache size : 1024 KB
4GB RAM

Software:
Xen 3.2.0 with credit scheduler
32 bit CentOS 5.1 Dom0 with 64-bit Hypervisor
Started 32 bit Linux DomUs in all 32 of them with 64MB RAM each.
Started 16 iperf servers and 16 iperf clients for 400 seconds.

BUG:
Output of /var/log/messages:
Feb 28 14:15:00 rktst-srv1 kernel: BUG: soft lockup detected on CPU#0!
Feb 28 14:15:00 rktst-srv1 kernel:  [<c0105522>] show_trace+0x12/0x20
Feb 28 14:15:00 rktst-srv1 kernel:  [<c0105649>] dump_stack+0x19/0x20
Feb 28 14:15:00 rktst-srv1 kernel:  [<c013b7e3>] softlockup_tick+0x83/0xa0
Feb 28 14:18:33 rktst-srv1 kernel:  [<c0126612>] run_local_timers+0x12/0x20
Feb 28 14:18:33 rktst-srv1 kernel:  [<c0108c50>] timer_interrupt+0x3e0/0x530
Feb 28 14:18:33 rktst-srv1 kernel:  [<c013c01a>] handle_IRQ_event+0x5a/0x90
Feb 28 14:18:33 rktst-srv1 kernel:  [<c013c0b4>] __do_IRQ+0x64/0xd0
Feb 28 14:18:41 rktst-srv1 kernel:  [<c0106ac2>] do_IRQ+0x32/0x70
Feb 28 14:18:41 rktst-srv1 kernel:  [<c020962f>] evtchn_do_upcall+0x9f/0x150
Feb 28 14:18:41 rktst-srv1 kernel:  [<c01052c1>] hypervisor_callback+0x3d/0x45
Feb 28 14:18:41 rktst-srv1 kernel:  [<d904368a>] scsi_request_fn+0x33a/0x380
[scsi_mod]
Feb 28 14:18:42 rktst-srv1 kernel:  [<c01a8085>]
__generic_unplug_device+0x25/0x30
Feb 28 14:18:43 rktst-srv1 kernel:  [<c01a80a2>]
generic_unplug_device+0x12/0x30
Feb 28 14:23:24 rktst-srv1 kernel:  [<d90c3cb2>] dm_table_unplug_all+0x42/0x50
[dm_mod]
Feb 28 14:23:24 rktst-srv1 VRM: TP_SKT.c(1461): m_skt_write(): Write failed -
Connection aborted unexpectedly, err=Connection reset by peer
Feb 28 14:25:14 rktst-srv1 kernel:  [<d90c1a1a>] dm_unplug_all+0x1a/0x30
[dm_mod]
Feb 28 14:25:15 rktst-srv1 VRM: TP_SKT.c(1363): m_skt_read(): Read failed -
Connection aborted unexpectedly, err=Connection reset by peer

Xen Config file:

# Kernel image file.
kernel = "/boot/vmlinuz-2.6.16.33-xenU"
# Optional ramdisk.
ramdisk = "/boot/initrd-2.6.16.33-xenU.img"
memory = 64
vif = [ 'mac=00:16:3e:00:00:01, bridge=xenbr0' ]
disk = [ 'phy:/dev/loop0,hda1,w','phy:/dev/loop32,hda2,w' ]
# Set root device.
root = "/dev/hda1 ro"
# Sets runlevel 4.
extra = "4"

on_poweroff = 'destroy'
on_reboot   = 'restart'
on_crash    = 'restart'


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>