Kerneloops

Similar reports
Problem #699918
Component
kernel Tainted
Last affected version
0:3.10.0-1160.76.1.el7
Executable
unknown
First occurrence
2022-11-20
Last occurrence
2022-11-20
Unique reports
1
Quality
-38

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.76.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff8d71718e
Build id: 3.10.0-1160.76.1.el7.x86_64
0x20e
2
? netif_receive_skb_internal
vmlinux 0xffffffff8dc59b80
Build id: 3.10.0-1160.76.1.el7.x86_64
0x20
3
? setup_data_read
vmlinux 0xffffffff8d634260
Build id: 3.10.0-1160.76.1.el7.x86_64
0xd0
4
? netif_receive_skb_internal
vmlinux 0xffffffff8dc59b81
Build id: 3.10.0-1160.76.1.el7.x86_64
0x21
5
on_each_cpu
vmlinux 0xffffffff8d71724d
Build id: 3.10.0-1160.76.1.el7.x86_64
0x2d
6
? netif_receive_skb_internal
vmlinux 0xffffffff8dc59b80
Build id: 3.10.0-1160.76.1.el7.x86_64
0x20
7
text_poke_bp
vmlinux 0xffffffff8d634a8a
Build id: 3.10.0-1160.76.1.el7.x86_64
0x6a
8
arch_jump_label_transform
vmlinux 0xffffffff8d6316a8
Build id: 3.10.0-1160.76.1.el7.x86_64
0x68
9
__jump_label_update
vmlinux 0xffffffff8d7bb39f
Build id: 3.10.0-1160.76.1.el7.x86_64
0x5f
10
jump_label_update
vmlinux 0xffffffff8d7bb47d
Build id: 3.10.0-1160.76.1.el7.x86_64
0x9d
11
static_key_slow_inc
vmlinux 0xffffffff8d7bb6dd
Build id: 3.10.0-1160.76.1.el7.x86_64
0xad
12
net_enable_timestamp
vmlinux 0xffffffff8dc53774
Build id: 3.10.0-1160.76.1.el7.x86_64
0x44
13
sock_enable_timestamp
vmlinux 0xffffffff8dc40705
Build id: 3.10.0-1160.76.1.el7.x86_64
0x45
14
sock_setsockopt
vmlinux 0xffffffff8dc40c87
Build id: 3.10.0-1160.76.1.el7.x86_64
0x577
15
SyS_setsockopt
vmlinux 0xffffffff8dc3b716
Build id: 3.10.0-1160.76.1.el7.x86_64
0xe6
16
system_call_fastpath
vmlinux 0xffffffff8dd99f92
Build id: 3.10.0-1160.76.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#20 stuck for 23s! [chronyd:1571]
Modules linked in: socwatch2_14(OE) vtsspp(OE) sep5(OE) socperf3(OE) xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 pax(OE) tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc dm_mirror dm_region_hash dm_log dm_mod iTCO_wdt iTCO_vendor_support intel_wmi_thunderbolt mxm_wmi nvidia_drm(POE) nvidia_modeset(POE) vfat nvidia(POE) fat sb_edac intel_powerclamp coretemp snd_hda_codec_hdmi intel_rapl iosf_mbi
kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel snd_hda_codec_realtek aesni_intel snd_hda_codec_generic lrw gf128mul glue_helper ablk_helper cryptd pcspkr snd_hda_intel snd_hda_codec snd_hda_core sg snd_hwdep snd_seq i2c_i801 lpc_ich snd_seq_device snd_pcm joydev mei_me mei snd_timer snd ipmi_ssif ioatdma soundcore ipmi_si ipmi_devintf ipmi_msghandler wmi acpi_power_meter acpi_pad ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic ast drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm igb ahci crct10dif_pclmul crct10dif_common crc32c_intel libahci ptp pps_core dca libata i2c_algo_bit drm_panel_orientation_quirks nfit libnvdimm fuse
CPU: 20 PID: 1571 Comm: chronyd Kdump: loaded Tainted: P           OEL ------------   3.10.0-1160.76.1.el7.x86_64 #1
Hardware name: Supermicro Super Server/X10DRG-Q, BIOS 3.2 11/22/2019
task: ffff90d8a0776300 ti: ffff90f8bc574000 task.ti: ffff90f8bc574000
RIP: 0010:[<ffffffff8d71718e>]  [<ffffffff8d71718e>] smp_call_function_many+0x20e/0x270
RSP: 0018:ffff90f8bc577d18  EFLAGS: 00000202
RAX: 0000000000000000 RBX: 000000000001b840 RCX: ffff90d8bf620958
RDX: 0000000000000000 RSI: 0000000000000040 RDI: 0000000000000000
RBP: ffff90f8bc577d50 R08: ffff90d9732d0000 R09: ffffffff8d9869f9
R10: ffff90f8bef1f160 R11: fffffe7f7ff3b200 R12: ffff90f8bc577cc8
R13: 0000000000000003 R14: ffffffff8d827843 R15: ffff90f8bc577ca8
FS:  00007ff5aff02740(0000) GS:ffff90f8bef00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005561e0bf6ba8 CR3: 0000003fe85fc000 CR4: 00000000003607e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
[<ffffffff8dc59b80>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff8d634260>] ? setup_data_read+0xd0/0xd0
[<ffffffff8dc59b81>] ? netif_receive_skb_internal+0x21/0xc0
[<ffffffff8d71724d>] on_each_cpu+0x2d/0x60
[<ffffffff8dc59b80>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff8d634a8a>] text_poke_bp+0x6a/0xf0
[<ffffffff8d6316a8>] arch_jump_label_transform+0x68/0xb0
[<ffffffff8d7bb39f>] __jump_label_update+0x5f/0xa0
[<ffffffff8d7bb47d>] jump_label_update+0x9d/0xb0
[<ffffffff8d7bb6dd>] static_key_slow_inc+0xad/0xb0
[<ffffffff8dc53774>] net_enable_timestamp+0x44/0x50
[<ffffffff8dc40705>] sock_enable_timestamp+0x45/0x50
[<ffffffff8dc40c87>] sock_setsockopt+0x577/0x8f0
[<ffffffff8dc3b716>] SyS_setsockopt+0xe6/0x100
[<ffffffff8dd99f92>] system_call_fastpath+0x25/0x2a
Code: 88 c4 00 89 c2 39 f0 0f 8d 7d fe ff ff 48 98 49 8b 0f 48 03 0c c5 00 19 35 8e f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 f6 41 20 01 <75> f8 48 63 35 8d 88 c4 00 eb b7 0f b6 4d cc 4c 89 f2 4c 89 ee