From mboxrd@z Thu Jan 1 00:00:00 1970 From: Sebastian Andrzej Siewior Subject: Re: 3.12.9-rt13: BUG: soft lockup Date: Fri, 7 Mar 2014 14:13:41 +0100 Message-ID: <20140307131341.GC8637@linutronix.de> References: <52FBF2F1.8040504@localhost> <52FD4D89.2000207@localhost> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Cc: Thomas Gleixner , linux-rt-users , Steven Rostedt , John Kacur , LKML To: Fernando Lopez-Lezcano Return-path: Received: from www.linutronix.de ([62.245.132.108]:37439 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752099AbaCGNNt (ORCPT ); Fri, 7 Mar 2014 08:13:49 -0500 Content-Disposition: inline In-Reply-To: <52FD4D89.2000207@localhost> Sender: linux-rt-users-owner@vger.kernel.org List-ID: * Fernando Lopez-Lezcano | 2014-02-13 14:56:09 [-0800]: >On 02/13/2014 02:25 PM, Thomas Gleixner wrote: >>On Wed, 12 Feb 2014, Fernando Lopez-Lezcano wrote: >>>[771508.546449] RIP: 0010:[] [] >>>smp_call_function_many+0x2ca/0x330 >> >>Can you decode the exact location inside of smp_call_function_many via >>addr2line please ? > >Hope this is useful (adding 0x2ce/0x330 as offsets does not make any >difference, don't know if it should)... ffffffff810dc60a is the location where the CPU is atm. The address of smp_call_function_many() + 0x2ca should give the same value. 0x330 says that the function is 0x330 bytes in size. that means, if you do the math, you learn that smp_call_function_many() starts at 0xffffffff810dc340 and ends at 0xffffffff810dc66f. Sebastian