Kerneloops

Similar reports
Problem #694150
Component
kernel
Last affected version
0:3.10.0-1160.49.1.el7
Executable
unknown
First occurrence
2023-01-18
Last occurrence
2025-08-19
Unique reports
3
Quality
-25

Statistics

Operating system Unique / Total count
CentOS 7 3 / 5
Operating system Count
CentOS 7 5
Architecture Count
x86_64 5
Related packages Count
kernel 5
 0:3.10.0-1160.49.1.el7 5

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
clear_page_c_e
vmlinux 0xffffffff84595397
Build id: 3.10.0-1160.49.1.el7.x86_64
0x7
2
? get_page_from_freelist
vmlinux 0xffffffff843c862f
Build id: 3.10.0-1160.49.1.el7.x86_64
0x36f
3
? __radix_tree_lookup
vmlinux 0xffffffff8458dc44
Build id: 3.10.0-1160.49.1.el7.x86_64
0x84
4
__alloc_pages_nodemask
vmlinux 0xffffffff843c8f04
Build id: 3.10.0-1160.49.1.el7.x86_64
0x184
5
? filemap_fault
vmlinux 0xffffffff843c0ead
Build id: 3.10.0-1160.49.1.el7.x86_64
0x17d
6
alloc_pages_vma
vmlinux 0xffffffff8441cc49
Build id: 3.10.0-1160.49.1.el7.x86_64
0xa9
7
handle_mm_fault
vmlinux 0xffffffff843f6837
Build id: 3.10.0-1160.49.1.el7.x86_64
0xcb7
8
__do_page_fault
vmlinux 0xffffffff84990653
Build id: 3.10.0-1160.49.1.el7.x86_64
0x213
9
trace_do_page_fault
vmlinux 0xffffffff84990a26
Build id: 3.10.0-1160.49.1.el7.x86_64
0x56
10
do_async_page_fault
vmlinux 0xffffffff8498ffa2
Build id: 3.10.0-1160.49.1.el7.x86_64
0x22
11
async_page_fault
vmlinux 0xffffffff8498c7a8
Build id: 3.10.0-1160.49.1.el7.x86_64
0x28
NMI watchdog: BUG: soft lockup - CPU#1 stuck for 39s! [abrt-action-gen:7550]
Modules linked in: uinput xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack libcrc32c ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc dm_mirror dm_region_hash dm_log dm_mod nfit libnvdimm snd_hda_codec_generic iosf_mbi snd_hda_intel crc32_pclmul ghash_clmulni_intel aesni_intel ppdev snd_hda_codec lrw gf128mul glue_helper snd_hda_core snd_hwdep snd_seq ablk_helper snd_seq_device cryptd snd_pcm pcspkr
snd_timer joydev snd virtio_rng virtio_balloon soundcore sg parport_pc parport i2c_piix4 ip_tables ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi qxl drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm virtio_net ata_piix net_failover virtio_console virtio_blk failover crct10dif_pclmul crct10dif_common libata crc32c_intel floppy serio_raw virtio_pci virtio_ring virtio drm_panel_orientation_quirks fuse
CPU: 1 PID: 7550 Comm: abrt-action-gen Kdump: loaded Tainted: G             L ------------   3.10.0-1160.49.1.el7.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
task: ffff915cf87de300 ti: ffff915e5407c000 task.ti: ffff915e5407c000
RIP: 0010:[<ffffffff84595397>]  [<ffffffff84595397>] clear_page_c_e+0x7/0x10
RSP: 0000:ffff915e5407fb08  EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffe2a306740080 RCX: 0000000000001000
RDX: ffffffff84c8ed70 RSI: 0000000000000000 RDI: ffff915ddd001000
RBP: ffff915e5407fc18 R08: ffffffff84c8ed5f R09: ffffe2a306740080
R10: 00000000000034aa R11: ffff915caf510d80 R12: ffff915cf87de300
R13: ffffe2a306740040 R14: ffffe2a306740040 R15: ffff915e803d8000
FS:  00007f6e181ce740(0000) GS:ffff915e80100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000005dc90001 CR3: 00000002141d2000 CR4: 00000000003606e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
[<ffffffff843c862f>] ? get_page_from_freelist+0x36f/0xac0
[<ffffffff8458dc44>] ? __radix_tree_lookup+0x84/0xf0
[<ffffffff843c8f04>] __alloc_pages_nodemask+0x184/0xbe0
[<ffffffff843c0ead>] ? filemap_fault+0x17d/0x420
[<ffffffff8441cc49>] alloc_pages_vma+0xa9/0x200
[<ffffffff843f6837>] handle_mm_fault+0xcb7/0xfb0
[<ffffffff84990653>] __do_page_fault+0x213/0x500
[<ffffffff84990a26>] trace_do_page_fault+0x56/0x150
[<ffffffff8498ffa2>] do_async_page_fault+0x22/0xf0
[<ffffffff8498c7a8>] async_page_fault+0x28/0x30
Code: bc 0f 1f 00 e8 5b 5c d0 ff 90 90 90 90 90 90 90 90 90 90 90 b9 00 02 00 00 31 c0 f3 48 ab c3 0f 1f 44 00 00 b9 00 10 00 00 31 c0 <f3> aa c3 66 0f 1f 44 00 00 eb ee 0f 1f 84 00 00 00 00 00 0f 1f