Kerneloops

Similar reports
Problem #699918
Component
kernel Tainted
Last affected version
0:3.10.0-1160.53.1.el7
Executable
unknown
First occurrence
2023-12-03
Last occurrence
2024-04-07
Unique reports
5
Quality
-40

Statistics

Operating system Unique / Total count
CentOS 7 5 / 33
Operating system Count
CentOS 7 33
Architecture Count
x86_64 33
Related packages Count
kernel 33
 0:3.10.0-1160.53.1.el7 33

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffffb59170da
Build id: 3.10.0-1160.53.1.el7.x86_64
0x20a
2
? dev_hard_start_xmit
vmlinux 0xffffffffb5e55e81
Build id: 3.10.0-1160.53.1.el7.x86_64
0x131
3
? setup_data_read
vmlinux 0xffffffffb5834260
Build id: 3.10.0-1160.53.1.el7.x86_64
0xd0
4
? dev_hard_start_xmit
vmlinux 0xffffffffb5e55e82
Build id: 3.10.0-1160.53.1.el7.x86_64
0x132
5
on_each_cpu
vmlinux 0xffffffffb591719d
Build id: 3.10.0-1160.53.1.el7.x86_64
0x2d
6
? dev_hard_start_xmit
vmlinux 0xffffffffb5e55e81
Build id: 3.10.0-1160.53.1.el7.x86_64
0x131
7
text_poke_bp
vmlinux 0xffffffffb5834a8a
Build id: 3.10.0-1160.53.1.el7.x86_64
0x6a
8
arch_jump_label_transform
vmlinux 0xffffffffb58316a8
Build id: 3.10.0-1160.53.1.el7.x86_64
0x68
9
__jump_label_update
vmlinux 0xffffffffb59bb34f
Build id: 3.10.0-1160.53.1.el7.x86_64
0x5f
10
jump_label_update
vmlinux 0xffffffffb59bb42d
Build id: 3.10.0-1160.53.1.el7.x86_64
0x9d
11
static_key_slow_inc
vmlinux 0xffffffffb59bb68d
Build id: 3.10.0-1160.53.1.el7.x86_64
0xad
12
net_enable_timestamp
vmlinux 0xffffffffb5e50784
Build id: 3.10.0-1160.53.1.el7.x86_64
0x44
13
sock_enable_timestamp
vmlinux 0xffffffffb5e3d715
Build id: 3.10.0-1160.53.1.el7.x86_64
0x45
14
sock_setsockopt
vmlinux 0xffffffffb5e3daca
Build id: 3.10.0-1160.53.1.el7.x86_64
0x3aa
15
? sock_alloc_file
vmlinux 0xffffffffb5e34340
Build id: 3.10.0-1160.53.1.el7.x86_64
0xa0
16
SyS_setsockopt
vmlinux 0xffffffffb5e38726
Build id: 3.10.0-1160.53.1.el7.x86_64
0xe6
17
system_call_fastpath
vmlinux 0xffffffffb5f95f92
Build id: 3.10.0-1160.53.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#1 stuck for 21s! [check_icmp:29810]
Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter devlink ip6_tables iptable_filter nfsv3 nfs_acl nfs lockd grace fscache vmw_vsock_vmci_transport vsock dm_mirror dm_region_hash dm_log dm_mod iosf_mbi kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ppdev sg joydev vmw_balloon pcspkr vmw_vmci parport_pc i2c_piix4 parport auth_rpcgss sunrpc ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper sd_mod crc_t10dif syscopyarea sysfillrect crct10dif_generic sysimgblt fb_sys_fops ttm ahci libahci
drm crct10dif_pclmul ata_piix crct10dif_common nfit crc32c_intel serio_raw libata libnvdimm vmxnet3 vmw_pvscsi drm_panel_orientation_quirks fuse
CPU: 1 PID: 29810 Comm: check_icmp Kdump: loaded Tainted: G        W    L ------------   3.10.0-1160.53.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
task: ffff9f7a83620000 ti: ffff9f7a937ec000 task.ti: ffff9f7a937ec000
RIP: 0010:[<ffffffffb59170da>]  [<ffffffffb59170da>] smp_call_function_many+0x20a/0x270
RSP: 0018:ffff9f7a937efd18  EFLAGS: 00000202
RAX: 0000000000000000 RBX: 00000000000000fc RCX: ffff9f7cffc20600
RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000
RBP: ffff9f7a937efd50 R08: ffff9f7bb9375000 R09: ffffffffb5b86bf9
R10: ffff9f7cffc5f160 R11: ffffe4d48029ff00 R12: 0000000000000296
R13: ffff9f7a937efcc8 R14: ffffffffb58dfbd8 R15: ffff9f7a937efc78
FS:  00007f50d3684740(0000) GS:ffff9f7cffc40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc45f6b1000 CR3: 00000000126a6000 CR4: 00000000007607e0
PKRU: 55555554
Call Trace:
[<ffffffffb5e55e81>] ? dev_hard_start_xmit+0x131/0x3b0
[<ffffffffb5834260>] ? setup_data_read+0xd0/0xd0
[<ffffffffb5e55e82>] ? dev_hard_start_xmit+0x132/0x3b0
[<ffffffffb591719d>] on_each_cpu+0x2d/0x60
[<ffffffffb5e55e81>] ? dev_hard_start_xmit+0x131/0x3b0
[<ffffffffb5834a8a>] text_poke_bp+0x6a/0xf0
[<ffffffffb58316a8>] arch_jump_label_transform+0x68/0xb0
[<ffffffffb59bb34f>] __jump_label_update+0x5f/0xa0
[<ffffffffb59bb42d>] jump_label_update+0x9d/0xb0
[<ffffffffb59bb68d>] static_key_slow_inc+0xad/0xb0
[<ffffffffb5e50784>] net_enable_timestamp+0x44/0x50
[<ffffffffb5e3d715>] sock_enable_timestamp+0x45/0x50
[<ffffffffb5e3daca>] sock_setsockopt+0x3aa/0x8f0
[<ffffffffb5e34340>] ? sock_alloc_file+0xa0/0x140
[<ffffffffb5e38726>] SyS_setsockopt+0xe6/0x100
[<ffffffffb5f95f92>] system_call_fastpath+0x25/0x2a
Code: 48 63 35 ce 85 c4 00 89 c2 39 f0 0f 8d 7d fe ff ff 48 98 49 8b 0f 48 03 0c c5 60 15 55 b6 f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 <f6> 41 20 01 75 f8 48 63 35 9d 85 c4 00 eb b7 0f b6 4d cc 4c 89