Multiple soft lockup messages due to third-party cvbf kernel module

Solution Unverified - Updated -

Issue

  • Multiple soft lockup messages are observed when unloading the third-party cvbf kernel module:
kernel: cvbf: module verification failed: signature and/or required key missing - tainting kernel
kernel: 13965: cvbf_init(): Initializing the driver.
kernel: 13965: cvbf_init(): Built: Jan 11 2024 10:51:23
kernel: 13965: cvbf_init(): rc=0
kernel: 13969: cvbf_cleanup(): The driver is being unloaded.
kernel: 13969: cvbf_remove_proc(): Removing /proc/cvbf tree.
kernel: 13975: cvbf_init(): Initializing the driver.
kernel: 13975: cvbf_init(): Built: Jan 11 2024 10:51:23
kernel: 13975: cvbf_init(): rc=0
kernel: 13978: cvbf_cleanup(): The driver is being unloaded.
kernel: 13978: cvbf_remove_proc(): Removing /proc/cvbf tree.
kernel: watchdog: BUG: soft lockup - CPU#13 stuck for 23s! [rmmod:13978]
kernel: Modules linked in: cvbf(POE-) binfmt_misc nf_tables nfnetlink intel_rapl_msr intel_rapl_common intel_uncore_frequency_common isst_if_mbox_msr isst_if_common nfit libnvdimm kvm_intel kvm irqbypass crc32_pclmul rapl vmw_balloon pcspkr joydev i2c_piix4 auth_rpcgss sunrpc vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock vmw_vmci xfs libcrc32c sr_mod sd_mod cdrom t10_pi sg ata_generic vmwgfx drm_ttm_helper ttm drm_kms_helper syscopyarea sysfillrect sysimgblt crct10dif_pclmul drm crc32c_intel ata_piix ghash_clmulni_intel libata serio_raw vmxnet3 vmw_pvscsi dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: cvbf]
kernel: Red Hat flags: eBPF/event eBPF/rawtrace
kernel: CPU: 13 PID: 13978 Comm: rmmod Kdump: loaded Tainted: POE ---------- 4.18.0-553.71.1.el8_10.x86_64 #1
kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x24/0x1c0
kernel: Code: ff ff 0f 1f 40 00 0f 1f 44 00 00 0f 1f 44 00 00 ba 01 00 00 00 8b 07 85 c0 75 0d f0 0f b1 17 85 c0 75 f2 c3 cc cc cc cc f3 90 <eb> 
e9 81 fe 00 01 00 00 74 44 81 e6 00 ff ff ff 75 71 f0 0f ba 2f
kernel: RSP: 0018:ffffb81cc6a23e78 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13
kernel: RAX: 0000000000000001 RBX: ffffffffc0a3c480 RCX: 0000000080100007
kernel: RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffffffffc0a3d8b8
kernel: RBP: ffffb81cc6a23f58 R08: 0000000000000001 R09: 0000000000000001
kernel: R10: ffff9efce0bf2000 R11: ffffb81cc6a23c00 R12: 0000000000000000
kernel: R13: ffffb81cc6a23e88 R14: 0000000000000000 R15: 0000000000000000
kernel: FS:  00007f6c5ab8ab80(0000) GS:ffff9f0b7e140000(0000) knlGS:0000000000000000
kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: 000055c0a66b1058 CR3: 0000000160382006 CR4: 00000000007706e0
kernel: PKRU: 55555554
kernel: Call Trace:
kernel: <IRQ>
kernel: ? watchdog_timer_fn.cold.10+0x46/0x9e
kernel: ? watchdog+0x30/0x30
kernel: ? __hrtimer_run_queues+0x101/0x280
kernel: ? hrtimer_interrupt+0x100/0x220
kernel: ? sched_clock+0x5/0x10
kernel: ? smp_apic_timer_interrupt+0x6a/0x130
kernel: ? apic_timer_interrupt+0xf/0x20
kernel: </IRQ>
kernel: ? native_queued_spin_lock_slowpath+0x24/0x1c0
kernel: ? cvdrv_debug_destroy+0x16/0x40 [cvbf]
kernel: _raw_spin_lock+0x1e/0x30
kernel: cvdrv_ftrace_destroy+0x6c/0x160 [cvbf]
kernel: cvbf_cleanup+0x31/0x3b [cvbf]
kernel: __x64_sys_delete_module+0x141/0x260
kernel: do_syscall_64+0x5b/0x1a0
kernel: entry_SYSCALL_64_after_hwframe+0x66/0xcb
kernel: RIP: 0033:0x7f6c59a8dbab
kernel: Code: 73 01 c3 48 8b 0d dd 72 39 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d ad 72 39 00 f7 d8 64 89 01 48

Environment

  • Red Hat Enterprise Linux 8
  • kernel-4.18.0-553.71.1.el8_10
  • Third-party module: cvbf

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content