softlockup in `unhook_syscalls+0x23/0x60 [ktap_113573]`
Issue
- Soft lockup was happening with the below call trace.
[98440.909701] watchdog: BUG: soft lockup - CPU#6 stuck for 23s! [guard_stap:22868]
[98440.909735] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache ktap_113573(FOE) vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc ext4 mbcache jbd2 intel_rapl_msr intel_rapl_common sb_edac crct10dif_pclmul crc32_pclmul ghash_clmulni_intel vmw_balloon rapl joydev pcspkr vmw_vmci i2c_piix4 binfmt_misc xfs libcrc32c sr_mod cdrom ata_generic sd_mod t10_pi vmwgfx sg drm_ttm_helper ttm drm_kms_helper crc32c_intel syscopyarea sysfillrect serio_raw sysimgblt ata_piix fb_sys_fops libata drm vmw_pvscsi vmxnet3 dm_mirror dm_region_hash dm_log dm_mod fuse
[98440.909915] CPU: 6 PID: 22868 Comm: guard_stap Kdump: loaded Tainted: GF OE --------- - - 4.18.0-425.10.1.el8_7.x86_64 #1
[98440.909954] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[98440.909987] RIP: 0010:native_queued_spin_lock_slowpath+0x24/0x1c0
[98440.910010] Code: ff ff 0f 1f 40 00 66 66 66 66 90 66 66 66 66 90 ba 01 00 00 00 8b 07 85 c0 75 0d f0 0f b1 17 85 c0 75 f2 e9 6e b7 aa 00 f3 90 <eb> e9 81 fe 00 01 00 00 74 44 81 e6 00 ff ff ff 75 71 f0 0f ba 2f
[98440.910059] RSP: 0018:ffffa58b5d8dfe80 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13
[98440.910081] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffff9799fbeae000
[98440.910101] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff97a68e043f18
[98440.910120] RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000
[98440.910139] R10: ffffa58b5d8dfea8 R11: ffff97a729916d10 R12: 00000000000a001d
[98440.910158] R13: ffff97a61de8dec8 R14: ffff9799fbeae020 R15: ffff97a6b931bcc0
[98440.910177] FS: 00007f28fd997b80(0000) GS:ffff97a8bfd80000(0000) knlGS:0000000000000000
[98440.910199] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[98440.910215] CR2: 00007f28f3244fb8 CR3: 0000000cda03c003 CR4: 00000000000606e0
[98440.910252] Call Trace:
[98440.910282] _raw_spin_lock+0x1e/0x30
[98440.911137] unhook_syscalls+0x23/0x60 [ktap_113573]
[98440.911980] ktap_release+0x8f/0xe0 [ktap_113573]
[98440.912787] __fput+0xbe/0x250
[98440.913547] task_work_run+0x8a/0xb0
[98440.914294] exit_to_usermode_loop+0xef/0x100
[98440.915027] do_syscall_64+0x19c/0x1b0
[98440.915742] entry_SYSCALL_64_after_hwframe+0x61/0xc6
[98440.916468] RIP: 0033:0x7f28fd14cb47
Environment
- Red Hat Enterprise Linux 8.7
- 3rd party module list
- ktap_113573
- ktap_113723
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.