The following kernel stack was captured on a system in "fork() hangs" state via "echo t > /proc/sysrq-trigger". The code for libctest is here: https://gist.github.com/2d2b78987ea451c2edd6
<6>[853486.204130] libctest R running task 0 13658 1417 0x00000000 <4>[853486.204132] ffffffff00000000 0000000000000000 ffff88088b03a980 ffff8800e3489ea8 <4>[853486.204134] ffffffff810909f7 ffff88088b03aa48 ffff88088b03a980 ffff8800e3489ec8 <4>[853486.204137] ffffffff81109f04 ffff880889a27c80 0000000000008002 ffff8804d4470680 <4>[853486.204139] Call Trace: <4>[853486.204141] [<ffffffff810909f7>] ? __call_rcu+0x77/0x1c0 <4>[853486.204143] [<ffffffff81109f04>] ? mntput_no_expire+0x24/0x110 <4>[853486.204145] [<ffffffff811078ab>] ? alloc_fd+0x4b/0x160 <4>[853486.204148] [<ffffffff810f79f0>] ? putname+0x30/0x50 <4>[853486.204150] [<ffffffff810eb526>] ? do_sys_open+0x106/0x160 <4>[853486.204152] [<ffffffff810eb5ab>] ? sys_open+0x1b/0x20 <4>[853486.204154] [<ffffffff81009ba8>] ? system_call_fastpath+0x16/0x1b <4>[853486.204157] [<ffffffff81009b40>] ? system_call+0x0/0x52 <4>[853486.204159] [<ffffffff81009b40>] ? system_call+0x0/0x52 -- You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. https://bugs.launchpad.net/bugs/708920 Title: Strange 'fork/clone' blocking behavior under high cpu usage on EC2 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs