Kerneloops

Similar reports
Problem #816382
Component
kernel Tainted
Last affected version
0:3.10.0-957.el7
Executable
unknown
First occurrence
2023-05-14
Last occurrence
2023-05-14
Unique reports
1
Quality
-27

Statistics

Operating system Unique / Total count
CentOS 7 1 / 3
Operating system Count
CentOS 7 3
Architecture Count
x86_64 3
Related packages Count
kernel 3
 0:3.10.0-957.el7 3

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff9f51173e
Build id: 3.10.0-957.el7.x86_64
0x20e
2
native_flush_tlb_others
vmlinux 0xffffffff9f47a598
Build id: 3.10.0-957.el7.x86_64
0xb8
3
flush_tlb_page
vmlinux 0xffffffff9f47a734
Build id: 3.10.0-957.el7.x86_64
0x54
4
ptep_clear_flush
vmlinux 0xffffffff9f5fd587
Build id: 3.10.0-957.el7.x86_64
0x67
5
wp_page_copy.isra.71
vmlinux 0xffffffff9f5e55bb
Build id: 3.10.0-957.el7.x86_64
0x30b
6
do_wp_page
vmlinux 0xffffffff9f5e782b
Build id: 3.10.0-957.el7.x86_64
0xfb
7
? __mem_cgroup_commit_charge
vmlinux 0xffffffff9f6329b2
Build id: 3.10.0-957.el7.x86_64
0xe2
8
handle_pte_fault
vmlinux 0xffffffff9f5e91bd
Build id: 3.10.0-957.el7.x86_64
0x37d
9
handle_mm_fault
vmlinux 0xffffffff9f5ebc6d
Build id: 3.10.0-957.el7.x86_64
0x39d
10
__do_page_fault
vmlinux 0xffffffff9fb6f5e3
Build id: 3.10.0-957.el7.x86_64
0x203
11
do_page_fault
vmlinux 0xffffffff9fb6f915
Build id: 3.10.0-957.el7.x86_64
0x35
12
page_fault
vmlinux 0xffffffff9fb6b758
Build id: 3.10.0-957.el7.x86_64
0x28
NMI watchdog: BUG: soft lockup - CPU#7 stuck for 22s! [docker-containe:74588]
Modules linked in: veth xt_nat xt_addrtype br_netfilter xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables devlink ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock fuse vmhgfs(OE) overlay(T) sunrpc snd_seq_midi snd_seq_midi_event sb_edac coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper ablk_helper cryptd vmw_balloon snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm joydev snd_timer snd pcspkr sg soundcore vmw_vmci i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom ata_generic sd_mod crc_t10dif crct10dif_generic
pata_acpi vmwgfx drm_kms_helper crct10dif_pclmul crct10dif_common crc32c_intel syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm serio_raw ata_piix mptspi libata scsi_transport_spi e1000 nfit mptscsih libnvdimm mptbase drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
CPU: 7 PID: 74588 Comm: docker-containe Kdump: loaded Tainted: G        W  OEL ------------ T 3.10.0-957.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015
task: ffff8b74399f8000 ti: ffff8b74a9ae8000 task.ti: ffff8b74a9ae8000
RIP: 0010:[<ffffffff9f51173e>]  [<ffffffff9f51173e>] smp_call_function_many+0x20e/0x270
RSP: 0000:ffff8b74a9aebb70  EFLAGS: 00000202
RAX: 000000000000000f RBX: 000800009f47a3d0 RCX: ffff8b76ed9e06a0
RDX: 000000000000000f RSI: 0000000000000080 RDI: 0000000000000000
RBP: ffff8b74a9aebba8 R08: ffff8b7439cb4c00 R09: ffffffff9f7755c9
R10: ffff8b76ed7df160 R11: ffffefb40a41c000 R12: 0000000000000282
R13: 0000000000000282 R14: ffff8b74a9aebb20 R15: ffffffffffffffff
FS:  00007f57d824c740(0000) GS:ffff8b76ed7c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c420196010 CR3: 00000002183b4000 CR4: 00000000003607e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
[<ffffffff9f47a598>] native_flush_tlb_others+0xb8/0xc0
[<ffffffff9f47a734>] flush_tlb_page+0x54/0xa0
[<ffffffff9f5fd587>] ptep_clear_flush+0x67/0xa0
[<ffffffff9f5e55bb>] wp_page_copy.isra.71+0x30b/0x560
[<ffffffff9f5e782b>] do_wp_page+0xfb/0x720
[<ffffffff9f6329b2>] ? __mem_cgroup_commit_charge+0xe2/0x2f0
[<ffffffff9f5e91bd>] handle_pte_fault+0x37d/0xd10
[<ffffffff9f5ebc6d>] handle_mm_fault+0x39d/0x9b0
[<ffffffff9fb6f5e3>] __do_page_fault+0x203/0x500
[<ffffffff9fb6f915>] do_page_fault+0x35/0x90
[<ffffffff9fb6b758>] page_fault+0x28/0x30
Code: 83 c4 00 89 c2 39 f0 0f 8d 7d fe ff ff 48 98 49 8b 0f 48 03 0c c5 60 b9 14 a0 f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 f6 41 20 01 <75> f8 48 63 35 1d 83 c4 00 eb b7 0f b6 4d cc 4c 89 f2 4c 89 ee