Kerneloops

Similar reports
Problem #575829
Component
kernel Tainted
Last affected version
0:3.10.0-327.36.3.el7
Executable
unknown
First occurrence
2022-03-02
Last occurrence
2022-07-19
Unique reports
2
Quality
-35

Statistics

Operating system Unique / Total count
CentOS 7 2 / 2
Operating system Count
CentOS 7 2
Architecture Count
x86_64 2
Related packages Count
kernel 2
 0:3.10.0-327.36.3.el7 2

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff81636431
Build id: 3.10.0-327.36.3.el7.x86_64
0x19
2
warn_slowpath_common
vmlinux 0xffffffff8107b260
Build id: 3.10.0-327.36.3.el7.x86_64
0x70
3
warn_slowpath_fmt
vmlinux 0xffffffff8107b2fc
Build id: 3.10.0-327.36.3.el7.x86_64
0x5c
4
kprobe_dispatcher
vmlinux 0xffffffff81645832
Build id: 3.10.0-327.36.3.el7.x86_64
0x2b2
5
? do_execve_common.isra.23
vmlinux 0xffffffff811e66a1
Build id: 3.10.0-327.36.3.el7.x86_64
0x1
6
kprobe_ftrace_handler
vmlinux 0xffffffff81641a5c
Build id: 3.10.0-327.36.3.el7.x86_64
0xac
7
? prepare_bprm_creds
vmlinux 0xffffffff811e66a0
Build id: 3.10.0-327.36.3.el7.x86_64
0x80
8
? SyS_execve
vmlinux 0xffffffff811e6fc9
Build id: 3.10.0-327.36.3.el7.x86_64
0x29
9
ftrace_ops_list_func
vmlinux 0xffffffff8112cb1e
Build id: 3.10.0-327.36.3.el7.x86_64
0xee
10
ftrace_regs_call
vmlinux 0xffffffff816487f4
Build id: 3.10.0-327.36.3.el7.x86_64
0x5
11
? do_execve_common.isra.23
vmlinux 0xffffffff811e66a1
Build id: 3.10.0-327.36.3.el7.x86_64
0x1
12
? do_execve_common.isra.23
vmlinux 0xffffffff811e66a5
Build id: 3.10.0-327.36.3.el7.x86_64
0x5
13
? SyS_execve
vmlinux 0xffffffff811e6fc9
Build id: 3.10.0-327.36.3.el7.x86_64
0x29
14
stub_execve
vmlinux 0xffffffff816470e9
Build id: 3.10.0-327.36.3.el7.x86_64
0x69
WARNING: at kernel/trace/trace_kprobe.c:1183 kprobe_dispatcher+0x2b2/0x2c0()
profile buffer not large enough
Modules linked in:
mmfs26(OE) mmfslinux(OE) tracedev(OE) 8021q garp stp mrp llc mlx4_en(OE) mlx4_core(OE) dm_mirror dm_region_hash dm_log dm_mod iTCO_wdt iTCO_vendor_support mxm_wmi intel_powerclamp coretemp intel_rapl kvm crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ipmi_devintf sb_edac lpc_ich mei_me edac_core pcspkr sg mfd_core i2c_i801 mei shpchp ipmi_si ipmi_msghandler wmi acpi_power_meter acpi_pad acpi_cpufreq binfmt_misc nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables ext4 mbcache jbd2 sd_mod crc_t10dif crct10dif_generic mgag200 syscopyarea sysfillrect sysimgblt drm_kms_helper mlx5_core(OE) ttm igb vxlan ahci ip6_udp_tunnel udp_tunnel mlxfw(OE) dca libahci crct10dif_pclmul drm mlx_compat(OE) crct10dif_common i2c_algo_bit ptp libata crc32c_intel i2c_core
pps_core
CPU: 28 PID: 6957 Comm: mmcommon Tainted: G           OE  ------------   3.10.0-327.36.3.el7.x86_64 #1
Hardware name: Advanced Clustering Compute Block/S2600TPR, BIOS SE5C610.86B.01.01.0020.C1.122820161512 12/28/2016
ffff887d7d24fd20 00000000ee4a7ab9 ffff887d7d24fcd8 ffffffff81636431
ffff887d7d24fd10 ffffffff8107b260 0000000000000bf1 0000000000000c3c
0000000000000bf1 ffff887d7d24fe80 ffff887dc7918010 ffff887d7d24fd78
Call Trace:
[<ffffffff81636431>] dump_stack+0x19/0x1b
[<ffffffff8107b260>] warn_slowpath_common+0x70/0xb0
[<ffffffff8107b2fc>] warn_slowpath_fmt+0x5c/0x80
[<ffffffff81645832>] kprobe_dispatcher+0x2b2/0x2c0
[<ffffffff811e66a1>] ? do_execve_common.isra.23+0x1/0x690
[<ffffffff81641a5c>] kprobe_ftrace_handler+0xac/0xf0
[<ffffffff811e66a0>] ? prepare_bprm_creds+0x80/0x80
[<ffffffff811e6fc9>] ? SyS_execve+0x29/0x30
[<ffffffff8112cb1e>] ftrace_ops_list_func+0xee/0x110
[<ffffffff816487f4>] ftrace_regs_call+0x5/0x81
[<ffffffff811e66a1>] ? do_execve_common.isra.23+0x1/0x690
[<ffffffff811e66a5>] ? do_execve_common.isra.23+0x5/0x690
[<ffffffff811e6fc9>] ? SyS_execve+0x29/0x30
[<ffffffff816470e9>] stub_execve+0x69/0xa0