Kerneloops

Similar reports
Problem #20801
Component
kernel Tainted
Last affected version
0:3.10.0-957.5.1.el7
Executable
unknown
First occurrence
2023-02-22
Last occurrence
2023-02-22
Unique reports
1
Quality
-17

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-957.5.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
pci_user_read_config_dword
vmlinux 0xffffffff9b1b9a2e
Build id: 3.10.0-957.5.1.el7.x86_64
0x8e
2
pci_read_config
vmlinux 0xffffffff9b1c7ed4
Build id: 3.10.0-957.5.1.el7.x86_64
0x114
3
sysfs_kf_bin_read
vmlinux 0xffffffff9b0cbc3a
Build id: 3.10.0-957.5.1.el7.x86_64
0x4a
4
kernfs_fop_read
vmlinux 0xffffffff9b0cb0c5
Build id: 3.10.0-957.5.1.el7.x86_64
0xa5
5
vfs_read
vmlinux 0xffffffff9b0414bf
Build id: 3.10.0-957.5.1.el7.x86_64
0x9f
6
SyS_pread64
vmlinux 0xffffffff9b042572
Build id: 3.10.0-957.5.1.el7.x86_64
0x92
7
system_call_fastpath
vmlinux 0xffffffff9b574ddb
Build id: 3.10.0-957.5.1.el7.x86_64
0x22
NMI watchdog: BUG: soft lockup - CPU#19 stuck for 22s! [nvflash_eng:26310]
Modules linked in: xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun uio_pci_generic uio vfio_pci vfio_iommu_type1 vfio cuse ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security rdma_ucm(OE) ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat rdma_cm(OE) iw_cm(OE) nf_conntrack libcrc32c iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ib_ipoib(OE) ib_cm(OE) ib_umad(OE) dm_mirror dm_region_hash dm_log dm_mod nvidia_drm(POE) nvidia_modeset(POE) nvidia(POE) fuse coretemp kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel
aesni_intel iTCO_wdt iTCO_vendor_support lrw gf128mul glue_helper ablk_helper cryptd pcspkr sg mei_me mei i2c_i801 wmi ipmi_si ipmi_devintf ipmi_msghandler pinctrl_lewisburg pinctrl_intel acpi_power_meter knem(OE) auth_rpcgss sunrpc ip_tables ext4 mbcache jbd2 sd_mod crc_t10dif crct10dif_generic mlx5_ib(OE) ib_uverbs(OE) ib_core(OE) ast drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm mlx5_core(OE) ahci mlxfw(OE) psample auxiliary(OE) devlink libahci igb drm_panel_orientation_quirks mlx_compat(OE) crct10dif_pclmul crct10dif_common crc32c_intel libata ptp pps_core dca i2c_algo_bit xpmem(OE)
CPU: 19 PID: 26310 Comm: nvflash_eng Kdump: loaded Tainted: P        W  OE  ------------   3.10.0-957.5.1.el7.x86_64 #1
Hardware name: GIGABYTE MU72-SU0-00/MU72-SU0-00, BIOS F05 07/09/2021
task: ffff9f218342c100 ti: ffff9f21adb10000 task.ti: ffff9f21adb10000
RIP: 0010:[<ffffffff9b1b9a2e>]  [<ffffffff9b1b9a2e>] pci_user_read_config_dword+0x8e/0xf0
RSP: 0018:ffff9f21adb13dd8  EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffff9f21b6ed3000 RCX: 0000000000000084
RDX: 0000000000000000 RSI: 0000000000000006 RDI: ffffffff9c02dd60
RBP: ffff9f21adb13e00 R08: 0000000000000004 R09: ffff9f21adb13ddc
R10: 0000000000000000 R11: ffff9f21ff9d90a8 R12: ffff9f21adb13d70
R13: ffff9f21ff9d5188 R14: ffff9f21b5686980 R15: 0000000000000005
FS:  00007f77e7140740(0000) GS:ffff9f21bf2c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000001f33080 CR3: 00000010352a2000 CR4: 0000000000760fe0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
[<ffffffff9b1c7ed4>] pci_read_config+0x114/0x2c0
[<ffffffff9b0cbc3a>] sysfs_kf_bin_read+0x4a/0x70
[<ffffffff9b0cb0c5>] kernfs_fop_read+0xa5/0x170
[<ffffffff9b0414bf>] vfs_read+0x9f/0x170
[<ffffffff9b042572>] SyS_pread64+0x92/0xc0
[<ffffffff9b574ddb>] system_call_fastpath+0x22/0x27
Code: b9 04 00 00 00 48 8b 87 b8 00 00 00 48 8b 00 e8 39 d3 fc ff 48 c7 c7 60 dd 02 9c 89 c2 c6 07 00 0f 1f 40 00 fb 66 0f 1f 44 00 00 <8b> 45 dc 85 d2 41 89 45 00 89 d0 7e 10 8d 92 7f ff ff ff b8 de