Messages file flooded with logs "BUG: soft lockup - CPU#X stuck for 10s! [hald-addon-stor:xxxx]"

Solution Verified - Updated -

Issue

  • System hang with the following soft lockup messages in the logs:
Jan  7 18:31:23 xxx kernel: BUG: soft lockup - CPU#0 stuck for 10s! [hald-addon-stor:6293]
Jan  7 18:31:23 xxx kernel: 
Jan  7 18:31:23 xxx kernel: Pid: 6293, comm:      hald-addon-stor
Jan  7 18:31:23 xxx kernel: EIP: 0060:[<c060f128>] CPU: 0
Jan  7 18:31:23 xxx kernel: EIP is at _spin_unlock_irqrestore+0x8/0x9
Jan  7 18:31:23 xxx kernel:  EFLAGS: 00000286    Not tainted  (2.6.18-128.el5PAE #1)
Jan  7 18:31:23 xxx kernel: EAX: c06eca00 EBX: cfa08a8c ECX: 00000286 EDX: 00000200
Jan  7 18:31:23 xxx kernel: ESI: c07d0c14 EDI: 00000001 EBP: 00000000 DS: 007b ES: 007b
Jan  7 18:31:23 xxx kernel: CR0: 8005003b CR2: ae858004 CR3: 372f53c0 CR4: 000006f0
Jan  7 18:31:23 xxx kernel:  [<c05669e8>] ide_end_request+0xcc/0xd4
Jan  7 18:31:23 xxx kernel:  [<c0566a09>] ide_kill_rq+0x19/0x29
Jan  7 18:31:23 xxx kernel:  [<c056705d>] ide_do_request+0x644/0x6c3
Jan  7 18:31:23 xxx kernel:  [<c042c2e4>] lock_timer_base+0x15/0x2f
Jan  7 18:31:23 xxx kernel:  [<c042c79f>] del_timer+0x41/0x47
Jan  7 18:31:23 xxx kernel:  [<c04d7fab>] elv_insert+0xc8/0x1ad
Jan  7 18:31:23 xxx kernel:  [<c04dacbb>] blk_execute_rq_nowait+0x6d/0x84
Jan  7 18:31:23 xxx kernel:  [<c04dad48>] blk_execute_rq+0x76/0x97
Jan  7 18:31:23 xxx kernel:  [<c04da354>] blk_end_sync_rq+0x0/0x1d
Jan  7 18:31:23 xxx kernel:  [<c04765ce>] bio_copy_user+0xcf/0x1fe
Jan  7 18:31:23 xxx kernel:  [<c04de5b0>] sg_io+0x253/0x338
Jan  7 18:31:23 xxx kernel:  [<c04deadf>] scsi_cmd_ioctl+0x1b9/0x366
Jan  7 18:31:23 xxx kernel:  [<f88f8ca3>] cdrom_ioctl+0x22/0xb35 [cdrom]
Jan  7 18:31:23 xxx kernel:  [<f89a5f71>] idecd_ioctl+0x12f/0x144 [ide_cd]
Jan  7 18:31:23 xxx kernel:  [<c041ce0d>] __wake_up_common+0x2f/0x53
Jan  7 18:31:23 xxx kernel:  [<c041ce42>] __wake_up_locked+0x11/0x15
Jan  7 18:31:23 xxx kernel:  [<c060efd1>] __down+0x85/0xbb
Jan  7 18:31:23 xxx kernel:  [<c04dca83>] blkdev_driver_ioctl+0x4b/0x5b
Jan  7 18:31:23 xxx kernel:  [<c04dd0aa>] blkdev_ioctl+0x617/0x665
Jan  7 18:31:23 xxx kernel:  [<c04e562a>] kobject_get+0xf/0x13
Jan  7 18:31:23 xxx kernel:  [<c04dd5ed>] get_disk+0x35/0x6e
Jan  7 18:31:23 xxx kernel:  [<c04dd62d>] exact_lock+0x7/0xd
Jan  7 18:31:23 xxx kernel:  [<c055414d>] kobj_lookup+0x10d/0x168
Jan  7 18:31:23 xxx kernel:  [<f89a6031>] idecd_open+0x7b/0xa8 [ide_cd]
Jan  7 18:31:23 xxx kernel:  [<c047813f>] do_open+0x211/0x2cc
Jan  7 18:31:23 xxx kernel:  [<c04776a7>] bd_claim+0x10/0x59
Jan  7 18:31:23 xxx kernel:  [<c0478397>] blkdev_open+0x31/0x44
Jan  7 18:31:23 xxx kernel:  [<c046fc36>] __dentry_open+0xea/0x1ab
Jan  7 18:31:23 xxx kernel:  [<c046fd5b>] nameidata_to_filp+0x19/0x28
Jan  7 18:31:23 xxx kernel:  [<c046fd95>] do_filp_open+0x2b/0x31
Jan  7 18:31:23 xxx kernel:  [<c04778cc>] block_ioctl+0x13/0x16
Jan  7 18:31:23 xxx kernel:  [<c04778b9>] block_ioctl+0x0/0x16
Jan  7 18:31:23 xxx kernel:  [<c0480dfc>] do_ioctl+0x1c/0x5d
Jan  7 18:31:23 xxx kernel:  [<c0481087>] vfs_ioctl+0x24a/0x25c
Jan  7 18:31:23 xxx kernel:  [<c04810e1>] sys_ioctl+0x48/0x5f
Jan  7 18:31:23 xxx kernel:  [<c0404f17>] syscall_call+0x7/0xb

Environment

  • Red Hat Enterprise Linux 5
  • IBM System

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content