Kerneloops

Similar reports
Problem #532369
Component
kernel Tainted
Last affected version
0:3.10.0-1160.88.1.el7
Executable
unknown
First occurrence
2023-04-17
Last occurrence
2023-04-17
Unique reports
1
Quality
-23

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.88.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff9891e1ca
Build id: 3.10.0-1160.88.1.el7.x86_64
0x20a
2
native_flush_tlb_others
vmlinux 0xffffffff98881fa8
Build id: 3.10.0-1160.88.1.el7.x86_64
0xb8
3
flush_tlb_mm_range
vmlinux 0xffffffff9888201b
Build id: 3.10.0-1160.88.1.el7.x86_64
0x6b
4
change_protection
vmlinux 0xffffffff98a0a99d
Build id: 3.10.0-1160.88.1.el7.x86_64
0x5dd
5
mprotect_fixup
vmlinux 0xffffffff98a0aba3
Build id: 3.10.0-1160.88.1.el7.x86_64
0x163
6
? cred_has_perm
vmlinux 0xffffffff98b1fed9
Build id: 3.10.0-1160.88.1.el7.x86_64
0x29
7
? file_map_prot_check
vmlinux 0xffffffff98b22758
Build id: 3.10.0-1160.88.1.el7.x86_64
0x68
8
do_mprotect_pkey
vmlinux 0xffffffff98a0b02e
Build id: 3.10.0-1160.88.1.el7.x86_64
0x23e
9
SyS_mprotect
vmlinux 0xffffffff98a0b183
Build id: 3.10.0-1160.88.1.el7.x86_64
0x13
10
system_call_fastpath
vmlinux 0xffffffff98fc539a
Build id: 3.10.0-1160.88.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#17 stuck for 22s! [code:102141]
[drm:drm_atomic_helper_wait_for_dependencies [drm_kms_helper]] *ERROR* [PLANE:33:plane-0] flip_done timed out
Modules linked in: mfe_fileaccess_100714877(OE) nfsv3 rpcsec_gss_krb5 nfsv4 dns_resolver nfs fscache ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink xt_addrtype cbsensor_2_5_1230541(OE) ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter mfe_aac_100714877(OE) vmw_vsock_vmci_transport vsock ppdev vmw_balloon joydev sg vmw_vmci i2c_piix4 pcspkr parport_pc parport nfsd nfs_acl lockd auth_rpcgss grace sunrpc ip_tables xfs libcrc32c
sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic crct10dif_common pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm nfit mptspi ata_piix scsi_transport_spi libata libnvdimm mptscsih mptbase serio_raw crc32c_intel vmxnet3 drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse br_netfilter bridge stp llc overlay(T) [last unloaded: mfe_fileaccess_100714877]
CPU: 17 PID: 102141 Comm: code Tainted: G           OEL ------------ T 3.10.0-1160.88.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020
task: ffff8fc31f23c200 ti: ffff8fc319998000 task.ti: ffff8fc319998000
RIP: 0010:[<ffffffff9891e1ca>]  [<ffffffff9891e1ca>] smp_call_function_many+0x20a/0x270
RSP: 0018:ffff8fc31999bc70  EFLAGS: 00000202
RAX: 0000000000000000 RBX: 0008000098881b10 RCX: ffff8fc493620858
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000000000000
RBP: ffff8fc31999bca8 R08: ffff8fbb6469f000 R09: ffffffff98b9c669
R10: ffff8fc493a5f160 R11: ffffdccb2475fc00 R12: 0000000000000282
R13: 0000000000000282 R14: ffff8fc31999bc20 R15: 0000000001a2c7c5
FS:  00007f994f044bc0(0000) GS:ffff8fc493a40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000005f5056a8072 CR3: 000000090a232000 CR4: 00000000000007e0
Call Trace:
[<ffffffff98881fa8>] native_flush_tlb_others+0xb8/0xc0
[<ffffffff9888201b>] flush_tlb_mm_range+0x6b/0x140
[<ffffffff98a0a99d>] change_protection+0x5dd/0x680
[<ffffffff98a0aba3>] mprotect_fixup+0x163/0x3b0
[<ffffffff98b1fed9>] ? cred_has_perm+0x29/0x30
[<ffffffff98b22758>] ? file_map_prot_check+0x68/0xe0
[<ffffffff98a0b02e>] do_mprotect_pkey+0x23e/0x380
[<ffffffff98a0b183>] SyS_mprotect+0x13/0x20
[<ffffffff98fc539a>] system_call_fastpath+0x25/0x2a
Code: 48 63 35 7e 18 c4 00 89 c2 39 f0 0f 8d 7d fe ff ff 48 98 49 8b 0f 48 03 0c c5 00 19 55 99 f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 <f6> 41 20 01 75 f8 48 63 35 4d 18 c4 00 eb b7 0f b6 4d cc 4c 89