Info

Permalink
Function
unknown function
First occurrence
2023-11-01
Last occurrence
2023-11-01
State
NEW
Components
kernel Tainted
Quality
-22

Statistics

Operating system Count
AlmaLinux 8.8 4
Architecture Count
x86_64 4
Related packages Count
kernel-core 4
 0:4.18.0-477.13.1.el8_8 4

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

Report backtrace


Complete report #601
Frame # Function Binary Source or offset Line
1
__napi_poll
vmlinux 0x2d
2
__napi_poll
vmlinux 0x2d
3
__napi_poll
vmlinux 0x2d
4
? __napi_poll
vmlinux 0x2d
5
? __napi_poll
vmlinux 0x2d
6
__napi_poll
vmlinux 0x2d
7
? __napi_poll
vmlinux 0x2d
8
__napi_poll
vmlinux 0x2d
9
? __napi_poll
vmlinux 0x2d
10
__napi_poll
vmlinux 0x2d
watchdog: BUG: soft lockup - CPU#2 stuck for 56s! [containerd-shim:194060]
Modules linked in: snd_seq_dummy snd_hrtimer tcp_diag inet_diag nls_utf8 isofs vxlan ip6_udp_tunnel udp_tunnel xt_policy xt_mark xt_bpf xt_nat veth nf_conntrack_netlink xt_addrtype br_netfilter vboxsf(OE) xt_CHECKSUM ipt_MASQUERADE xt_conntrack ipt_REJECT nft_compat nf_nat_tftp nft_objref nf_conntrack_tftp vboxvideo drm_vram_helper nft_counter bridge stp llc overlay cfg80211 rfkill nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nf_tables_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink sunrpc intel_rapl_msr intel_rapl_common snd_intel8x0 intel_pmc_core snd_ac97_codec crct10dif_pclmul ac97_bus crc32_pclmul snd_seq snd_seq_device ghash_clmulni_intel snd_pcm rapl snd_timer pcspkr snd soundcore vboxguest(OE) i2c_piix4 video xfs libcrc32c sr_mod sd_mod cdrom t10_pi sg ata_generic vmwgfx drm_ttm_helper ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm
 ahci libahci ata_piix crc32c_intel libata serio_raw e1000 dm_mod fuse
CPU: 2 PID: 194060 Comm: containerd-shim Kdump: loaded Tainted: G           OEL   --------- -  - 4.18.0-477.13.1.el8_8.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
RIP: 0033:0x43d398
Code: ff eb dd 48 89 84 24 d8 00 00 00 84 00 83 b8 78 22 00 00 00 74 0d e8 57 e4 ff ff 48 8b 84 24 d8 00 00 00 31 db e8 48 19 00 00 <48> 89 44 24 58 48 89 5c 24 50 80 3d 47 ae 8d 00 00 75 09 80 3d 3f
RSP: 002b:000000c00008fe40 EFLAGS: 00010202 ORIG_RAX: ffffffffffffff13
RAX: 00027c1675020c37 RBX: 00027c1d5b42ee0c RCX: 0000000000000000
RDX: 0000000000000000 RSI: 00027c1d5b42ee0c RDI: 0000000000000000
RBP: 000000c00008ff20 R08: 00007ffd89150090 R09: 000000001c228068
R10: 000000001c228068 R11: 00007ffd89151000 R12: 000000c00008fdd8
R13: 0000000000000000 R14: 000000c0001c4820 R15: 0000000000000071
FS:  000000c000049c90 GS:  0000000000000000
rcu: INFO: rcu_sched self-detected stall on CPU
rcu: 	3-...!: (1 ticks this GP) idle=d6a/1/0x4000000000000002 softirq=26916127/26916127 fqs=0 
	(t=60000 jiffies g=76101853 q=27)
rcu: rcu_sched kthread starved for 60000 jiffies! g76101853 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: 	Unless rcu_sched kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_sched       state:R  running task     stack:    0 pid:   14 ppid:     2 flags:0x80004000
Call Trace:
 __schedule+0x2d1/0x870
 schedule+0x55/0xf0
 schedule_timeout+0x197/0x300
 ? __next_timer_interrupt+0xf0/0xf0
 ? __prepare_to_swait+0x4f/0x80
 rcu_gp_kthread+0x512/0x8a0
 ? rcu_gp_cleanup+0x3b0/0x3b0
 kthread+0x134/0x150
 ? set_kthread_struct+0x50/0x50
 ret_from_fork+0x1f/0x40
Complete report #615
Frame # Function Binary Source or offset Line
1
ata_scsi_queuecmd
libata 0x4e
2
__napi_poll
vmlinux 0x2d
3
__napi_poll
vmlinux 0x2d
4
? __napi_poll
vmlinux 0x2d
5
__napi_poll
vmlinux 0x2d
6
__napi_poll
vmlinux 0x2d
7
__napi_poll
vmlinux 0x2d
8
__napi_poll
vmlinux 0x2d
9
__napi_poll
vmlinux 0x2d
watchdog: BUG: soft lockup - CPU#0 stuck for 56s! [kworker/0:1H:57]
Modules linked in: snd_seq_dummy snd_hrtimer tcp_diag inet_diag nls_utf8 isofs vxlan ip6_udp_tunnel udp_tunnel xt_policy xt_mark xt_bpf xt_nat veth nf_conntrack_netlink xt_addrtype br_netfilter vboxsf(OE) xt_CHECKSUM ipt_MASQUERADE xt_conntrack ipt_REJECT nft_compat nf_nat_tftp nft_objref nf_conntrack_tftp vboxvideo drm_vram_helper nft_counter bridge stp llc overlay cfg80211 rfkill nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nf_tables_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink sunrpc intel_rapl_msr intel_rapl_common snd_intel8x0 intel_pmc_core snd_ac97_codec crct10dif_pclmul ac97_bus crc32_pclmul snd_seq snd_seq_device ghash_clmulni_intel snd_pcm rapl snd_timer pcspkr snd soundcore vboxguest(OE) i2c_piix4 video xfs libcrc32c sr_mod sd_mod cdrom t10_pi sg ata_generic vmwgfx drm_ttm_helper ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm
 ahci libahci ata_piix crc32c_intel libata serio_raw e1000 dm_mod fuse
CPU: 0 PID: 57 Comm: kworker/0:1H Kdump: loaded Tainted: G           OEL   --------- -  - 4.18.0-477.13.1.el8_8.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
Workqueue: kblockd blk_mq_run_work_fn
RIP: 0010:_raw_spin_unlock_irqrestore+0x11/0x20
Code: c0 e9 d3 06 40 00 b8 01 00 00 00 e9 c9 06 40 00 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 e8 2a 9d 75 ff 66 90 48 89 f7 57 9d <0f> 1f 44 00 00 e9 a5 06 40 00 0f 1f 44 00 00 0f 1f 44 00 00 8b 07
RSP: 0018:ffffafb0820a7c68 EFLAGS: 00010293 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000001 RBX: ffff8b1fd0e90000 RCX: 0000000000000002
RDX: 0000000000000004 RSI: 0000000000000293 RDI: 0000000000000293
RBP: 0000000000000000 R08: 000000012255ffff R09: 0000000000000010
R10: 0000000001114d87 R11: 000000000002000b R12: 0000000000000293
R13: ffff8b1fd0cfe000 R14: ffff8b1fc91e6000 R15: ffffafb0820a7d50
FS:  0000000000000000(0000) GS:ffff8b20e4200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c000b7e000 CR3: 00000001e6010003 CR4: 00000000000306f0
Call Trace:
 ata_scsi_queuecmd+0x4e/0x80 [libata]
 scsi_queue_rq+0x512/0xb10
 blk_mq_dispatch_rq_list+0x154/0x860
 ? sbitmap_get+0x9b/0x200
 blk_mq_do_dispatch_sched+0x34f/0x3a0
 __blk_mq_sched_dispatch_requests+0xc6/0x130
 blk_mq_sched_dispatch_requests+0x30/0x60
 __blk_mq_run_hw_queue+0x2b/0x70
 process_one_work+0x1a7/0x360