[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#407410: marked as done (BUG: soft lockup detected on CPU#2!)



Your message dated Fri, 4 Jul 2008 22:33:36 +0200
with message-id <20080704203336.GB29028@stro.at>
and subject line Re: xen-linux-system-2.6.18-4-xen-686: Prevents ALSA from finding soundcards
has caused the Debian Bug report #407410,
regarding BUG: soft lockup detected on CPU#2!
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
407410: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407410
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6.18-3-xen-amd64
Version: 2.6.18-7
Severity: normal

I get these dmesg errors inside a xen VM. They might have started after a save/restore.

BUG: soft lockup detected on CPU#1!

Call Trace:
 <IRQ> [<ffffffff802a0540>] softlockup_tick+0xdb/0xed
 [<ffffffff8026874e>] timer_interrupt+0x38d/0x3db
 [<ffffffff802111cd>] handle_IRQ_event+0x2d/0x60
 [<ffffffff802a087f>] __do_IRQ+0xa4/0x105
 [<ffffffff80283ffb>] _local_bh_enable+0x59/0xb3
 [<ffffffff80266f4a>] do_IRQ+0x65/0x73
 [<ffffffff80360e58>] evtchn_do_upcall+0x86/0xe0
 [<ffffffff8025cfe6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff80267cca>] raw_safe_halt+0x84/0xa8
 [<ffffffff80264f4d>] xen_idle+0x38/0x4a
 [<ffffffff80248cef>] cpu_idle+0x97/0xba

BUG: soft lockup detected on CPU#2!

Call Trace:
 <IRQ> [<ffffffff802a0540>] softlockup_tick+0xdb/0xed
 [<ffffffff8026874e>] timer_interrupt+0x38d/0x3db
 [<ffffffff802111cd>] handle_IRQ_event+0x2d/0x60
 [<ffffffff802a087f>] __do_IRQ+0xa4/0x105
 [<ffffffff80283ffb>] _local_bh_enable+0x59/0xb3
 [<ffffffff80266f4a>] do_IRQ+0x65/0x73
 [<ffffffff80360e58>] evtchn_do_upcall+0x86/0xe0
 [<ffffffff8025cfe6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff80267cca>] raw_safe_halt+0x84/0xa8
 [<ffffffff80264f4d>] xen_idle+0x38/0x4a
 [<ffffffff80248cef>] cpu_idle+0x97/0xba


-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-xen-amd64
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages linux-image-2.6.18-3-xen-amd64 depends on:
ii  e2fsprog 1.39+1.40-WIP-2006.11.14+dfsg-1 ext2 file system utilities and lib
ii  initramf 0.85e                           tools for generating an initramfs
ii  linux-mo 2.6.18-7                        Linux 2.6.18 modules on AMD64

linux-image-2.6.18-3-xen-amd64 recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Version: 2.6.25-1

upstream merged paravirt_ops Xen. it features enhanced netxen
and block modules.

as this code got rewritten old bug no longer apply.
for guest system it is recommend to upgrade to newer xen.
for more infos on upstream merge status see
http://wiki.xensource.com/xenwiki/XenParavirtOps

for latest 2.6.26-rc8 linux images see
http://wiki.debian.org/DebianKernel

thanks for your report.

-- 
maks


--- End Message ---

Reply to: