Re: update-grub and then grub-mkconfig leads to the watchdog: BUG: soft lockup
On 3/15/21 9:38 AM, John Paul Adrian Glaubitz wrote: > Hello! > > On 3/15/21 10:34 AM, Anatoly Pugachev wrote: >>> + /usr/sbin/grub-probe --target=device / >>> + GRUB_DEVICE=/dev/sda2 >>> + /usr/sbin/grub-probe --device /dev/sda2 --target=fs_uuid >>> [ 1330.951329] watchdog: BUG: soft lockup - CPU#0 stuck for 22s! >>> [grub-probe:443] >>> [ 1331.046350] Modules linked in: drm(E) drm_panel_orientation_quirks(E) >>> i2c_core(E) sg(E) envctrl(E) display7seg(E) flash(E) fuse(E) configfs(E) >>> ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) >>> crc32c_generic(E) sd_mod(E) t10_pi(E) crc_t10dif(E) st(E) >>> crct10dif_generic(E) crct10dif_common(E) sym53c8xx(E) >>> scsi_transport_spi(E) scsi_mod(E) sunhme(E) >>> [ 1331.475596] CPU: 0 PID: 443 Comm: grub-probe Tainted: GE >>> 5.10.0-4-sparc64 #1 Debian 5.10.19-1 >>> [ 1331.606055] TSTATE: 009911001601 TPC: 00950920 TNPC: >>> 00950924 Y: Tainted: GE >>> [ 1331.753728] TPC: >>> [ 1331.804124] g0: f800065e3140 g1: 1005a830 g2: >>> g3: 0149fa90 >>> [ 1331.918504] g4: f80009bde780 g5: 604a4edc g6: >>> f8000a1ac000 g7: 0fa664c8 >>> [ 1332.032984] o0: 00f2c960 o1: f8000a1af8ec o2: >>> f80004275b50 o3: >>> [ 1332.147464] o4: o5: sp: >>> f8000a1aef81 ret_pc: 00950900 >>> [ 1332.266539] RPC: >>> [ 1332.316950] l0: 00f2c800 l1: l2: >>> 00668200 l3: 00064b73605f >>> [ 1332.431439] l4: 0002 l5: f8000a1af8f0 l6: >>> 00e1a000 l7: 0001 >>> [ 1332.545917] i0: f8000b813d90 i1: f80009bad100 i2: >>> 00f2c800 i3: 00f2c978 >>> [ 1332.660398] i4: 00ec i5: 1005a818 i6: >>> f8000a1af031 i7: 00668e38 >>> [ 1332.774892] I7: >>> [ 1332.826436] Call Trace: >>> [ 1332.858473] [<00668e38>] chrdev_open+0x98/0x1e0 >>> [ 1332.927215] [<0065e430>] do_dentry_open+0x170/0x420 >>> [ 1333.000505] [<00660068>] vfs_open+0x28/0x40 >>> [ 1333.064670] [<00674948>] path_openat+0x988/0x1100 >>> [ 1333.135679] [<006773d0>] do_filp_open+0x50/0x100 >>> [ 1333.205549] [<00660330>] do_sys_openat2+0x70/0x180 >>> [ 1333.277710] [<00660868>] sys_openat+0x48/0xc0 >>> [ 1333.344164] [<00406174>] linux_sparc_syscall+0x34/0x44 >>> ~ >>> Type 'go' to resume >>> ok >> >> >> This kernel OOPS (backtrace) should be reported to sparclinux@ , >> linux-kernel@ (lkml) and linux-fsdevel@ (vfs) linux kernel mailing >> lists. > > It should be verified that this issue is 100% reproducible using the upstream > kernel. If, yes, Dennis should bisect the problem to find which commit intro- > duced the problem. > > Anything else won't really get us any further. > yup. This will take a pile of time. -- Dennis Clarke RISC-V/SPARC/PPC/ARM/CISC UNIX and Linux spoken GreyBeard and suspenders optional
Re: watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [systemd:1]
On Fri, Mar 12, 2021 at 5:27 PM Dennis Clarke wrote: > > > I have seen this for a few months now. The old old netra machine will > run just fine endlessly but if I attempt to perform a package update > then I am always assured to see : > > > ceres# apt-get update > Get:1 http://deb.debian.org/debian-ports sid InRelease [55.3 kB] > Get:2 http://deb.debian.org/debian-ports sid/main sparc64 Packages [21.6 MB] > Get:3 http://deb.debian.org/debian-ports sid/main all Packages [8,682 > kB] > Fetched 30.3 MB in 1min 24s (361 kB/s) > > Reading package lists... Done > ceres# > > Then try "upgrade" and the machine drops off the network : > > Setting up systemd (247.3-1) ... > Timeout, server 172.16.35.61 not responding. Dennis, did you tried to test machine with stress-ng ? There's a lot of tests in it, it could trigger your issue and probably would be easier to hunt down the issue.
Re: update-grub and then grub-mkconfig leads to the watchdog: BUG: soft lockup
Hello! On 3/15/21 10:34 AM, Anatoly Pugachev wrote: >> + /usr/sbin/grub-probe --target=device / >> + GRUB_DEVICE=/dev/sda2 >> + /usr/sbin/grub-probe --device /dev/sda2 --target=fs_uuid >> [ 1330.951329] watchdog: BUG: soft lockup - CPU#0 stuck for 22s! >> [grub-probe:443] >> [ 1331.046350] Modules linked in: drm(E) drm_panel_orientation_quirks(E) >> i2c_core(E) sg(E) envctrl(E) display7seg(E) flash(E) fuse(E) configfs(E) >> ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) >> crc32c_generic(E) sd_mod(E) t10_pi(E) crc_t10dif(E) st(E) >> crct10dif_generic(E) crct10dif_common(E) sym53c8xx(E) >> scsi_transport_spi(E) scsi_mod(E) sunhme(E) >> [ 1331.475596] CPU: 0 PID: 443 Comm: grub-probe Tainted: GE >> 5.10.0-4-sparc64 #1 Debian 5.10.19-1 >> [ 1331.606055] TSTATE: 009911001601 TPC: 00950920 TNPC: >> 00950924 Y: Tainted: GE >> [ 1331.753728] TPC: >> [ 1331.804124] g0: f800065e3140 g1: 1005a830 g2: >> g3: 0149fa90 >> [ 1331.918504] g4: f80009bde780 g5: 604a4edc g6: >> f8000a1ac000 g7: 0fa664c8 >> [ 1332.032984] o0: 00f2c960 o1: f8000a1af8ec o2: >> f80004275b50 o3: >> [ 1332.147464] o4: o5: sp: >> f8000a1aef81 ret_pc: 00950900 >> [ 1332.266539] RPC: >> [ 1332.316950] l0: 00f2c800 l1: l2: >> 00668200 l3: 00064b73605f >> [ 1332.431439] l4: 0002 l5: f8000a1af8f0 l6: >> 00e1a000 l7: 0001 >> [ 1332.545917] i0: f8000b813d90 i1: f80009bad100 i2: >> 00f2c800 i3: 00f2c978 >> [ 1332.660398] i4: 00ec i5: 1005a818 i6: >> f8000a1af031 i7: 00668e38 >> [ 1332.774892] I7: >> [ 1332.826436] Call Trace: >> [ 1332.858473] [<00668e38>] chrdev_open+0x98/0x1e0 >> [ 1332.927215] [<0065e430>] do_dentry_open+0x170/0x420 >> [ 1333.000505] [<00660068>] vfs_open+0x28/0x40 >> [ 1333.064670] [<00674948>] path_openat+0x988/0x1100 >> [ 1333.135679] [<006773d0>] do_filp_open+0x50/0x100 >> [ 1333.205549] [<00660330>] do_sys_openat2+0x70/0x180 >> [ 1333.277710] [<00660868>] sys_openat+0x48/0xc0 >> [ 1333.344164] [<00406174>] linux_sparc_syscall+0x34/0x44 >> ~ >> Type 'go' to resume >> ok > > > This kernel OOPS (backtrace) should be reported to sparclinux@ , > linux-kernel@ (lkml) and linux-fsdevel@ (vfs) linux kernel mailing > lists. It should be verified that this issue is 100% reproducible using the upstream kernel. If, yes, Dennis should bisect the problem to find which commit intro- duced the problem. Anything else won't really get us any further. Adrian -- .''`. John Paul Adrian Glaubitz : :' : Debian Developer - glaub...@debian.org `. `' Freie Universitaet Berlin - glaub...@physik.fu-berlin.de `-GPG: 62FF 8A75 84E0 2956 9546 0006 7426 3B37 F5B5 F913
Re: update-grub and then grub-mkconfig leads to the watchdog: BUG: soft lockup
On Mon, Mar 15, 2021 at 4:59 AM Dennis Clarke wrote: > > > While digging around here I saw that update-grub will lead to a lockup > every time. So I simply changed /usr/sbin/grub-mkconfig script to > allow me to see everything that happens. > > That gets me to : > > /usr/sbin/grub-probe --device /dev/sda2 --target=fs_uuid > > which falls to pieces perfectly : > > root@eros:~# > root@eros:~# uptime > 01:09:40 up 20 min, 2 users, load average: 0.07, 0.14, 0.48 > root@eros:~# /usr/sbin/grub-mkconfig -o /boot/grub/grub.cfg > + prefix=/usr > + exec_prefix=/usr > + datarootdir=/usr/share > + prefix=/usr > + exec_prefix=/usr > + sbindir=/usr/sbin > + bindir=/usr/bin > + sysconfdir=/etc > + PACKAGE_NAME=GRUB > + PACKAGE_VERSION=2.04-16 > + host_os=linux-gnu > + datadir=/usr/share > + [ x = x ] > + pkgdatadir=/usr/share/grub > + export pkgdatadir > + grub_cfg= > + grub_mkconfig_dir=/etc/grub.d > + basename /usr/sbin/grub-mkconfig > + self=grub-mkconfig > + grub_probe=/usr/sbin/grub-probe > + grub_file=/usr/bin/grub-file > + grub_editenv=/usr/bin/grub-editenv > + grub_script_check=/usr/bin/grub-script-check > + export TEXTDOMAIN=grub > + export TEXTDOMAINDIR=/usr/share/locale > + . /usr/share/grub/grub-mkconfig_lib > + prefix=/usr > + exec_prefix=/usr > + datarootdir=/usr/share > + datadir=/usr/share > + bindir=/usr/bin > + sbindir=/usr/sbin > + [ x/usr/share/grub = x ] > + test x/usr/sbin/grub-probe = x > + test x/usr/bin/grub-file = x > + test x = x > + grub_mkrelpath=/usr/bin/grub-mkrelpath > + which gettext > + : > + grub_tab= > + test 2 -gt 0 > + option=-o > + shift > + argument -o /boot/grub/grub.cfg > + opt=-o > + shift > + test 1 -eq 0 > + echo /boot/grub/grub.cfg > + grub_cfg=/boot/grub/grub.cfg > + shift > + test 0 -gt 0 > + [ x = x ] > + id -u > + EUID=0 > + [ 0 != 0 ] > + set /usr/sbin/grub-probe dummy > + test -f /usr/sbin/grub-probe > + : > + /usr/sbin/grub-probe --target=device / > + GRUB_DEVICE=/dev/sda2 > + /usr/sbin/grub-probe --device /dev/sda2 --target=fs_uuid > [ 1330.951329] watchdog: BUG: soft lockup - CPU#0 stuck for 22s! > [grub-probe:443] > [ 1331.046350] Modules linked in: drm(E) drm_panel_orientation_quirks(E) > i2c_core(E) sg(E) envctrl(E) display7seg(E) flash(E) fuse(E) configfs(E) > ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) > crc32c_generic(E) sd_mod(E) t10_pi(E) crc_t10dif(E) st(E) > crct10dif_generic(E) crct10dif_common(E) sym53c8xx(E) > scsi_transport_spi(E) scsi_mod(E) sunhme(E) > [ 1331.475596] CPU: 0 PID: 443 Comm: grub-probe Tainted: GE > 5.10.0-4-sparc64 #1 Debian 5.10.19-1 > [ 1331.606055] TSTATE: 009911001601 TPC: 00950920 TNPC: > 00950924 Y: Tainted: GE > [ 1331.753728] TPC: > [ 1331.804124] g0: f800065e3140 g1: 1005a830 g2: > g3: 0149fa90 > [ 1331.918504] g4: f80009bde780 g5: 604a4edc g6: > f8000a1ac000 g7: 0fa664c8 > [ 1332.032984] o0: 00f2c960 o1: f8000a1af8ec o2: > f80004275b50 o3: > [ 1332.147464] o4: o5: sp: > f8000a1aef81 ret_pc: 00950900 > [ 1332.266539] RPC: > [ 1332.316950] l0: 00f2c800 l1: l2: > 00668200 l3: 00064b73605f > [ 1332.431439] l4: 0002 l5: f8000a1af8f0 l6: > 00e1a000 l7: 0001 > [ 1332.545917] i0: f8000b813d90 i1: f80009bad100 i2: > 00f2c800 i3: 00f2c978 > [ 1332.660398] i4: 00ec i5: 1005a818 i6: > f8000a1af031 i7: 00668e38 > [ 1332.774892] I7: > [ 1332.826436] Call Trace: > [ 1332.858473] [<00668e38>] chrdev_open+0x98/0x1e0 > [ 1332.927215] [<0065e430>] do_dentry_open+0x170/0x420 > [ 1333.000505] [<00660068>] vfs_open+0x28/0x40 > [ 1333.064670] [<00674948>] path_openat+0x988/0x1100 > [ 1333.135679] [<006773d0>] do_filp_open+0x50/0x100 > [ 1333.205549] [<00660330>] do_sys_openat2+0x70/0x180 > [ 1333.277710] [<00660868>] sys_openat+0x48/0xc0 > [ 1333.344164] [<00406174>] linux_sparc_syscall+0x34/0x44 > ~ > Type 'go' to resume > ok This kernel OOPS (backtrace) should be reported to sparclinux@ , linux-kernel@ (lkml) and linux-fsdevel@ (vfs) linux kernel mailing lists. Thanks.