Kerneloops

Similar reports
Problem #662037
Component
kernel
Last affected version
0:3.10.0-1062.12.1.el7
Executable
unknown
First occurrence
2020-09-22
Last occurrence
2020-09-22
Unique reports
1
Quality
-41

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1062.12.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
generic_exec_single
vmlinux 0xffffffff9d7163d2
Build id: 3.10.0-1062.12.1.el7.x86_64
0x102
2
? leave_mm
vmlinux 0xffffffff9d67e2b0
Build id: 3.10.0-1062.12.1.el7.x86_64
0x110
3
? arch_tlb_finish_mmu
vmlinux 0xffffffff9d7edb67
Build id: 3.10.0-1062.12.1.el7.x86_64
0x47
4
? leave_mm
vmlinux 0xffffffff9d67e2b0
Build id: 3.10.0-1062.12.1.el7.x86_64
0x110
5
? leave_mm
vmlinux 0xffffffff9d67e2b0
Build id: 3.10.0-1062.12.1.el7.x86_64
0x110
6
smp_call_function_single
vmlinux 0xffffffff9d7164ef
Build id: 3.10.0-1062.12.1.el7.x86_64
0x5f
7
? cpumask_next_and
vmlinux 0xffffffff9d981685
Build id: 3.10.0-1062.12.1.el7.x86_64
0x35
8
smp_call_function_many
vmlinux 0xffffffff9d716a9b
Build id: 3.10.0-1062.12.1.el7.x86_64
0x22b
9
native_flush_tlb_others
vmlinux 0xffffffff9d67e478
Build id: 3.10.0-1062.12.1.el7.x86_64
0xb8
10
flush_tlb_mm_range
vmlinux 0xffffffff9d67e4eb
Build id: 3.10.0-1062.12.1.el7.x86_64
0x6b
11
change_protection
vmlinux 0xffffffff9d7fc4dd
Build id: 3.10.0-1062.12.1.el7.x86_64
0x5cd
12
? handle_pte_fault
vmlinux 0xffffffff9d7f16b4
Build id: 3.10.0-1062.12.1.el7.x86_64
0x6b4
13
mprotect_fixup
vmlinux 0xffffffff9d7fc6e3
Build id: 3.10.0-1062.12.1.el7.x86_64
0x163
14
do_mprotect_pkey
vmlinux 0xffffffff9d7fcb72
Build id: 3.10.0-1062.12.1.el7.x86_64
0x252
15
SyS_mprotect
vmlinux 0xffffffff9d7fcc93
Build id: 3.10.0-1062.12.1.el7.x86_64
0x13
16
system_call_fastpath
vmlinux 0xffffffff9dd8dede
Build id: 3.10.0-1062.12.1.el7.x86_64
0x25
17
? system_call_after_swapgs
vmlinux 0xffffffff9dd8de21
Build id: 3.10.0-1062.12.1.el7.x86_64
0xae
NMI watchdog: BUG: soft lockup - CPU#1 stuck for 21s! [gnome-shell:1648]
Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc devlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_vs nf_conntrack vmw_vsock_vmci_transport vsock sunrpc dm_mirror dm_region_hash dm_log dm_mod snd_seq_midi snd_seq_midi_event sb_edac iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev vmw_balloon snd_ens1371 snd_rawmidi aesni_intel snd_ac97_codec ac97_bus lrw snd_seq gf128mul glue_helper ablk_helper cryptd snd_seq_device snd_pcm joydev pcspkr snd_timer sg snd vmw_vmci soundcore i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom sd_mod ata_generic crc_t10dif crct10dif_generic pata_acpi vmwgfx drm_kms_helper
crct10dif_pclmul crct10dif_common crc32c_intel syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm nfit libnvdimm mptspi serio_raw ata_piix scsi_transport_spi libata mptscsih e1000 mptbase drm_panel_orientation_quirks
CPU: 1 PID: 1648 Comm: gnome-shell Kdump: loaded Tainted: G             L ------------   3.10.0-1062.12.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/13/2018
task: ffff9754338d3150 ti: ffff97542bf24000 task.ti: ffff97542bf24000
RIP: 0010:[<ffffffff9d7163d2>]  [<ffffffff9d7163d2>] generic_exec_single+0x102/0x1c0
RSP: 0018:ffff97542bf27be0  EFLAGS: 00000202
RAX: 0000000000000080 RBX: ffff97542bf27bb0 RCX: 0000000000000001
RDX: ffffffff9de13550 RSI: 0000000000000080 RDI: 0000000000000282
RBP: ffff97542bf27c30 R08: ffffffff9de13548 R09: 0000000000000000
R10: 0000000800000000 R11: 00003457070d5000 R12: ffffffffffffffff
R13: 0000000000000002 R14: 0000000000000030 R15: 00000000338d3150
FS:  00007f1c9db86a80(0000) GS:ffff9754b9640000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00003457070d5008 CR3: 00000000abdf4000 CR4: 00000000000607e0
Call Trace:
[<ffffffff9d67e2b0>] ? leave_mm+0x110/0x110
[<ffffffff9d7edb67>] ? arch_tlb_finish_mmu+0x47/0x80
[<ffffffff9d67e2b0>] ? leave_mm+0x110/0x110
[<ffffffff9d67e2b0>] ? leave_mm+0x110/0x110
[<ffffffff9d7164ef>] smp_call_function_single+0x5f/0xa0
[<ffffffff9d981685>] ? cpumask_next_and+0x35/0x50
[<ffffffff9d716a9b>] smp_call_function_many+0x22b/0x270
[<ffffffff9d67e478>] native_flush_tlb_others+0xb8/0xc0
[<ffffffff9d67e4eb>] flush_tlb_mm_range+0x6b/0x140
[<ffffffff9d7fc4dd>] change_protection+0x5cd/0x670
[<ffffffff9d7f16b4>] ? handle_pte_fault+0x6b4/0xe20
[<ffffffff9d7fc6e3>] mprotect_fixup+0x163/0x3a0
[<ffffffff9d7fcb72>] do_mprotect_pkey+0x252/0x360
[<ffffffff9d7fcc93>] SyS_mprotect+0x13/0x20
[<ffffffff9dd8dede>] system_call_fastpath+0x25/0x2a
[<ffffffff9dd8de21>] ? system_call_after_swapgs+0xae/0x146
Code: 89 de 48 03 14 c5 20 e8 34 9e 48 89 df e8 37 23 28 00 84 c0 75 53 45 85 ed 74 16 f6 43 20 01 74 10 0f 1f 84 00 00 00 00 00 f3 90 <f6> 43 20 01 75 f8 31 c0 48 8b 7c 24 28 65 48 33 3c 25 28 00 00