Kerneloops

Similar reports
Problem #815773
Component
kernel Tainted
Last affected version
0:3.10.0-693.5.2.el7
Executable
unknown
First occurrence
2022-12-22
Last occurrence
2023-03-21
Unique reports
2
Quality
-30

Statistics

Operating system Unique / Total count
CentOS 7 2 / 2
Operating system Count
CentOS 7 2
Architecture Count
x86_64 2
Related packages Count
kernel 2
 0:3.10.0-693.5.2.el7 2

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_unlock_irqrestore
vmlinux 0xffffffff816ab905
Build id: 3.10.0-693.5.2.el7.x86_64
0x15
2
pagevec_lru_move_fn
vmlinux 0xffffffff81190ec5
Build id: 3.10.0-693.5.2.el7.x86_64
0xf5
3
? lru_deactivate_fn
vmlinux 0xffffffff811905c0
Build id: 3.10.0-693.5.2.el7.x86_64
0x1d0
4
__lru_cache_add
vmlinux 0xffffffff81191154
Build id: 3.10.0-693.5.2.el7.x86_64
0x64
5
lru_cache_add
vmlinux 0xffffffff8119151e
Build id: 3.10.0-693.5.2.el7.x86_64
0xe
6
putback_lru_page
vmlinux 0xffffffff81195d3d
Build id: 3.10.0-693.5.2.el7.x86_64
0x3d
7
mem_cgroup_reparent_charges
vmlinux 0xffffffff811f339a
Build id: 3.10.0-693.5.2.el7.x86_64
0x22a
8
mem_cgroup_css_offline
vmlinux 0xffffffff811f36e4
Build id: 3.10.0-693.5.2.el7.x86_64
0x84
9
cgroup_destroy_locked
vmlinux 0xffffffff8110d767
Build id: 3.10.0-693.5.2.el7.x86_64
0xe7
10
cgroup_rmdir
vmlinux 0xffffffff8110da12
Build id: 3.10.0-693.5.2.el7.x86_64
0x22
11
vfs_rmdir
vmlinux 0xffffffff8120f5a6
Build id: 3.10.0-693.5.2.el7.x86_64
0xd6
12
do_rmdir
vmlinux 0xffffffff81212241
Build id: 3.10.0-693.5.2.el7.x86_64
0x1f1
13
SyS_rmdir
vmlinux 0xffffffff81213446
Build id: 3.10.0-693.5.2.el7.x86_64
0x16
14
system_call_fastpath
vmlinux 0xffffffff816b5089
Build id: 3.10.0-693.5.2.el7.x86_64
0x16
NMI watchdog: BUG: soft lockup - CPU#22 stuck for 22s! [slurmstepd:163644]
Modules linked in: 8021q garp mrp xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter nfsv3 nfs fscache rpcrdma ib_isert iscsi_target_mod ib_iser libiscsi scsi_transport_iscsi ib_srpt target_core_mod ib_srp scsi_transport_srp scsi_tgt ib_ipoib rdma_ucm ib_ucm ib_uverbs ib_umad rdma_cm ib_cm iw_cm dm_mirror dm_region_hash dm_log dm_mod skx_edac edac_core iTCO_wdt intel_powerclamp iTCO_vendor_support coretemp intel_rapl iosf_mbi kvm hfi1 irqbypass crc32_pclmul rdmavt ghash_clmulni_intel aesni_intel ib_core lrw gf128mul glue_helper mei_me ablk_helper cryptd joydev pcspkr sg mei
lpc_ich i2c_i801 shpchp wmi ipmi_si ipmi_devintf ipmi_msghandler nfit libnvdimm acpi_pad acpi_power_meter acpi_cpufreq nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops crct10dif_pclmul crct10dif_common ixgbe ttm crc32c_intel ahci mdio drm libahci ptp libata pps_core i2c_core dca
CPU: 22 PID: 163644 Comm: slurmstepd Tainted: G        W      ------------   3.10.0-693.5.2.el7.x86_64 #1
Hardware name: Advanced Clustering S2600BPB/S2600BPB, BIOS SE5C620.86B.00.01.0009.C2.101920170742 10/19/2017
task: ffff88474a3e6eb0 ti: ffff8842e1f4c000 task.ti: ffff8842e1f4c000
RIP: 0010:[<ffffffff816ab905>]  [<ffffffff816ab905>] _raw_spin_unlock_irqrestore+0x15/0x20
RSP: 0018:ffff8842e1f4fca8  EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffff882e61a99800 RCX: 0000000000000004
RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
RBP: ffff8842e1f4fca8 R08: 0000000000000000 R09: ffffea0000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff8842e1f4fc28
R13: 0000000000000246 R14: 0000000000000010 R15: ffffffff81190a3b
FS:  00002aea08755d00(0000) GS:ffff885f7be80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007febd8ecf000 CR3: 0000004834786000 CR4: 00000000003407e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Stack:
ffff8842e1f4fcf8 ffffffff81190ec5 0000000000000000 ffffffff811905c0
0000000000000246 ffffea0049efe700 ffff885f7be91ae0 0000000000000000
0000000000000000 ffffea0049efe720 ffff8842e1f4fd18 ffffffff81191154
Call Trace:
[<ffffffff81190ec5>] pagevec_lru_move_fn+0xf5/0x130
[<ffffffff811905c0>] ? lru_deactivate_fn+0x1d0/0x1d0
[<ffffffff81191154>] __lru_cache_add+0x64/0x90
[<ffffffff8119151e>] lru_cache_add+0xe/0x10
[<ffffffff81195d3d>] putback_lru_page+0x3d/0xb0
[<ffffffff811f339a>] mem_cgroup_reparent_charges+0x22a/0x3c0
[<ffffffff811f36e4>] mem_cgroup_css_offline+0x84/0x140
[<ffffffff8110d767>] cgroup_destroy_locked+0xe7/0x370
[<ffffffff8110da12>] cgroup_rmdir+0x22/0x40
[<ffffffff8120f5a6>] vfs_rmdir+0xd6/0x150
[<ffffffff81212241>] do_rmdir+0x1f1/0x220
[<ffffffff81213446>] SyS_rmdir+0x16/0x20
[<ffffffff816b5089>] system_call_fastpath+0x16/0x1b
Code: 07 00 0f 1f 40 00 5d c3 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 c6 07 00 0f 1f 40 00 48 89 f7 57 9d <0f> 1f 44 00 00 5d c3 0f 1f 40 00 0f 1f 44 00 00 55 48 89 e5 48