Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 579431 Details for
Bug 815230
[abrt] kernel: BUG: soft lockup - CPU#0 stuck for 22s! [rtkit-daemon:1344]
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 4.23 KB, created by
Rafael Pereira
on 2012-04-23 07:39:31 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Rafael Pereira
Created:
2012-04-23 07:39:31 UTC
Size:
4.23 KB
patch
obsolete
>BUG: soft lockup - CPU#0 stuck for 22s! [rtkit-daemon:1344] >Modules linked in: hidp ppdev parport_pc lp parport 8021q garp stp llc fcoe libfcoe libfc scsi_transport_fc scsi_tgt rfcomm be2iscsi iscsi_boot_sysfs bnx2i cnic uio cxgb4i cxgb4 cxgb3i libcxgbi cxgb3 mdio ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi bnep ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack binfmt_misc fuse arc4 snd_hda_codec_hdmi snd_hda_codec_conexant brcmsmac mac80211 snd_hda_intel snd_hda_codec snd_hwdep brcmutil snd_seq snd_seq_device snd_pcm uvcvideo cfg80211 videobuf2_core videodev snd_timer snd media v4l2_compat_ioctl32 videobuf2_vmalloc videobuf2_memops btusb crc8 bluetooth cordic soundcore atl1c i2c_i801 iTCO_wdt snd_page_alloc bcma toshiba_acpi intel_ips iTCO_vendor_support toshiba_bluetooth sparse_keymap rfkill microcode joydev uinput video radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core [last unloa >ded: scsi_wait_scan] >CPU 0 >Modules linked in: hidp ppdev parport_pc lp parport 8021q garp stp llc fcoe libfcoe libfc scsi_transport_fc scsi_tgt rfcomm be2iscsi iscsi_boot_sysfs bnx2i cnic uio cxgb4i cxgb4 cxgb3i libcxgbi cxgb3 mdio ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi bnep ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack binfmt_misc fuse arc4 snd_hda_codec_hdmi snd_hda_codec_conexant brcmsmac mac80211 snd_hda_intel snd_hda_codec snd_hwdep brcmutil snd_seq snd_seq_device snd_pcm uvcvideo cfg80211 videobuf2_core videodev snd_timer snd media v4l2_compat_ioctl32 videobuf2_vmalloc videobuf2_memops btusb crc8 bluetooth cordic soundcore atl1c i2c_i801 iTCO_wdt snd_page_alloc bcma toshiba_acpi intel_ips iTCO_vendor_support toshiba_bluetooth sparse_keymap rfkill microcode joydev uinput video radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core [last unloa >ded: scsi_wait_scan] >Pid: 1344, comm: rtkit-daemon Tainted: G W 3.3.1-3.fc16.x86_64 #1 TOSHIBA Satellite L650/Portable PC >RIP: 0010:[<ffffffff81279cbb>] [<ffffffff81279cbb>] avtab_search_node+0x5b/0xa0 >RSP: 0018:ffff880110e89aa8 EFLAGS: 00000297 >RAX: ffff880032c8ac90 RBX: 0000000000000282 RCX: 000000000000079e >RDX: 0000000000000f52 RSI: 0000000000001e7e RDI: ffffffff81f0f368 >RBP: ffff880110e89aa8 R08: 0000000000000006 R09: 0000000000000007 >R10: ffff8800b8264000 R11: ffff880110e89c78 R12: ffffffff8126b597 >R13: ffff880110e89a58 R14: 0000000000800000 R15: 000000000000007c >FS: 00007f6b312b2700(0000) GS:ffff880137c00000(0000) knlGS:0000000000000000 >CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >CR2: 00007fba2f55a000 CR3: 000000012e8f9000 CR4: 00000000000006f0 >DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 >Process rtkit-daemon (pid: 1344, threadinfo ffff880110e88000, task ffff88012ea19730) >Stack: > ffff880110e89b28 ffffffff81280de9 ffff880032f51c80 00000006812d20f9 > ffff88002c57e128 ffff88002c57e488 ffff88010a2a1200 0f52000600000f51 > 0000000000000080 00070006079e0f52 00000000000000c3 ffff880110e89c14 >Call Trace: > [<ffffffff81280de9>] context_struct_compute_av+0x179/0x3e0 > [<ffffffff81281ca0>] security_compute_av+0xf0/0x2a0 > [<ffffffff8126bb69>] avc_has_perm_noaudit+0x1d9/0x360 > [<ffffffff8126bd64>] ? avc_has_perm_flags+0x74/0x90 > [<ffffffff8126bd39>] avc_has_perm_flags+0x49/0x90 > [<ffffffff8126c040>] inode_has_perm+0x30/0x40 > [<ffffffff8126cf71>] selinux_inode_permission+0xd1/0x120 > [<ffffffff8126954c>] security_inode_permission+0x1c/0x30 > [<ffffffff8118cd08>] inode_permission+0x48/0x100 > [<ffffffff8119037a>] do_last+0x1fa/0x8e0 > [<ffffffff81190b73>] path_openat+0xd3/0x3c0 > [<ffffffff81190f82>] do_filp_open+0x42/0xa0 > [<ffffffff8119cfef>] ? alloc_fd+0x4f/0x150 > [<ffffffff81180798>] do_sys_open+0xf8/0x1d0 > [<ffffffff810d322c>] ? __audit_syscall_entry+0xcc/0x310 > [<ffffffff81180891>] sys_open+0x21/0x30 > [<ffffffff815fbfe9>] system_call_fastpath+0x16/0x1b >Code: c0 0f b7 f1 8d 34 b0 0f b7 c2 c1 e0 09 01 f0 66 23 47 10 0f b7 c0 49 8b 04 c2 48 85 c0 74 11 90 66 39 10 74 13 77 29 48 8b 40 10 <48> 85 c0 75 f0 5d c3 66 0f 1f 44 00 00 66 39 48 02 75 e7 66 44
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 815230
: 579431