Kerneloops

Similar reports
Problem #699918
Component
kernel Tainted
Last affected version
0:3.10.0-693.el7
Executable
unknown
First occurrence
2021-07-16
Last occurrence
2023-11-24
Unique reports
3
Quality
-40

Statistics

Operating system Unique / Total count
CentOS 7 3 / 8
Operating system Count
CentOS 7 8
Architecture Count
x86_64 8
Related packages Count
kernel 8
 0:3.10.0-1160.53.1.el7 7
 0:3.10.0-693.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff810f99a6
Build id: 3.10.0-693.el7.x86_64
0x206
2
? netif_receive_skb_internal
vmlinux 0xffffffff815871f0
Build id: 3.10.0-693.el7.x86_64
0x20
3
? setup_data_read
vmlinux 0xffffffff81031c80
Build id: 3.10.0-693.el7.x86_64
0x90
4
? netif_receive_skb_internal
vmlinux 0xffffffff815871f1
Build id: 3.10.0-693.el7.x86_64
0x21
5
on_each_cpu
vmlinux 0xffffffff810f9a5d
Build id: 3.10.0-693.el7.x86_64
0x2d
6
? netif_receive_skb_internal
vmlinux 0xffffffff815871f0
Build id: 3.10.0-693.el7.x86_64
0x20
7
text_poke_bp
vmlinux 0xffffffff810324d4
Build id: 3.10.0-693.el7.x86_64
0x94
8
arch_jump_label_transform
vmlinux 0xffffffff8102f558
Build id: 3.10.0-693.el7.x86_64
0x68
9
__jump_label_update
vmlinux 0xffffffff8117fb8f
Build id: 3.10.0-693.el7.x86_64
0x5f
10
jump_label_update
vmlinux 0xffffffff8117fc4d
Build id: 3.10.0-693.el7.x86_64
0x9d
11
static_key_slow_inc
vmlinux 0xffffffff8117fead
Build id: 3.10.0-693.el7.x86_64
0xad
12
net_enable_timestamp
vmlinux 0xffffffff815822a4
Build id: 3.10.0-693.el7.x86_64
0x44
13
sock_enable_timestamp
vmlinux 0xffffffff815700a5
Build id: 3.10.0-693.el7.x86_64
0x45
14
sock_setsockopt
vmlinux 0xffffffff8157042a
Build id: 3.10.0-693.el7.x86_64
0x37a
15
? sock_alloc_file
vmlinux 0xffffffff81567340
Build id: 3.10.0-693.el7.x86_64
0xa0
16
SyS_setsockopt
vmlinux 0xffffffff8156b3f6
Build id: 3.10.0-693.el7.x86_64
0xd6
17
system_call_fastpath
vmlinux 0xffffffff816b4fc9
Build id: 3.10.0-693.el7.x86_64
0x16
NMI watchdog: BUG: soft lockup - CPU#2 stuck for 22s! [chronyd:786]
Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock sb_edac edac_core coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ppdev sg pcspkr vmw_balloon joydev parport_pc parport shpchp vmw_vmci i2c_piix4 nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm mptspi scsi_transport_spi ata_piix mptscsih mptbase libata
crct10dif_pclmul crct10dif_common crc32c_intel serio_raw e1000 i2c_core floppy dm_mirror dm_region_hash dm_log dm_mod
CPU: 2 PID: 786 Comm: chronyd Tainted: G        W    L ------------   3.10.0-693.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
task: ffff88081abcbf40 ti: ffff88081a238000 task.ti: ffff88081a238000
RIP: 0010:[<ffffffff810f99a6>]  [<ffffffff810f99a6>] smp_call_function_many+0x206/0x260
RSP: 0018:ffff88081a23bd48  EFLAGS: 00000202
RAX: 0000000000000005 RBX: 0000000000017800 RCX: ffff88081ef5af48
RDX: 0000000000000005 RSI: 0000000000000020 RDI: 0000000000000000
RBP: ffff88081a23bd80 R08: ffff880174b1c800 R09: ffffffff813227d9
R10: ffff88081ee99c80 R11: ffffea002052cc00 R12: ffff88081a23bcf8
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f7e2c5e9740(0000) GS:ffff88081ee80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f403846e000 CR3: 0000000812f94000 CR4: 00000000000407e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Stack:
000000011a23bd58 ffffffff81b1c820 ffffffff815871f0 ffffffff81031c80
0000000000000000 ffffffff815871f1 0000000000000000 ffff88081a23bda8
ffffffff810f9a5d ffffffff815871f0 ffff88081a23bdfb 0000000000000005
Call Trace:
[<ffffffff815871f0>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff81031c80>] ? setup_data_read+0x90/0x90
[<ffffffff815871f1>] ? netif_receive_skb_internal+0x21/0xc0
[<ffffffff810f9a5d>] on_each_cpu+0x2d/0x60
[<ffffffff815871f0>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff810324d4>] text_poke_bp+0x94/0xf0
[<ffffffff8102f558>] arch_jump_label_transform+0x68/0xb0
[<ffffffff8117fb8f>] __jump_label_update+0x5f/0x80
[<ffffffff8117fc4d>] jump_label_update+0x9d/0xb0
[<ffffffff8117fead>] static_key_slow_inc+0xad/0xb0
[<ffffffff815822a4>] net_enable_timestamp+0x44/0x50
[<ffffffff815700a5>] sock_enable_timestamp+0x45/0x50
[<ffffffff8157042a>] sock_setsockopt+0x37a/0x880
[<ffffffff81567340>] ? sock_alloc_file+0xa0/0x140
[<ffffffff8156b3f6>] SyS_setsockopt+0xd6/0xf0
[<ffffffff816b4fc9>] system_call_fastpath+0x16/0x1b
Code: 45 a2 00 89 c2 39 f0 0f 8d 85 fe ff ff 48 98 49 8b 0f 48 03 0c c5 e0 fd b0 81 f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 f6 41 20 01 <75> f8 48 63 35 f5 44 a2 00 eb b7 0f b6 4d cc 4c 89 f2 4c 89 ee