How to fix "spin count exceeded (tokenLck) possible deadlock" error on ESXi 3.5 running in VMWare Workstation 6.5


Hi, I'm a new comer of cloud computing. I want to build a private cloud (small) for research purpose. I have never been used cloud features. I choose ESXi 3.5 server for my host. I try to install ESX server on VMWare Workstation 6.5 for testing purpose. Installation was successful but while rebooting the server, I found the error " Spin count exceeded (tokenLck) possible deadlock". I arranged the ESXi VM with 2736 MB memory, 50 GB HD (SCSI) and also chose "other Linux 2.4 X Kernel 64 bit". I run VMWare Workstation 6,5 on Windows 7. ,Laptop is Lenovo Z480 intel core i5. Give me advice please. If ESXi 3.5 is not possible, advice me which cloud platform OS (eg. Ubuntu or something) can go well. Thanks in advance.

Answer this Question


1 total
Vote Up (10)

"Commit your redo logs before their size exceeds 1GB.

If your machine has already stopped responding due to this problem, perform an offline commit of the redo log before restarting the affected virtual machine after the next host power on.

Warning: If you are using multiple redo logs, it might be impossible to determine which redo log caused the system to stop responding.

Note: This issue is fixed in ESX Server 3.0.1."

Ask a question

Join Now or Sign In to ask a question. recently celebrated its 15th year in existence, and as the SaaS (software-as-a-service) vendor races toward US$5 billion in revenue its influence on the industry is being felt more than ever. At the same time, some signs indicate that is having a few growing pains, as well as showing some trappings of the mega-vendors it once mocked with its "End of Software" marketing campaign.
Mainframe operators using BMC software may now be able to enjoy the speedy, devops-style development pace that is quickly becoming the norm for customer-facing mobile applications and Internet services.
Mobile office suite Polaris Office now offers a cloud option for storing your documents. But in all the metrics that matter--price, privacy, and functionality--you'd be better served by passing it by.
Some cloud storage providers who hope to be on the leading edge of cloud security adopt a "zero-knowledge" policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are.
In today's accessible technology roundup: Google wants to embed cameras in contact lenses, Apple gets a patent for a new GUI for touch devices to improve accessibility and a hacker develops a virtual cane for the blind
Borrowing a page from the recently revised Microsoft playbook, development tools maker Telerik has released as open source the bulk of its Kendo software library of components for building Web and mobile applications
Although Exadata is Oracle's most popular and mature "engineered system," some customers implementing the database machine are making mistakes that prevent them from getting the most performance out of the expensive product, according to a veteran of many Exadata projects.
Sure, you’ve changed a bunch of passwords, but are you doing all you can to protect yourself?
Google did little during its first-quarter earnings report to shush critics who say its Enterprise unit is a second-class citizen in its kingdom.
Red Hat has successfully grown Linux into an enterprise platform, now it's looking to do the same with OpenStack

White Papers & Webcasts

See more White Papers | Webcasts

Join us: