[4.12-rc3][smp] smp_call_function_many() - CPU soft lockup
From: Shawn Starr
Date: Tue Jun 06 2017 - 12:40:27 EST
Hello Kernel devs,
I was just about to open a VM with virt-manager and then kernel locked
up CPUs.
Will try -rc4 and see if this got fixed in the churn.
Thanks,
Shawn
Stack below:
[33970.295966] NMI watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [libvirtd:1043]
[33970.295969] Modules linked in: vhost_net vhost tap tun ebtable_filterebtables ip6table_filter ip6_tables bridge stp llc toshiba_acpi
industrialio toshiba_haps hp_accel lis3lv02d input_polldev sunrpc
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvmarc4 uvcvideo videobuf2_vmalloc irqbypass iwlmvm snd_usb_audio
videobuf2_memops videobuf2_v4l2 crct10dif_pclmul videobuf2_core crc32_pclmul snd_soc_rt5640 ghash_clmulni_intel snd_soc_rl6231
snd_usbmidi_lib videodev snd_hda_codec_realtek intel_cstate snd_rawmidi
snd_soc_core snd_compress media iTCO_wdt mei_wdt mac80211 snd_pcm_dmaengine intel_uncore snd_hda_codec_generic ppdev dell_laptop
ac97_bus iTCO_vendor_support snd_hda_codec_hdmi dell_wmi snd_hda_intel
intel_rapl_perf snd_hda_codec vfat snd_hda_core dell_smbios dcdbas snd_hwdep
[33970.295992] sparse_keymap dell_smm_hwmon snd_seq fat snd_seq_device snd_pcm snd_timer iwlwifi joydev cfg80211 pcspkr parport_pc mei_me snd
elan_i2c snd_soc_sst_acpi i2c_designware_platform dw_dmac
spi_pxa2xx_platform parport video snd_soc_sst_match lpc_ich shpchp mei dell_rbtn rfkill i2c_i801 i2c_designware_core ie31200_edac soundcore
8250_pci tpm_tis tpm_tis_core tpm dell_smo8800 wmi binfmt_misc amdkfd amd_iommu_v2 amdgpu i2c_algo_bit drm_kms_helper ttm drm netconsole
sdhci_pci sdhci_acpi sdhci crc32c_intel mmc_core serio_raw i2c_hid
e1000e ptp pps_core
[33970.296013] CPU: 0 PID: 1043 Comm: libvirtd Not tainted 4.12.0-rc3+ #1
[33970.296014] Hardware name: Dell Inc. Precision M6800/05NG6V, BIOS A19 05/14/2017
[33970.296015] task: ffff96c6f7c8ac80 task.stack: ffffb16c4815c000
[33970.296017] RIP: 0010:smp_call_function_many+0x1c9/0x220
[33970.296018] RSP: 0018:ffffb16c4815fc20 EFLAGS: 00000202 ORIG_RAX:ffffffffffffff10
[33970.296019] RAX: 0000000000000003 RBX: 0000000000000008 RCX:0000000000000007
[33970.296020] RDX: ffff96c72dddcd38 RSI: 0000000000000000 RDI:ffff96c70d021ae0
[33970.296021] RBP: ffffb16c4815fc58 R08: ffffffffffffff80 R09:00000000000000fe
[33970.296021] R10: ffffeee51fdd7880 R11: ffff96c70cc02dc8 R12:ffffffffae025b90
[33970.296022] R13: 0000000000000000 R14: ffff96c72dc19dc0 R15:0000000000019d80
[33970.296023] FS: 00007f6a70200700(0000) GS:ffff96c72dc00000(0000) knlGS:0000000000000000
[33970.296024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[33970.296024] CR2: 000055e31fbbcb60 CR3: 00000007f7c30000 CR4:00000000001406b0
[33970.296025] Call Trace:
[33970.296029] ? ___slab_alloc+0x34b/0x4e0
[33970.296031] ? setup_data_read+0xa0/0xa0
[33970.296032] ? ___slab_alloc+0x34c/0x4e0
[33970.296033] on_each_cpu+0x28/0x60
[33970.296035] ? ___slab_alloc+0x34b/0x4e0
[33970.296036] text_poke_bp+0x8f/0xe0
[33970.296037] ? ___slab_alloc+0x34b/0x4e0
[33970.296039] arch_jump_label_transform+0x96/0x110
[33970.296041] __jump_label_update+0x72/0x80
[33970.296042] jump_label_update+0x54/0xb0
[33970.296044] static_key_slow_inc+0x86/0x90
[33970.296045] cpuset_css_online+0x62/0x450
[33970.296046] online_css+0x1a/0x60
[33970.296048] cgroup_apply_control_enable+0x212/0x350
[33970.296049] cgroup_mkdir+0x2da/0x310
[33970.296052] kernfs_iop_mkdir+0x55/0x90
[33970.296053] vfs_mkdir+0x10a/0x1b0
[33970.296055] SyS_mkdir+0x75/0xf0
[33970.296057] entry_SYSCALL_64_fastpath+0x1a/0xa5
[33970.296058] RIP: 0033:0x7f6a7eab0947
[33970.296059] RSP: 002b:00007f6a701ff4c8 EFLAGS: 00000202 ORIG_RAX:0000000000000053
[33970.296060] RAX: ffffffffffffffda RBX: 00007f6a44012d20 RCX:00007f6a7eab0947
[33970.296060] RDX: 00007f6a701ff3e0 RSI: 00000000000001ed RDI:00007f6a44012cd0
[33970.296061] RBP: 00007f6a7ed763c0 R08: 00007f6a828ae270 R09:00007f6a828acc25
[33970.296062] R10: 00007f6a44012cd0 R11: 0000000000000202 R12:0000000000000000
[33970.296062] R13: 000000000000000b R14: 00007f6a701ff092 R15:0000000000000000
[33970.296063] Code: ae 55 28 00 3b 05 6c aa ca 00 89 c1 0f 8d bb fe ff
ff 48 98 49 8b 16 48 03 14 c5 e0 33 ac ae 8b 42 18 a8 01 74 09 f3 90 8b
42 18 <a8> 01 75 f7 eb be 0f b6 4d d0 4c 89 ea 4c 89 e6 44 89 f7 e8 7f
[spstarr@segfault ~]$
Message from syslogd@segfault at Jun 6 12:34:57 ...
kernel:[33974.355754] NMI watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [chrome:12357]
Message from syslogd@segfault at Jun 6 12:35:21 ...
kernel:[33998.294502] NMI watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [libvirtd:1043]
Message from syslogd@segfault at Jun 6 12:35:25 ...
kernel:[34002.354290] NMI watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [chrome:12357]
Message from syslogd@segfault at Jun 6 12:35:53 ...
kernel:[34030.292830] NMI watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [libvirtd:1043]
Message from syslogd@segfault at Jun 6 12:35:53 ...
kernel:[34030.352826] NMI watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [chrome:12357]
[spstarr@segfault ~]$ uname -a
Linux segfault.sh0n.net 4.12.0-rc3+ #1 SMP Fri Jun 2 18:48:08 EDT 2017
x86_64 x86_64 x86_64 GNU/Linux
[spstarr@segfault ~]$
Message from syslogd@segfault at Jun 6 12:36:21 ...
kernel:[34058.291368] NMI watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [libvirtd:1043]
Message from syslogd@segfault at Jun 6 12:36:21 ...
kernel:[34058.351364] NMI watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [chrome:12357]
Message from syslogd@segfault at Jun 6 12:36:49 ...
kernel:[34086.289907] NMI watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [libvirtd:1043]
Message from syslogd@segfault at Jun 6 12:36:49 ...
kernel:[34086.349903] NMI watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [chrome:12357]