Kerneloops

Similar reports
Problem #816382
Component
kernel Tainted
Last affected version
0:3.10.0-957.el7
Executable
unknown
First occurrence
2023-05-14
Last occurrence
2023-08-10
Unique reports
2
Quality
-30

Statistics

Operating system Unique / Total count
CentOS 7 2 / 2
Operating system Count
CentOS 7 2
Architecture Count
x86_64 2
Related packages Count
kernel 2
 0:3.10.0-957.el7 2

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff8d71173a
Build id: 3.10.0-957.el7.x86_64
0x20a
2
native_flush_tlb_others
vmlinux 0xffffffff8d67a598
Build id: 3.10.0-957.el7.x86_64
0xb8
3
flush_tlb_page
vmlinux 0xffffffff8d67a734
Build id: 3.10.0-957.el7.x86_64
0x54
4
ptep_clear_flush
vmlinux 0xffffffff8d7fd587
Build id: 3.10.0-957.el7.x86_64
0x67
5
wp_page_copy.isra.71
vmlinux 0xffffffff8d7e55bb
Build id: 3.10.0-957.el7.x86_64
0x30b
6
do_wp_page
vmlinux 0xffffffff8d7e782b
Build id: 3.10.0-957.el7.x86_64
0xfb
7
? __mem_cgroup_commit_charge
vmlinux 0xffffffff8d8329b2
Build id: 3.10.0-957.el7.x86_64
0xe2
8
handle_pte_fault
vmlinux 0xffffffff8d7e91bd
Build id: 3.10.0-957.el7.x86_64
0x37d
9
? xfs_iunlock
xfs 0xffffffffc02fe87c
Build id: 3.10.0-957.el7.x86_64
0xac
10
handle_mm_fault
vmlinux 0xffffffff8d7ebc6d
Build id: 3.10.0-957.el7.x86_64
0x39d
11
__do_page_fault
vmlinux 0xffffffff8dd6f5e3
Build id: 3.10.0-957.el7.x86_64
0x203
12
do_page_fault
vmlinux 0xffffffff8dd6f915
Build id: 3.10.0-957.el7.x86_64
0x35
13
page_fault
vmlinux 0xffffffff8dd6b758
Build id: 3.10.0-957.el7.x86_64
0x28
NMI watchdog: BUG: soft lockup - CPU#11 stuck for 22s! [docker-containe:95662]
Modules linked in: binfmt_misc veth xt_nat xt_addrtype br_netfilter xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables devlink ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock fuse vmhgfs(OE) overlay(T) sunrpc snd_seq_midi snd_seq_midi_event sb_edac coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel snd_ens1371 lrw snd_rawmidi gf128mul ppdev glue_helper snd_ac97_codec ablk_helper cryptd ac97_bus vmw_balloon snd_seq snd_seq_device snd_pcm snd_timer snd joydev soundcore pcspkr sg vmw_vmci i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sd_mod sr_mod cdrom crc_t10dif crct10dif_generic
ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix drm libata mptspi scsi_transport_spi mptscsih e1000 mptbase nfit libnvdimm crct10dif_pclmul crct10dif_common crc32c_intel serio_raw drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
CPU: 11 PID: 95662 Comm: docker-containe Kdump: loaded Tainted: G        W  OEL ------------ T 3.10.0-957.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015
task: ffff8ce5974e5140 ti: ffff8ce683c84000 task.ti: ffff8ce683c84000
RIP: 0010:[<ffffffff8d71173a>]  [<ffffffff8d71173a>] smp_call_function_many+0x20a/0x270
RSP: 0000:ffff8ce683c87b70  EFLAGS: 00000202
RAX: 000000000000000d RBX: 000800008d67a3d0 RCX: ffff8ce9ad960740
RDX: 000000000000000d RSI: 0000000000000080 RDI: 0000000000000000
RBP: ffff8ce683c87ba8 R08: ffff8ce6f9cb5c00 R09: ffffffff8d9755c9
R10: ffff8ce9ad8df160 R11: fffff56800795a00 R12: 0000000000000282
R13: 0000000000000000 R14: ffff8ce683c87ae0 R15: 0000000000000282
FS:  00007f57b89f6700(0000) GS:ffff8ce9ad8c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c4202e2008 CR3: 0000000403f6e000 CR4: 00000000003607e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
[<ffffffff8d67a598>] native_flush_tlb_others+0xb8/0xc0
[<ffffffff8d67a734>] flush_tlb_page+0x54/0xa0
[<ffffffff8d7fd587>] ptep_clear_flush+0x67/0xa0
[<ffffffff8d7e55bb>] wp_page_copy.isra.71+0x30b/0x560
[<ffffffff8d7e782b>] do_wp_page+0xfb/0x720
[<ffffffff8d8329b2>] ? __mem_cgroup_commit_charge+0xe2/0x2f0
[<ffffffff8d7e91bd>] handle_pte_fault+0x37d/0xd10
[<ffffffffc02fe87c>] ? xfs_iunlock+0xac/0x130 [xfs]
[<ffffffff8d7ebc6d>] handle_mm_fault+0x39d/0x9b0
[<ffffffff8dd6f5e3>] __do_page_fault+0x203/0x500
[<ffffffff8dd6f915>] do_page_fault+0x35/0x90
[<ffffffff8dd6b758>] page_fault+0x28/0x30
Code: 48 63 35 4e 83 c4 00 89 c2 39 f0 0f 8d 7d fe ff ff 48 98 49 8b 0f 48 03 0c c5 60 b9 34 8e f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 <f6> 41 20 01 75 f8 48 63 35 1d 83 c4 00 eb b7 0f b6 4d cc 4c 89