Loading...
Loading...
The following stack trace may be observed in the messages or journalctl logs. kernel: NMI watchdog: BUG: soft lockup - CPU#2 stuck for 23s! [lia-3.5.0.468:374992] kernel: CPU: 2 PID: 374992 Comm: lia-3.5.0.468 Kdump: loaded Not tainted 3.10.0-862.el7.x86_64 #1 kernel: Hardware name: Dell Inc. PowerEdge R740xd/XXXXX, BIOS 2.6.4 04/09/2020 kernel: task: ffff89805bfbeeb0 ti: ffff89803fa74000 task.ti: ffff89803fa74000 kernel: RIP: 0010:[<ffffffffaf8617bf>] [<ffffffffaf8617bf>] fsnotify+0x19f/0x510 kernel: RSP: 0018:ffff89803fa77dc0 EFLAGS: 00000246 kernel: RAX: ffff8988557a1301 RBX: ffff89803fa77e10 RCX: 0000000000000000 kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 kernel: RBP: ffff89803fa77e90 R08: 0000000000000000 R09: 0000000000000000 kernel: R10: 0000000000000000 R11: 0000000000000000 R12: ffff8980595692f0 kernel: R13: ffff89805a607400 R14: ffff890000000026 R15: ffff89805a607400 kernel: FS: 00007fcb6c130700(0000) GS:ffff89805ca40000(0000) knlGS:0000000000000000 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kernel: CR2: 00007fcb6c12bff0 CR3: 0000000ff4fb6000 CR4: 00000000007607e0 kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 kernel: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 kernel: PKRU: 55555554 kernel: Call Trace: kernel: [<ffffffffaf8769f3>] ? vfs_lock_file+0x53/0x60 kernel: [<ffffffffaf81cf41>] __fput+0xa1/0x260 kernel: [<ffffffffaf81d1ee>] ____fput+0xe/0x10 kernel: [<ffffffffaf6b784b>] task_work_run+0xbb/0xe0 kernel: [<ffffffffaf62ac55>] do_notify_resume+0xa5/0xc0 kernel: [<ffffffffafd1fb1d>] int_signal+0x12/0x17
The multiple soft lockups in due to fsnotify() function call which is the Operating System function.
This is not a Powerflex but an Operating System kernel bug. Please contact the OS vendor to further investigate the issue with fsnotify() function call.
Click on a version to see all relevant bugs
Dell Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.