Kerneloops

Similar reports
Problem #501551
Component
kernel Tainted
Last affected version
0:3.10.0-957.el7
Executable
unknown
First occurrence
2020-11-09
Last occurrence
2024-05-17
Unique reports
25
Quality
-29

Statistics

Operating system Unique / Total count
CentOS 7 25 / 9,389
Operating system Count
CentOS 7 9,389
Architecture Count
x86_64 9,389
Related packages Count
kernel 9,389
 0:3.10.0-862.14.4.el7 5,948
 0:3.10.0-957.el7 2,932
 0:3.10.0-862.11.6.el7 509

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffffb3761dc1
Build id: 3.10.0-957.el7.x86_64
0x19
2
__warn
vmlinux 0xffffffffb3097648
Build id: 3.10.0-957.el7.x86_64
0xd8
3
warn_slowpath_null
vmlinux 0xffffffffb309778d
Build id: 3.10.0-957.el7.x86_64
0x1d
4
cpuset_write_resmask
vmlinux 0xffffffffb312c36a
Build id: 3.10.0-957.el7.x86_64
0x80a
5
? cgroup_rightmost_descendant
vmlinux 0xffffffffb3121860
Build id: 3.10.0-957.el7.x86_64
0x80
6
? update_cpumasks_hier
vmlinux 0xffffffffb312bb60
Build id: 3.10.0-957.el7.x86_64
0x410
7
cgroup_file_write
vmlinux 0xffffffffb3125066
Build id: 3.10.0-957.el7.x86_64
0x1e6
8
? __sb_start_write
vmlinux 0xffffffffb32440b8
Build id: 3.10.0-957.el7.x86_64
0x58
9
? security_file_permission
vmlinux 0xffffffffb32f8e77
Build id: 3.10.0-957.el7.x86_64
0x27
10
vfs_write
vmlinux 0xffffffffb32410a0
Build id: 3.10.0-957.el7.x86_64
0xc0
11
SyS_write
vmlinux 0xffffffffb3241ebf
Build id: 3.10.0-957.el7.x86_64
0x7f
12
system_call_fastpath
vmlinux 0xffffffffb3774ddb
Build id: 3.10.0-957.el7.x86_64
0x22
WARNING: CPU: 1 PID: 13588 at kernel/cpuset.c:1296 cpuset_write_resmask+0x80a/0xa10
Modules linked in: ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink overlay(T) br_netfilter bridge stp llc xt_set xt_mark ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_bitmap_port ip_set nfnetlink dummy xt_comment xt_conntrack iptable_filter xt_addrtype iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs nf_conntrack tcp_diag inet_diag isofs vmw_vsock_vmci_transport vsock sunrpc sb_edac ppdev iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel vmw_balloon lrw gf128mul glue_helper ablk_helper cryptd joydev pcspkr sg vmw_vmci i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops
ttm crct10dif_pclmul drm ata_piix crct10dif_common crc32c_intel mptspi serio_raw libata nfit scsi_transport_spi mptscsih libnvdimm vmxnet3 mptbase drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod
CPU: 1 PID: 13588 Comm: kubelet Kdump: loaded Tainted: G        W      ------------ T 3.10.0-957.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016
Call Trace:
[<ffffffffb3761dc1>] dump_stack+0x19/0x1b
[<ffffffffb3097648>] __warn+0xd8/0x100
[<ffffffffb309778d>] warn_slowpath_null+0x1d/0x20
[<ffffffffb312c36a>] cpuset_write_resmask+0x80a/0xa10
[<ffffffffb3121860>] ? cgroup_rightmost_descendant+0x80/0x80
[<ffffffffb312bb60>] ? update_cpumasks_hier+0x410/0x410
[<ffffffffb3125066>] cgroup_file_write+0x1e6/0x2e0
[<ffffffffb32440b8>] ? __sb_start_write+0x58/0x110
[<ffffffffb32f8e77>] ? security_file_permission+0x27/0xa0
[<ffffffffb32410a0>] vfs_write+0xc0/0x1f0
[<ffffffffb3241ebf>] SyS_write+0x7f/0xf0
[<ffffffffb3774ddb>] system_call_fastpath+0x22/0x27