Kerneloops

Similar reports
Problem #552492
Component
kernel Tainted
Last affected version
0:3.10.0-693.el7
Executable
unknown
First occurrence
2025-08-21
Last occurrence
2025-08-21
Unique reports
1
Quality
-45

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-693.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff816a3d91
Build id: 3.10.0-693.el7.x86_64
0x19
2
__warn
vmlinux 0xffffffff810879c8
Build id: 3.10.0-693.el7.x86_64
0xd8
3
warn_slowpath_fmt
vmlinux 0xffffffff81087a4f
Build id: 3.10.0-693.el7.x86_64
0x5f
4
? pde_subdir_insert
vmlinux 0xffffffff812762a8
Build id: 3.10.0-693.el7.x86_64
0x58
5
? ida_get_new_above
vmlinux 0xffffffff81324680
Build id: 3.10.0-693.el7.x86_64
0x230
6
proc_register
vmlinux 0xffffffff81276536
Build id: 3.10.0-693.el7.x86_64
0xf6
7
proc_mkdir_data
vmlinux 0xffffffff81276672
Build id: 3.10.0-693.el7.x86_64
0x52
8
proc_mkdir
vmlinux 0xffffffff812766d5
Build id: 3.10.0-693.el7.x86_64
0x15
9
tmproc_mkdir
bmhook 0xffffffffc066822e
Build id: 3.10.0-693.el7.x86_64
0xe
10
create_self_protection_group
bmhook 0xffffffffc06572e8
Build id: 3.10.0-693.el7.x86_64
0xe8
11
bmhook_self_protection_write
bmhook 0xffffffffc06575cc
Build id: 3.10.0-693.el7.x86_64
0x11c
12
proc_reg_write
vmlinux 0xffffffff8127018d
Build id: 3.10.0-693.el7.x86_64
0x3d
13
vfs_write
vmlinux 0xffffffff81200d2d
Build id: 3.10.0-693.el7.x86_64
0xbd
14
? putname
vmlinux 0xffffffff81211c3d
Build id: 3.10.0-693.el7.x86_64
0x3d
15
SyS_write
vmlinux 0xffffffff81201b3f
Build id: 3.10.0-693.el7.x86_64
0x7f
16
? down_read
vmlinux 0xffffffff816a8752
Build id: 3.10.0-693.el7.x86_64
0x12
17
tmhook_invoke
tmhook 0xffffffffc060bb42
Build id: 3.10.0-693.el7.x86_64
0x42
18
tmhook_handler
tmhook 0xffffffffc060bd3a
Build id: 3.10.0-693.el7.x86_64
0x1aa
19
system_call_fastpath
vmlinux 0xffffffff816b4fc9
Build id: 3.10.0-693.el7.x86_64
0x16
WARNING: CPU: 0 PID: 1874 at fs/proc/generic.c:414 proc_register+0xf6/0x130
proc_dir_entry 'self_protection/2' already registered
Modules linked in: bmsensor(OE) bmhook(OE) tmhook(OE) dsa_filter(POE) dsa_filter_hook(OE) xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 ipt_REJECT nf_reject_ipv4 xt_conntrack iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables tun binfmt_misc ip_set nfnetlink bridge stp llc vmw_vsock_vmci_transport vsock sb_edac edac_core iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ppdev vmw_balloon joydev pcspkr nfit libnvdimm parport_pc parport i2c_piix4 shpchp vmw_vmci sg nfsd auth_rpcgss nfs_acl lockd grace sunrpc xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper mptspi
syscopyarea sysfillrect sysimgblt scsi_transport_spi fb_sys_fops ttm mptscsih e1000 drm crct10dif_pclmul crct10dif_common mptbase crc32c_intel serio_raw ata_piix libata i2c_core floppy dm_mirror dm_region_hash dm_log dm_mod [last unloaded: bmsensor]
CPU: 0 PID: 1874 Comm: pool-ds_am Tainted: P        W  OE  ------------   3.10.0-693.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016
ffff8802aa45bc80 00000000b7cabb98 ffff8802aa45bc30 ffffffff816a3d91
ffff8802aa45bc70 ffffffff810879c8 0000019e81fbf604 ffff88001d183cc0
ffff8802d6fb5c00 ffff8802aa45be30 ffff880416235c40 ffff8803c9296390
Call Trace:
[<ffffffff816a3d91>] dump_stack+0x19/0x1b
[<ffffffff810879c8>] __warn+0xd8/0x100
[<ffffffff81087a4f>] warn_slowpath_fmt+0x5f/0x80
[<ffffffff812762a8>] ? pde_subdir_insert+0x58/0xb0
[<ffffffff81324680>] ? ida_get_new_above+0x230/0x2a0
[<ffffffff81276536>] proc_register+0xf6/0x130
[<ffffffff81276672>] proc_mkdir_data+0x52/0x80
[<ffffffff812766d5>] proc_mkdir+0x15/0x20
[<ffffffffc066822e>] tmproc_mkdir+0xe/0x10 [bmhook]
[<ffffffffc06572e8>] create_self_protection_group+0xe8/0x2b0 [bmhook]
[<ffffffffc06575cc>] bmhook_self_protection_write+0x11c/0x380 [bmhook]
[<ffffffff8127018d>] proc_reg_write+0x3d/0x80
[<ffffffff81200d2d>] vfs_write+0xbd/0x1e0
[<ffffffff81211c3d>] ? putname+0x3d/0x60
[<ffffffff81201b3f>] SyS_write+0x7f/0xe0
[<ffffffff816a8752>] ? down_read+0x12/0x40
[<ffffffffc060bb42>] tmhook_invoke+0x42/0x90 [tmhook]
[<ffffffffc060bd3a>] tmhook_handler+0x1aa/0x2c0 [tmhook]
[<ffffffff816b4fc9>] system_call_fastpath+0x16/0x1b