Kerneloops

Similar reports
Problem #699918
Component
kernel
Last affected version
0:3.10.0-693.2.2.rt56.623.el7
Executable
unknown
First occurrence
2022-09-22
Last occurrence
2022-11-01
Unique reports
3
Quality
-41

Statistics

Operating system Unique / Total count
CentOS 7 3 / 44
Operating system Count
CentOS 7 44
Architecture Count
x86_64 44
Related packages Count
kernel-rt 44
 0:3.10.0-693.2.2.rt56.623.el7 44

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff810f670a
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x23a
2
? netif_receive_skb_internal
vmlinux 0xffffffff81587de1
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x21
3
smp_call_function
vmlinux 0xffffffff810f67aa
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x3a
4
? netif_receive_skb_internal
vmlinux 0xffffffff81587de0
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x20
5
? setup_data_read
vmlinux 0xffffffff810237e0
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x90
6
on_each_cpu
vmlinux 0xffffffff810f680b
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x2b
7
? netif_receive_skb_internal
vmlinux 0xffffffff81587de0
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x20
8
? netif_receive_skb_internal
vmlinux 0xffffffff81587de1
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x21
9
text_poke_bp
vmlinux 0xffffffff81024087
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0xb7
10
arch_jump_label_transform
vmlinux 0xffffffff81020e48
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x68
11
__jump_label_update
vmlinux 0xffffffff8118242f
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x5f
12
jump_label_update
vmlinux 0xffffffff811824ed
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x9d
13
static_key_slow_inc
vmlinux 0xffffffff8118274d
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0xad
14
net_enable_timestamp
vmlinux 0xffffffff81582b04
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x44
15
sock_enable_timestamp
vmlinux 0xffffffff815703c5
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x45
16
sock_setsockopt
vmlinux 0xffffffff8157090f
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x53f
17
SyS_setsockopt
vmlinux 0xffffffff8156b416
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0xd6
18
system_call_fastpath
vmlinux 0xffffffff816ba109
Build id: 3.10.0-693.2.2.rt56.623.el7.x86_64
0x16
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [chronyd:1020]
Modules linked in: tcp_lp xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter devlink ext4 mbcache jbd2 sunrpc dm_mirror dm_region_hash dm_log dm_mod ppdev joydev sg edac_core virtio_balloon virtio_rng iosf_mbi crc32_pclmul parport_pc ghash_clmulni_intel parport aesni_intel lrw gf128mul glue_helper ablk_helper i2c_piix4 cryptd i2c_core pcspkr ip_tables xfs libcrc32c sr_mod cdrom virtio_blk virtio_console virtio_net ata_generic pata_acpi crct10dif_pclmul crct10dif_common crc32c_intel serio_raw ata_piix virtio_pci libata floppy fuse
CPU: 0 PID: 1020 Comm: chronyd Not tainted 3.10.0-693.2.2.rt56.623.el7.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
task: ffff8803e9c7e1e0 ti: ffff8803e2b60000 task.ti: ffff8803e2b60000
RIP: 0010:[<ffffffff810f670a>]  [<ffffffff810f670a>] smp_call_function_many+0x23a/0x2a0
RSP: 0018:ffff8803e2b63d20  EFLAGS: 00000202
RAX: 0000000000000003 RBX: ffff8803e2b61fd8 RCX: ffff8803efedc838
RDX: 0000000000000003 RSI: 0000000000000019 RDI: 0000000000000000
RBP: ffff8803e2b63d58 R08: ffff8803efe19c08 R09: 0000000000000000
R10: ffff8803efe19c08 R11: 0000000000000000 R12: ffffffff8101a8e2
R13: ffff8803e2b63cd8 R14: ffffffff810c6bfc R15: ffff8803e2b63ca0
FS:  00007efcdf257740(0000) GS:ffff8803efe00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000006ec0f8 CR3: 00000003e8810000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Stack:
0000000100000000 0000000000019bc0 ffff8803e2b60000 ffff8803e2b63fd8
0000000000000000 ffffffff81587de1 0000000000000000 ffff8803e2b63d78
ffffffff810f67aa ffffffff81587de0 ffffffff810237e0 ffff8803e2b63da8
Call Trace:
[<ffffffff81587de1>] ? netif_receive_skb_internal+0x21/0xe0
[<ffffffff810f67aa>] smp_call_function+0x3a/0x70
[<ffffffff81587de0>] ? netif_receive_skb_internal+0x20/0xe0
[<ffffffff810237e0>] ? setup_data_read+0x90/0x90
[<ffffffff810f680b>] on_each_cpu+0x2b/0xc0
[<ffffffff81587de0>] ? netif_receive_skb_internal+0x20/0xe0
[<ffffffff81587de1>] ? netif_receive_skb_internal+0x21/0xe0
[<ffffffff81024087>] text_poke_bp+0xb7/0xf0
[<ffffffff81020e48>] arch_jump_label_transform+0x68/0xb0
[<ffffffff8118242f>] __jump_label_update+0x5f/0x80
[<ffffffff811824ed>] jump_label_update+0x9d/0xb0
[<ffffffff8118274d>] static_key_slow_inc+0xad/0xb0
[<ffffffff81582b04>] net_enable_timestamp+0x44/0x50
[<ffffffff815703c5>] sock_enable_timestamp+0x45/0x50
[<ffffffff8157090f>] sock_setsockopt+0x53f/0x890
[<ffffffff8156b416>] SyS_setsockopt+0xd6/0xf0
[<ffffffff816ba109>] system_call_fastpath+0x16/0x1b
Code: 63 35 ff 19 a6 00 89 c2 39 f0 0f 8d 49 fe ff ff 48 98 49 8b 4d 00 48 03 0c c5 20 a0 b4 81 f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 <f6> 41 20 01 75 f8 48 63 35 cd 19 a6 00 eb b7 0f b6 4d cc 4c 89