| Summary: | switch cgroup cause guest soft lockup | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Suqin Huang <shuang> | ||||
| Component: | kernel | Assignee: | Vivek Goyal <vgoyal> | ||||
| Status: | CLOSED DEFERRED | QA Contact: | Red Hat Kernel QE team <kernel-qe> | ||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | 6.2 | CC: | esandeen, juzhang, michen | ||||
| Target Milestone: | rc | ||||||
| Target Release: | --- | ||||||
| Hardware: | Unspecified | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2016-07-19 17:59:30 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Bug Depends On: | |||||||
| Bug Blocks: | 846704 | ||||||
| Attachments: |
|
||||||
|
Description
Suqin Huang
2011-07-27 10:16:06 UTC
Created attachment 515463 [details]
call trace
Squin, Is this issue reproducible? I can't seem to reproduce it. Also CCing Eric Sandeen if he has an insight from ext4 point of view that what happened here. To me soft lockup would mean that interrupts were enabled on the cpu but a single thread was monopolizing the cpu for long time and not giving up cpu. If that's true, then it could have something to do with ext4 too. I am not sure. Eric, might have some thoughts on this. Since RHEL 6.2 External Beta has begun, and this bug remains unresolved, it has been rejected as it is not proposed as exception or blocker. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. can not reproduce it, get diff call trace Call Trace: [<ffffffff8105dc32>] ? default_wake_function+0x12/0x20 [<ffffffffa00800dd>] do_get_write_access+0x29d/0x520 [jbd2] [<ffffffff8108e1c0>] ? wake_bit_function+0x0/0x50 [<ffffffffa00804b1>] jbd2_journal_get_write_access+0x31/0x50 [jbd2] [<ffffffffa00d4318>] __ext4_journal_get_write_access+0x38/0x80 [ext4] [<ffffffffa00b0863>] ext4_reserve_inode_write+0x73/0xa0 [ext4] [<ffffffffa00b08dc>] ext4_mark_inode_dirty+0x4c/0x1d0 [ext4] [<ffffffffa00b0bd0>] ext4_dirty_inode+0x40/0x60 [ext4] [<ffffffff8119b67b>] __mark_inode_dirty+0x3b/0x160 [<ffffffff8118bf82>] file_update_time+0xf2/0x170 [<ffffffff8117c4c2>] pipe_write+0x2d2/0x650 [<ffffffff811724fa>] do_sync_write+0xfa/0x140 [<ffffffff8108e180>] ? autoremove_wake_function+0x0/0x40 [<ffffffff81211d5b>] ? selinux_file_permission+0xfb/0x150 [<ffffffff812051c6>] ? security_file_permission+0x16/0x20 [<ffffffff811727f8>] vfs_write+0xb8/0x1a0 [<ffffffff810d1b52>] ? audit_syscall_entry+0x272/0x2a0 [<ffffffff81173231>] sys_write+0x51/0x90 [<ffffffff8100b172>] system_call_fastpath+0x16/0x1b INFO: task pickup:1649 blocked for more than 120 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. pickup D 0000000000000000 0 1649 1642 0x00000080 ffff88007b553a68 0000000000000082 0000000000000000 ffff880078e055b8 ffff88007b553a28 0000000000000096 0000000000000000 000000010003044c ffff8800379de638 ffff88007b553fd8 000000000000f598 ffff8800379de638 Call Trace: [<ffffffffa00800dd>] do_get_write_access+0x29d/0x520 [jbd2] [<ffffffff8108e1c0>] ? wake_bit_function+0x0/0x50 [<ffffffffa00804b1>] jbd2_journal_get_write_access+0x31/0x50 [jbd2] [<ffffffffa00d4318>] __ext4_journal_get_write_access+0x38/0x80 [ext4] [<ffffffffa00b0863>] ext4_reserve_inode_write+0x73/0xa0 [ext4] [<ffffffffa00b08dc>] ext4_mark_inode_dirty+0x4c/0x1d0 [ext4] [<ffffffff811b461b>] ? ep_poll_callback+0xbb/0xf0 [<ffffffffa00b0bd0>] ext4_dirty_inode+0x40/0x60 [ext4] [<ffffffff8119b67b>] __mark_inode_dirty+0x3b/0x160 [<ffffffff8118c12d>] touch_atime+0x12d/0x170 [<ffffffff8117cb15>] pipe_read+0x2d5/0x4e0 [<ffffffff8117263a>] do_sync_read+0xfa/0x140 [<ffffffff8108e180>] ? autoremove_wake_function+0x0/0x40 [<ffffffff81211d1f>] ? selinux_file_permission+0xbf/0x150 [<ffffffff812051c6>] ? security_file_permission+0x16/0x20 [<ffffffff81173065>] vfs_read+0xb5/0x1a0 [<ffffffff810d1b52>] ? audit_syscall_entry+0x272/0x2a0 [<ffffffff811731a1>] sys_read+0x51/0x90 [<ffffffff8100b172>] system_call_fastpath+0x16/0x1b |