[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 878] New: A lot of call trace are printed in serial port



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=878

           Summary: A lot of call trace are printed in serial port
           Product: Xen
           Version: unstable
          Platform: Other
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: ping.y.yu@xxxxxxxxx


Environment:
------------
Service OS (ia32/ia32e/IA64): PAE/IA32e
Guest OS (ia32/ia32e/IA64): 
Change Set: 13703


Bug detailed description:
--------------------------
I find this issue when I do nightly test, Call trace are printed continusly in
serial port, it 
says "BUG: soft lockup detected on CPU#xx".
the detail informationi is attached.
I find it from changeset 13703, but I am afraid that it also exists before. 



BUG: soft lockup detected on CPU#3!

Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd

BUG: soft lockup detected on CPU#1!

Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd

BUG: soft lockup detected on CPU#1!

Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd

BUG: soft lockup detected on CPU#2!

Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd

BUG: soft lockup detected on CPU#3!

Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd

BUG: soft lockup detected on CPU#3!

Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd

BUG: soft lockup detected on CPU#1!


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.