Kerneloops

Similar reports
Problem #374023
Component
kernel
Last affected version
0:3.10.0-1160.53.1.el7
Executable
unknown
First occurrence
2021-05-25
Last occurrence
2026-01-27
Unique reports
7
Quality
-48

Statistics

Operating system Unique / Total count
CentOS 7 7 / 23
Operating system Count
CentOS 7 23
Architecture Count
x86_64 23
Related packages Count
kernel 23
 0:3.10.0-1062.4.1.el7 20
 0:3.10.0-1127.el7 1
 0:3.10.0-1160.119.1.el7 1
 0:3.10.0-1160.53.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_unlock_irqrestore
vmlinux 0xffffffffb4f81125
Build id: 3.10.0-1062.4.1.el7.x86_64
0x15
2
ata_scsi_queuecmd
libata 0xffffffffc0252d65
Build id: 3.10.0-1062.4.1.el7.x86_64
0x155
3
? ata_scsiop_inq_std
libata 0xffffffffc024edb0
Build id: 3.10.0-1062.4.1.el7.x86_64
0xf0
4
scsi_dispatch_cmd
vmlinux 0xffffffffb4cdd100
Build id: 3.10.0-1062.4.1.el7.x86_64
0xb0
5
scsi_request_fn
vmlinux 0xffffffffb4ce676c
Build id: 3.10.0-1062.4.1.el7.x86_64
0x4cc
6
__blk_run_queue
vmlinux 0xffffffffb4b4d7b9
Build id: 3.10.0-1062.4.1.el7.x86_64
0x39
7
blk_execute_rq_nowait
vmlinux 0xffffffffb4b55835
Build id: 3.10.0-1062.4.1.el7.x86_64
0xb5
8
blk_execute_rq
vmlinux 0xffffffffb4b5597b
Build id: 3.10.0-1062.4.1.el7.x86_64
0x8b
9
scsi_execute
vmlinux 0xffffffffb4ce3233
Build id: 3.10.0-1062.4.1.el7.x86_64
0xd3
10
scsi_execute_req_flags
vmlinux 0xffffffffb4ce4f7e
Build id: 3.10.0-1062.4.1.el7.x86_64
0x8e
11
sr_check_events
sr_mod 0xffffffffc033d31c
Build id: 3.10.0-1062.4.1.el7.x86_64
0xbc
12
cdrom_check_events
cdrom 0xffffffffc032205e
Build id: 3.10.0-1062.4.1.el7.x86_64
0x1e
13
sr_block_check_events
sr_mod 0xffffffffc033e0b1
Build id: 3.10.0-1062.4.1.el7.x86_64
0xb1
14
disk_check_events
vmlinux 0xffffffffb4b634e6
Build id: 3.10.0-1062.4.1.el7.x86_64
0x66
15
disk_events_workfn
vmlinux 0xffffffffb4b63626
Build id: 3.10.0-1062.4.1.el7.x86_64
0x16
16
process_one_work
vmlinux 0xffffffffb48bd1df
Build id: 3.10.0-1062.4.1.el7.x86_64
0x17f
17
worker_thread
vmlinux 0xffffffffb48be2f6
Build id: 3.10.0-1062.4.1.el7.x86_64
0x126
18
? manage_workers.isra.26
vmlinux 0xffffffffb48be1d0
Build id: 3.10.0-1062.4.1.el7.x86_64
0x2a0
19
kthread
vmlinux 0xffffffffb48c51b1
Build id: 3.10.0-1062.4.1.el7.x86_64
0xd1
20
? insert_kthread_work
vmlinux 0xffffffffb48c50e0
Build id: 3.10.0-1062.4.1.el7.x86_64
0x40
21
ret_from_fork_nospec_begin
vmlinux 0xffffffffb4f8bd37
Build id: 3.10.0-1062.4.1.el7.x86_64
0x21
22
? insert_kthread_work
vmlinux 0xffffffffb48c50e0
Build id: 3.10.0-1062.4.1.el7.x86_64
0x40
NMI watchdog: BUG: soft lockup - CPU#7 stuck for 39s! [kworker/7:1:15176]
Modules linked in: ebtable_filter ebtables devlink ip6table_filter ip6_tables binfmt_misc iptable_nat nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw ipt_REJECT nf_reject_ipv4 nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack iptable_filter ppdev iosf_mbi crc32_pclmul ghash_clmulni_intel snd_hda_codec_generic aesni_intel lrw gf128mul glue_helper ablk_helper cryptd snd_hda_intel joydev snd_hda_codec virtio_balloon snd_hda_core sg snd_hwdep snd_seq parport_pc snd_seq_device parport snd_pcm snd_timer snd pcspkr i2c_piix4 soundcore auth_rpcgss sunrpc ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi virtio_net virtio_blk cirrus drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ata_piix libata serio_raw crct10dif_pclmul crct10dif_common crc32c_intel
virtio_pci floppy virtio_ring virtio drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
CPU: 7 PID: 15176 Comm: kworker/7:1 Kdump: loaded Tainted: G             L ------------   3.10.0-1062.4.1.el7.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
Workqueue: events_freezable disk_events_workfn
task: ffff89e779e1d230 ti: ffff89e79ad54000 task.ti: ffff89e79ad54000
RIP: 0010:[<ffffffffb4f81125>]  [<ffffffffb4f81125>] _raw_spin_unlock_irqrestore+0x15/0x20
RSP: 0000:ffff89e79ad57a68  EFLAGS: 00000286
RAX: 0000000000000000 RBX: ffff89e79ad57a10 RCX: ffff89e79f1e4405
RDX: ffff89e79f1da4a0 RSI: 0000000000000286 RDI: 0000000000000286
RBP: ffff89e79ad57a68 R08: 0000000000000001 R09: ffff89e797088198
R10: ffff89e79a8728d8 R11: 0000000000000000 R12: ffff89e797089e80
R13: ffff89e797088000 R14: ffff89e797088158 R15: ffffffffc025e8e0
FS:  0000000000000000(0000) GS:ffff89e79f1c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000b582f007 CR3: 0000002f4937a000 CR4: 00000000001606e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
[<ffffffffc0252d65>] ata_scsi_queuecmd+0x155/0x450 [libata]
[<ffffffffc024edb0>] ? ata_scsiop_inq_std+0xf0/0xf0 [libata]
[<ffffffffb4cdd100>] scsi_dispatch_cmd+0xb0/0x240
[<ffffffffb4ce676c>] scsi_request_fn+0x4cc/0x680
[<ffffffffb4b4d7b9>] __blk_run_queue+0x39/0x50
[<ffffffffb4b55835>] blk_execute_rq_nowait+0xb5/0x170
[<ffffffffb4b5597b>] blk_execute_rq+0x8b/0x150
[<ffffffffb4ce3233>] scsi_execute+0xd3/0x170
[<ffffffffb4ce4f7e>] scsi_execute_req_flags+0x8e/0x100
[<ffffffffc033d31c>] sr_check_events+0xbc/0x2d0 [sr_mod]
[<ffffffffc032205e>] cdrom_check_events+0x1e/0x40 [cdrom]
[<ffffffffc033e0b1>] sr_block_check_events+0xb1/0x120 [sr_mod]
[<ffffffffb4b634e6>] disk_check_events+0x66/0x190
[<ffffffffb4b63626>] disk_events_workfn+0x16/0x20
[<ffffffffb48bd1df>] process_one_work+0x17f/0x440
[<ffffffffb48be2f6>] worker_thread+0x126/0x3c0
[<ffffffffb48be1d0>] ? manage_workers.isra.26+0x2a0/0x2a0
[<ffffffffb48c51b1>] kthread+0xd1/0xe0
[<ffffffffb48c50e0>] ? insert_kthread_work+0x40/0x40
[<ffffffffb4f8bd37>] ret_from_fork_nospec_begin+0x21/0x21
[<ffffffffb48c50e0>] ? insert_kthread_work+0x40/0x40
Code: 07 00 0f 1f 40 00 5d c3 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 c6 07 00 0f 1f 40 00 48 89 f7 57 9d <0f> 1f 44 00 00 5d c3 0f 1f 40 00 0f 1f 44 00 00 55 48 89 e5 48