Hide Forgot
This description generated by Andreas from an ABRT report architecture: x86_64 cmdline: not_applicable component: kernel executable: kernel kernel: 2.6.32-131.4.1.el6.x86_64 package: kernel reason: BUG: soft lockup - CPU#0 stuck for 67s! [java:20189] release: Red Hat Enterprise Linux Server release 6.1 (Santiago) reproduce: 1.unknown 2. 3. time: 1310490414 uid: 0 backtrace: BUG: soft lockup - CPU#0 stuck for 67s! [java:20189] Modules linked in: fuse nfsd lockd nfs_acl auth_rpcgss exportfs autofs4 sunrpc ipv6 dm_mirror dm_region_hash dm_log uinput microcode virtio_balloon snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer snd soundcore snd_page_alloc virtio_net i2c_piix4 i2c_core ext4 mbcache jbd2 virtio_blk virtio_pci virtio_ring virtio pata_acpi ata_generic ata_piix dm_mod [last unloaded: speedstep_lib] CPU 0: Modules linked in: fuse nfsd lockd nfs_acl auth_rpcgss exportfs autofs4 sunrpc ipv6 dm_mirror dm_region_hash dm_log uinput microcode virtio_balloon snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer snd soundcore snd_page_alloc virtio_net i2c_piix4 i2c_core ext4 mbcache jbd2 virtio_blk virtio_pci virtio_ring virtio pata_acpi ata_generic ata_piix dm_mod [last unloaded: speedstep_lib] Pid: 20189, comm: java Not tainted 2.6.32-131.4.1.el6.x86_64 #1 KVM RIP: 0010:[<ffffffff8104671a>] [<ffffffff8104671a>] flush_tlb_others_ipi+0x11a/0x130 RSP: 0018:ffff88027782fd68 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffff88027782fda8 RCX: 0000000000000004 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff81d51418 RBP: ffffffff8100bc8e R08: 0000000000000000 R09: 0000000000000008 R10: 0000000000000000 R11: 0000000000000206 R12: ffff88027782fda8 R13: ffffffff8100bc8e R14: ffff880270647ed0 R15: ffff8803cbb2b748 FS: 00007f1ea53d6700(0000) GS:ffff880028200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b CR2: 00007f22ffb9c000 CR3: 00000002d7c0a000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: [<ffffffff81046728>] ? flush_tlb_others_ipi+0x128/0x130 [<ffffffff810467a6>] ? native_flush_tlb_others+0x76/0x90 [<ffffffff8104697c>] ? flush_tlb_mm+0x5c/0xa0 [<ffffffff8113e809>] ? mprotect_fixup+0x619/0x760 [<ffffffff8113ead5>] ? sys_mprotect+0x185/0x250 [<ffffffff8100b172>] ? system_call_fastpath+0x16/0x1b
Created attachment 512478 [details] File: backtrace
Closing this bug, since the associated customer case has closed. Please feel free to re-open this if new information becomes available.