Kerneloops

Similar reports
Problem #815773
Component
kernel Tainted
Last affected version
0:3.10.0-693.5.2.el7
Executable
unknown
First occurrence
2023-03-22
Last occurrence
2023-03-25
Unique reports
1
Quality
-36

Statistics

Operating system Unique / Total count
CentOS 7 1 / 6
Operating system Count
CentOS 7 6
Architecture Count
x86_64 6
Related packages Count
kernel 6
 0:3.10.0-693.5.2.el7 6

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_unlock_irqrestore
vmlinux 0xffffffff816ab905
Build id: 3.10.0-693.5.2.el7.x86_64
0x15
2
pagevec_lru_move_fn
vmlinux 0xffffffff81190ec5
Build id: 3.10.0-693.5.2.el7.x86_64
0xf5
3
? lru_deactivate_fn
vmlinux 0xffffffff811905c0
Build id: 3.10.0-693.5.2.el7.x86_64
0x1d0
4
__lru_cache_add
vmlinux 0xffffffff81191154
Build id: 3.10.0-693.5.2.el7.x86_64
0x64
5
lru_cache_add
vmlinux 0xffffffff8119151e
Build id: 3.10.0-693.5.2.el7.x86_64
0xe
6
putback_lru_page
vmlinux 0xffffffff81195d3d
Build id: 3.10.0-693.5.2.el7.x86_64
0x3d
7
mem_cgroup_reparent_charges
vmlinux 0xffffffff811f339a
Build id: 3.10.0-693.5.2.el7.x86_64
0x22a
8
mem_cgroup_css_offline
vmlinux 0xffffffff811f36e4
Build id: 3.10.0-693.5.2.el7.x86_64
0x84
9
cgroup_destroy_locked
vmlinux 0xffffffff8110d767
Build id: 3.10.0-693.5.2.el7.x86_64
0xe7
10
cgroup_rmdir
vmlinux 0xffffffff8110da12
Build id: 3.10.0-693.5.2.el7.x86_64
0x22
11
vfs_rmdir
vmlinux 0xffffffff8120f5a6
Build id: 3.10.0-693.5.2.el7.x86_64
0xd6
12
do_rmdir
vmlinux 0xffffffff81212241
Build id: 3.10.0-693.5.2.el7.x86_64
0x1f1
13
SyS_rmdir
vmlinux 0xffffffff81213446
Build id: 3.10.0-693.5.2.el7.x86_64
0x16
14
unload_network_ops_symbols
falcon_lsm_pinned_14810 0xffffffffc07388fd
Build id: 3.10.0-693.5.2.el7.x86_64
0x432d
15
unload_network_ops_symbols
falcon_lsm_pinned_14812 0xffffffffc08268fd
Build id: 3.10.0-693.5.2.el7.x86_64
0x432d
16
system_call_fastpath
vmlinux 0xffffffff816b5089
Build id: 3.10.0-693.5.2.el7.x86_64
0x16
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [slurmstepd:18605]
Modules linked in: falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_kal(E) falcon_lsm_pinned_14812(E) rpcsec_gss_krb5 nfsv4 dns_resolver nfs fscache panfs(POE) 8021q garp mrp stp llc falcon_lsm_pinned_14810(E) rdma_ucm(OE) ib_ucm(OE) rdma_cm(OE) iw_cm(OE) mlx5_fpga_tools(OE) ip6_tables iptable_filter edac_mce_amd edac_core kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel dell_smbios lrw gf128mul glue_helper dcdbas ablk_helper cryptd sparse_keymap sg mlx5_ib(OE) mlx4_ib(OE) mlx4_en(OE) ib_uverbs(OE) pcspkr ipmi_si ipmi_devintf ipmi_msghandler wmi i2c_piix4 acpi_power_meter shpchp mlx5_core(OE) mlxfw(OE) vfio_mdev(OE) binfmt_misc nfsd vfio_iommu_type1 vfio mdev(OE) ptp pps_core auth_rpcgss nfs_acl mlx4_core(OE) lockd devlink grace knem(OE) sunrpc ip_tables ext4 mbcache
jbd2 sd_mod crc_t10dif crct10dif_generic mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ahci crct10dif_pclmul drm crct10dif_common libahci crc32c_intel libata bnxt_en i2c_core megaraid_sas ib_ipoib(OE) ib_cm(OE) ib_umad(OE) ib_core(OE) mlx_compat(OE) [last unloaded: falcon_kal]
CPU: 0 PID: 18605 Comm: slurmstepd Tainted: P        W  OEL ------------   3.10.0-693.5.2.el7.x86_64 #1
Hardware name: Dell Inc. PowerEdge R7525/0PYVT1, BIOS 1.4.8 05/06/2020
task: ffff8919dd606eb0 ti: ffff897dfd260000 task.ti: ffff897dfd260000
RIP: 0010:[<ffffffff816ab905>]  [<ffffffff816ab905>] _raw_spin_unlock_irqrestore+0x15/0x20
RSP: 0018:ffff897dfd263c28  EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffff883c04531000 RCX: 0000000000000004
RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
RBP: ffff897dfd263c28 R08: 0000000000000000 R09: ffffea0000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff897dfd263ba8
R13: 0000000000000246 R14: 0000000000000010 R15: ffffffff81190d4a
FS:  00002b5ba43db300(0000) GS:ffff887e7e200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000020bd4a0 CR3: 000001427c022000 CR4: 00000000003407f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Stack:
ffff897dfd263c78 ffffffff81190ec5 0000000000000000 ffffffff811905c0
0000000000000246 ffffea042eb53240 ffff887e7e211ae0 0000000000000000
0000000000000000 ffffea042eb53260 ffff897dfd263c98 ffffffff81191154
Call Trace:
[<ffffffff81190ec5>] pagevec_lru_move_fn+0xf5/0x130
[<ffffffff811905c0>] ? lru_deactivate_fn+0x1d0/0x1d0
[<ffffffff81191154>] __lru_cache_add+0x64/0x90
[<ffffffff8119151e>] lru_cache_add+0xe/0x10
[<ffffffff81195d3d>] putback_lru_page+0x3d/0xb0
[<ffffffff811f339a>] mem_cgroup_reparent_charges+0x22a/0x3c0
[<ffffffff811f36e4>] mem_cgroup_css_offline+0x84/0x140
[<ffffffff8110d767>] cgroup_destroy_locked+0xe7/0x370
[<ffffffff8110da12>] cgroup_rmdir+0x22/0x40
[<ffffffff8120f5a6>] vfs_rmdir+0xd6/0x150
[<ffffffff81212241>] do_rmdir+0x1f1/0x220
[<ffffffff81213446>] SyS_rmdir+0x16/0x20
[<ffffffffc07388fd>] unload_network_ops_symbols+0x432d/0x72a0 [falcon_lsm_pinned_14810]
[<ffffffffc08268fd>] unload_network_ops_symbols+0x432d/0x72a0 [falcon_lsm_pinned_14812]
[<ffffffff816b5089>] system_call_fastpath+0x16/0x1b
Code: 07 00 66 66 66 90 5d c3 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 66 66 66 66 90 55 48 89 e5 c6 07 00 66 66 66 90 48 89 f7 57 9d <66> 66 90 66 90 5d c3 0f 1f 40 00 66 66 66 66 90 55 48 89 e5 48