"NMI watchdog: BUG: soft lockup..." happening on system at wake_up_all_events_and_reset_scanningQueue()

Solution Verified - Updated -

Issue

  • System is not responding and shows the soft lockup messages
[6417704.538699] NMI watchdog: BUG: soft lockup - CPU#2 stuck for 23s! [Broker KM Evnt:15922]
[6417704.538782] Modules linked in: nfsv3 nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache fileaccess_mod_100605107(OE) mfeaack_100605107(OE) vmw_vsock_vmci_transport vsock sunrpc ext4 mbcache jbd2 sb_edac iosf_mbi crc32_pclmul ppdev vmw_balloon ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr joydev sg vmw_vmci i2c_piix4 parport_pc parport dm_multipath binfmt_misc ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common crc32c_intel drm ata_piix serio_raw libata vmw_pvscsi vmxnet3 drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod
[6417704.538796] CPU: 2 PID: 15922 Comm: Broker KM Evnt Kdump: loaded Tainted: G           OEL ------------   3.10.0-1062.7.1.el7.x86_64 #1
[6417704.538797] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
[6417704.538799] task: ffff8fefc9b40000 ti: ffff8fefbce00000 task.ti: ffff8fefbce00000
[6417704.538812] RIP: 0010:[<ffffffffc04414f8>]  [<ffffffffc04414f8>] wake_up_all_events_and_reset_scanningQueue+0x288/0x4e0 [fileaccess_mod_100605107]
[6417704.538816] RSP: 0018:ffff8fefbce03bb8  EFLAGS: 00000283
[6417704.538817] RAX: ffff8fefeea78088 RBX: 0000000000000246 RCX: ffff8fee35fcc730
[6417704.538819] RDX: 0000000000000001 RSI: 0000000008fc977e RDI: ffffffffc044a60c
[6417704.538820] RBP: ffff8fefbce03bf0 R08: e200000000000000 R09: 2000000000000000
[6417704.538821] R10: 8788000000000000 R11: 0001f46a3f2150f1 R12: ffffdc50c5e1bec0
[6417704.538822] R13: ffff8feeb744d210 R14: 0000000000000000 R15: ffff8ff02b727160
[6417704.538824] FS:  00007f37c57fa700(0000) GS:ffff8ff03fd00000(0000) knlGS:0000000000000000
[6417704.538825] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[6417704.538826] CR2: 00007fe164840b90 CR3: 000000022beb8000 CR4: 00000000001607e0
[6417704.538832] Call Trace:
[6417704.538852]  [<ffffffff8288d400>] netlink_unicast+0x170/0x210
[6417704.538859]  [<ffffffff8288d7a8>] netlink_sendmsg+0x308/0x420
[6417704.538863]  [<ffffffff8282f3a6>] sock_sendmsg+0xb6/0xf0
[6417704.538872]  [<ffffffff82988975>] ? do_page_fault+0x35/0x90
[6417704.538875]  [<ffffffff8282fad1>] SYSC_sendto+0x121/0x1c0
[6417704.538879]  [<ffffffff82988678>] ? __do_page_fault+0x238/0x500
[6417704.538881]  [<ffffffff828315ee>] SyS_sendto+0xe/0x10
[6417704.538884]  [<ffffffff8298dede>] system_call_fastpath+0x25/0x2a

Environment

  • Red Hat Enterprise Linux 7
  • fileaccess or mfe_fileaccess module is loaded

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content