Kerneloops

Similar reports
Problem #699918
Component
kernel Tainted
Last affected version
0:3.10.0-693.el7
Executable
unknown
First occurrence
2020-10-06
Last occurrence
2025-05-01
Unique reports
9
Quality
-37

Statistics

Operating system Unique / Total count
CentOS 7 9 / 36
Operating system Count
CentOS 7 36
Architecture Count
x86_64 36
Related packages Count
kernel 36
 0:3.10.0-693.5.2.el7 25
 0:3.10.0-693.el7 9
 0:3.10.0-514.26.2.el7 1
 0:3.10.0-1160.118.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff810f9f76
Build id: 3.10.0-514.26.2.el7.x86_64
0x206
2
? netif_receive_skb_internal
vmlinux 0xffffffff81570460
Build id: 3.10.0-514.26.2.el7.x86_64
0x20
3
? setup_data_read
vmlinux 0xffffffff81031ce0
Build id: 3.10.0-514.26.2.el7.x86_64
0x90
4
? netif_receive_skb_internal
vmlinux 0xffffffff81570461
Build id: 3.10.0-514.26.2.el7.x86_64
0x21
5
on_each_cpu
vmlinux 0xffffffff810fa02d
Build id: 3.10.0-514.26.2.el7.x86_64
0x2d
6
? netif_receive_skb_internal
vmlinux 0xffffffff81570460
Build id: 3.10.0-514.26.2.el7.x86_64
0x20
7
text_poke_bp
vmlinux 0xffffffff8103250a
Build id: 3.10.0-514.26.2.el7.x86_64
0x6a
8
arch_jump_label_transform
vmlinux 0xffffffff8102f508
Build id: 3.10.0-514.26.2.el7.x86_64
0x68
9
__jump_label_update
vmlinux 0xffffffff8117dfdf
Build id: 3.10.0-514.26.2.el7.x86_64
0x5f
10
jump_label_update
vmlinux 0xffffffff8117e09d
Build id: 3.10.0-514.26.2.el7.x86_64
0x9d
11
static_key_slow_inc
vmlinux 0xffffffff8117e23d
Build id: 3.10.0-514.26.2.el7.x86_64
0x6d
12
net_enable_timestamp
vmlinux 0xffffffff8156b6a4
Build id: 3.10.0-514.26.2.el7.x86_64
0x44
13
sock_enable_timestamp
vmlinux 0xffffffff8155bce5
Build id: 3.10.0-514.26.2.el7.x86_64
0x45
14
sock_setsockopt
vmlinux 0xffffffff8155c06a
Build id: 3.10.0-514.26.2.el7.x86_64
0x37a
15
SyS_setsockopt
vmlinux 0xffffffff81556e66
Build id: 3.10.0-514.26.2.el7.x86_64
0xd6
16
system_call_fastpath
vmlinux 0xffffffff81697809
Build id: 3.10.0-514.26.2.el7.x86_64
0x16
NMI watchdog: BUG: soft lockup - CPU#2 stuck for 21s! [dhclient:20394]
Modules linked in: tcp_lp fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock intel_powerclamp iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul ppdev glue_helper ablk_helper cryptd vmw_balloon pcspkr vmwgfx ttm drm_kms_helper syscopyarea nfit sysfillrect libnvdimm shpchp sg sysimgblt fb_sys_fops drm parport_pc
i2c_piix4 i2c_core vmw_vmci parport nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic sr_mod cdrom ata_generic pata_acpi crct10dif_pclmul crct10dif_common crc32c_intel serio_raw ahci ata_piix libahci libata e1000 fjes dm_mirror dm_region_hash dm_log dm_mod
CPU: 2 PID: 20394 Comm: dhclient Tainted: G           OEL ------------   3.10.0-514.26.2.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
task: ffff880092348000 ti: ffff88013719c000 task.ti: ffff88013719c000
RIP: 0010:[<ffffffff810f9f76>]  [<ffffffff810f9f76>] smp_call_function_many+0x206/0x260
RSP: 0018:ffff88013719fd48  EFLAGS: 00000202
RAX: 0000000000000003 RBX: 00000000000000fc RCX: ffff88013fd9a6a0
RDX: 0000000000000003 RSI: 0000000000000004 RDI: 0000000000000000
RBP: ffff88013719fd80 R08: ffff880139be5c00 R09: ffffffff81318499
R10: ffff88013fd19b40 R11: ffffea0004da3900 R12: 0000000000000296
R13: ffff88013719fcf8 R14: 000280da00000000 R15: ffffffff811dd69b
FS:  00007f24abc67880(0000) GS:ffff88013fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f24aa8d9093 CR3: 0000000079fd8000 CR4: 00000000000407e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Stack:
000000018106acb8 ffffffff81ae6300 ffffffff81570460 ffffffff81031ce0
0000000000000000 ffffffff81570461 0000000000000000 ffff88013719fda8
ffffffff810fa02d ffffffff81570460 ffff88013719fdfb 0000000000000005
Call Trace:
[<ffffffff81570460>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff81031ce0>] ? setup_data_read+0x90/0x90
[<ffffffff81570461>] ? netif_receive_skb_internal+0x21/0xc0
[<ffffffff810fa02d>] on_each_cpu+0x2d/0x60
[<ffffffff81570460>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff8103250a>] text_poke_bp+0x6a/0xf0
[<ffffffff8102f508>] arch_jump_label_transform+0x68/0xb0
[<ffffffff8117dfdf>] __jump_label_update+0x5f/0x80
[<ffffffff8117e09d>] jump_label_update+0x9d/0xb0
[<ffffffff8117e23d>] static_key_slow_inc+0x6d/0x90
[<ffffffff8156b6a4>] net_enable_timestamp+0x44/0x50
[<ffffffff8155bce5>] sock_enable_timestamp+0x45/0x50
[<ffffffff8155c06a>] sock_setsockopt+0x37a/0x940
[<ffffffff81556e66>] SyS_setsockopt+0xd6/0xf0
[<ffffffff81697809>] system_call_fastpath+0x16/0x1b
Code: da 9e 00 89 c2 39 f0 0f 8d 86 fe ff ff 48 98 49 8b 0f 48 03 0c c5 80 99 ad 81 f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 f6 41 20 01 <75> f8 48 63 35 f5 d9 9e 00 eb b7 0f b6 4d cc 4c 89 f2 4c 89 ee