redhat cpu bug解决

来源:本站原创 Linux 超过382 views围观 0条评论

解决方案

yum list  kernel
Loaded plugins: fastestmirror, langpacks
Loading mirror speeds from cached hostfile
* epel: ftp.yzu.edu.tw
Installed Packages
kernel.x86_64                                   3.10.0-862.11.6.el7                                   @CentOS-Updates
Available Packages
kernel.x86_64                                   3.10.0-957.12.1.el7                                   updates       

升级到    3.10.0-957.12.1.el7       

 

yum update         3.10.0-957.12.1.el7          

以下是报错

 

$
Message from syslogd@ at May  7 08:01:54 …
kernel:NMI watchdog: BUG: soft lockup – CPU#1 stuck for 22s! [runc:[1:CHILD]:79506]

Message from syslogd@at May  7 08:02:22 …
kernel:NMI watchdog: BUG: soft lockup – CPU#1 stuck for 22s! [runc:[1:CHILD]:79506]

Message from syslogd@ at May  7 08:02:50 …
kernel:NMI watchdog: BUG: soft lockup – CPU#1 stuck for 22s! [runc:[1:CHILD]:79506]

Message from syslogd@ at May  7 08:03:18 …
kernel:NMI watchdog: BUG: soft lockup – CPU#1 stuck for 22s! [runc:[1:CHILD]:79506]

 

 

[64060.127003] NMI watchdog: BUG: soft lockup – CPU#2 stuck for 22s! [runc:[1:CHILD]:121488]^M

[64060.127003] Modules linked in: ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6_tables veth ipt_REJECT nf_reject_ipv4 xt_set xt_multiport iptable_mangle iptable_raw ip_set_hash_ip ip_set_hash_net ip_set ipip tunnel4 ip_tunnel xt_statistic xt_nat xt_comment xt_mark ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink xt_owner iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_security iptable_filter xt_conntrack nf_nat nf_conntrack br_netfilter bridge stp llc ext4 mbcache jbd2 overlay(T) dm_mirror dm_region_hash dm_log dm_mod mlx4_en sb_edac mlx4_core iosf_mbi crc32_pclmul ghash_clmulni_intel devlink joydev aesni_intel lrw gf128mul glue_helper ablk_helper cryptd sg hv_utils ptp hv_balloon pps_core pci_hyperv i2c_piix4 i2c_core pcspkr ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi hv_storvsc scsi_transport_fc hid_hyperv hyperv_keyboard hv_netvsc scsi_tgt hyperv_fb crct10dif_pclmul crct10dif_common ata_piix crc32c_intel libata serio_raw hv_vmbus floppy^M

[64060.127003] CPU: 2 PID: 121488 Comm: runc:[1:CHILD] Tainted: G             L ———— T 3.10.0-862.11.6.el7.x86_64 #1^M

[64060.127003] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090007  06/02/2017^M

[64060.127003] task: ffff9b517510bf40 ti: ffff9b5553334000 task.ti: ffff9b5553334000^M

[64060.127003] RIP: 0010:[<ffffffff9055f269>]  [<ffffffff9055f269>] __write_lock_failed+0x9/0x20^M

[64060.127003] RSP: 0018:ffff9b5553337cd8  EFLAGS: 00000297^M

[64060.127003] RAX: ffff9b5553337fd8 RBX: ffff9b554dffc300 RCX: 0000000000000000^M

[64060.127003] RDX: ffff9b5553337d5c RSI: 0000000000000001 RDI: ffff9b574ab339bc^M

[64060.127003] RBP: ffff9b5553337cd8 R08: ffff9b5553380600 R09: 000000018040003f^M

[64060.127003] R10: 0000000000000001 R11: ffffd66e554ce000 R12: 0000000000000006^M

[64060.127003] R13: ffff9b554dffc3f0 R14: ffff9b57a2c25100 R15: ffff9b57a28655e8^M

[64060.127003] FS:  00007fd577d7b740(0000) GS:ffff9b57a1680000(0000) knlGS:0000000000000000^M

[64060.127003] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033^M

[64060.127003] CR2: 00007f52ee8cc000 CR3: 000000054e2ce000 CR4: 00000000001406e0^M

[64060.127003] Call Trace:^M

[64060.127003]  [<ffffffff9091b44a>] _raw_write_lock_bh+0x2a/0x30^M

[64060.127003]  [<ffffffff90892dea>] xfrm_policy_flush+0x3a/0x2f0^M

[64060.127003]  [<ffffffff908930f8>] xfrm_policy_fini+0x58/0x180^M

[64060.127003]  [<ffffffff908934c0>] xfrm_net_init+0x240/0x370^M

[64060.127003]  [<ffffffff907e5914>] ops_init+0x44/0x150^M

[64060.127003]  [<ffffffff907e5ac3>] setup_net+0xa3/0x160^M

[64060.127003]  [<ffffffff907e6265>] copy_net_ns+0xb5/0x180^M

[64060.127003]  [<ffffffff902c2fb9>] create_new_namespaces+0xf9/0x180^M

[64060.127003]  [<ffffffff902c31fa>] unshare_nsproxy_namespaces+0x5a/0xc0^M

[64060.127003]  [<ffffffff90293b13>] SyS_unshare+0x173/0x2e0^M

[64060.127003]  [<ffffffff9092579b>] system_call_fastpath+0x22/0x27^M

[64060.127003] Code: 00 00 e9 03 00 00 00 41 ff e7 e8 07 00 00 00 f3 90 0f ae e8 eb f9 4c 89 3c 24 c3 90 90 90 90 90 90 90 55 48 89 e5 f0 ff 07 f3 90 <83> 3f 01 75 f9 f0 ff 0f 75 f1 5d c3 90 66 2e 0f 1f 84 00 00 00 ^M

文章出自:CCIE那点事 http://www.jdccie.com/ 版权所有。本站文章除注明出处外,皆为作者原创文章,可自由引用,但请注明来源。 禁止全文转载。
本文标题:redhat cpu bug解决
本文链接:http://www.jdccie.com/?p=4150转载请注明转自CCIE那点事
如果喜欢:点此订阅本站
  • 相关文章
  • 为您推荐
  • 各种观点

暂时还木有人评论,坐等沙发!
发表评论

您必须 [ 登录 ] 才能发表留言!