Kerneloops

Similar reports
Problem #699918
Component
kernel Tainted
Last affected version
0:3.10.0-693.11.1.el7
Executable
unknown
First occurrence
2023-04-13
Last occurrence
2023-04-19
Unique reports
1
Quality
-37

Statistics

Operating system Unique / Total count
CentOS 7 1 / 767
Operating system Count
CentOS 7 767
Architecture Count
x86_64 767
Related packages Count
kernel 767
 0:3.10.0-693.11.1.el7 767

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff810f99b2
Build id: 3.10.0-693.11.1.el7.x86_64
0x202
2
? netif_receive_skb_internal
vmlinux 0xffffffff815871f0
Build id: 3.10.0-693.11.1.el7.x86_64
0x20
3
? setup_data_read
vmlinux 0xffffffff81031c80
Build id: 3.10.0-693.11.1.el7.x86_64
0x90
4
? netif_receive_skb_internal
vmlinux 0xffffffff815871f1
Build id: 3.10.0-693.11.1.el7.x86_64
0x21
5
on_each_cpu
vmlinux 0xffffffff810f9a6d
Build id: 3.10.0-693.11.1.el7.x86_64
0x2d
6
? netif_receive_skb_internal
vmlinux 0xffffffff815871f0
Build id: 3.10.0-693.11.1.el7.x86_64
0x20
7
text_poke_bp
vmlinux 0xffffffff810324aa
Build id: 3.10.0-693.11.1.el7.x86_64
0x6a
8
arch_jump_label_transform
vmlinux 0xffffffff8102f558
Build id: 3.10.0-693.11.1.el7.x86_64
0x68
9
__jump_label_update
vmlinux 0xffffffff8117fb9f
Build id: 3.10.0-693.11.1.el7.x86_64
0x5f
10
jump_label_update
vmlinux 0xffffffff8117fc5d
Build id: 3.10.0-693.11.1.el7.x86_64
0x9d
11
static_key_slow_inc
vmlinux 0xffffffff8117febd
Build id: 3.10.0-693.11.1.el7.x86_64
0xad
12
net_enable_timestamp
vmlinux 0xffffffff815822a4
Build id: 3.10.0-693.11.1.el7.x86_64
0x44
13
sock_enable_timestamp
vmlinux 0xffffffff815700a5
Build id: 3.10.0-693.11.1.el7.x86_64
0x45
14
sock_setsockopt
vmlinux 0xffffffff8157042a
Build id: 3.10.0-693.11.1.el7.x86_64
0x37a
15
SyS_setsockopt
vmlinux 0xffffffff8156b3f6
Build id: 3.10.0-693.11.1.el7.x86_64
0xd6
16
system_call_fastpath
vmlinux 0xffffffff816b5089
Build id: 3.10.0-693.11.1.el7.x86_64
0x16
NMI watchdog: BUG: soft lockup - CPU#15 stuck for 23s! [chronyd:1109]
Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter binfmt_misc intel_powerclamp coretemp kvm_intel sr_mod kvm cdrom irqbypass ipmi_ssif crc32_pclmul ghash_clmulni_intel ipmi_si aesni_intel lrw sg iTCO_wdt iTCO_vendor_support acpi_power_meter ipmi_devintf ipmi_msghandler gf128mul pcspkr glue_helper tpm_infineon i2c_i801 ablk_helper lpc_ich ahci cryptd libahci libata shpchp i7core_edac edac_core acpi_cpufreq nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic mgag200 drm_kms_helper syscopyarea sysfillrect
sysimgblt fb_sys_fops ttm drm igb mptsas scsi_transport_sas crct10dif_pclmul ptp crct10dif_common mptscsih pps_core crc32c_intel dca mptbase i2c_algo_bit i2c_core dm_mirror dm_region_hash dm_log dm_mod
CPU: 15 PID: 1109 Comm: chronyd Tainted: G          I  L ------------   3.10.0-693.11.1.el7.x86_64 #1
Hardware name: FUJITSU                          PRIMERGY RX300 S6             /D2619, BIOS 6.00 Rev. 1.04.2619.N1           05/18/2010
task: ffff8803378d1fa0 ti: ffff88033a860000 task.ti: ffff88033a860000
RIP: 0010:[<ffffffff810f99b2>]  [<ffffffff810f99b2>] smp_call_function_many+0x202/0x260
RSP: 0018:ffff88033a863d48  EFLAGS: 00000202
RAX: 0000000000000015 RBX: 0000000000017800 RCX: ffff88033fc5b198
RDX: 0000000000000015 RSI: 0000000000000018 RDI: 0000000000000000
RBP: ffff88033a863d80 R08: ffff88017cddf000 R09: ffffffff81322729
R10: ffff880237c59c80 R11: ffffea00028d9600 R12: ffff88033a863cc0
R13: 0000000000000286 R14: 0000000000000010 R15: ffffffff8105558e
FS:  00007f8eef294740(0000) GS:ffff880237c40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f58adb2b4f0 CR3: 000000033271a000 CR4: 00000000000007e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Stack:
000000013a863d58 ffffffff81b1c820 ffffffff815871f0 ffffffff81031c80
0000000000000000 ffffffff815871f1 0000000000000000 ffff88033a863da8
ffffffff810f9a6d ffffffff815871f0 ffff88033a863dfb 0000000000000005
Call Trace:
[<ffffffff815871f0>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff81031c80>] ? setup_data_read+0x90/0x90
[<ffffffff815871f1>] ? netif_receive_skb_internal+0x21/0xc0
[<ffffffff810f9a6d>] on_each_cpu+0x2d/0x60
[<ffffffff815871f0>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff810324aa>] text_poke_bp+0x6a/0xf0
[<ffffffff8102f558>] arch_jump_label_transform+0x68/0xb0
[<ffffffff8117fb9f>] __jump_label_update+0x5f/0x80
[<ffffffff8117fc5d>] jump_label_update+0x9d/0xb0
[<ffffffff8117febd>] static_key_slow_inc+0xad/0xb0
[<ffffffff815822a4>] net_enable_timestamp+0x44/0x50
[<ffffffff815700a5>] sock_enable_timestamp+0x45/0x50
[<ffffffff8157042a>] sock_setsockopt+0x37a/0x880
[<ffffffff8156b3f6>] SyS_setsockopt+0xd6/0xf0
[<ffffffff816b5089>] system_call_fastpath+0x16/0x1b
Code: 48 63 35 16 45 a2 00 89 c2 39 f0 0f 8d 85 fe ff ff 48 98 49 8b 0f 48 03 0c c5 e0 fd b0 81 f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 <f6> 41 20 01 75 f8 48 63 35 e5 44 a2 00 eb b7 0f b6 4d cc 4c 89