Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp809726ybi; Fri, 21 Jun 2019 08:31:38 -0700 (PDT) X-Google-Smtp-Source: APXvYqw6ur0HqIwPbaZJa+q0ZabX2ogAGB+V6+rBeN4NpUU4A8RejkshQife2/6SutkVDpLFRsNA X-Received: by 2002:a63:f70b:: with SMTP id x11mr19369925pgh.212.1561131098689; Fri, 21 Jun 2019 08:31:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561131098; cv=none; d=google.com; s=arc-20160816; b=BRQagckqqwqkbxusPEFoe19ctt7H/CVcs+0A7Y79nrxPr2UvXR6gg40fktiMsLFLRG gAEUV/zozjfVLDgyfGGuK2urfo6in0eZW3x9Drs/upj63i+hou3B81BRNlS/fvuC22dz p2cAulJOqbKa54Gt6lLu3iJ7zCcai1vrZEgrMv7Mp061OlMlxOMPndw2zuvBU0XCeLof 7xWY2ktKSwfCRC6/UREgHH9rWwECGvBn0DG7jrC3b52LS2cUN/4m2qJbaQXt0HmmNI/7 r+twh6DgbeRkT12KT4Ypbm98gSFgL6d2UaqKW84TGPplj7HVPPHRLmIoPC0xZTuqx/qn dvUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=1pSN2ZA0P3LmmRsCrGltK33YJ8H1rboRz/6Z82Z2bkY=; b=hh1miemTy1vpvd1h7nFKY2tLI/zSI+Iodqnc491gi20N9yNq8seZrhDzuNrl0SnKUv VT/pOHKp2Ef+rDLAsyK3BGYDLYuMHR+qrh/w6AEmgKwXz5cxqn5Qa0InVPt2Fbeee0ED STbLuYS2a0gvJfR8uIab6sowFtmlN3cQJVRn0IL5dbBK+00ytqjtaAPoDxbhN10afJrR zdFXAfCLFVrlELdpLsOQB1k22TLjE11XMbjzXeC7VTbuvJzOCq0xbBWf+0DgUthNbsNe Fk/G9PfyIsN3XZIJS8wiUUvE6rlv6CldUxw+6n4EMUns5c7JPSHoZktUUJz2aLZpzAmL iuWA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d2si2719443pll.31.2019.06.21.08.31.23; Fri, 21 Jun 2019 08:31:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726307AbfFUPa5 (ORCPT + 99 others); Fri, 21 Jun 2019 11:30:57 -0400 Received: from Galois.linutronix.de ([146.0.238.70]:55275 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726070AbfFUPa5 (ORCPT ); Fri, 21 Jun 2019 11:30:57 -0400 Received: from p5b06daab.dip0.t-ipconnect.de ([91.6.218.171] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1heLV6-0005xn-RP; Fri, 21 Jun 2019 17:30:53 +0200 Date: Fri, 21 Jun 2019 17:30:52 +0200 (CEST) From: Thomas Gleixner To: Linus Torvalds cc: Chris Wilson , Linux List Kernel Mailing , Steven Rostedt , Josh Poimboeuf , Joerg Roedel Subject: Re: NMI hardlock stacktrace deadlock [was Re: Linux 5.2-rc5] In-Reply-To: Message-ID: References: <156094799629.21217.4574572565333265288@skylake-alporthouse-com> <156097197830.664.13418742301997062555@skylake-alporthouse-com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 19 Jun 2019, Linus Torvalds wrote: > On Wed, Jun 19, 2019 at 12:19 PM Chris Wilson wrote: > > > > > Do you have the oops itself at all? > > > > An example at > > https://intel-gfx-ci.01.org/tree/drm-tip/CI_DRM_6310/fi-kbl-x1275/dmesg0.log > > https://intel-gfx-ci.01.org/tree/drm-tip/CI_DRM_6310/fi-kbl-x1275/boot0.log The second once contains a lockdep splat which warns about a potential deadlock in the iommu code. > > The bug causing the oops is clearly a driver problem. The rc5 fallout > > just seems to be because of some shrinker changes affecting some object > > reaping that were unfortunately still active. What perturbed the CI > > team was the machine failed to panic & reboot. > > Hmm. It's hard to guess at the cause of that. The oopses themselves > don't look like they are happening in any particularly bad context, so > all the normal reboot-on-oops etc stuff _should_ work. > > So it would help a lot if you could bisect the bad problem at least a > bit, if it is at all reproducible. Because with no other clues, it's > hard to even guess at what might be up. > > The fact that you say "NMI watchdog firing as we dumped the ftrace" > means that maybe it might be some ftrace / stacktrace issue where the > dumping itself leads to some endless loop, but who knows. > > For example, one thing that has happened during this development cycle > is the stacktrace common infrastructure changes (arch_stack_walk() and > friends). I'm, not seeing why that would cause your issues, but I'm > adding a few random people for ftrace / stacktrace changes. /me whistels innocently. Chris, do you have the actual NMI lockup detector splats somewhere? Thanks, tglx