I'm getting weird soft lockups while reading smaps on loaded systems with
some background cgroups usage. This issue can be reproduced with the most
recent kernel.

Here's the stack trace:
[ 1748.312052] BUG: soft lockup - CPU#6 stuck for 23s! [python2.7:1857]
[ 1748.312052] Modules linked in: xfs xt_addrtype xt_conntrack
iptable_filter ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4
nf_nat_ipv4 nf_nat nf_conntrack ip_tables x_tables bridge stp llc
dm_thin_pool dm_persistent_data dm_bio_prison dm_bufio libcrc32c nfsd
auth_rpcgss nfs_acl nfs lockd sunrpc fscache dm_crypt psmouse serio_raw
ppdev parport_pc i2c_piix4 parport xen_fbfront fb_sys_fops syscopyarea
sysfillrect sysimgblt mac_hid isofs raid10 raid456 async_memcpy
async_raid6_recov async_pq async_xor async_tx xor raid6_pq raid1 raid0
multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd floppy
[ 1748.312052] CPU: 6 PID: 1857 Comm: python2.7 Not tainted
3.15.5-031505-generic #201407091543
[ 1748.312052] Hardware name: Xen HVM domU, BIOS 4.2.amazon 01/24/2014
[ 1748.312052] task: ffff8800eab41930 ti: ffff8803b9a94000 task.ti:
ffff8803b9a94000
[ 1748.312052] RIP: 0010:[<ffffffff81013111>]  [<ffffffff81013111>]
KSTK_ESP+0x11/0x40
[ 1748.312052] RSP: 0018:ffff8803b9a97c68  EFLAGS: 00000287
[ 1748.312052] RAX: 0000000000000000 RBX: ffff8803b60de3aa RCX: 00007f49ec000000
[ 1748.312052] RDX: 0000000000000001 RSI: ffff8800eba1c730 RDI: ffff880399434b90
[ 1748.312052] RBP: ffff8803b9a97c68 R08: 000000000000000a R09: 000000000000fffe
[ 1748.312052] R10: 0000000000000000 R11: 0000000000000007 R12: 0000000000000001
[ 1748.312052] R13: ffff8803b7a74108 R14: 00007f49ec021000 R15: ffff8803b9a9ffff
[ 1748.312052] FS:  00007fcc9562b740(0000) GS:ffff8803cfcc0000(0000)
knlGS:0000000000000000
[ 1748.312052] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1748.312052] CR2: 00007fcc955ed180 CR3: 00000003b97a5000 CR4: 00000000001406e0
[ 1748.312052] Stack:
[ 1748.312052]  ffff8803b9a97ca8 ffffffff8117bcc9 ffff8803b9a97df8
ffff880399435030
[ 1748.312052]  ffff88003684d000 ffff8800eba1c730 0000000000000000
ffff8803b5dfc980
[ 1748.312052]  ffff8803b9a97d38 ffffffff81236612 ffff88030000002d
00007f4900000070
[ 1748.312052] Call Trace:
[ 1748.312052]  [<ffffffff8117bcc9>] vm_is_stack+0x59/0xe0
[ 1748.312052]  [<ffffffff81236612>] show_map_vma+0x212/0x280
[ 1748.312052]  [<ffffffff81236805>] show_smap+0x85/0x250
[ 1748.312052]  [<ffffffff81237bc0>] ? smaps_pte_entry.isra.21+0x220/0x220
[ 1748.312052]  [<ffffffff81236a03>] show_pid_smap+0x13/0x20
[ 1748.312052]  [<ffffffff811f6016>] seq_read+0x256/0x3e0
[ 1748.312052]  [<ffffffff811d30e1>] vfs_read+0xb1/0x180
[ 1748.312052]  [<ffffffff811d335f>] SyS_read+0x4f/0xb0
[ 1748.312052]  [<ffffffff8178527f>] tracesys+0xe1/0xe6
[ 1748.312052] Code: 89 f8 48 89 f2 89 c6 48 89 e5 65 48 8b 3c 25 c0 c7 00
00 e8 b2 f9 ff ff 5d c3 0f 1f 44 00 00 48 8b 47 08 55 48 89 e5 48 8b 40 10
<a9> 00 00 02 00 75 10 48 8b 87 10 06 00 00 5d c3 0f 1f 80 00 00


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to