|  |  | 
  
    |  |  | 
 
  |   |  | 
  
    |  |  | 
  
    |  |  | 
  
    |   xen-bugs
[Xen-bugs] [Bug 878] New: A lot of call trace are printed in serial	port 
| http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=878
           Summary: A lot of call trace are printed in serial port
           Product: Xen
           Version: unstable
          Platform: Other
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: ping.y.yu@xxxxxxxxx
Environment:
------------
Service OS (ia32/ia32e/IA64): PAE/IA32e
Guest OS (ia32/ia32e/IA64): 
Change Set: 13703
Bug detailed description:
--------------------------
I find this issue when I do nightly test, Call trace are printed continusly in
serial port, it 
says "BUG: soft lockup detected on CPU#xx".
the detail informationi is attached.
I find it from changeset 13703, but I am afraid that it also exists before. 
BUG: soft lockup detected on CPU#3!
Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#1!
Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#1!
Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#2!
Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#3!
Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#3!
Call Trace:
 <IRQ> [<ffffffff80257a11>] softlockup_tick+0xcc/0xde
 [<ffffffff8020e76e>] timer_interrupt+0x39f/0x3fd
 [<ffffffff80258040>] handle_IRQ_event+0x4b/0x92
 [<ffffffff80258125>] __do_IRQ+0x9e/0xfd
 [<ffffffff8020cbc3>] do_IRQ+0x63/0x71
 [<ffffffff8034a37f>] evtchn_do_upcall+0xee/0x165
 [<ffffffff8020aaf6>] do_hypervisor_callback+0x1e/0x2c
 <EOI> [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000
 [<ffffffff8020ee11>] raw_safe_halt+0x84/0xaa
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff8020825c>] xen_idle+0x0/0x78
 [<ffffffff802082c2>] xen_idle+0x66/0x78
 [<ffffffff8020838e>] cpu_idle+0xba/0xdd
BUG: soft lockup detected on CPU#1!
-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
 | 
 
| <Prev in Thread] | Current Thread | [Next in Thread> |  | 
[Xen-bugs] [Bug 878] New: A lot of call trace are printed in serial	port,
bugzilla-daemon <=
 |  |  | 
  
    |  |  |