This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:

apport-collect 1596866

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1596866

Title:
  NMI watchdog: Watchdog detected hard LOCKUP on cpu 0 - Xenial - Python

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  I am receiving quite regular hardlockups on python (27) in xenial:

  Linux rts-os-s-03 4.4.0-28-generic #47-Ubuntu SMP Fri Jun 24 10:09:13
  UTC 2016 x86_64 x86_64 x86_64 GNU/Linux

  Ubuntu 16.04 LTS \n \l

  Python 27:
  ii  python                               2.7.11-1                            
amd64        interactive high-level object-oriented language (default version)
  ii  python2.7                            2.7.11-7ubuntu1                     
amd64        Interactive high-level object-oriented language (version 2.7)

  Python 3:
  ii  python3                              3.5.1-3                             
amd64        interactive high-level object-oriented language (default python3 
version)

  
  Jun 28 06:52:42 XXXX kernel: [ 1634.052991] NMI watchdog: Watchdog detected 
hard LOCKUP on cpu 0
  Jun 28 06:52:42 XXXX kernel: [ 1634.059516] Modules linked in: iptable_raw 
kvm_intel ebtable_filter ebtables ip6table_filter ip6_tables xt_CHECKSUM 
iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat xt_tcpudp iptable_filter 
ip_tables x_tables veth bridge stp llc bonding dcdbas intel_rapl 
x86_pkg_temp_thermal intel_powerclamp coretemp kvm irqbypass shpchp lpc_ich 
ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp 
libiscsi scsi_transport_iscsi openvswitch nf_defrag_ipv6 nf_conntrack autofs4 
btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx 
xor raid6_pq raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul 
aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd bnx2x ahci 
libahci tg3 megaraid_sas vxlan ip6_udp_tunnel udp_tunnel ptp pps_core mdio 
libcrc32c [last unloaded: kvm_intel]
  Jun 28 06:52:42 XXXX kernel: [ 1634.059790] CPU: 0 PID: 52914 Comm: python 
Not tainted 4.4.0-28-generic #47-Ubuntu
  Jun 28 06:52:42 XXXX kernel: [ 1634.059791] Hardware name: Dell Inc. 
PowerEdge R730/0H21J3, BIOS 1.5.4 10/002/2015
  Jun 28 06:52:42 XXXX kernel: [ 1634.059792]  0000000000000086 
000000002732bfd7 ffff887b254bbbd0 ffffffff813eb1a3
  Jun 28 06:52:42 XXXX kernel: [ 1634.059794]  0000000000000000 
0000000000000000 ffff887b254bbbe8 ffffffff8113b3bd
  Jun 28 06:52:42 XXXX kernel: [ 1634.059796]  ffff887e4da1a000 
ffff887b254bbc20 ffffffff81183e4c 0000000000000001
  Jun 28 06:52:42 XXXX kernel: [ 1634.059797] Call Trace:
  Jun 28 06:52:42 XXXX kernel: [ 1634.059804]  [<ffffffff813eb1a3>] 
dump_stack+0x63/0x90
  Jun 28 06:52:42 XXXX kernel: [ 1634.059807]  [<ffffffff8113b3bd>] 
watchdog_overflow_callback+0xbd/0xd0
  Jun 28 06:52:42 XXXX kernel: [ 1634.059810]  [<ffffffff81183e4c>] 
__perf_event_overflow+0x8c/0x1d0
  Jun 28 06:52:42 XXXX kernel: [ 1634.059811]  [<ffffffff81184a24>] 
perf_event_overflow+0x14/0x20
  Jun 28 06:52:42 XXXX kernel: [ 1634.059814]  [<ffffffff8100c4d1>] 
intel_pmu_handle_irq+0x1e1/0x4a0
  Jun 28 06:52:42 XXXX kernel: [ 1634.059817]  [<ffffffff81197001>] ? 
__alloc_pages_nodemask+0x1b1/0xb60
  Jun 28 06:52:42 XXXX kernel: [ 1634.059821]  [<ffffffff811fc3f4>] ? 
try_charge+0xd4/0x640
  Jun 28 06:52:42 XXXX kernel: [ 1634.059823]  [<ffffffff81200b4b>] ? 
mem_cgroup_try_charge+0x6b/0x1b0
  Jun 28 06:52:42 XXXX kernel: [ 1634.059826]  [<ffffffff8119e667>] ? 
lru_cache_add_active_or_unevictable+0x27/0xa0
  Jun 28 06:52:42 XXXX kernel: [ 1634.059830]  [<ffffffff811bfffa>] ? 
handle_mm_fault+0xcaa/0x1820
  Jun 28 06:52:42 XXXX kernel: [ 1634.059831]  [<ffffffff811c5fbe>] ? 
vma_merge+0x22e/0x330
  Jun 28 06:52:42 XXXX kernel: [ 1634.059834]  [<ffffffff810056dd>] 
perf_event_nmi_handler+0x2d/0x50
  Jun 28 06:52:42 XXXX kernel: [ 1634.059837]  [<ffffffff810323c9>] 
nmi_handle+0x69/0x120
  Jun 28 06:52:42 XXXX kernel: [ 1634.059839]  [<ffffffff81032900>] 
default_do_nmi+0x40/0x100
  Jun 28 06:52:42 XXXX kernel: [ 1634.059841]  [<ffffffff81032aa2>] 
do_nmi+0xe2/0x130
  Jun 28 06:52:42 XXXX kernel: [ 1634.059844]  [<ffffffff81829ac6>] 
nmi+0x56/0xa5


  As suggested, this is causing hard lockups and/or pauses.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1596866/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to