Kerneloops

Similar reports
Problem #700106
Component
kernel Tainted
Last affected version
0:3.10.0-957.el7
Executable
unknown
First occurrence
2023-11-08
Last occurrence
2026-03-30
Unique reports
26
Quality
-36

Statistics

Operating system Unique / Total count
CentOS 7 26 / 265
Operating system Count
CentOS 7 265
Architecture Count
x86_64 265
Related packages Count
kernel 265
 0:3.10.0-957.el7 265

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff87561dc1
Build id: 3.10.0-957.el7.x86_64
0x19
2
__warn
vmlinux 0xffffffff86e97648
Build id: 3.10.0-957.el7.x86_64
0xd8
3
warn_slowpath_fmt
vmlinux 0xffffffff86e976cf
Build id: 3.10.0-957.el7.x86_64
0x5f
4
? nfs4_put_lock_state
nfsv4 0xffffffffc0d453a6
Build id: 3.10.0-957.el7.x86_64
0x76
5
locks_remove_file
vmlinux 0xffffffff8709feb2
Build id: 3.10.0-957.el7.x86_64
0x202
6
__fput
vmlinux 0xffffffff870433ad
Build id: 3.10.0-957.el7.x86_64
0xbd
7
____fput
vmlinux 0xffffffff8704363e
Build id: 3.10.0-957.el7.x86_64
0xe
8
task_work_run
vmlinux 0xffffffff86ebe79b
Build id: 3.10.0-957.el7.x86_64
0xbb
9
do_exit
vmlinux 0xffffffff86e9dc61
Build id: 3.10.0-957.el7.x86_64
0x2d1
10
? nfs4_proc_lock
nfsv4 0xffffffffc0d33016
Build id: 3.10.0-957.el7.x86_64
0x1f6
11
do_group_exit
vmlinux 0xffffffff86e9e44f
Build id: 3.10.0-957.el7.x86_64
0x3f
12
get_signal_to_deliver
vmlinux 0xffffffff86eaf24e
Build id: 3.10.0-957.el7.x86_64
0x1ce
13
do_signal
vmlinux 0xffffffff86e2b527
Build id: 3.10.0-957.el7.x86_64
0x57
14
? locks_free_lock
vmlinux 0xffffffff8709d28c
Build id: 3.10.0-957.el7.x86_64
0x3c
15
do_notify_resume
vmlinux 0xffffffff86e2bc32
Build id: 3.10.0-957.el7.x86_64
0x72
16
int_signal
vmlinux 0xffffffff87575124
Build id: 3.10.0-957.el7.x86_64
0x12
WARNING: CPU: 11 PID: 28691 at fs/locks.c:2431 locks_remove_file+0x202/0x210
leftover lock: dev=0:90 ino=13284255 type=1 flags=0x1 start=0 end=0
Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache team_mode_activebackup team sunrpc sb_edac intel_powerclamp coretemp intel_rapl iTCO_wdt iosf_mbi iTCO_vendor_support mxm_wmi kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr joydev sg ipmi_ssif mei_me mei lpc_ich ioatdma i2c_i801 ipmi_si ipmi_devintf ipmi_msghandler wmi acpi_power_meter acpi_pad ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic sr_mod cdrom mgag200 drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common crc32c_intel ixgbe ahci drm libahci igb libata mdio ptp drm_panel_orientation_quirks pps_core dca i2c_algo_bit dm_mirror dm_region_hash dm_log dm_mod
CPU: 11 PID: 28691 Comm: hsr Kdump: loaded Tainted: G        W      ------------   3.10.0-957.el7.x86_64 #1
Hardware name: Intel Corporation S2600WT2R/S2600WT2R, BIOS SE5C610.86B.01.01.0019.101220160604 10/12/2016
Call Trace:
[<ffffffff87561dc1>] dump_stack+0x19/0x1b
[<ffffffff86e97648>] __warn+0xd8/0x100
[<ffffffff86e976cf>] warn_slowpath_fmt+0x5f/0x80
[<ffffffffc0d453a6>] ? nfs4_put_lock_state+0x76/0xb0 [nfsv4]
[<ffffffff8709feb2>] locks_remove_file+0x202/0x210
[<ffffffff870433ad>] __fput+0xbd/0x260
[<ffffffff8704363e>] ____fput+0xe/0x10
[<ffffffff86ebe79b>] task_work_run+0xbb/0xe0
[<ffffffff86e9dc61>] do_exit+0x2d1/0xa40
[<ffffffffc0d33016>] ? nfs4_proc_lock+0x1f6/0x340 [nfsv4]
[<ffffffff86e9e44f>] do_group_exit+0x3f/0xa0
[<ffffffff86eaf24e>] get_signal_to_deliver+0x1ce/0x5e0
[<ffffffff86e2b527>] do_signal+0x57/0x6f0
[<ffffffff8709d28c>] ? locks_free_lock+0x3c/0x50
[<ffffffff86e2bc32>] do_notify_resume+0x72/0xc0
[<ffffffff87575124>] int_signal+0x12/0x17