Bug 680181

Summary: [abrt] kernel: BUG: soft lockup - CPU#0 stuck for 282s! [vmtoolsd:1383]
Product: Red Hat Enterprise Linux 6 Reporter: Red Hat Case Diagnostics <case-diagnostics>
Component: kernelAssignee: Red Hat Kernel Manager <kernel-mgr>
Status: CLOSED NOTABUG QA Contact: Red Hat Kernel QE team <kernel-qe>
Severity: medium Docs Contact:
Priority: medium    
Version: 6.0CC: arozansk, bmr, jwest, sassmann, ychavan
Target Milestone: rc   
Target Release: ---   
Hardware: i686   
OS: Unspecified   
Whiteboard: abrt_hash:1305010388
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-10-05 21:32:42 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Attachments:
Description Flags
File: backtrace none

Description Red Hat Case Diagnostics 2011-02-24 15:22:36 UTC
This description generated by Andreas from an ABRT report
architecture: i686
cmdline: not_applicable
component: kernel
executable: kernel
kernel: 2.6.32-71.18.1.el6.i686 #1
package: kernel
reason: BUG: soft lockup - CPU#0 stuck for 282s! [vmtoolsd:1383]
release: Red Hat Enterprise Linux Server release 6.0 (Santiago)
time: 1298560818
uid: 0
backtrace: BUG: soft lockup - CPU#0 stuck for 282s! [vmtoolsd:1383]
Modules linked in: autofs4 sunrpc fcoe libfcoe 8021q libfc garp scsi_transport_fc stp llc scsi_tgt vmblock(U) vsock(U) vmci(U) vmxnet(U) vmmemctl(U) vmhgfs(U) ipt_REJECT nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter ip_tables ip6t_REJECT nf_conntrack_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 dm_mirror dm_region_hash dm_log uinput ppdev parport_pc parport snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm snd_timer snd soundcore snd_page_alloc pcnet32 mii sg i2c_piix4 i2c_core ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif ata_generic pata_acpi ata_piix mptspi mptscsih mptbase scsi_transport_spi dm_mod [last unloaded: vmware_balloon]
Pid: 1383, comm: vmtoolsd Not tainted (2.6.32-71.18.1.el6.i686 #1) VMware Virtual Platform
EIP: 0060:[<c080dfa9>] EFLAGS: 00000296 CPU: 0
EIP is at _spin_unlock_irqrestore+0x9/0x10
EAX: 00000296 EBX: 00000001 ECX: 0000028c EDX: 00000296
ESI: c0a11180 EDI: f6141e4c EBP: 00000000 ESP: f6217d24
DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
CR0: 8005003b CR2: bfaf40c4 CR3: 3631d000 CR4: 000006f0
DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
DR6: ffff0ff0 DR7: 00000400
Call Trace:
[<c0712877>] ? serio_interrupt+0x47/0x80
[<c0713470>] ? i8042_interrupt+0x110/0x360
[<c0519067>] ? __mem_cgroup_try_charge.clone.2+0x57/0x230
[<c04ad635>] ? handle_IRQ_event+0x45/0x140
[<c04b0a01>] ? move_native_irq+0x11/0x50
[<c04af658>] ? handle_edge_irq+0xa8/0x130
[<c040c192>] ? handle_irq+0x32/0x60
[<c040b7c7>] ? do_IRQ+0x47/0xc0
[<c040a0f0>] ? common_interrupt+0x30/0x38
[<c080dfa9>] ? _spin_unlock_irqrestore+0x9/0x10
[<c071344f>] ? i8042_interrupt+0xef/0x360
[<f876a976>] ? pcnet32_interrupt+0xe6/0x190 [pcnet32]
[<c04ad635>] ? handle_IRQ_event+0x45/0x140
[<c04ad635>] ? handle_IRQ_event+0x45/0x140
[<c05e6d70>] ? rb_insert_color+0x80/0x100
[<c04b0a01>] ? move_native_irq+0x11/0x50
[<c04af658>] ? handle_edge_irq+0xa8/0x130
[<c04af75f>] ? handle_fasteoi_irq+0x7f/0xd0
[<c040c192>] ? handle_irq+0x32/0x60
[<c040b7c7>] ? do_IRQ+0x47/0xc0
[<c040a0f0>] ? common_interrupt+0x30/0x38
[<c04571e5>] ? __do_softirq+0x45/0x1b0
[<c045738d>] ? do_softirq+0x3d/0x50
[<c04574e5>] ? irq_exit+0x65/0x70
[<c0425ae4>] ? smp_apic_timer_interrupt+0x54/0x90
[<c040a435>] ? apic_timer_interrupt+0x31/0x38

Comment 1 Red Hat Case Diagnostics 2011-02-24 15:22:57 UTC
Created attachment 480783 [details]
File: backtrace

Comment 8 Jeremy West 2011-10-05 21:32:42 UTC
Closing this bug, since the associated customer case has closed.  Please feel free to re-open this if new information becomes available.