Kerneloops

Similar reports
Problem #552492
Component
kernel Tainted
Last affected version
0:3.10.0-514.el7
Executable
unknown
First occurrence
2025-06-19
Last occurrence
2025-08-29
Unique reports
3
Quality
-45

Statistics

Operating system Unique / Total count
CentOS 7 3 / 4
Operating system Count
CentOS 7 4
Architecture Count
x86_64 4
Related packages Count
kernel 4
 0:3.10.0-514.el7 4

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff81685fac
Build id: 3.10.0-514.el7.x86_64
0x19
2
warn_slowpath_common
vmlinux 0xffffffff81085820
Build id: 3.10.0-514.el7.x86_64
0x70
3
warn_slowpath_fmt
vmlinux 0xffffffff810858bc
Build id: 3.10.0-514.el7.x86_64
0x5c
4
? pde_subdir_insert
vmlinux 0xffffffff812716b8
Build id: 3.10.0-514.el7.x86_64
0x58
5
? ida_get_new_above
vmlinux 0xffffffff81319930
Build id: 3.10.0-514.el7.x86_64
0x230
6
proc_register
vmlinux 0xffffffff81271997
Build id: 3.10.0-514.el7.x86_64
0xd7
7
proc_mkdir_data
vmlinux 0xffffffff81271b02
Build id: 3.10.0-514.el7.x86_64
0x52
8
proc_mkdir
vmlinux 0xffffffff81271b65
Build id: 3.10.0-514.el7.x86_64
0x15
9
tmproc_mkdir
bmhook 0xffffffffa09ab59e
Build id: 3.10.0-514.el7.x86_64
0xe
10
create_self_protection_group
bmhook 0xffffffffa099ac88
Build id: 3.10.0-514.el7.x86_64
0xe8
11
bmhook_self_protection_write
bmhook 0xffffffffa099af5c
Build id: 3.10.0-514.el7.x86_64
0x11c
12
proc_reg_write
vmlinux 0xffffffff8126b57d
Build id: 3.10.0-514.el7.x86_64
0x3d
13
vfs_write
vmlinux 0xffffffff811fe12d
Build id: 3.10.0-514.el7.x86_64
0xbd
14
? putname
vmlinux 0xffffffff8120eb4d
Build id: 3.10.0-514.el7.x86_64
0x3d
15
SyS_write
vmlinux 0xffffffff811fec4f
Build id: 3.10.0-514.el7.x86_64
0x7f
16
? down_read
vmlinux 0xffffffff8168a7f2
Build id: 3.10.0-514.el7.x86_64
0x12
17
tmhook_invoke
tmhook 0xffffffffa092fb42
Build id: 3.10.0-514.el7.x86_64
0x42
18
tmhook_handler
tmhook 0xffffffffa092fd3a
Build id: 3.10.0-514.el7.x86_64
0x1aa
19
system_call_fastpath
vmlinux 0xffffffff816965c9
Build id: 3.10.0-514.el7.x86_64
0x16
WARNING: at fs/proc/generic.c:414 proc_register+0xd7/0x140()
proc_dir_entry 'self_protection/2' already registered
Modules linked in: bmhook(OE) dsa_filter(POE) dsa_filter_hook(OE) tmhook(OE) veth xt_nat nf_conntrack_netlink xt_addrtype br_netfilter xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun nf_conntrack_netbios_ns nf_conntrack_broadcast ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat overlay(T) nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock ext4 mbcache jbd2 dm_mirror dm_region_hash dm_log dm_mod intel_powerclamp iosf_mbi crc32_pclmul
ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ppdev vmw_balloon pcspkr sg shpchp i2c_piix4 vmw_vmci nfit libnvdimm parport_pc parport nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi crct10dif_pclmul crct10dif_common vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops crc32c_intel ttm drm serio_raw vmxnet3 mptspi i2c_core scsi_transport_spi mptscsih mptbase ata_piix libata floppy fjes [last unloaded: dsa_filter_hook]
CPU: 0 PID: 4987 Comm: pool-ds_am Tainted: P        W  OE  ------------ T 3.10.0-514.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
ffff88001281fc80 0000000048d4552a ffff88001281fc38 ffffffff81685fac
ffff88001281fc70 ffffffff81085820 ffff880316b5f200 ffff880365603680
ffff8801426de840 0000000000000002 ffff880298bd72b0 ffff88001281fcd8
Call Trace:
[<ffffffff81685fac>] dump_stack+0x19/0x1b
[<ffffffff81085820>] warn_slowpath_common+0x70/0xb0
[<ffffffff810858bc>] warn_slowpath_fmt+0x5c/0x80
[<ffffffff812716b8>] ? pde_subdir_insert+0x58/0xb0
[<ffffffff81319930>] ? ida_get_new_above+0x230/0x2a0
[<ffffffff81271997>] proc_register+0xd7/0x140
[<ffffffff81271b02>] proc_mkdir_data+0x52/0x80
[<ffffffff81271b65>] proc_mkdir+0x15/0x20
[<ffffffffa09ab59e>] tmproc_mkdir+0xe/0x10 [bmhook]
[<ffffffffa099ac88>] create_self_protection_group+0xe8/0x2a0 [bmhook]
[<ffffffffa099af5c>] bmhook_self_protection_write+0x11c/0x380 [bmhook]
[<ffffffff8126b57d>] proc_reg_write+0x3d/0x80
[<ffffffff811fe12d>] vfs_write+0xbd/0x1e0
[<ffffffff8120eb4d>] ? putname+0x3d/0x60
[<ffffffff811fec4f>] SyS_write+0x7f/0xe0
[<ffffffff8168a7f2>] ? down_read+0x12/0x30
[<ffffffffa092fb42>] tmhook_invoke+0x42/0x90 [tmhook]
[<ffffffffa092fd3a>] tmhook_handler+0x1aa/0x2c0 [tmhook]
[<ffffffff816965c9>] system_call_fastpath+0x16/0x1b