|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 878] New: A lot of call trace are printed in serial port
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=878
Summary: A lot of call trace are printed in serial port
Product: Xen
Version: unstable
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Hypervisor
AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
ReportedBy: ping.y.yu@xxxxxxxxx
Environment:
------------
Service OS (ia32/ia32e/IA64): PAE/IA32e
Guest OS (ia32/ia32e/IA64):
Change Set: 13703
Bug detailed description:
--------------------------
I find this issue when I do nightly test, Call trace are printed continusly in
serial port, it
says "BUG: soft lockup detected on CPU#xx".
the detail informationi is attached.
I find it from changeset 13703, but I am afraid that it also exists before.
BUG: soft lockup detected on CPU#3!
Call Trace:
<IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
[<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
[<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
[<ffffffff80258125>] __do_IRQ+0x9e/0xfd
[<ffffffff8020cbc3>] do_IRQ+0x63/0x71
[<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
[<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
<EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff802082c2>] xen_idle+0x66/0x78
[<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#1!
Call Trace:
<IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
[<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
[<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
[<ffffffff80258125>] __do_IRQ+0x9e/0xfd
[<ffffffff8020cbc3>] do_IRQ+0x63/0x71
[<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
[<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
<EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff802082c2>] xen_idle+0x66/0x78
[<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#1!
Call Trace:
<IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
[<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
[<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
[<ffffffff80258125>] __do_IRQ+0x9e/0xfd
[<ffffffff8020cbc3>] do_IRQ+0x63/0x71
[<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
[<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
<EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff802082c2>] xen_idle+0x66/0x78
[<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#2!
Call Trace:
<IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
[<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
[<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
[<ffffffff80258125>] __do_IRQ+0x9e/0xfd
[<ffffffff8020cbc3>] do_IRQ+0x63/0x71
[<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
[<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
<EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff802082c2>] xen_idle+0x66/0x78
[<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#3!
Call Trace:
<IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
[<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
[<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
[<ffffffff80258125>] __do_IRQ+0x9e/0xfd
[<ffffffff8020cbc3>] do_IRQ+0x63/0x71
[<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
[<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
<EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff802082c2>] xen_idle+0x66/0x78
[<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#3!
Call Trace:
<IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
[<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
[<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
[<ffffffff80258125>] __do_IRQ+0x9e/0xfd
[<ffffffff8020cbc3>] do_IRQ+0x63/0x71
[<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
[<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
<EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
[<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff8020825c>] xen_idle+0x0/0x78
[<ffffffff802082c2>] xen_idle+0x66/0x78
[<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#1!
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-bugs] [Bug 878] New: A lot of call trace are printed in serial port,
bugzilla-daemon <=
|
|
|
|
|