Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 621495 Details for
Bug 863033
ip link set eth0 down on tg3 (BCM5701 - 3C996B-T) leads to BUG: soft lockup - CPU stuck
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
dmesg
dmesg (text/plain), 4.62 KB, created by
Michal Žejdl
on 2012-10-04 09:39:06 UTC
(
hide
)
Description:
dmesg
Filename:
MIME Type:
Creator:
Michal Žejdl
Created:
2012-10-04 09:39:06 UTC
Size:
4.62 KB
patch
obsolete
>BUG: soft lockup - CPU#6 stuck for 63s! [ip:3482] > >Modules linked in: mptctl mptbase nfsd lockd nfs_acl auth_rpcgss exportfs sunrpc ipv6 ext2 ppdev parport_pc parport microcode serio_raw tg3 cpqphp sg i2c_piix4 i2c_core cfi_probe gen_probe cfi_util scb2_flash osst st e100 mii ext4 mbcache jbd2 hpsa cciss sr_mod cdrom pata_acpi ata_generic pata_serverworks aic7xxx scsi_transport_spi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan] > >Modules linked in: mptctl mptbase nfsd lockd nfs_acl auth_rpcgss exportfs sunrpc ipv6 ext2 ppdev parport_pc parport microcode serio_raw tg3 cpqphp sg i2c_piix4 i2c_core cfi_probe gen_probe cfi_util scb2_flash osst st e100 mii ext4 mbcache jbd2 hpsa cciss sr_mod cdrom pata_acpi ata_generic pata_serverworks aic7xxx scsi_transport_spi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan] > > > >Pid: 3482, comm: ip Not tainted 2.6.32-279.9.1.el6.i686 #1 HP ProLiant ML570 G2 > >EIP: 0060:[<c083edb7>] EFLAGS: 00000297 CPU: 6 > >EIP is at _spin_lock_bh+0x17/0x30 > >EAX: f3279e9d EBX: c15b83e4 ECX: c15b8bac EDX: c15f8000 > >ESI: c15f8000 EDI: 00000000 EBP: c15b83e4 ESP: f3277abc > > DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 > >Process ip (pid: 3482, ti=f3276000 task=c1531aa0 task.ti=f3276000) > >Stack: > > c15b83e0 f8318d8c 00000000 c15b83e0 00000000 c15b83e4 00000000 f831f5f5 > ><0> c15b83e0 c15b8bac c15b83e4 00000001 f8323c6f c15b83e0 c15b8020 f832ea20 > ><0> 00001003 00000000 c0795b3b c15b8130 c15b8020 c0793c80 c15b8020 00001002 > >Call Trace: > > [<f8318d8c>] ? tg3_get_stats+0x19c/0x210 [tg3] > > [<f831f5f5>] ? tg3_halt+0x65/0xa0 [tg3] > > [<f8323c6f>] ? tg3_close+0xdf/0x1a0 [tg3] > > [<c0795b3b>] ? dev_close+0x5b/0xb0 > > [<c0793c80>] ? dev_set_rx_mode+0x20/0x40 > > [<c0795667>] ? dev_change_flags+0x87/0x1a0 > > [<c07a0ea8>] ? do_setlink+0x188/0x720 > > [<c060d8c1>] ? nla_parse+0x21/0xd0 > > [<c07a1864>] ? rtnl_newlink+0x424/0x4f0 > > [<c078bb2a>] ? __alloc_skb+0x4a/0x140 > > [<c07a1440>] ? rtnl_newlink+0x0/0x4f0 > > [<c07a0a96>] ? rtnetlink_rcv_msg+0x146/0x230 > > [<c078bb2a>] ? __alloc_skb+0x4a/0x140 > > [<c07a0950>] ? rtnetlink_rcv_msg+0x0/0x230 > > [<c07b695e>] ? netlink_rcv_skb+0x7e/0xa0 > > [<c07a0930>] ? rtnetlink_rcv+0x0/0x20 > > [<c07a0944>] ? rtnetlink_rcv+0x14/0x20 > > [<c07b6650>] ? netlink_unicast+0x250/0x280 > > [<c07b6e2c>] ? netlink_sendmsg+0x1bc/0x2a0 > > [<c0784fe5>] ? sock_sendmsg+0xe5/0x120 > > [<c0476a50>] ? autoremove_wake_function+0x0/0x40 > > [<c04f1e94>] ? __alloc_pages_nodemask+0xf4/0x870 > > [<c0476a50>] ? autoremove_wake_function+0x0/0x40 > > [<c04e0d0d>] ? find_get_page+0x1d/0x90 > > [<c0604f25>] ? copy_from_user+0x35/0x120 > > [<c0604f25>] ? copy_from_user+0x35/0x120 > > [<c078ef62>] ? verify_iovec+0x62/0xb0 > > [<c078680d>] ? __sys_sendmsg+0x2ad/0x2c0 > > [<c043a580>] ? kmap_atomic_prot+0x120/0x150 > > [<c05071c1>] ? handle_mm_fault+0x131/0x1d0 > > [<c04343ba>] ? __do_page_fault+0x1aa/0x430 > > [<c0786989>] ? sys_sendmsg+0x39/0x70 > > [<c0786aba>] ? sys_socketcall+0xfa/0x2e0 > > [<c0841c3a>] ? do_page_fault+0x2a/0x90 > > [<c083efc4>] ? syscall_call+0x7/0xb > >Code: 28 01 79 05 e8 ab fd ff ff 5b c3 89 f6 8d bc 27 00 00 00 00 53 89 c3 e8 c8 e0 c1 ff 66 b8 00 01 f0 66 0f c1 03 38 e0 74 0e f3 90 <8a> 03 eb f6 66 83 3b 00 75 f4 eb e5 5b c3 8d 74 26 00 8d bc 27 > >Call Trace: > > [<f8318d8c>] ? tg3_get_stats+0x19c/0x210 [tg3] > > [<f831f5f5>] ? tg3_halt+0x65/0xa0 [tg3] > > [<f8323c6f>] ? tg3_close+0xdf/0x1a0 [tg3] > > [<c0795b3b>] ? dev_close+0x5b/0xb0 > > [<c0793c80>] ? dev_set_rx_mode+0x20/0x40 > > [<c0795667>] ? dev_change_flags+0x87/0x1a0 > > [<c07a0ea8>] ? do_setlink+0x188/0x720 > > [<c060d8c1>] ? nla_parse+0x21/0xd0 > > [<c07a1864>] ? rtnl_newlink+0x424/0x4f0 > > [<c078bb2a>] ? __alloc_skb+0x4a/0x140 > > [<c07a1440>] ? rtnl_newlink+0x0/0x4f0 > > [<c07a0a96>] ? rtnetlink_rcv_msg+0x146/0x230 > > [<c078bb2a>] ? __alloc_skb+0x4a/0x140 > > [<c07a0950>] ? rtnetlink_rcv_msg+0x0/0x230 > > [<c07b695e>] ? netlink_rcv_skb+0x7e/0xa0 > > [<c07a0930>] ? rtnetlink_rcv+0x0/0x20 > > [<c07a0944>] ? rtnetlink_rcv+0x14/0x20 > > [<c07b6650>] ? netlink_unicast+0x250/0x280 > > [<c07b6e2c>] ? netlink_sendmsg+0x1bc/0x2a0 > > [<c0784fe5>] ? sock_sendmsg+0xe5/0x120 > > [<c0476a50>] ? autoremove_wake_function+0x0/0x40 > > [<c04f1e94>] ? __alloc_pages_nodemask+0xf4/0x870 > > [<c0476a50>] ? autoremove_wake_function+0x0/0x40 > > [<c04e0d0d>] ? find_get_page+0x1d/0x90 > > [<c0604f25>] ? copy_from_user+0x35/0x120 > > [<c0604f25>] ? copy_from_user+0x35/0x120 > > [<c078ef62>] ? verify_iovec+0x62/0xb0 > > [<c078680d>] ? __sys_sendmsg+0x2ad/0x2c0 > > [<c043a580>] ? kmap_atomic_prot+0x120/0x150 > > [<c05071c1>] ? handle_mm_fault+0x131/0x1d0 > > [<c04343ba>] ? __do_page_fault+0x1aa/0x430 > > [<c0786989>] ? sys_sendmsg+0x39/0x70 > > [<c0786aba>] ? sys_socketcall+0xfa/0x2e0 > > [<c0841c3a>] ? do_page_fault+0x2a/0x90 > > [<c083efc4>] ? syscall_call+0x7/0xb >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 863033
: 621495