Kerneloops

Similar reports
Problem #699918
Component
kernel
Last affected version
0:3.10.0-693.el7
Executable
unknown
First occurrence
2022-02-27
Last occurrence
2022-02-27
Unique reports
1
Quality
-32

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-693.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff810f99a6
Build id: 3.10.0-693.el7.x86_64
0x206
2
? netif_receive_skb_internal
vmlinux 0xffffffff815871f0
Build id: 3.10.0-693.el7.x86_64
0x20
3
? setup_data_read
vmlinux 0xffffffff81031c80
Build id: 3.10.0-693.el7.x86_64
0x90
4
? netif_receive_skb_internal
vmlinux 0xffffffff815871f1
Build id: 3.10.0-693.el7.x86_64
0x21
5
on_each_cpu
vmlinux 0xffffffff810f9a5d
Build id: 3.10.0-693.el7.x86_64
0x2d
6
? netif_receive_skb_internal
vmlinux 0xffffffff815871f0
Build id: 3.10.0-693.el7.x86_64
0x20
7
text_poke_bp
vmlinux 0xffffffff810324aa
Build id: 3.10.0-693.el7.x86_64
0x6a
8
arch_jump_label_transform
vmlinux 0xffffffff8102f558
Build id: 3.10.0-693.el7.x86_64
0x68
9
__jump_label_update
vmlinux 0xffffffff8117fb8f
Build id: 3.10.0-693.el7.x86_64
0x5f
10
jump_label_update
vmlinux 0xffffffff8117fc4d
Build id: 3.10.0-693.el7.x86_64
0x9d
11
static_key_slow_inc
vmlinux 0xffffffff8117fead
Build id: 3.10.0-693.el7.x86_64
0xad
12
net_enable_timestamp
vmlinux 0xffffffff815822a4
Build id: 3.10.0-693.el7.x86_64
0x44
13
sock_enable_timestamp
vmlinux 0xffffffff815700a5
Build id: 3.10.0-693.el7.x86_64
0x45
14
sock_setsockopt
vmlinux 0xffffffff8157042a
Build id: 3.10.0-693.el7.x86_64
0x37a
NMI watchdog: BUG: soft lockup - CPU#2 stuck for 22s! [chronyd:640]
Modules linked in: ipt_MASQUERADE nf_nat_masquerade_ipv4 xt_addrtype xt_conntrack iptable_filter nf_conntrack_netlink binfmt_misc fuse xt_nat veth br_netfilter tun overlay(T) ip_set nfnetlink bridge stp llc iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack vmw_vsock_vmci_transport vsock dm_mirror dm_region_hash dm_log dm_mod snd_seq_midi snd_seq_midi_event edac_core iosf_mbi crc32_pclmul snd_ens1371 ghash_clmulni_intel snd_rawmidi snd_ac97_codec aesni_intel lrw gf128mul ac97_bus glue_helper snd_seq ablk_helper cryptd snd_seq_device snd_pcm ppdev snd_timer vmw_balloon snd soundcore pcspkr joydev sg nfit parport_pc libnvdimm parport shpchp vmw_vmci i2c_piix4 nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sr_mod cdrom ata_generic sd_mod crc_t10dif
crct10dif_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm mptspi drm scsi_transport_spi mptscsih ata_piix mptbase libata e1000 crct10dif_pclmul crct10dif_common i2c_core crc32c_intel serio_raw [last unloaded: iptable_filter]
CPU: 2 PID: 640 Comm: chronyd Tainted: G             L ------------ T 3.10.0-693.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/29/2019
task: ffff88037f9b4f10 ti: ffff88036dd6c000 task.ti: ffff88036dd6c000
RIP: 0010:[<ffffffff810f99a6>]  [<ffffffff810f99a6>] smp_call_function_many+0x206/0x260
RSP: 0018:ffff88036dd6fd48  EFLAGS: 00000202
RAX: 0000000000000000 RBX: 00000000000000fc RCX: ffff88037021af48
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000000000000
RBP: ffff88036dd6fd80 R08: ffff88017afb3800 R09: ffffffff813227d9
R10: ffff880370299c80 R11: ffffea0002cf0400 R12: 0000000000000296
R13: ffff88036dd6fcf8 R14: 0000000000000000 R15: ffff880000000000
FS:  00007f9f1ca4f740(0000) GS:ffff880370280000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fd5650e5fd8 CR3: 000000036a241000 CR4: 00000000003407e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Stack:
000000016dd6fd58 ffffffff81b1c820 ffffffff815871f0 ffffffff81031c80
0000000000000000 ffffffff815871f1 0000000000000000 ffff88036dd6fda8
ffffffff810f9a5d ffffffff815871f0 ffff88036dd6fdfb 0000000000000005
Call Trace:
[<ffffffff815871f0>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff81031c80>] ? setup_data_read+0x90/0x90
[<ffffffff815871f1>] ? netif_receive_skb_internal+0x21/0xc0
[<ffffffff810f9a5d>] on_each_cpu+0x2d/0x60
[<ffffffff815871f0>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff810324aa>] text_poke_bp+0x6a/0xf0
[<ffffffff8102f558>] arch_jump_label_transform+0x68/0xb0
[<ffffffff8117fb8f>] __jump_label_update+0x5f/0x80
[<ffffffff8117fc4d>] jump_label_update+0x9d/0xb0
[<ffffffff8117fead>] static_key_slow_inc+0xad/0xb0
[<ffffffff815822a4>] net_enable_timestamp+0x44/0x50
[<ffffffff815700a5>] sock_enable_timestamp+0x45/0x50
[<ffffffff8157042a>] sock_setsockopt+0x37a/0x880