Kerneloops

Similar reports
Problem #662037
Component
kernel Tainted
Last affected version
0:3.10.0-957.el7
Executable
unknown
First occurrence
2020-10-22
Last occurrence
2025-03-08
Unique reports
15
Quality
-33

Statistics

Operating system Unique / Total count
CentOS 7 15 / 23
Operating system Count
CentOS 7 23
Architecture Count
x86_64 23
Related packages Count
kernel 23
 0:3.10.0-1160.el7 9
 0:3.10.0-862.el7 4
 0:3.10.0-957.el7 4
 0:3.10.0-862.14.4.el7 2
 0:3.10.0-1160.41.1.el7 2
 0:3.10.0-1160.11.1.el7 1
 0:3.10.0-1160.53.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
generic_exec_single
vmlinux 0xffffffffb490aa2a
Build id: 3.10.0-862.14.4.el7.x86_64
0xfa
2
? leave_mm
vmlinux 0xffffffffb4879c90
Build id: 3.10.0-862.14.4.el7.x86_64
0x110
3
? leave_mm
vmlinux 0xffffffffb4879c90
Build id: 3.10.0-862.14.4.el7.x86_64
0x110
4
? leave_mm
vmlinux 0xffffffffb4879c90
Build id: 3.10.0-862.14.4.el7.x86_64
0x110
5
smp_call_function_single
vmlinux 0xffffffffb490ab3f
Build id: 3.10.0-862.14.4.el7.x86_64
0x5f
6
? cpumask_next_and
vmlinux 0xffffffffb4b4edb5
Build id: 3.10.0-862.14.4.el7.x86_64
0x35
7
smp_call_function_many
vmlinux 0xffffffffb490b0eb
Build id: 3.10.0-862.14.4.el7.x86_64
0x22b
8
native_flush_tlb_others
vmlinux 0xffffffffb4879e58
Build id: 3.10.0-862.14.4.el7.x86_64
0xb8
9
flush_tlb_mm_range
vmlinux 0xffffffffb4879ec8
Build id: 3.10.0-862.14.4.el7.x86_64
0x68
10
change_protection
vmlinux 0xffffffffb49d2b1d
Build id: 3.10.0-862.14.4.el7.x86_64
0x5cd
11
mprotect_fixup
vmlinux 0xffffffffb49d2d2f
Build id: 3.10.0-862.14.4.el7.x86_64
0x15f
12
do_mprotect_pkey
vmlinux 0xffffffffb49d3162
Build id: 3.10.0-862.14.4.el7.x86_64
0x252
13
SyS_mprotect
vmlinux 0xffffffffb49d3283
Build id: 3.10.0-862.14.4.el7.x86_64
0x13
14
system_call_fastpath
vmlinux 0xffffffffb4f2579b
Build id: 3.10.0-862.14.4.el7.x86_64
0x22
NMI watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [java:1746]
Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter devlink vmw_vsock_vmci_transport vsock sunrpc iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel snd_seq_midi snd_seq_midi_event lrw gf128mul glue_helper ablk_helper cryptd snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm snd_timer ppdev snd vmw_balloon soundcore pcspkr nfit sg joydev libnvdimm parport_pc parport vmw_vmci shpchp i2c_piix4 ip_tables xfs libcrc32c sr_mod cdrom ata_generic sd_mod crc_t10dif crct10dif_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect
sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common crc32c_intel drm mptspi serio_raw scsi_transport_spi e1000 mptscsih ata_piix libata i2c_core mptbase dm_mirror dm_region_hash dm_log dm_mod
CPU: 1 PID: 1746 Comm: java Tainted: G        W    L ------------   3.10.0-862.14.4.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
task: ffff9eb73a65cf10 ti: ffff9eb3f84b4000 task.ti: ffff9eb3f84b4000
RIP: 0010:[<ffffffffb490aa2a>]  [<ffffffffb490aa2a>] generic_exec_single+0xfa/0x1b0
RSP: 0018:ffff9eb3f84b7bf0  EFLAGS: 00000202
RAX: 0000000000000080 RBX: ffff9eb3f84b7bc0 RCX: 0000000000000001
RDX: ffffffffb50132b0 RSI: 0000000000000080 RDI: 0000000000000282
RBP: ffff9eb3f84b7c40 R08: ffffffffb50132a8 R09: 0000000000000000
R10: 0000000800000000 R11: 00007fa635a8b000 R12: ffffffffb4f18af8
R13: ffffffffb4f18b04 R14: ffffffffb4f18af8 R15: ffffffffb4f18b04
FS:  00007fa61c1f9700(0000) GS:ffff9eb76d640000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fd659f59710 CR3: 00000000b84d6000 CR4: 00000000003607e0
Call Trace:
[<ffffffffb4879c90>] ? leave_mm+0x110/0x110
[<ffffffffb4879c90>] ? leave_mm+0x110/0x110
[<ffffffffb4879c90>] ? leave_mm+0x110/0x110
[<ffffffffb490ab3f>] smp_call_function_single+0x5f/0xa0
[<ffffffffb4b4edb5>] ? cpumask_next_and+0x35/0x50
[<ffffffffb490b0eb>] smp_call_function_many+0x22b/0x270
[<ffffffffb4879e58>] native_flush_tlb_others+0xb8/0xc0
[<ffffffffb4879ec8>] flush_tlb_mm_range+0x68/0x140
[<ffffffffb49d2b1d>] change_protection+0x5cd/0x680
[<ffffffffb49d2d2f>] mprotect_fixup+0x15f/0x340
[<ffffffffb49d3162>] do_mprotect_pkey+0x252/0x360
[<ffffffffb49d3283>] SyS_mprotect+0x13/0x20
[<ffffffffb4f2579b>] system_call_fastpath+0x22/0x27
Code: c0 96 01 00 48 89 de 48 03 14 c5 a0 54 53 b5 48 89 df e8 6a a1 25 00 84 c0 75 46 45 85 ed 74 11 f6 43 20 01 74 0b 0f 1f 00 f3 90 <f6> 43 20 01 75 f8 31 c0 48 8b 7c 24 28 65 48 33 3c 25 28 00 00