It seems we have the same problem with latest LTS kernel

# uname -a
Linux dc01ram1rls 4.4.0-18-generic #34~14.04.1-Ubuntu SMP Thu Apr 7 18:31:54 
UTC 2016 x86_64 x86_64 x86_64 GNU/Linux

# lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:    Ubuntu 14.04.4 LTS
Release:        14.04
Codename:       trusty

The kernel was installed with 
# apt-get install --install-recommends linux-generic-lts-xenial

Errors in /var/log/kern.log look like:

Apr 24 03:31:58 dc01ram1rls kernel: [280174.661115] NMI watchdog: BUG: soft 
lockup - CPU#4 stuck for 22s! [rsync:10
4799]
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669494] Modules linked in: 
ip6table_filter ip6_tables iptable_filter ip
_tables ebtable_nat ebtables x_tables 8021q garp mrp bridge stp llc dm_crypt 
intel_rapl ipmi_ssif x86_pkg_temp_ther
mal intel_powerclamp ipmi_devintf coretemp kvm_intel kvm irqbypass 
crct10dif_pclmul crc32_pclmul aesni_intel aes_x8
6_64 lrw gf128mul glue_helper ablk_helper sb_edac cryptd dcdbas edac_core 
input_leds mei_me lpc_ich mei ipmi_si 825
0_fintek shpchp ipmi_msghandler acpi_power_meter mac_hid parport_pc ppdev lp 
parport igb dca ptp hid_generic usbhid
 uas hid usb_storage ahci pps_core megaraid_sas i2c_algo_bit libahci wmi fjes
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669522] CPU: 4 PID: 104799 Comm: 
rsync Not tainted 4.4.0-18-generic #34
~14.04.1-Ubuntu
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669523] Hardware name: Dell Inc. 
PowerEdge T630/0W9WXC, BIOS 1.3.6 06/0
8/2015
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669525] task: ffff88041ebea940 ti: 
ffff880402580000 task.ti: ffff880402
580000
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669526] RIP: 
0010:[<ffffffff810c4e50>]  [<ffffffff810c4e50>] native_que
ued_spin_lock_slowpath+0x160/0x170
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669531] RSP: 0018:ffff8804025839f8  
EFLAGS: 00000202
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669532] RAX: 0000000000000101 RBX: 
0000000000000000 RCX: 00000000000000
01
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669533] RDX: 0000000000000101 RSI: 
0000000000000001 RDI: ffffffff81fce3
20
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669533] RBP: ffff8804025839f8 R08: 
0000000000000101 R09: ffff880f9da4b7
a4
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669534] R10: ffff880855937000 R11: 
000000000000008c R12: 00000000000000
00
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669535] R13: ffff880f9e2799f0 R14: 
ffff880f9e2799c0 R15: 00000000000000
00
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669536] FS:  00007f0980b0b740(0000) 
GS:ffff88085ec80000(0000) knlGS:000
0000000000000
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669537] CS:  0010 DS: 0000 ES: 0000 
CR0: 0000000080050033
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669538] CR2: 0000000002c0dd08 CR3: 
0000000405421000 CR4: 00000000001426
e0
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669539] Stack:
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669539]  ffff880402583a08 
ffffffff81180407 ffff880402583a18 ffffffff817
ee550
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669541]  ffff880402583a80 
ffffffff8125ad4a 0000000000000000 ffff8804025
83a68
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669542]  ffffffff812332ab 
ffff880f9c044140 ffff880f9e2761a0 ffff8804025
83a70
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669544] Call Trace:
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669547]  [<ffffffff81180407>] 
queued_spin_lock_slowpath+0xb/0xf
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669550]  [<ffffffff817ee550>] 
_raw_spin_lock+0x20/0x30
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669552]  [<ffffffff8125ad4a>] 
mb_cache_entry_get+0x1aa/0x220
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669555]  [<ffffffff812332ab>] ? 
__getblk_gfp+0x2b/0x60
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669557]  [<ffffffff812c8efc>] 
ext4_xattr_block_set+0x7c/0x9d0
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669559]  [<ffffffff812c84e4>] ? 
ext4_xattr_set_entry+0x34/0x340
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669560]  [<ffffffff812ca3e2>] 
ext4_xattr_set_handle+0x2f2/0x420
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669562]  [<ffffffff812cf6d0>] 
__ext4_set_acl+0x280/0x320
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669564]  [<ffffffff812cfb42>] 
ext4_set_acl+0xd2/0x110
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669565]  [<ffffffff8125c0ad>] ? 
posix_acl_from_xattr+0x11d/0x170
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669567]  [<ffffffff8125c1b7>] 
posix_acl_xattr_set+0xb7/0x150
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669569]  [<ffffffff81221321>] 
generic_setxattr+0x61/0x80
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669570]  [<ffffffff81221e01>] 
__vfs_setxattr_noperm+0x61/0x1a0
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669573]  [<ffffffff81326c9d>] ? 
security_inode_setxattr+0xbd/0xd0
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669575]  [<ffffffff81221fe7>] 
vfs_setxattr+0xa7/0xb0
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669576]  [<ffffffff81222124>] 
setxattr+0x134/0x1c0
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669579]  [<ffffffff811db97f>] ? 
kmem_cache_alloc+0x19f/0x200
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669582]  [<ffffffff8120c1af>] ? 
getname_flags+0x4f/0x1f0
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669583]  [<ffffffff810c46ff>] ? 
percpu_down_read+0x1f/0x50
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669584]  [<ffffffff8122223c>] 
path_setxattr+0x8c/0xc0
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669586]  [<ffffffff812222f4>] 
SyS_setxattr+0x14/0x20
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669587]  [<ffffffff817ee8f6>] 
entry_SYSCALL_64_fastpath+0x16/0x75
Apr 24 03:31:58 dc01ram1rls kernel: [280174.669588] Code: 8b 01 48 85 c0 75 0a 
f3 90 48 8b 01 48 85 c0 74 f6 c7 40 08 01 00 00 00 e9 61 ff ff ff 83 fa 01 75 
07 e9 c2 fe ff ff f3 90 8b 07 <84> c0 75 f8 b8 01 00 00 00 66 89 07 5d c3 66 90 
0f 1f 44 00 00

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1483343

Title:
  NMI watchdog: BUG: soft lockup errors when we execute lock_torture_wr
  tests

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1483343/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to