Kerneloops

Similar reports
Problem #661794
Component
kernel Tainted
Last affected version
0:3.10.0-957.el7
Executable
unknown
First occurrence
2020-10-27
Last occurrence
2024-05-19
Unique reports
21
Quality
-34

Statistics

Operating system Unique / Total count
CentOS 7 21 / 19,517
Operating system Count
CentOS 7 19,517
Architecture Count
x86_64 19,517
Related packages Count
kernel 19,517
 0:3.10.0-957.el7 14,454
 0:3.10.0-862.el7 4,890
 0:3.10.0-862.14.4.el7 170
 0:3.10.0-862.3.2.el7 3

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff9f70e78e
Build id: 3.10.0-862.3.2.el7.x86_64
0x19
2
__warn
vmlinux 0xffffffff9f091998
Build id: 3.10.0-862.3.2.el7.x86_64
0xd8
3
warn_slowpath_null
vmlinux 0xffffffff9f091add
Build id: 3.10.0-862.3.2.el7.x86_64
0x1d
4
update_cpumasks_hier
vmlinux 0xffffffff9f122719
Build id: 3.10.0-862.3.2.el7.x86_64
0x3c9
5
? cpuset_read_u64
vmlinux 0xffffffff9f11fd30
Build id: 3.10.0-862.3.2.el7.x86_64
0x100
6
cpuset_write_resmask
vmlinux 0xffffffff9f1229b3
Build id: 3.10.0-862.3.2.el7.x86_64
0x253
7
? cgroup_rightmost_descendant
vmlinux 0xffffffff9f118080
Build id: 3.10.0-862.3.2.el7.x86_64
0x80
8
? update_cpumasks_hier
vmlinux 0xffffffff9f122760
Build id: 3.10.0-862.3.2.el7.x86_64
0x410
9
cgroup_file_write
vmlinux 0xffffffff9f11a471
Build id: 3.10.0-862.3.2.el7.x86_64
0x1d1
10
? __sb_start_write
vmlinux 0xffffffff9f21df98
Build id: 3.10.0-862.3.2.el7.x86_64
0x58
11
? security_file_permission
vmlinux 0xffffffff9f2d0d57
Build id: 3.10.0-862.3.2.el7.x86_64
0x27
12
vfs_write
vmlinux 0xffffffff9f21b010
Build id: 3.10.0-862.3.2.el7.x86_64
0xc0
13
SyS_write
vmlinux 0xffffffff9f21be3f
Build id: 3.10.0-862.3.2.el7.x86_64
0x7f
14
system_call_fastpath
vmlinux 0xffffffff9f72082f
Build id: 3.10.0-862.3.2.el7.x86_64
0x1c
WARNING: CPU: 21 PID: 376683 at kernel/cpuset.c:994 update_cpumasks_hier+0x3c9/0x410
Modules linked in: vsock_diag vsock sctp_diag sctp unix_diag af_packet_diag netlink_diag udp_diag binfmt_misc cfg80211 rfkill joydev bonding tcp_diag inet_diag 8021q garp mrp stp llc sunrpc xfs dm_mirror dm_region_hash dm_log dm_mod libcrc32c skx_edac intel_powerclamp coretemp intel_rapl iosf_mbi kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul iTCO_wdt iTCO_vendor_support glue_helper ablk_helper cryptd cdc_ether sg usbnet mii pcspkr wmi ipmi_si ipmi_devintf ipmi_msghandler nfit mei_me mei lpc_ich shpchp i2c_i801 libnvdimm acpi_power_meter acpi_pad ip_tables ext4 mbcache jbd2 sd_mod crc_t10dif crct10dif_generic mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common crc32c_intel i40e ahci drm nvme libahci nvme_core megaraid_sas libata ptp pps_core i2c_core
CPU: 21 PID: 376683 Comm: cgset Kdump: loaded Tainted: G        W      ------------   3.10.0-862.3.2.el7.x86_64 #1
Hardware name: Lenovo ThinkSystem SR630 -[7X02CTO1WW]-/-[7X02CTO1WW]-, BIOS -[IVE122G-1.31]- 08/15/2018
Call Trace:
 [<ffffffff9f70e78e>] dump_stack+0x19/0x1b
 [<ffffffff9f091998>] __warn+0xd8/0x100
 [<ffffffff9f091add>] warn_slowpath_null+0x1d/0x20
 [<ffffffff9f122719>] update_cpumasks_hier+0x3c9/0x410
 [<ffffffff9f11fd30>] ? cpuset_read_u64+0x100/0x100
 [<ffffffff9f1229b3>] cpuset_write_resmask+0x253/0xa10
 [<ffffffff9f118080>] ? cgroup_rightmost_descendant+0x80/0x80
 [<ffffffff9f122760>] ? update_cpumasks_hier+0x410/0x410
 [<ffffffff9f11a471>] cgroup_file_write+0x1d1/0x2d0
 [<ffffffff9f21df98>] ? __sb_start_write+0x58/0x110
 [<ffffffff9f2d0d57>] ? security_file_permission+0x27/0xa0
 [<ffffffff9f21b010>] vfs_write+0xc0/0x1f0
 [<ffffffff9f21be3f>] SyS_write+0x7f/0xf0
 [<ffffffff9f72082f>] system_call_fastpath+0x1c/0x21