Kerneloops

Similar reports
Problem #699918
Component
kernel
Last affected version
0:3.10.0-693.el7
Executable
unknown
First occurrence
2020-09-26
Last occurrence
2021-08-05
Unique reports
5
Quality
-39

Statistics

Operating system Unique / Total count
CentOS 7 5 / 6
Operating system Count
CentOS 7 6
Architecture Count
x86_64 6
Related packages Count
kernel 6
 0:3.10.0-693.el7 5
 0:3.10.0-514.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff810f98e2
Build id: 3.10.0-514.el7.x86_64
0x202
2
? __netif_receive_skb_core
vmlinux 0xffffffff8156f02f
Build id: 3.10.0-514.el7.x86_64
0x2f
3
? setup_data_read
vmlinux 0xffffffff81031d20
Build id: 3.10.0-514.el7.x86_64
0x90
4
? __netif_receive_skb_core
vmlinux 0xffffffff8156f030
Build id: 3.10.0-514.el7.x86_64
0x30
5
on_each_cpu
vmlinux 0xffffffff810f999d
Build id: 3.10.0-514.el7.x86_64
0x2d
6
? __netif_receive_skb_core
vmlinux 0xffffffff8156f02f
Build id: 3.10.0-514.el7.x86_64
0x2f
7
text_poke_bp
vmlinux 0xffffffff8103254a
Build id: 3.10.0-514.el7.x86_64
0x6a
8
arch_jump_label_transform
vmlinux 0xffffffff8102f508
Build id: 3.10.0-514.el7.x86_64
0x68
9
__jump_label_update
vmlinux 0xffffffff8117d90f
Build id: 3.10.0-514.el7.x86_64
0x5f
10
jump_label_update
vmlinux 0xffffffff8117d9cd
Build id: 3.10.0-514.el7.x86_64
0x9d
11
static_key_slow_inc
vmlinux 0xffffffff8117db6d
Build id: 3.10.0-514.el7.x86_64
0x6d
12
net_enable_timestamp
vmlinux 0xffffffff8156a7d4
Build id: 3.10.0-514.el7.x86_64
0x44
13
sock_enable_timestamp
vmlinux 0xffffffff8155ae85
Build id: 3.10.0-514.el7.x86_64
0x45
14
sock_setsockopt
vmlinux 0xffffffff8155b20a
Build id: 3.10.0-514.el7.x86_64
0x37a
15
? sock_alloc_file
vmlinux 0xffffffff81551f50
Build id: 3.10.0-514.el7.x86_64
0xa0
16
SyS_setsockopt
vmlinux 0xffffffff81556046
Build id: 3.10.0-514.el7.x86_64
0xd6
17
system_call_fastpath
vmlinux 0xffffffff816965c9
Build id: 3.10.0-514.el7.x86_64
0x16
NMI watchdog: BUG: soft lockup - CPU#5 stuck for 23s! [chronyd:803]
Modules linked in: ext4 mbcache jbd2 loop arc4 md4 nls_utf8 cifs fuse rpcsec_gss_krb5 nfsv4 dns_resolver nfs fscache vmw_vsock_vmci_transport vsock intel_powerclamp coretemp kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ppdev sg pcspkr vmw_balloon i2c_piix4 shpchp parport_pc parport vmw_vmci nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ata_piix ttm vmxnet3 drm crct10dif_pclmul crct10dif_common crc32c_intel libata serio_raw mptspi scsi_transport_spi mptscsih mptbase i2c_core floppy fjes dm_mirror dm_region_hash dm_log dm_mod
CPU: 5 PID: 803 Comm: chronyd Not tainted 3.10.0-514.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/30/2013
task: ffff880233d86dd0 ti: ffff88023321c000 task.ti: ffff88023321c000
RIP: 0010:[<ffffffff810f98e2>]  [<ffffffff810f98e2>] smp_call_function_many+0x202/0x260
RSP: 0018:ffff88023321fd48  EFLAGS: 00000202
RAX: 0000000000000000 RBX: 0000000000017780 RCX: ffff88023fc1ae48
RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000
RBP: ffff88023321fd80 R08: ffff880184e1e400 R09: ffffffff81317a89
R10: ffff88023fd59b40 R11: ffffea000735b700 R12: ffffffff813179df
R13: ffffffff81058b23 R14: ffffffffffffff10 R15: 0000000000000297
FS:  00007f914f2f8740(0000) GS:ffff88023fd40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1dc1ce8000 CR3: 0000000230e13000 CR4: 00000000000407e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Stack:
000000018106ab88 ffffffff81ae20c0 ffffffff8156f02f ffffffff81031d20
0000000000000000 ffffffff8156f030 0000000000000000 ffff88023321fda8
ffffffff810f999d ffffffff8156f02f ffff88023321fdfb 0000000000000005
Call Trace:
[<ffffffff8156f02f>] ? __netif_receive_skb_core+0x2f/0x800
[<ffffffff81031d20>] ? setup_data_read+0x90/0x90
[<ffffffff8156f030>] ? __netif_receive_skb_core+0x30/0x800
[<ffffffff810f999d>] on_each_cpu+0x2d/0x60
[<ffffffff8156f02f>] ? __netif_receive_skb_core+0x2f/0x800
[<ffffffff8103254a>] text_poke_bp+0x6a/0xf0
[<ffffffff8102f508>] arch_jump_label_transform+0x68/0xb0
[<ffffffff8117d90f>] __jump_label_update+0x5f/0x80
[<ffffffff8117d9cd>] jump_label_update+0x9d/0xb0
[<ffffffff8117db6d>] static_key_slow_inc+0x6d/0x90
[<ffffffff8156a7d4>] net_enable_timestamp+0x44/0x50
[<ffffffff8155ae85>] sock_enable_timestamp+0x45/0x50
[<ffffffff8155b20a>] sock_setsockopt+0x37a/0x940
[<ffffffff81551f50>] ? sock_alloc_file+0xa0/0x140
[<ffffffff81556046>] SyS_setsockopt+0xd6/0xf0
[<ffffffff816965c9>] system_call_fastpath+0x16/0x1b
Code: 48 63 35 76 9e 9e 00 89 c2 39 f0 0f 8d 86 fe ff ff 48 98 49 8b 0f 48 03 0c c5 40 57 ad 81 f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 <f6> 41 20 01 75 f8 48 63 35 45 9e 9e 00 eb b7 0f b6 4d cc 4c 89