Kerneloops

Similar reports
Problem #552492
Component
kernel Tainted
Last affected version
0:3.10.0-514.6.1.el7
Executable
unknown
First occurrence
2025-04-24
Last occurrence
2025-07-02
Unique reports
3
Quality
-42

Statistics

Operating system Unique / Total count
CentOS 7 3 / 9
Operating system Count
CentOS 7 9
Architecture Count
x86_64 9
Related packages Count
kernel 9
 0:3.10.0-514.6.1.el7 9

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff816862ac
Build id: 3.10.0-514.6.1.el7.x86_64
0x19
2
warn_slowpath_common
vmlinux 0xffffffff81085940
Build id: 3.10.0-514.6.1.el7.x86_64
0x70
3
warn_slowpath_fmt
vmlinux 0xffffffff810859dc
Build id: 3.10.0-514.6.1.el7.x86_64
0x5c
4
? pde_subdir_insert
vmlinux 0xffffffff81271808
Build id: 3.10.0-514.6.1.el7.x86_64
0x58
5
? ida_get_new_above
vmlinux 0xffffffff81319aa0
Build id: 3.10.0-514.6.1.el7.x86_64
0x230
6
proc_register
vmlinux 0xffffffff81271ae7
Build id: 3.10.0-514.6.1.el7.x86_64
0xd7
7
proc_mkdir_data
vmlinux 0xffffffff81271c52
Build id: 3.10.0-514.6.1.el7.x86_64
0x52
8
proc_mkdir
vmlinux 0xffffffff81271cb5
Build id: 3.10.0-514.6.1.el7.x86_64
0x15
9
tmproc_mkdir
bmhook 0xffffffffa05ee59e
Build id: 3.10.0-514.6.1.el7.x86_64
0xe
10
create_self_protection_group
bmhook 0xffffffffa05ddc88
Build id: 3.10.0-514.6.1.el7.x86_64
0xe8
11
bmhook_self_protection_write
bmhook 0xffffffffa05ddf5c
Build id: 3.10.0-514.6.1.el7.x86_64
0x11c
12
proc_reg_write
vmlinux 0xffffffff8126b6cd
Build id: 3.10.0-514.6.1.el7.x86_64
0x3d
13
vfs_write
vmlinux 0xffffffff811fe27d
Build id: 3.10.0-514.6.1.el7.x86_64
0xbd
14
SyS_write
vmlinux 0xffffffff811fed9f
Build id: 3.10.0-514.6.1.el7.x86_64
0x7f
15
? down_read
vmlinux 0xffffffff8168aaf2
Build id: 3.10.0-514.6.1.el7.x86_64
0x12
16
tmhook_invoke
tmhook 0xffffffffa0483b42
Build id: 3.10.0-514.6.1.el7.x86_64
0x42
17
tmhook_handler
tmhook 0xffffffffa0483d3a
Build id: 3.10.0-514.6.1.el7.x86_64
0x1aa
18
system_call_fastpath
vmlinux 0xffffffff816968c9
Build id: 3.10.0-514.6.1.el7.x86_64
0x16
WARNING: at fs/proc/generic.c:414 proc_register+0xd7/0x140()
proc_dir_entry 'self_protection/2' already registered
Modules linked in: bmsensor(OE) ip6table_filter ip6_tables iptable_filter bmhook(OE) dsa_filter(POE) dsa_filter_hook(OE) udp_diag tcp_diag inet_diag rpcsec_gss_krb5 tmhook(OE) binfmt_misc nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack xt_owner iptable_security dm_mirror dm_region_hash dm_log dm_mod intel_powerclamp iosf_mbi kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd sg pcspkr hv_utils hv_balloon i2c_piix4 i2c_core nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables ext4 mbcache jbd2 sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi hyperv_keyboard hv_netvsc hid_hyperv hv_storvsc crct10dif_pclmul hyperv_fb crct10dif_common crc32c_intel hv_vmbus serio_raw fjes floppy ata_piix libata [last unloaded: bmsensor]
CPU: 3 PID: 13335 Comm: pool-ds_am Tainted: P        W  OE  ------------   3.10.0-514.6.1.el7.x86_64 #1
Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008  12/07/2018
ffff880494febc80 0000000033d6e0a0 ffff880494febc38 ffffffff816862ac
ffff880494febc70 ffffffff81085940 ffff8803ede1d0c0 ffff8803e82def00
ffff8804aa69b640 0000000000000002 ffff88041fb85b40 ffff880494febcd8
Call Trace:
[<ffffffff816862ac>] dump_stack+0x19/0x1b
[<ffffffff81085940>] warn_slowpath_common+0x70/0xb0
[<ffffffff810859dc>] warn_slowpath_fmt+0x5c/0x80
[<ffffffff81271808>] ? pde_subdir_insert+0x58/0xb0
[<ffffffff81319aa0>] ? ida_get_new_above+0x230/0x2a0
[<ffffffff81271ae7>] proc_register+0xd7/0x140
[<ffffffff81271c52>] proc_mkdir_data+0x52/0x80
[<ffffffff81271cb5>] proc_mkdir+0x15/0x20
[<ffffffffa05ee59e>] tmproc_mkdir+0xe/0x10 [bmhook]
[<ffffffffa05ddc88>] create_self_protection_group+0xe8/0x2a0 [bmhook]
[<ffffffffa05ddf5c>] bmhook_self_protection_write+0x11c/0x380 [bmhook]
[<ffffffff8126b6cd>] proc_reg_write+0x3d/0x80
[<ffffffff811fe27d>] vfs_write+0xbd/0x1e0
[<ffffffff811fed9f>] SyS_write+0x7f/0xe0
[<ffffffff8168aaf2>] ? down_read+0x12/0x30
[<ffffffffa0483b42>] tmhook_invoke+0x42/0x90 [tmhook]
[<ffffffffa0483d3a>] tmhook_handler+0x1aa/0x2c0 [tmhook]
[<ffffffff816968c9>] system_call_fastpath+0x16/0x1b