Kerneloops

Similar reports
Problem #823570
Component
kernel Tainted
Last affected version
0:3.10.0-1160.31.1.el7
Executable
unknown
First occurrence
2022-04-27
Last occurrence
2022-04-27
Unique reports
1
Quality
-30

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.31.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
copy_user_generic_unrolled
vmlinux 0xffffffffb99951f1
Build id: 3.10.0-1160.31.1.el7.x86_64
0x41
2
? iov_iter_copy_from_user_atomic
vmlinux 0xffffffffb97bd515
Build id: 3.10.0-1160.31.1.el7.x86_64
0x55
3
iomap_write_actor
vmlinux 0xffffffffb98bb3e3
Build id: 3.10.0-1160.31.1.el7.x86_64
0x103
4
? iomap_dirty_actor
vmlinux 0xffffffffb98bb2e0
Build id: 3.10.0-1160.31.1.el7.x86_64
0x1d0
5
iomap_apply
vmlinux 0xffffffffb98bb79a
Build id: 3.10.0-1160.31.1.el7.x86_64
0xba
6
iomap_file_buffered_write
vmlinux 0xffffffffb98bb8e1
Build id: 3.10.0-1160.31.1.el7.x86_64
0xa1
7
? iomap_dirty_actor
vmlinux 0xffffffffb98bb2e0
Build id: 3.10.0-1160.31.1.el7.x86_64
0x1d0
8
xfs_file_buffered_aio_write
xfs 0xffffffffc03427bd
Build id: 3.10.0-1160.31.1.el7.x86_64
0x12d
9
xfs_file_aio_write
xfs 0xffffffffc0342add
Build id: 3.10.0-1160.31.1.el7.x86_64
0x18d
10
do_sync_write
vmlinux 0xffffffffb984d593
Build id: 3.10.0-1160.31.1.el7.x86_64
0x93
11
vfs_write
vmlinux 0xffffffffb984e080
Build id: 3.10.0-1160.31.1.el7.x86_64
0xc0
12
SyS_write
vmlinux 0xffffffffb984ee5f
Build id: 3.10.0-1160.31.1.el7.x86_64
0x7f
13
system_call_fastpath
vmlinux 0xffffffffb9d95f92
Build id: 3.10.0-1160.31.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [urlgrabber-ext-:3711]
Modules linked in: xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter talpa_vfshook(OE) talpa_pedconnector(OE) talpa_pedevice(OE) talpa_vcdevice(OE) talpa_core(OE) talpa_linux(OE) talpa_syscallhook(OE) vboxdrv(OE) vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm
snd_timer iosf_mbi snd soundcore crc32_pclmul ghash_clmulni_intel aesni_intel ppdev lrw gf128mul glue_helper ablk_helper cryptd vmw_balloon pcspkr joydev sg parport_pc parport vmw_vmci i2c_piix4 ip_tables xfs libcrc32c sd_mod sr_mod crc_t10dif cdrom crct10dif_generic ata_generic pata_acpi crct10dif_pclmul crct10dif_common crc32c_intel vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm serio_raw drm mptspi nfit scsi_transport_spi libnvdimm e1000 mptscsih ata_piix mptbase libata drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 0 PID: 3711 Comm: urlgrabber-ext- Kdump: loaded Tainted: G           OE  ------------   3.10.0-1160.31.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
task: ffff8f11a5790000 ti: ffff8f119a414000 task.ti: ffff8f119a414000
RIP: 0010:[<ffffffffb99951f1>]  [<ffffffffb99951f1>] copy_user_generic_unrolled+0x41/0xc0
RSP: 0018:ffff8f119a417b38  EFLAGS: 00050202
RAX: 0000000001e02027 RBX: ffff8f127220bd68 RCX: 0000000000000040
RDX: 0000000000000000 RSI: 0000000001e02027 RDI: ffff8f1241d0b000
RBP: ffff8f119a417b50 R08: 334c62fae36192a0 R09: b9d037c8d4a3e905
R10: 7c422f63c41992ed R11: 747ba501b2daa4d9 R12: ffffffff00001000
R13: ffffe274440742c0 R14: ffff8f1179dd97c8 R15: 0000000000000000
FS:  00007fe350279740(0000) GS:ffff8f1279600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000001e05008 CR3: 000000005237c000 CR4: 00000000003607f0
Call Trace:
[<ffffffffb97bd515>] ? iov_iter_copy_from_user_atomic+0x55/0xb0
[<ffffffffb98bb3e3>] iomap_write_actor+0x103/0x1f0
[<ffffffffb98bb2e0>] ? iomap_dirty_actor+0x1d0/0x1d0
[<ffffffffb98bb79a>] iomap_apply+0xba/0x160
[<ffffffffb98bb8e1>] iomap_file_buffered_write+0xa1/0xe0
[<ffffffffb98bb2e0>] ? iomap_dirty_actor+0x1d0/0x1d0
[<ffffffffc03427bd>] xfs_file_buffered_aio_write+0x12d/0x2c0 [xfs]
[<ffffffffc0342add>] xfs_file_aio_write+0x18d/0x1b0 [xfs]
[<ffffffffb984d593>] do_sync_write+0x93/0xe0
[<ffffffffb984e080>] vfs_write+0xc0/0x1f0
[<ffffffffb984ee5f>] SyS_write+0x7f/0xf0
[<ffffffffb9d95f92>] system_call_fastpath+0x25/0x2a
Code: f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 83 e2 3f c1 e9 06 74 4a 4c 8b 06 4c 8b 4e 08 4c 8b 56 10 4c 8b 5e 18 <4c> 89 07 4c 89 4f 08 4c 89 57 10 4c 89 5f 18 4c 8b 46 20 4c 8b