slowpath very early in the boot process

Bug #988430 reported by C de-Avillez
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Expired
Medium
Unassigned

Bug Description

I was checking the 3.2.0-24.37~rc1 kernel (Andy built, for tests) when I got hit by a slowpath warning very early in the boot process.

This only happened on generic-pae (AMD64 machine), and -- so far -- on only one machine. I have no reproducer, although it happened at least twice (see syslog attached).

Obviously this is *not* an official Ubuntu package. But it will be. Of course, as a result, no apport magic.

Apr 25 16:58:15 alkaid kernel: [ 0.169354] Booting Node 0, Processors #1
Apr 25 16:58:15 alkaid kernel: [ 0.169355] smpboot cpu 1: start_ip = 82000
Apr 25 16:58:15 alkaid kernel: [ 5562.890150] ------------[ cut here ]------------
Apr 25 16:58:15 alkaid kernel: [ 5562.890154] WARNING: at /home/apw/build/ubuntu-precise/ubuntu-precise/kernel/watchdog.c:241 watchdog_overflow_callback+0xac/0xd0()
Apr 25 16:58:15 alkaid kernel: [ 5562.890156] Hardware name: PowerEdge R210 II
Apr 25 16:58:15 alkaid kernel: [ 5562.890157] Watchdog detected hard LOCKUP on cpu 0
Apr 25 16:58:15 alkaid kernel: [ 5562.890158] Modules linked in:
Apr 25 16:58:15 alkaid kernel: [ 5562.890160] Pid: 1, comm: swapper/0 Not tainted 3.2.0-24-generic-pae #37~rc1
Apr 25 16:58:15 alkaid kernel: [ 5562.890161] Call Trace:
Apr 25 16:58:15 alkaid kernel: [ 5562.890165] [<c105a512>] warn_slowpath_common+0x72/0xa0
Apr 25 16:58:15 alkaid kernel: [ 5562.890167] [<c10be48c>] ? watchdog_overflow_callback+0xac/0xd0
Apr 25 16:58:15 alkaid kernel: [ 5562.890169] [<c10be48c>] ? watchdog_overflow_callback+0xac/0xd0
Apr 25 16:58:15 alkaid kernel: [ 5562.890172] [<c10be3e0>] ? touch_nmi_watchdog+0x70/0x70
Apr 25 16:58:15 alkaid kernel: [ 5562.890174] [<c105a5e3>] warn_slowpath_fmt+0x33/0x40
Apr 25 16:58:15 alkaid kernel: [ 5562.890176] [<c10be48c>] watchdog_overflow_callback+0xac/0xd0
Apr 25 16:58:15 alkaid kernel: [ 5562.890179] [<c10f1685>] __perf_event_overflow+0x95/0x210
Apr 25 16:58:15 alkaid kernel: [ 5562.890182] [<c101edde>] ? x86_perf_event_set_period+0x11e/0x220
Apr 25 16:58:15 alkaid kernel: [ 5562.890185] [<c10f1c75>] perf_event_overflow+0x15/0x20
Apr 25 16:58:15 alkaid kernel: [ 5562.890187] [<c1022edd>] intel_pmu_handle_irq+0x12d/0x1d0
Apr 25 16:58:15 alkaid kernel: [ 5562.890190] [<c1022535>] ? intel_pmu_enable_all+0x45/0xa0
Apr 25 16:58:15 alkaid kernel: [ 5562.890193] [<c10ea63b>] ? perf_ctx_unlock+0x1b/0x20
Apr 25 16:58:15 alkaid kernel: [ 5562.890195] [<c10f09f0>] ? perf_rotate_context+0xf0/0x1b0
Apr 25 16:58:15 alkaid kernel: [ 5562.890197] [<c10f0b0b>] ? perf_event_task_tick+0x5b/0x90
Apr 25 16:58:15 alkaid kernel: [ 5562.890201] [<c15a9990>] perf_event_nmi_handler+0x20/0x30
Apr 25 16:58:15 alkaid kernel: [ 5562.890204] [<c15a924f>] default_do_nmi+0x4f/0x280
Apr 25 16:58:15 alkaid kernel: [ 5562.890206] [<c108a004>] ? tick_periodic+0x34/0x80
Apr 25 16:58:15 alkaid kernel: [ 5562.890209] [<c106151c>] ? irq_exit+0x3c/0xa0
Apr 25 16:58:15 alkaid kernel: [ 5562.890211] [<c15a94ef>] do_nmi+0x6f/0x80
Apr 25 16:58:15 alkaid kernel: [ 5562.890213] [<c15a8854>] nmi_stack_correct+0x2f/0x34
Apr 25 16:58:15 alkaid kernel: [ 5562.890216] [<c12b60dd>] ? delay_tsc+0x3d/0x70
Apr 25 16:58:15 alkaid kernel: [ 5562.890218] [<c12b6030>] __const_udelay+0x20/0x30
Apr 25 16:58:15 alkaid kernel: [ 5562.890221] [<c158af19>] wakeup_secondary_cpu_via_init+0x7b/0x1d3
Apr 25 16:58:15 alkaid kernel: [ 5562.890224] [<c158b2e3>] do_boot_cpu+0x272/0x39e
Apr 25 16:58:15 alkaid kernel: [ 5562.890226] [<c158b40f>] ? do_boot_cpu+0x39e/0x39e
Apr 25 16:58:15 alkaid kernel: [ 5562.890229] [<c158ba1f>] native_cpu_up+0x9e/0xe6
Apr 25 16:58:15 alkaid kernel: [ 5562.890231] [<c105bff4>] ? __cpu_notify+0x24/0x40
Apr 25 16:58:15 alkaid kernel: [ 5562.890233] [<c158cb39>] _cpu_up+0x83/0xeb
Apr 25 16:58:15 alkaid kernel: [ 5562.890235] [<c15a6b88>] ? mutex_lock+0x18/0x40
Apr 25 16:58:15 alkaid kernel: [ 5562.890237] [<c158cbeb>] cpu_up+0x4a/0x59
Apr 25 16:58:15 alkaid kernel: [ 5562.890239] [<c15a6b88>] ? mutex_lock+0x18/0x40
Apr 25 16:58:15 alkaid kernel: [ 5562.890242] [<c18959fc>] smp_init+0x39/0x7e
Apr 25 16:58:15 alkaid kernel: [ 5562.890245] [<c15760d3>] ? register_cpu_notifier+0x23/0x30
Apr 25 16:58:15 alkaid kernel: [ 5562.890248] [<c187d817>] kernel_init+0x85/0x145
Apr 25 16:58:15 alkaid kernel: [ 5562.890249] [<c187d792>] ? start_kernel+0x35d/0x35d
Apr 25 16:58:15 alkaid kernel: [ 5562.890252] [<c15af6be>] kernel_thread_helper+0x6/0x10
Apr 25 16:58:15 alkaid kernel: [ 5562.890257] ---[ end trace a7919e7f17c0a725 ]---
Apr 25 16:58:15 alkaid kernel: [ 5563.092388] Initializing CPU#1
Apr 25 16:58:15 alkaid kernel: [ 5563.168372] CPU1: Thermal monitoring handled by SMI
Apr 25 16:58:15 alkaid kernel: [ 5563.188421] NMI watchdog enabled, takes one hw-pmu counter.
Apr 25 16:58:15 alkaid kernel: [ 5563.188495] CPU 2 irqstacks, hard=f7566000 soft=f7568000
Apr 25 16:58:15 alkaid kernel: [ 5563.188496] #2
Apr 25 16:58:15 alkaid kernel: [ 5563.188497] smpboot cpu 2: start_ip = 82000
Apr 25 16:58:15 alkaid kernel: [ 5563.198686] Initializing CPU#2

Revision history for this message
C de-Avillez (hggdh2) wrote :
Revision history for this message
Brad Figg (brad-figg) wrote : Missing required logs.

This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:

apport-collect 988430

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete
Changed in linux (Ubuntu):
importance: Undecided → Medium
Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for linux (Ubuntu) because there has been no activity for 60 days.]

Changed in linux (Ubuntu):
status: Incomplete → Expired
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.