Kerneloops

Similar reports
Problem #699918
Component
kernel Tainted
Last affected version
0:3.10.0-693.el7
Executable
unknown
First occurrence
2025-03-30
Last occurrence
2025-03-30
Unique reports
1
Quality
-33

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-693.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff810f99a2
Build id: 3.10.0-693.el7.x86_64
0x202
2
? netif_rx_internal
vmlinux 0xffffffff815861a2
Build id: 3.10.0-693.el7.x86_64
0x22
3
? setup_data_read
vmlinux 0xffffffff81031c80
Build id: 3.10.0-693.el7.x86_64
0x90
4
? netif_rx_internal
vmlinux 0xffffffff815861a3
Build id: 3.10.0-693.el7.x86_64
0x23
5
on_each_cpu
vmlinux 0xffffffff810f9a5d
Build id: 3.10.0-693.el7.x86_64
0x2d
6
? netif_rx_internal
vmlinux 0xffffffff815861a2
Build id: 3.10.0-693.el7.x86_64
0x22
7
text_poke_bp
vmlinux 0xffffffff810324d4
Build id: 3.10.0-693.el7.x86_64
0x94
8
arch_jump_label_transform
vmlinux 0xffffffff8102f558
Build id: 3.10.0-693.el7.x86_64
0x68
9
__jump_label_update
vmlinux 0xffffffff8117fb8f
Build id: 3.10.0-693.el7.x86_64
0x5f
10
jump_label_update
vmlinux 0xffffffff8117fc4d
Build id: 3.10.0-693.el7.x86_64
0x9d
11
static_key_slow_inc
vmlinux 0xffffffff8117fead
Build id: 3.10.0-693.el7.x86_64
0xad
12
net_enable_timestamp
vmlinux 0xffffffff815822a4
Build id: 3.10.0-693.el7.x86_64
0x44
13
sock_enable_timestamp
vmlinux 0xffffffff815700a5
Build id: 3.10.0-693.el7.x86_64
0x45
14
sock_setsockopt
vmlinux 0xffffffff8157042a
Build id: 3.10.0-693.el7.x86_64
0x37a
NMI watchdog: BUG: soft lockup - CPU#1 stuck for 24s! [chronyd:734]
Modules linked in: veth xt_nat nf_conntrack_netlink nfnetlink xt_addrtype br_netfilter xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter overlay(T) vmhgfs(OE) vmw_vsock_vmci_transport vsock snd_seq_midi snd_seq_midi_event ext4 mbcache jbd2 snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus snd_seq snd_seq_device crc32_pclmul snd_pcm ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper ablk_helper cryptd vmw_balloon snd_timer sg pcspkr nfit joydev snd soundcore libnvdimm i2c_piix4 vmw_vmci shpchp parport_pc parport nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables
xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ata_piix libata e1000 crct10dif_pclmul crct10dif_common mptspi crc32c_intel scsi_transport_spi serio_raw mptscsih mptbase i2c_core dm_mirror dm_region_hash dm_log dm_mod
CPU: 1 PID: 734 Comm: chronyd Tainted: G           OEL ------------ T 3.10.0-693.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
task: ffff88022fb49fa0 ti: ffff8800ba764000 task.ti: ffff8800ba764000
RIP: 0010:[<ffffffff810f99a2>]  [<ffffffff810f99a2>] smp_call_function_many+0x202/0x260
RSP: 0018:ffff8800ba767d48  EFLAGS: 00000202
RAX: 0000000000000000 RBX: 00000000000000fc RCX: ffff88023561af20
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000000000000
RBP: ffff8800ba767d80 R08: ffff88017cf53400 R09: ffffffff813227d9
R10: ffff880235659c80 R11: ffffea000662d000 R12: 0000000000000296
R13: ffff8800ba767cf8 R14: ffff8800ba767cb8 R15: 0000000000000296
FS:  00007f88aa34f740(0000) GS:ffff880235640000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc360dc81f0 CR3: 0000000034712000 CR4: 00000000003407e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Stack:
00000001ba767d58 ffffffff81b1c820 ffffffff815861a2 ffffffff81031c80
0000000000000000 ffffffff815861a3 0000000000000000 ffff8800ba767da8
ffffffff810f9a5d ffffffff815861a2 ffff8800ba767dfb 0000000000000005
Call Trace:
[<ffffffff815861a2>] ? netif_rx_internal+0x22/0x110
[<ffffffff81031c80>] ? setup_data_read+0x90/0x90
[<ffffffff815861a3>] ? netif_rx_internal+0x23/0x110
[<ffffffff810f9a5d>] on_each_cpu+0x2d/0x60
[<ffffffff815861a2>] ? netif_rx_internal+0x22/0x110
[<ffffffff810324d4>] text_poke_bp+0x94/0xf0
[<ffffffff8102f558>] arch_jump_label_transform+0x68/0xb0
[<ffffffff8117fb8f>] __jump_label_update+0x5f/0x80
[<ffffffff8117fc4d>] jump_label_update+0x9d/0xb0
[<ffffffff8117fead>] static_key_slow_inc+0xad/0xb0
[<ffffffff815822a4>] net_enable_timestamp+0x44/0x50
[<ffffffff815700a5>] sock_enable_timestamp+0x45/0x50
[<ffffffff8157042a>] sock_setsockopt+0x37a/0x880