[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 878] New: A lot of call trace are printed in serial port
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=878 Summary: A lot of call trace are printed in serial port Product: Xen Version: unstable Platform: Other OS/Version: All Status: NEW Severity: normal Priority: P2 Component: Hypervisor AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx ReportedBy: ping.y.yu@xxxxxxxxx Environment: ------------ Service OS (ia32/ia32e/IA64): PAE/IA32e Guest OS (ia32/ia32e/IA64): Change Set: 13703 Bug detailed description: -------------------------- I find this issue when I do nightly test, Call trace are printed continusly in serial port, it says "BUG: soft lockup detected on CPU#xx". the detail informationi is attached. I find it from changeset 13703, but I am afraid that it also exists before. BUG: soft lockup detected on CPU#3! Call Trace: <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd [<ffffffff8020cbc3>] do_IRQ+0x63/0x71 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff802082c2>] xen_idle+0x66/0x78 [<ffffffff8020838e>] cpu_idle+0xba/0xdd BUG: soft lockup detected on CPU#1! Call Trace: <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd [<ffffffff8020cbc3>] do_IRQ+0x63/0x71 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff802082c2>] xen_idle+0x66/0x78 [<ffffffff8020838e>] cpu_idle+0xba/0xdd BUG: soft lockup detected on CPU#1! Call Trace: <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd [<ffffffff8020cbc3>] do_IRQ+0x63/0x71 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff802082c2>] xen_idle+0x66/0x78 [<ffffffff8020838e>] cpu_idle+0xba/0xdd BUG: soft lockup detected on CPU#2! Call Trace: <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd [<ffffffff8020cbc3>] do_IRQ+0x63/0x71 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff802082c2>] xen_idle+0x66/0x78 [<ffffffff8020838e>] cpu_idle+0xba/0xdd BUG: soft lockup detected on CPU#3! Call Trace: <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd [<ffffffff8020cbc3>] do_IRQ+0x63/0x71 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff802082c2>] xen_idle+0x66/0x78 [<ffffffff8020838e>] cpu_idle+0xba/0xdd BUG: soft lockup detected on CPU#3! Call Trace: <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd [<ffffffff8020cbc3>] do_IRQ+0x63/0x71 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff8020825c>] xen_idle+0x0/0x78 [<ffffffff802082c2>] xen_idle+0x66/0x78 [<ffffffff8020838e>] cpu_idle+0xba/0xdd BUG: soft lockup detected on CPU#1! -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |