The Linux Kernel Mailing List
 help / color / mirror / Atom feed
From: David Riley <d.riley@proxmox.com>
To: Paolo Bonzini <pbonzini@redhat.com>,
	linux-kernel@vger.kernel.org, kvm@vger.kernel.org
Cc: jon@nutanix.com
Subject: Re: [PATCH v6 00/28] KVM: combined patchset for MBEC/GMET support
Date: Mon, 11 May 2026 13:07:33 +0200	[thread overview]
Message-ID: <8ebbfb3d-69a0-42d0-83cd-78e163e3acdf@proxmox.com> (raw)
In-Reply-To: <251c6f2c-6a6b-4a7b-b0d6-330611bb12c6@redhat.com>

is that enough?

dmesg | grep -A 50 "soft lockup - CPU#11"

[ 5565.326572] watchdog: BUG: soft lockup - CPU#11 stuck for 28s! [CPU 0/KVM:16105]
[ 5565.326576] Modules linked in: tcp_diag(E) inet_diag(E) veth(E) rpcsec_gss_krb5(E) auth_rpcgss(E) nfsv4(E) nfs(E) lockd(E) grace(E) netfs(E) ebtable_filter(E) ebtables(E) ip_set(E) ip6table_raw(E) iptable_raw(E) ip6table_filter(E) ip6_tables(E) iptable_filter(E) sunrpc(E) nf_tables(E) softdog(E) bonding(E) tls(E) binfmt_misc(E) nfnetlink_log(E) intel_rapl_msr(E) intel_rapl_common(E) intel_uncore_frequency(E) intel_uncore_frequency_common(E) intel_ifs(E) i10nm_edac(E) skx_edac_common(E) nfit(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) coretemp(E) cxl_pci(E) cxl_mem(E) kvm_intel(E) acpi_power_meter(E) ipmi_ssif(E) cxl_acpi(E) cxl_port(E) cxl_pmem(E) kvm(E) pmt_telemetry(E) dax_hmem(E) pmt_discovery(E) irqbypass(E) pmt_class(E) intel_sdsi(E) bnxt_re(E) cxl_core(E) aesni_intel(E) ib_uverbs(E) gf128mul(E) isst_if_mmio(E) isst_if_mbox_pci(E) fwctl(E) rapl(E) cmdlinepart(E) intel_cstate(E) einj(E) pcspkr(E) wmi_bmof(E) spi_nor(E) iaa_crypto(E) isst_if_common(E) ib_core(E) 
intel_vsec(E) mei_me(E) ast(E) mtd(E) spd5118(E)
[ 5565.326599]  i2c_algo_bit(E) mei(E) ipmi_si(E) acpi_ipmi(E) ipmi_devintf(E) ipmi_msghandler(E) acpi_pad(E) joydev(E) input_leds(E) mac_hid(E) sch_fq_codel(E) msr(E) vhost_net(E) vhost(E) vhost_iotlb(E) tap(E) efi_pstore(E) nfnetlink(E) dmi_sysfs(E) ip_tables(E) x_tables(E) autofs4(E) btrfs(E) libblake2b(E) raid6_pq(E) xor(E) hid_generic(E) usbmouse(E) usbkbd(E) usbhid(E) hid(E) cdc_ether(E) usbnet(E) mii(E) uas(E) usb_storage(E) dm_thin_pool(E) dm_persistent_data(E) dm_bio_prison(E) dm_bufio(E) nvme(E) nvme_core(E) xhci_pci(E) i40e(E) nvme_keyring(E) i2c_i801(E) idxd(E) tg3(E) ahci(E) i2c_mux(E) libie(E) idxd_bus(E) spi_intel_pci(E) bnxt_en(E) nvme_auth(E) libie_adminq(E) xhci_hcd(E) i2c_smbus(E) spi_intel(E) libahci(E) i2c_ismt(E) wmi(E) pinctrl_emmitsburg(E)
[ 5565.326618] CPU: 11 UID: 0 PID: 16105 Comm: CPU 0/KVM Tainted: G            EL      7.1.0-rc2-v6-mbec-gmet-00028-g1e3b074acc33 #24 PREEMPT(lazy)
[ 5565.326620] Tainted: [E]=UNSIGNED_MODULE, [L]=SOFTLOCKUP
[ 5565.326620] Hardware name: ****, BIOS 3001 07/03/2025
[ 5565.326621] RIP: 0010:kvm_arch_vcpu_ioctl_run+0x78d/0x18e0 [kvm]
[ 5565.326680] Code: 07 00 48 83 bb 28 08 00 00 00 0f 85 69 0a 00 00 0f 1f 44 00 00 65 c6 05 08 d7 08 c7 01 c6 83 e2 0a 00 00 01 fb 0f 1f 44 00 00 <48> 83 83 48 19 00 00 01 fa 0f 1f 44 00 00 c6 83 e2 0a 00 00 00 0f
[ 5565.326681] RSP: 0018:ff6afb0ed454b9e0 EFLAGS: 00000246
[ 5565.326682] RAX: 0000000000000000 RBX: ff2a147c1758a480 RCX: 0000000000000000
[ 5565.326683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 5565.326683] RBP: ff6afb0ed454ba90 R08: 0000000000000000 R09: 0000000000000000
[ 5565.326684] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[ 5565.326684] R13: ff2a147c12163000 R14: 0000000000000000 R15: ff2a147c20d2b140
[ 5565.326685] FS:  00007503727ef6c0(0000) GS:ff2a147bf748a000(0000) knlGS:fffff8013ee33000
[ 5565.326685] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 5565.326686] CR2: 00007fffffff0000 CR3: 00000020948ed006 CR4: 0000000000f73ef0
[ 5565.326687] PKRU: 55555554
[ 5565.326687] Call Trace:
[ 5565.326688]  <TASK>
[ 5565.326689]  ? trace_event_buffer_reserve+0xa5/0xe0
[ 5565.326692]  ? trace_event_raw_event_kvm_userspace_exit+0x6c/0xc0 [kvm]
[ 5565.326727]  kvm_vcpu_ioctl+0x312/0xba0 [kvm]
[ 5565.326762]  ? __rb_reserve_next.constprop.0+0x5c/0x420
[ 5565.326765]  ? ring_buffer_lock_reserve+0x155/0x410
[ 5565.326767]  __x64_sys_ioctl+0xa5/0x100
[ 5565.326769]  x64_sys_call+0x103b/0x2390
[ 5565.326771]  do_syscall_64+0xe6/0x14c0
[ 5565.326774]  ? trace_event_buffer_reserve+0xa5/0xe0
[ 5565.326775]  ? trace_event_raw_event_kvm_userspace_exit+0x6c/0xc0 [kvm]
[ 5565.326807]  ? kvm_vcpu_ioctl+0x2a7/0xba0 [kvm]
[ 5565.326841]  ? trace_event_buffer_reserve+0xa5/0xe0
[ 5565.326842]  ? trace_event_raw_event_kvm_userspace_exit+0x6c/0xc0 [kvm]
[ 5565.326874]  ? __x64_sys_ioctl+0xbf/0x100
[ 5565.326875]  ? kvm_on_user_return+0x4a/0x90 [kvm]
[ 5565.326916]  ? fire_user_return_notifiers+0x37/0x70
[ 5565.326918]  ? do_syscall_64+0x396/0x14c0
[ 5565.326920]  ? do_syscall_64+0x396/0x14c0
[ 5565.326922]  ? __x64_sys_ioctl+0xbf/0x100
[ 5565.326923]  ? kvm_on_user_return+0x4a/0x90 [kvm]
[ 5565.326962]  ? fire_user_return_notifiers+0x37/0x70
[ 5565.326963]  ? do_syscall_64+0x396/0x14c0
[ 5565.326965]  ? kvm_on_user_return+0x4a/0x90 [kvm]
[ 5565.327002]  ? fire_user_return_notifiers+0x37/0x70
[ 5565.327004]  ? do_syscall_64+0x396/0x14c0
[ 5565.327005]  ? do_syscall_64+0x396/0x14c0
[ 5565.327007]  ? do_syscall_64+0x396/0x14c0
[ 5565.327008]  ? do_syscall_64+0x396/0x14c0
[ 5565.327009]  ? do_syscall_64+0x9b/0x14c0
[ 5565.327011]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 5565.327012] RIP: 0033:0x75037650f91b


On 5/11/26 12:54 PM, Paolo Bonzini wrote:
> On 5/11/26 12:53, David Riley wrote:
>>
>> watchdog: CPU11: Watchdog detected hard LOCKUP on cpu 11
>> watchdog: BUG: soft lockup - CPU#11 stuck for 28s [CPU 0/KVM:16105]
>
> What is the backtrace here?
>
> Thanks,
>
> Paolo
>
>


      reply	other threads:[~2026-05-11 11:07 UTC|newest]

Thread overview: 36+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-05-05 19:51 [PATCH v6 00/28] KVM: combined patchset for MBEC/GMET support Paolo Bonzini
2026-05-05 19:51 ` [PATCH 01/28] KVM: TDX/VMX: rework EPT_VIOLATION_EXEC_FOR_RING3_LIN into PROT_MASK Paolo Bonzini
2026-05-05 19:52 ` [PATCH 02/28] KVM: x86/mmu: remove SPTE_PERM_MASK Paolo Bonzini
2026-05-05 19:52 ` [PATCH 03/28] KVM: x86/mmu: free up bit 10 of PTEs in preparation for MBEC Paolo Bonzini
2026-05-05 19:52 ` [PATCH 04/28] KVM: x86/mmu: shuffle high bits of SPTEs " Paolo Bonzini
2026-05-05 19:52 ` [PATCH 05/28] KVM: x86/mmu: remove SPTE_EPT_* Paolo Bonzini
2026-05-05 19:52 ` [PATCH 06/28] KVM: x86/mmu: merge make_spte_{non,}executable Paolo Bonzini
2026-05-05 19:52 ` [PATCH 07/28] KVM: x86/mmu: rename and clarify BYTE_MASK Paolo Bonzini
2026-05-05 19:52 ` [PATCH 08/28] KVM: x86/mmu: separate more EPT/non-EPT permission_fault() Paolo Bonzini
2026-05-07 14:35   ` Sean Christopherson
2026-05-05 19:52 ` [PATCH 09/28] KVM: x86/mmu: introduce ACC_READ_MASK Paolo Bonzini
2026-05-05 19:52 ` [PATCH 10/28] KVM: x86/mmu: pass PFERR_GUEST_PAGE/FINAL_MASK to kvm_translate_gpa Paolo Bonzini
2026-05-05 19:52 ` [PATCH 11/28] KVM: x86/mmu: pass pte_access for final nGPA->GPA walk Paolo Bonzini
2026-05-05 19:52 ` [PATCH 12/28] KVM: x86: make translate_nested_gpa vendor-specific Paolo Bonzini
2026-05-05 19:52 ` [PATCH 13/28] KVM: x86/mmu: split XS/XU bits for EPT Paolo Bonzini
2026-05-05 19:52 ` [PATCH 14/28] KVM: x86/mmu: move cr4_smep to base role Paolo Bonzini
2026-05-05 19:52 ` [PATCH 15/28] KVM: VMX: enable use of MBEC Paolo Bonzini
2026-05-07 14:40   ` Sean Christopherson
2026-05-05 19:52 ` [PATCH 16/28] KVM: nVMX: pass advanced EPT violation vmexit info to guest Paolo Bonzini
2026-05-05 19:52 ` [PATCH 17/28] KVM: nVMX: pass PFERR_USER_MASK to MMU on EPT violations Paolo Bonzini
2026-05-05 19:52 ` [PATCH 18/28] KVM: x86/mmu: add support for MBEC to EPT page table walks Paolo Bonzini
2026-05-05 19:52 ` [PATCH 19/28] KVM: nVMX: advertise MBEC to nested guests Paolo Bonzini
2026-05-05 19:52 ` [PATCH 20/28] KVM: nVMX: allow MBEC with EVMCS Paolo Bonzini
2026-05-05 19:52 ` [PATCH 21/28] KVM: x86/mmu: propagate access mask from root pages down Paolo Bonzini
2026-05-05 19:52 ` [PATCH 22/28] KVM: x86/mmu: introduce cpu_role bit for availability of PFEC.I/D Paolo Bonzini
2026-05-05 19:52 ` [PATCH 23/28] KVM: SVM: add GMET bit definitions Paolo Bonzini
2026-05-05 19:52 ` [PATCH 24/28] KVM: x86/mmu: hard code more bits in kvm_init_shadow_npt_mmu Paolo Bonzini
2026-05-05 19:52 ` [PATCH 25/28] KVM: x86/mmu: add support for GMET to NPT page table walks Paolo Bonzini
2026-05-05 19:52 ` [PATCH 26/28] KVM: SVM: enable GMET and set it in MMU role Paolo Bonzini
2026-05-05 19:52 ` [PATCH 27/28] KVM: SVM: work around errata 1218 Paolo Bonzini
2026-05-05 19:52 ` [PATCH 28/28] KVM: nSVM: enable GMET for guests Paolo Bonzini
2026-05-07 14:44 ` [PATCH v6 00/28] KVM: combined patchset for MBEC/GMET support Sean Christopherson
2026-05-07 17:49   ` Paolo Bonzini
2026-05-11 10:53 ` David Riley
2026-05-11 10:55   ` Paolo Bonzini
2026-05-11 11:07     ` David Riley [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8ebbfb3d-69a0-42d0-83cd-78e163e3acdf@proxmox.com \
    --to=d.riley@proxmox.com \
    --cc=jon@nutanix.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox