SUSE Support

Here When You Need Us

BUG: workqueue leaked lock or atomic: kworker

This document (000020826) is provided subject to the disclaimer at the end of this document.

Environment

SUSE Linux Enterprise Server 15 SP4
SUSE Linux Enterprise Server for SAP Applications 15 SP4

Situation

Systems were updated to the latest versions of the SUSE Linux Enterprise Server 15 Service Pack 4 or SUSE Linux Enterprise Server for SAP Applications 15 Service Pack 4, with the release dates of August 12, 2022 or September 16, 2022.

Kernel crashes for SLES 15 SP4 with the kernel version
 
5.14.21-150400.24.21-default  (Release Date Sep-16-2022)

The server will randomly display the following in the /var/log/messages file
2022-10-10T22:41:44.420062+02:00 server123 kernel: [28460.483072][T22734] BUG: workqueue leaked lock or atomic: kworker/u5:1/0x00000001/22734
2022-10-10T22:41:44.420077+02:00 server123 kernel: [28460.483072][T22734]      last function: xs_error_handle [sunrpc]
2022-10-10T22:41:44.420078+02:00 server123 kernel: [28460.483136][T22734] CPU: 0 PID: 22734 Comm: kworker/u5:1 Kdump: loaded Tainted: G               X    5.14.21-150400.24.21-default #1 SLE15-SP4 7550826c4c7e8c258239e300508e0c8b2a69bad2
2022-10-10T22:41:44.420081+02:00 server123 kernel: [28460.483140][T22734] Hardware name: VMware, Inc. VMware7,1/440BX Desktop Reference Platform, BIOS VMW71.00V.18227214.B64.2106252220 06/25/2021
2022-10-10T22:41:44.420082+02:00 server123 kernel: [28460.483142][T22734] Workqueue: xprtiod xs_error_handle [sunrpc]
2022-10-10T22:41:44.420083+02:00 server123 kernel: [28460.483167][T22734] Call Trace:
2022-10-10T22:41:44.420083+02:00 server123 kernel: [28460.483284][T22734]  <TASK>
2022-10-10T22:41:44.420084+02:00 server123 kernel: [28460.483287][T22734]  dump_stack_lvl+0x45/0x5b
2022-10-10T22:41:44.420084+02:00 server123 kernel: [28460.483297][T22734]  process_one_work+0x390/0x440
2022-10-10T22:41:44.420085+02:00 server123 kernel: [28460.483307][T22734]  worker_thread+0x2d/0x3d0
2022-10-10T22:41:44.420086+02:00 server123 kernel: [28460.483311][T22734]  ? process_one_work+0x440/0x440
2022-10-10T22:41:44.420086+02:00 server123 kernel: [28460.483314][T22734]  kthread+0x154/0x180
2022-10-10T22:41:44.420088+02:00 server123 kernel: [28460.483318][T22734]  ? set_kthread_struct+0x50/0x50
2022-10-10T22:41:44.420088+02:00 server123 kernel: [28460.483321][T22734]  ret_from_fork+0x1f/0x30
2022-10-10T22:41:44.420089+02:00 server123 kernel: [28460.483330][T22734]  </TASK>
2022-10-10T22:41:44.420090+02:00 server123 kernel: [28460.483335][T22734] BUG: scheduling while atomic: kworker/u5:1/22734/0x00000002
2022-10-10T22:41:44.420091+02:00 server123 kernel: [28460.483337][T22734] Modules linked in: binfmt_misc nfs_layout_nfsv41_files rpcsec_gss_krb5 nfsv4 dns_resolver nfs fscache netfs af_packet iscsi_ibft iscsi_boot_sysfs rfkill vsock_loopback vmw_vsock_virtio_transport_c
ommon vmw_vsock_vmci_transport vsock nls_iso8859_1 nls_cp437 vfat fat intel_rapl_msr vmw_balloon intel_rapl_common joydev pcspkr vmxnet3 vmw_vmci ac button nfsd auth_rpcgss nfs_acl lockd grace sunrpc fuse configfs ip_tables x_tables xfs libcrc32c vmwgfx crc32_pclmul ttm
crc32c_intel drm_kms_helper sd_mod syscopyarea sysfillrect sysimgblt t10_pi fb_sys_fops cec ata_generic ghash_clmulni_intel rc_core aesni_intel crypto_simd cryptd ata_piix ahci serio_raw drm libahci vmw_pvscsi libata dm_mirror dm_region_hash dm_log sg dm_multipath dm_m
od scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod efivarfs
2022-10-10T22:41:44.420092+02:00 server123 kernel: [28460.483401][T22734] Supported: Yes, External
2022-10-10T22:41:44.420093+02:00 server123 kernel: [28460.483403][T22734] CPU: 0 PID: 22734 Comm: kworker/u5:1 Kdump: loaded Tainted: G               X    5.14.21-150400.24.21-default #1 SLE15-SP4 7550826c4c7e8c258239e300508e0c8b2a69bad2
2022-10-10T22:41:44.420094+02:00 server123 kernel: [28460.483406][T22734] Hardware name: VMware, Inc. VMware7,1/440BX Desktop Reference Platform, BIOS VMW71.00V.18227214.B64.2106252220 06/25/2021
2022-10-10T22:41:44.420095+02:00 server123 kernel: [28460.483408][T22734] Workqueue:  0x0 (xprtiod)
2022-10-10T22:41:44.420095+02:00 server123 kernel: [28460.483411][T22734] Call Trace:
2022-10-10T22:41:44.420096+02:00 server123 kernel: [28460.483412][T22734]  <TASK>
2022-10-10T22:41:44.420097+02:00 server123 kernel: [28460.483413][T22734]  dump_stack_lvl+0x45/0x5b
2022-10-10T22:41:44.420098+02:00 server123 kernel: [28460.483416][T22734]  __schedule_bug+0x52/0x70
2022-10-10T22:41:44.420098+02:00 server123 kernel: [28460.483420][T22734]  __schedule+0xdc4/0x1140
2022-10-10T22:41:44.420099+02:00 server123 kernel: [28460.483426][T22734]  ? dump_stack_lvl+0x4a/0x5b
2022-10-10T22:41:44.420099+02:00 server123 kernel: [28460.483429][T22734]  schedule+0x64/0xe0
2022-10-10T22:41:44.420101+02:00 server123 kernel: [28460.483431][T22734]  worker_thread+0xab/0x3d0
2022-10-10T22:41:44.420101+02:00 server123 kernel: [28460.483435][T22734]  ? process_one_work+0x440/0x440
2022-10-10T22:41:44.420102+02:00 server123 kernel: [28460.483438][T22734]  kthread+0x154/0x180
2022-10-10T22:41:44.420103+02:00 server123 kernel: [28460.483440][T22734]  ? set_kthread_struct+0x50/0x50
2022-10-10T22:41:44.420104+02:00 server123 kernel: [28460.483443][T22734]  ret_from_fork+0x1f/0x30
2022-10-10T22:41:44.420105+02:00 server123 kernel: [28460.483448][T22734]  </TASK>
2022-10-10T22:42:52.614751+02:00 server123 kernel: [    0.000000][    T0] Linux version 5.14.21-150400.24.21-default (geeko@buildhost) (gcc (SUSE Linux) 7.5.0, GNU ld (GNU Binutils; SUSE Linux Enterprise 15) 2.37.20211103-150100.7.37) #1 SMP PREEMPT_DYNAMIC Wed Sep 7 06
:51:18 UTC 2022 (974d0aa)
2022-10-10T22:42:52.615136+02:00 server123 kernel: [    0.000000][    T0] Command line: BOOT_IMAGE=/boot/vmlinuz-5.14.21-150400.24.21-default root=/dev/mapper/system-root plymouth.enable=0 console=ttyS0,115200 console=tty0 mitigations=auto vmw_pvscsi.cmd_per_lun=1024 vm
w_pvscsi.ring_pages=32 quiet systemd.show_status=1 crashkernel=300M,high crashkernel=72M,low
2022-10-10T22:42:52.615139+02:00 server123 kernel: [    0.000000][    T0] Disabled fast string operations
2022-10-10T22:42:52.615140+02:00 server123 kernel: [    0.000000][    T0] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
2022-10-10T22:42:52.615140+02:00 server123 kernel: [    0.000000][    T0] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
2022-10-10T22:42:52.615140+02:00 server123 kernel: [    0.000000][    T0] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
2022-10-10T22:42:52.614794+02:00 server123 systemd[1]: Queued start job for default target Multi-User System.
This messages may repeat several times in rapid succession, or might not appear again.
 

Resolution

A patch to resolve this was released in kernel version 5.14.21-150400.24.28.1. Please update to the latest kernel version on 15 SP4.

Cause

The main kernel source tree for Linux had a bug in it.  The bug as been identified by the open source community and a patch for the bug has been released.
 

Status

Reported to Engineering

Disclaimer

This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:000020826
  • Creation Date: 25-Oct-2022
  • Modified Date:02-Nov-2022
    • SUSE Linux Enterprise Server
    • SUSE Linux Enterprise Server for SAP Applications

< Back to Support Search

For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com

tick icon

SUSE Support Forums

Get your questions answered by experienced Sys Ops or interact with other SUSE community experts.

tick icon

Support Resources

Learn how to get the most from the technical support you receive with your SUSE Subscription, Premium Support, Academic Program, or Partner Program.

tick icon

Open an Incident

Open an incident with SUSE Technical Support, manage your subscriptions, download patches, or manage user access.