Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 588594 Details for
Bug 821594
soft lockup - CPU#0 stuck for 67s! [migration/0:5] w/150 virtio NICs
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
backtrace of soft lockup
softlock.log (text/plain), 4.62 KB, created by
Alex Williamson
on 2012-06-01 23:02:07 UTC
(
hide
)
Description:
backtrace of soft lockup
Filename:
MIME Type:
Creator:
Alex Williamson
Created:
2012-06-01 23:02:07 UTC
Size:
4.62 KB
patch
obsolete
>BUG: soft lockup - CPU#0 stuck for 67s! [halt:6185] >Modules linked in: autofs4 sunrpc ipt_REJECT ip6t_REJECT ipv6 uinput ppdev parport_pc parport microcode sg virtio_net i2c_piix4 i2c_core ext4 mbcache jbd2 sd_mod crc_t10dif pata_acpi ata_generic ata_piix virtio_pci virtio_ring virtio dm_mirror dm_region_hash dm_log dm_mod [last unloaded: nf_conntrack] >CPU 0 >Modules linked in: autofs4 sunrpc ipt_REJECT ip6t_REJECT ipv6 uinput ppdev parport_pc parport microcode sg virtio_net i2c_piix4 i2c_core ext4 mbcache jbd2 sd_mod crc_t10dif pata_acpi ata_generic ata_piix virtio_pci virtio_ring virtio dm_mirror dm_region_hash dm_log dm_mod [last unloaded: nf_conntrack] > >Pid: 6185, comm: halt Not tainted 2.6.32-276.el6.x86_64 #1 Red Hat KVM >RIP: 0010:[<ffffffff812820f9>] [<ffffffff812820f9>] ioread8+0x19/0x40 >RSP: 0018:ffff880002203d50 EFLAGS: 00000202 >RAX: 0000000000000000 RBX: ffff880002203d50 RCX: 0000000000000000 >RDX: 000000000001cc13 RSI: ffff880037197400 RDI: 000000000001cc13 >RBP: ffffffff8100bc13 R08: ffff88007cd14000 R09: ffff880002203ed0 >R10: 0000000000000020 R11: 0000000000000001 R12: ffff880002203cd0 >R13: 000000000000000b R14: ffff880037197400 R15: ffffffff81505b9b >FS: 00007f47dca49700(0000) GS:ffff880002200000(0000) knlGS:0000000000000000 >CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b >CR2: 0000000000ec70a0 CR3: 00000000374c0000 CR4: 00000000000006f0 >DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 >Process halt (pid: 6185, threadinfo ffff88007cd14000, task ffff880037666040) >Stack: > ffff880002203d70 ffffffffa004b6dc ffff88006955fd40 0000000000000000 ><d> ffff880002203dc0 ffffffff810db800 ffff880002203dc0 ffffffff8102e2a9 ><d> ffff880002203da0 ffffffff81a83a80 ffffffff81a83aec 000000000000000b >Call Trace: > <IRQ> > [<ffffffffa004b6dc>] ? vp_interrupt+0x2c/0x60 [virtio_pci] > [<ffffffff810db800>] ? handle_IRQ_event+0x60/0x170 > [<ffffffff8102e2a9>] ? ack_apic_level+0x79/0x1b0 > [<ffffffff810de0b8>] ? handle_fasteoi_irq+0x88/0xf0 > [<ffffffff8100df09>] ? handle_irq+0x49/0xa0 > [<ffffffff81505aac>] ? do_IRQ+0x6c/0xf0 > [<ffffffff8100ba53>] ? ret_from_intr+0x0/0x11 > [<ffffffff81073e70>] ? __do_softirq+0x70/0x1e0 > [<ffffffff8100c24c>] ? call_softirq+0x1c/0x30 > [<ffffffff8100de85>] ? do_softirq+0x65/0xa0 > [<ffffffff81073ca5>] ? irq_exit+0x85/0x90 > [<ffffffff81505ab5>] ? do_IRQ+0x75/0xf0 > [<ffffffff8100ba53>] ? ret_from_intr+0x0/0x11 > <EOI> > [<ffffffff81500127>] ? _spin_unlock_irqrestore+0x17/0x20 > [<ffffffff81289b5a>] ? pci_bus_read_config_word+0x7a/0x90 > [<ffffffff8128d09f>] ? pci_find_capability+0x3f/0x90 > [<ffffffff812a580a>] ? pci_msix_shutdown+0x7a/0xe0 > [<ffffffff8129213c>] ? pci_device_shutdown+0x3c/0x50 > [<ffffffff8134b97b>] ? device_shutdown+0x4b/0x190 > [<ffffffff8108a316>] ? kernel_shutdown_prepare+0x36/0x40 > [<ffffffff8108a333>] ? kernel_power_off+0x13/0x50 > [<ffffffff8108a661>] ? sys_reboot+0x111/0x220 > [<ffffffff81191d8f>] ? __d_free+0x3f/0x60 > [<ffffffff81191e08>] ? d_free+0x58/0x60 > [<ffffffff8119a330>] ? mntput_no_expire+0x30/0x110 > [<ffffffff8117c9e1>] ? __fput+0x1a1/0x210 > [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b >Code: ff 00 00 c9 c3 0f 1f 44 00 00 66 8b 07 0f b7 c0 c9 c3 55 48 81 ff ff ff 03 00 48 89 e5 77 2b 48 81 ff 00 00 01 00 76 0a 89 fa ec <0f> b6 c0 c9 c3 66 90 48 c7 c6 91 ed 7b 81 e8 14 fb ff ff b8 ff >Call Trace: > <IRQ> [<ffffffffa004b6dc>] ? vp_interrupt+0x2c/0x60 [virtio_pci] > [<ffffffff810db800>] ? handle_IRQ_event+0x60/0x170 > [<ffffffff8102e2a9>] ? ack_apic_level+0x79/0x1b0 > [<ffffffff810de0b8>] ? handle_fasteoi_irq+0x88/0xf0 > [<ffffffff8100df09>] ? handle_irq+0x49/0xa0 > [<ffffffff81505aac>] ? do_IRQ+0x6c/0xf0 > [<ffffffff8100ba53>] ? ret_from_intr+0x0/0x11 > [<ffffffff81073e70>] ? __do_softirq+0x70/0x1e0 > [<ffffffff8100c24c>] ? call_softirq+0x1c/0x30 > [<ffffffff8100de85>] ? do_softirq+0x65/0xa0 > [<ffffffff81073ca5>] ? irq_exit+0x85/0x90 > [<ffffffff81505ab5>] ? do_IRQ+0x75/0xf0 > [<ffffffff8100ba53>] ? ret_from_intr+0x0/0x11 > <EOI> [<ffffffff81500127>] ? _spin_unlock_irqrestore+0x17/0x20 > [<ffffffff81289b5a>] ? pci_bus_read_config_word+0x7a/0x90 > [<ffffffff8128d09f>] ? pci_find_capability+0x3f/0x90 > [<ffffffff812a580a>] ? pci_msix_shutdown+0x7a/0xe0 > [<ffffffff8129213c>] ? pci_device_shutdown+0x3c/0x50 > [<ffffffff8134b97b>] ? device_shutdown+0x4b/0x190 > [<ffffffff8108a316>] ? kernel_shutdown_prepare+0x36/0x40 > [<ffffffff8108a333>] ? kernel_power_off+0x13/0x50 > [<ffffffff8108a661>] ? sys_reboot+0x111/0x220 > [<ffffffff81191d8f>] ? __d_free+0x3f/0x60 > [<ffffffff81191e08>] ? d_free+0x58/0x60 > [<ffffffff8119a330>] ? mntput_no_expire+0x30/0x110 > [<ffffffff8117c9e1>] ? __fput+0x1a1/0x210 > [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 821594
:
584536
|
588268
|
588269
| 588594