NMI Watchdog detected Hard Lockup in vmballoon_enqueue_page_list()

Solution Unverified - Updated -

Issue

  • Kernel panic with the following call traces:
[1763249.651765] NMI watchdog: Watchdog detected hard LOCKUP on cpu 0
[1763249.651872] Modules linked in: tls rpcrdma rdma_cm iw_cm ib_cm ib_core nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock vfat fat intel_rapl_msr intel_rapl_common vmw_balloon pcspkr vmw_vmci i2c_piix4 joydev nfsd nfs_acl lockd auth_rpcgss grace sunrpc xfs libcrc32c vmwgfx sr_mod cdrom drm_ttm_helper ttm sd_mod ata_generic t10_pi drm_kms_helper sg ahci crct10dif_pclmul libahci ata_piix crc32_pclmul crc32c_intel drm ghash_clmulni_intel libata vmw_pvscsi vmxnet3 serio_raw dm_mirror dm_region_hash dm_log dm_mod fuse
[1763249.652201] CPU: 0 PID: 3051883 Comm: kworker/0:3 Kdump: loaded Tainted: GL ----------  5.14.0-503.35.1.el9_5.x86_64 #1
[1763249.652208] Hardware name: VMware, Inc. VMware7,1/440BX Desktop Reference Platform, BIOS VMW71.00V.21100432.B64.2301110304 01/11/2023
[1763249.652214] Workqueue: events_freezable vmballoon_work [vmw_balloon]
[1763249.652278] RIP: 0010:vmballoon_enqueue_page_list+0x5b/0xe0 [vmw_balloon]
[1763249.652284] Code: a7 b3 f9 4c 8d 6f 58 4c 89 ef e8 30 8c b3 f9 48 89 c6 48 8b 45 00 48 8d 48 f8 48 39 c5 74 27 48 8d 41 30 48 8d 91 30 80 00 00 <81> 20 ff fe ff ff 48 83 c0 40 48 39 c2 75 f1 48 8b 41 08 48 8d 48
[1763249.652286] RSP: 0018:ffffbc8602ba3d88 EFLAGS: 00000006
[1763249.652290] RAX: fffff30df7239030 RBX: ffffffffc09e8780 RCX: fffff30df7238000
[1763249.652422] RDX: fffff30df7240030 RSI: 0000000000000202 RDI: ffffffffc09e87d8
[1763249.652423] RBP: ffffbc8602ba3dd0 R08: ffffffffc09e8780 R09: ffffbc8602ba3d68
[1763249.652424] R10: 00000000001089b9 R11: 0000000000000001 R12: ffffbc8602ba3e04
[1763249.652426] R13: ffffffffc09e87d8 R14: fffff30df65f0008 R15: 0000000000000009
[1763249.652427] FS:  0000000000000000(0000) GS:ffff9c582fc00000(0000) knlGS:0000000000000000
[1763249.652429] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1763249.652439] CR2: 00007f0858024ff8 CR3: 000000025c326000 CR4: 0000000000350ef0
[1763249.652456] Call Trace:
[1763249.652462]  <NMI>
[1763249.652464]  ? srso_return_thunk+0x5/0x5f
[1763249.652769]  ? show_trace_log_lvl+0x26e/0x2df
[1763249.653058]  ? show_trace_log_lvl+0x26e/0x2df
[1763249.653071]  ? vmballoon_inflate+0x1b6/0x400 [vmw_balloon]
[1763249.653081]  ? watchdog_overflow_callback.cold+0x1e/0x70
[1763249.653093]  ? __perf_event_overflow+0x105/0x1e0
[1763249.653214]  ? x86_pmu_handle_irq+0x14a/0x1d0
[1763249.653257]  ? amd_pmu_handle_irq+0x42/0xb0
[1763249.653261]  ? perf_event_nmi_handler+0x28/0x50
[1763249.653266]  ? nmi_handle+0x5e/0x120
[1763249.653278]  ? default_do_nmi+0x40/0x130
[1763249.653508]  ? exc_nmi+0x100/0x180
[1763249.653514]  ? end_repeat_nmi+0xf/0x60
[1763249.653537]  ? vmballoon_enqueue_page_list+0x5b/0xe0 [vmw_balloon]
[1763249.653546]  ? vmballoon_enqueue_page_list+0x5b/0xe0 [vmw_balloon]
[1763249.653556]  ? vmballoon_enqueue_page_list+0x5b/0xe0 [vmw_balloon]
[1763249.653575]  </NMI>
[1763249.653576]  <TASK>
[1763249.653580]  vmballoon_inflate+0x1b6/0x400 [vmw_balloon]
[1763249.653600]  vmballoon_work+0xfe/0x195 [vmw_balloon]
[1763249.653607]  process_one_work+0x197/0x380
[1763249.653772]  worker_thread+0x2fe/0x410
[1763249.653778]  ? __pfx_worker_thread+0x10/0x10
[1763249.653782]  kthread+0xe0/0x100
[1763249.653785]  ? __pfx_kthread+0x10/0x10
[1763249.653791]  ret_from_fork+0x2c/0x50
[1763249.653892]  </TASK>
[1763249.653900] Kernel panic - not syncing: Hard LOCKUP
[1763249.653902] CPU: 0 PID: 3051883 Comm: kworker/0:3 Kdump: loaded Tainted: GL ----------  5.14.0-503.35.1.el9_5.x86_64 #1
[1763249.653904] Hardware name: VMware, Inc. VMware7,1/440BX Desktop Reference Platform, BIOS VMW71.00V.21100432.B64.2301110304 01/11/2023
[1763249.653906] Workqueue: events_freezable vmballoon_work [vmw_balloon]
[1763249.653911] Call Trace:
[1763249.653922]  <NMI>
[1763249.653926]  dump_stack_lvl+0x34/0x48
[1763249.653937]  panic+0x107/0x2bb
[1763249.653961]  nmi_panic.cold+0xc/0xc
[1763249.653965]  watchdog_overflow_callback.cold+0x5c/0x70
[1763249.653977]  __perf_event_overflow+0x105/0x1e0
[1763249.653990]  x86_pmu_handle_irq+0x14a/0x1d0
[1763249.654038]  amd_pmu_handle_irq+0x42/0xb0
[1763249.654043]  perf_event_nmi_handler+0x28/0x50
[1763249.654048]  nmi_handle+0x5e/0x120
[1763249.654057]  default_do_nmi+0x40/0x130
[1763249.654069]  exc_nmi+0x100/0x180
[1763249.654074]  end_repeat_nmi+0xf/0x60
[1763249.654077] RIP: 0010:vmballoon_enqueue_page_list+0x5b/0xe0 [vmw_balloon]
[1763249.654082] Code: a7 b3 f9 4c 8d 6f 58 4c 89 ef e8 30 8c b3 f9 48 89 c6 48 8b 45 00 48 8d 48 f8 48 39 c5 74 27 48 8d 41 30 48 8d 91 30 80 00 00 <81> 20 ff fe ff ff 48 83 c0 40 48 39 c2 75 f1 48 8b 41 08 48 8d 48
[1763249.654084] RSP: 0018:ffffbc8602ba3d88 EFLAGS: 00000006
[1763249.654086] RAX: fffff30df7239030 RBX: ffffffffc09e8780 RCX: fffff30df7238000
[1763249.654087] RDX: fffff30df7240030 RSI: 0000000000000202 RDI: ffffffffc09e87d8
[1763249.654089] RBP: ffffbc8602ba3dd0 R08: ffffffffc09e8780 R09: ffffbc8602ba3d68
[1763249.654090] R10: 00000000001089b9 R11: 0000000000000001 R12: ffffbc8602ba3e04
[1763249.654092] R13: ffffffffc09e87d8 R14: fffff30df65f0008 R15: 0000000000000009
[1763249.654107]  ? vmballoon_enqueue_page_list+0x5b/0xe0 [vmw_balloon]
[1763249.654114]  ? vmballoon_enqueue_page_list+0x5b/0xe0 [vmw_balloon]
[1763249.654121]  </NMI>
[1763249.654121]  <TASK>
[1763249.654124]  vmballoon_inflate+0x1b6/0x400 [vmw_balloon]
[1763249.654144]  vmballoon_work+0xfe/0x195 [vmw_balloon]
[1763249.654152]  process_one_work+0x197/0x380
[1763249.654158]  worker_thread+0x2fe/0x410
[1763249.654165]  ? __pfx_worker_thread+0x10/0x10
[1763249.654169]  kthread+0xe0/0x100
[1763249.654172]  ? __pfx_kthread+0x10/0x10
[1763249.654177]  ret_from_fork+0x2c/0x50
[1763249.654188]  </TASK>

Environment

  • Red Hat Enterprise Linux 9
  • Kernel-5.14.0-503.40.1.el9_5
  • VMware balloon driver [vmw_balloon]

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content