Kerneloops

Similar reports
Problem #699918
Component
kernel Tainted
Last affected version
0:3.10.0-1160.el7
Executable
unknown
First occurrence
2020-12-01
Last occurrence
2021-12-02
Unique reports
2
Quality
-43

Statistics

Operating system Unique / Total count
CentOS 7 2 / 2
Operating system Count
CentOS 7 2
Architecture Count
x86_64 2
Related packages Count
kernel 2
 0:3.10.0-1160.el7 2

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff8f916c0a
Build id: 3.10.0-1160.el7.x86_64
0x20a
2
? __netif_receive_skb_core
vmlinux 0xffffffff8fe54527
Build id: 3.10.0-1160.el7.x86_64
0x37
3
? setup_data_read
vmlinux 0xffffffff8f834260
Build id: 3.10.0-1160.el7.x86_64
0xd0
4
? __netif_receive_skb_core
vmlinux 0xffffffff8fe54528
Build id: 3.10.0-1160.el7.x86_64
0x38
5
on_each_cpu
vmlinux 0xffffffff8f916ccd
Build id: 3.10.0-1160.el7.x86_64
0x2d
6
? __netif_receive_skb_core
vmlinux 0xffffffff8fe54527
Build id: 3.10.0-1160.el7.x86_64
0x37
7
text_poke_bp
vmlinux 0xffffffff8f834a8a
Build id: 3.10.0-1160.el7.x86_64
0x6a
8
arch_jump_label_transform
vmlinux 0xffffffff8f8316a8
Build id: 3.10.0-1160.el7.x86_64
0x68
9
__jump_label_update
vmlinux 0xffffffff8f9bae8f
Build id: 3.10.0-1160.el7.x86_64
0x5f
10
jump_label_update
vmlinux 0xffffffff8f9baf6d
Build id: 3.10.0-1160.el7.x86_64
0x9d
11
static_key_slow_inc
vmlinux 0xffffffff8f9bb1cd
Build id: 3.10.0-1160.el7.x86_64
0xad
12
net_enable_timestamp
vmlinux 0xffffffff8fe4eb74
Build id: 3.10.0-1160.el7.x86_64
0x44
13
sock_enable_timestamp
vmlinux 0xffffffff8fe3b715
Build id: 3.10.0-1160.el7.x86_64
0x45
14
sock_setsockopt
vmlinux 0xffffffff8fe3bc97
Build id: 3.10.0-1160.el7.x86_64
0x577
15
? set_close_on_exec
vmlinux 0xffffffff8fa6f463
Build id: 3.10.0-1160.el7.x86_64
0x33
16
SyS_setsockopt
vmlinux 0xffffffff8fe36726
Build id: 3.10.0-1160.el7.x86_64
0xe6
17
system_call_fastpath
vmlinux 0xffffffff8ff93f92
Build id: 3.10.0-1160.el7.x86_64
0x25
18
? system_call_after_swapgs
vmlinux 0xffffffff8ff93ed5
Build id: 3.10.0-1160.el7.x86_64
0xa2
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 28s! [chronyd:725]
Modules linked in: xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock sunrpc dm_mirror dm_region_hash dm_log dm_mod sb_edac snd_hda_codec_generic coretemp snd_hda_intel snd_hda_codec snd_hda_core iosf_mbi crc32_pclmul ghash_clmulni_intel snd_hwdep snd_seq aesni_intel snd_seq_device snd_pcm lrw gf128mul glue_helper snd_timer
ablk_helper snd cryptd soundcore ppdev sg pcspkr joydev vmw_balloon parport_pc parport vmw_vmci i2c_piix4 ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ata_piix crct10dif_pclmul crct10dif_common crc32c_intel e1000 mptspi serio_raw scsi_transport_spi libata mptscsih mptbase drm_panel_orientation_quirks floppy fuse
CPU: 0 PID: 725 Comm: chronyd Kdump: loaded Tainted: G        W    L ------------   3.10.0-1160.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014
task: ffff8d4a79813180 ti: ffff8d4a79b90000 task.ti: ffff8d4a79b90000
RIP: 0010:[<ffffffff8f916c0a>]  [<ffffffff8f916c0a>] smp_call_function_many+0x20a/0x270
RSP: 0018:ffff8d4a79b93d18  EFLAGS: 00000202
RAX: 0000000000000002 RBX: 000000000001b840 RCX: ffff8d4a7b49fc10
RDX: 0000000000000002 RSI: 0000000000000040 RDI: 0000000000000000
RBP: ffff8d4a79b93d50 R08: ffff8d4a47d8f400 R09: ffffffff8fb85f99
R10: ffff8d4a7b41f160 R11: ffffe86b81e93800 R12: ffff8d4a79b93cc8
R13: 0000000000000000 R14: ffffffff8f8e5f1b R15: ffff8d4a79b93cb0
FS:  00007fabc1698740(0000) GS:ffff8d4a7b400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000002a5e1e8 CR3: 00000000b9b8e000 CR4: 00000000000607f0
Call Trace:
[<ffffffff8fe54527>] ? __netif_receive_skb_core+0x37/0xa10
[<ffffffff8f834260>] ? setup_data_read+0xd0/0xd0
[<ffffffff8fe54528>] ? __netif_receive_skb_core+0x38/0xa10
[<ffffffff8f916ccd>] on_each_cpu+0x2d/0x60
[<ffffffff8fe54527>] ? __netif_receive_skb_core+0x37/0xa10
[<ffffffff8f834a8a>] text_poke_bp+0x6a/0xf0
[<ffffffff8f8316a8>] arch_jump_label_transform+0x68/0xb0
[<ffffffff8f9bae8f>] __jump_label_update+0x5f/0xa0
[<ffffffff8f9baf6d>] jump_label_update+0x9d/0xb0
[<ffffffff8f9bb1cd>] static_key_slow_inc+0xad/0xb0
[<ffffffff8fe4eb74>] net_enable_timestamp+0x44/0x50
[<ffffffff8fe3b715>] sock_enable_timestamp+0x45/0x50
[<ffffffff8fe3bc97>] sock_setsockopt+0x577/0x8f0
[<ffffffff8fa6f463>] ? set_close_on_exec+0x33/0x70
[<ffffffff8fe36726>] SyS_setsockopt+0xe6/0x100
[<ffffffff8ff93f92>] system_call_fastpath+0x25/0x2a
[<ffffffff8ff93ed5>] ? system_call_after_swapgs+0xa2/0x13a
Code: 48 63 35 1e 89 c4 00 89 c2 39 f0 0f 8d 7d fe ff ff 48 98 49 8b 0f 48 03 0c c5 e0 13 55 90 f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 <f6> 41 20 01 75 f8 48 63 35 ed 88 c4 00 eb b7 0f b6 4d cc 4c 89