Kerneloops

Similar reports
Problem #794965
Component
kernel Tainted
Last affected version
0:3.10.0-1160.118.1.el7
Executable
unknown
First occurrence
2025-04-10
Last occurrence
2025-04-10
Unique reports
1
Quality
-15

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.118.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
nr_context_switches
vmlinux 0xffffffff828de890
Build id: 3.10.0-1160.118.1.el7.x86_64
0x40
2
show_stat
vmlinux 0xffffffff82ae25bc
Build id: 3.10.0-1160.118.1.el7.x86_64
0x68c
3
seq_read
vmlinux 0xffffffff82a858a8
Build id: 3.10.0-1160.118.1.el7.x86_64
0x138
4
proc_reg_read
vmlinux 0xffffffff82ad79a0
Build id: 3.10.0-1160.118.1.el7.x86_64
0x40
5
vfs_read
vmlinux 0xffffffff82a5bbef
Build id: 3.10.0-1160.118.1.el7.x86_64
0x9f
6
SyS_read
vmlinux 0xffffffff82a5ca65
Build id: 3.10.0-1160.118.1.el7.x86_64
0x55
7
system_call_fastpath
vmlinux 0xffffffff82fc539a
Build id: 3.10.0-1160.118.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#3 stuck for 21s! [java:25752]
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 21s! [vmtoolsd:854]
Modules linked in: xt_statistic tcp_lp nls_utf8 isofs ip6t_MASQUERADE nf_nat_masquerade_ipv6 ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle vxlan ip6_udp_tunnel udp_tunnel xt_physdev xt_NFLOG nfnetlink_log xt_limit xt_mark xt_multiport xt_comment ip_set veth xt_nat nf_conntrack_netlink xt_addrtype xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter devlink rpcsec_gss_krb5 nfsv4 dns_resolver nfs fscache overlay(T) br_netfilter bridge stp llc vmw_vsock_vmci_transport vsock snd_seq_midi snd_seq_midi_event snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus iosf_mbi snd_seq
crc32_pclmul snd_seq_device ghash_clmulni_intel snd_pcm aesni_intel lrw gf128mul snd_timer snd soundcore glue_helper ablk_helper cryptd vmw_balloon ppdev pcspkr sg joydev parport_pc parport i2c_piix4 vmw_vmci nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ata_piix nfit crct10dif_pclmul crct10dif_common crc32c_intel libnvdimm libata mptspi scsi_transport_spi e1000 mptscsih serio_raw mptbase drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 0 PID: 854 Comm: vmtoolsd Kdump: loaded Tainted: G        W    L ------------ T 3.10.0-1160.118.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
task: ffff8c2b9ac9b180 ti: ffff8c23b54c0000 task.ti: ffff8c23b54c0000
RIP: 0010:[<ffffffff828de890>]  [<ffffffff828de890>] nr_context_switches+0x40/0x70
RSP: 0018:ffff8c23b54c3d28  EFLAGS: 00000202
RAX: ffff8c2b9f100000 RBX: ffff8c2a4ee83ec0 RCX: 000000000000006c
RDX: 000000000000006c RSI: 0000000000000080 RDI: 0000000000000040
RBP: ffff8c23b54c3d40 R08: ffffffff8355e6e8 R09: 3020302030203020
R10: 3020302030203020 R11: 3020302030203020 R12: ffffffff4c0a0008
NMI watchdog: BUG: soft lockup - CPU#7 stuck for 21s! [kworker/u256:1:42119]
R13: 0000000000001188 R14: ffff8c25612301c8 R15: 0000000000000005
FS:  00007fc943ab8780(0000) GS:ffff8c2b9d600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc943acd000 CR3: 000000081ad72000 CR4: 00000000007607f0
PKRU: 55555554
Call Trace:
[<ffffffff82ae25bc>] show_stat+0x68c/0x740
[<ffffffff82a858a8>] seq_read+0x138/0x460
[<ffffffff82ad79a0>] proc_reg_read+0x40/0x80
[<ffffffff82a5bbef>] vfs_read+0x9f/0x170
[<ffffffff82a5ca65>] SyS_read+0x55/0xd0
[<ffffffff82fc539a>] system_call_fastpath+0x25/0x2a