Interpreting call trace

2011-04-06 Thread Daniel Baluta
Hello, I have the following stack trace: [3992.172/0] BUG: soft lockup - CPU#0 stuck for 61s! [events/0:39] [ 3992.215/0] Pid: 39, comm: events/0 Tainted: PW 2.6.32 #1 X8DTT-H [ 3992.222/0] RIP: 0010:[8115f989] [8115f989] __write_lock_failed+0x9/0x20 [ 3992.231/0] RSP:

Re: Interpreting call trace

2011-04-06 Thread Michael Blizek
Hi! On 15:56 Wed 06 Apr , Daniel Baluta wrote: ... For example having: [ 3992.316/0] [81297751] ? neigh_create+0x2f1/0x6b0 [ 3992.321/0] [81374f00] ? _read_unlock_bh+0x10/0x20 means that _read_unlock_bh has been called finished ? Or it has been interrupted by next

Re: Interpreting call trace

2011-04-06 Thread Mulyadi Santosa
Hi Daniel... On Wed, Apr 6, 2011 at 19:56, Daniel Baluta daniel.bal...@gmail.com wrote: Hello, I have the following stack trace: [3992.172/0] BUG: soft lockup - CPU#0 stuck for 61s! [events/0:39] alright, so we see soft lockup here so that means your machine is not entirely frozen,