Kerneloops

Similar reports
Problem #11076
Component
kernel Tainted
Last affected version
0:3.10.0-862.el7
Executable
unknown
First occurrence
2021-01-06
Last occurrence
2021-01-06
Unique reports
1
Quality
-35

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-862.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffffa7f0d768
Build id: 3.10.0-862.el7.x86_64
0x19
2
__warn
vmlinux 0xffffffffa78916d8
Build id: 3.10.0-862.el7.x86_64
0xd8
3
warn_slowpath_fmt
vmlinux 0xffffffffa789175f
Build id: 3.10.0-862.el7.x86_64
0x5f
4
prepend_path
vmlinux 0xffffffffa7a349cf
Build id: 3.10.0-862.el7.x86_64
0x25f
5
d_path
vmlinux 0xffffffffa7a34b75
Build id: 3.10.0-862.el7.x86_64
0xe5
6
proc_pid_readlink
vmlinux 0xffffffffa7a92b05
Build id: 3.10.0-862.el7.x86_64
0xa5
7
SyS_readlinkat
vmlinux 0xffffffffa7a210f1
Build id: 3.10.0-862.el7.x86_64
0x111
8
prepend_path
vmlinux 0xffffffffa7a349cf
Build id: 3.10.0-862.el7.x86_64
0x25f
9
d_path
vmlinux 0xffffffffa7a34b75
Build id: 3.10.0-862.el7.x86_64
0xe5
10
proc_pid_readlink
vmlinux 0xffffffffa7a92b05
Build id: 3.10.0-862.el7.x86_64
0xa5
11
SyS_readlinkat
vmlinux 0xffffffffa7a210f1
Build id: 3.10.0-862.el7.x86_64
0x111
12
prepend_path
vmlinux 0xffffffffa7a349cf
Build id: 3.10.0-862.el7.x86_64
0x25f
13
d_path
vmlinux 0xffffffffa7a34b75
Build id: 3.10.0-862.el7.x86_64
0xe5
14
proc_pid_readlink
vmlinux 0xffffffffa7a92b05
Build id: 3.10.0-862.el7.x86_64
0xa5
15
SyS_readlinkat
vmlinux 0xffffffffa7a210f1
Build id: 3.10.0-862.el7.x86_64
0x111
16
SyS_readlink
vmlinux 0xffffffffa7a2114b
Build id: 3.10.0-862.el7.x86_64
0x1b
17
system_call_fastpath
vmlinux 0xffffffffa7f1f7d5
Build id: 3.10.0-862.el7.x86_64
0x1c
WARNING: CPU: 8 PID: 2645 at fs/dcache.c:2891 prepend_path+0x25f/0x320
Root dentry has weird name <>
Modules linked in: sctp_diag sctp tcp_diag udp_diag inet_diag ip6table_filter ip6_tables veth xt_nat ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter xt_conntrack nf_nat nf_conntrack br_netfilter bridge stp llc overlay(T) sunrpc sb_edac intel_powerclamp coretemp intel_rapl iosf_mbi kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw joydev gf128mul mxm_wmi sg mei_me mei glue_helper ablk_helper cryptd iTCO_wdt iTCO_vendor_support pcspkr ipmi_ssif i2c_i801 shpchp ioatdma lpc_ich ipmi_si ipmi_devintf ipmi_msghandler wmi acpi_power_meter acpi_pad ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic ast drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops
ttm ahci libahci drm igb libata crct10dif_pclmul crct10dif_common crc32c_intel ptp pps_core dca i2c_algo_bit i2c_core dm_mirror dm_region_hash dm_log dm_mod
CPU: 8 PID: 2645 Comm: apps.plugin Kdump: loaded Tainted: G        W      ------------ T 3.10.0-862.el7.x86_64 #1
Hardware name: NULL NULL/NULL, BIOS 4.1.8 03/11/2016
Call Trace:
[<ffffffffa7f0d768>] dump_stack+0x19/0x1b
[<ffffffffa78916d8>] __warn+0xd8/0x100
[<ffffffffa789175f>] warn_slowpath_fmt+0x5f/0x80
[<ffffffffa7a349cf>] prepend_path+0x25f/0x320
[<ffffffffa7a34b75>] d_path+0xe5/0x150
[<ffffffffa7a92b05>] proc_pid_readlink+0xa5/0x100
[<ffffffffa7a210f1>] SyS_readlinkat+0x111/0x150
[<ffffffffa7a349cf>] prepend_path+0x25f/0x320
[<ffffffffa7a34b75>] d_path+0xe5/0x150
[<ffffffffa7a92b05>] proc_pid_readlink+0xa5/0x100
[<ffffffffa7a210f1>] SyS_readlinkat+0x111/0x150
[<ffffffffa7a349cf>] prepend_path+0x25f/0x320
[<ffffffffa7a34b75>] d_path+0xe5/0x150
[<ffffffffa7a92b05>] proc_pid_readlink+0xa5/0x100
[<ffffffffa7a210f1>] SyS_readlinkat+0x111/0x150
[<ffffffffa7a2114b>] SyS_readlink+0x1b/0x20
[<ffffffffa7f1f7d5>] system_call_fastpath+0x1c/0x21