Kerneloops

Similar reports
Problem #706288
Component
kernel Tainted
Last affected version
0:3.10.0-327.36.3.el7
Executable
unknown
First occurrence
2020-12-14
Last occurrence
2020-12-14
Unique reports
1
Quality
-37

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-327.36.3.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff81636431
Build id: 3.10.0-327.36.3.el7.x86_64
0x19
2
warn_slowpath_common
vmlinux 0xffffffff8107b260
Build id: 3.10.0-327.36.3.el7.x86_64
0x70
3
warn_slowpath_fmt
vmlinux 0xffffffff8107b2fc
Build id: 3.10.0-327.36.3.el7.x86_64
0x5c
4
kprobe_dispatcher
vmlinux 0xffffffff81645832
Build id: 3.10.0-327.36.3.el7.x86_64
0x2b2
5
aggr_pre_handler
vmlinux 0xffffffff8164270f
Build id: 3.10.0-327.36.3.el7.x86_64
0x4f
6
? do_execve_common.isra.23
vmlinux 0xffffffff811e66a1
Build id: 3.10.0-327.36.3.el7.x86_64
0x1
7
kprobe_ftrace_handler
vmlinux 0xffffffff81641a5c
Build id: 3.10.0-327.36.3.el7.x86_64
0xac
8
? prepare_bprm_creds
vmlinux 0xffffffff811e66a0
Build id: 3.10.0-327.36.3.el7.x86_64
0x80
9
? SyS_execve
vmlinux 0xffffffff811e6fc9
Build id: 3.10.0-327.36.3.el7.x86_64
0x29
10
ftrace_ops_list_func
vmlinux 0xffffffff8112cb1e
Build id: 3.10.0-327.36.3.el7.x86_64
0xee
11
ftrace_regs_call
vmlinux 0xffffffff816487f4
Build id: 3.10.0-327.36.3.el7.x86_64
0x5
12
? do_execve_common.isra.23
vmlinux 0xffffffff811e66a1
Build id: 3.10.0-327.36.3.el7.x86_64
0x1
13
? do_execve_common.isra.23
vmlinux 0xffffffff811e66a5
Build id: 3.10.0-327.36.3.el7.x86_64
0x5
14
? kretprobe_trampoline_holder
vmlinux 0xffffffff81640719
Build id: 3.10.0-327.36.3.el7.x86_64
0x9
15
stub_execve
vmlinux 0xffffffff816470e9
Build id: 3.10.0-327.36.3.el7.x86_64
0x69
WARNING: at kernel/trace/trace_kprobe.c:1183 kprobe_dispatcher+0x2b2/0x2c0()
profile buffer not large enough
Modules linked in:
mlx4_en(OE) mlx4_core(OE) dm_mirror dm_region_hash dm_log dm_mod iTCO_wdt iTCO_vendor_support mxm_wmi intel_powerclamp coretemp intel_rapl kvm crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper sb_edac ablk_helper ipmi_devintf mei_me lpc_ich cryptd sg pcspkr edac_core mei mfd_core shpchp i2c_i801 ipmi_si ipmi_msghandler wmi acpi_pad acpi_power_meter acpi_cpufreq binfmt_misc nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables ext4 mbcache jbd2 sd_mod crc_t10dif crct10dif_generic mgag200 syscopyarea sysfillrect sysimgblt mlx5_core(OE) drm_kms_helper vxlan ttm ip6_udp_tunnel udp_tunnel mlxfw(OE) ahci igb mlx_compat(OE) drm libahci crct10dif_pclmul ptp dca crct10dif_common i2c_algo_bit libata crc32c_intel i2c_core pps_core
CPU: 37 PID: 4876 Comm: mmautoload Tainted: G           OE  ------------   3.10.0-327.36.3.el7.x86_64 #1
igb 0000:07:00.1 eth1: igb: eth1 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX/TX
Hardware name: Advanced Clustering Compute Block/S2600TPR, BIOS SE5C610.86B.01.01.0020.C1.122820161512 12/28/2016
ffff887d898e3ce8 000000009626b251 ffff887d898e3ca0 ffffffff81636431
ffff887d898e3cd8 ffffffff8107b260 0000000000000b4b 0000000000000b94
0000000000000b4b ffff887d898e3e80 ffff88fdc7cca010 ffff887d898e3d40
Call Trace:
[<ffffffff81636431>] dump_stack+0x19/0x1b
[<ffffffff8107b260>] warn_slowpath_common+0x70/0xb0
[<ffffffff8107b2fc>] warn_slowpath_fmt+0x5c/0x80
[<ffffffff81645832>] kprobe_dispatcher+0x2b2/0x2c0
[<ffffffff8164270f>] aggr_pre_handler+0x4f/0xb0
[<ffffffff811e66a1>] ? do_execve_common.isra.23+0x1/0x690
[<ffffffff81641a5c>] kprobe_ftrace_handler+0xac/0xf0
[<ffffffff811e66a0>] ? prepare_bprm_creds+0x80/0x80
[<ffffffff811e6fc9>] ? SyS_execve+0x29/0x30
[<ffffffff8112cb1e>] ftrace_ops_list_func+0xee/0x110
[<ffffffff816487f4>] ftrace_regs_call+0x5/0x81
[<ffffffff811e66a1>] ? do_execve_common.isra.23+0x1/0x690
[<ffffffff811e66a5>] ? do_execve_common.isra.23+0x5/0x690
[<ffffffff81640719>] ? kretprobe_trampoline_holder+0x9/0x9
[<ffffffff816470e9>] stub_execve+0x69/0xa0