Kerneloops

Similar reports
Problem #662037
Component
kernel Tainted
Last affected version
0:3.10.0-1160.95.1.el7
Executable
unknown
First occurrence
2024-01-19
Last occurrence
2024-01-19
Unique reports
1
Quality
-37

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.95.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
generic_exec_single
vmlinux 0xffffffff8931db16
Build id: 3.10.0-1160.95.1.el7.x86_64
0x106
2
? leave_mm
vmlinux 0xffffffff89281b10
Build id: 3.10.0-1160.95.1.el7.x86_64
0x130
3
? ___slab_alloc
vmlinux 0xffffffff894348c9
Build id: 3.10.0-1160.95.1.el7.x86_64
0x229
4
? leave_mm
vmlinux 0xffffffff89281b10
Build id: 3.10.0-1160.95.1.el7.x86_64
0x130
5
? leave_mm
vmlinux 0xffffffff89281b10
Build id: 3.10.0-1160.95.1.el7.x86_64
0x130
6
smp_call_function_single
vmlinux 0xffffffff8931dc2f
Build id: 3.10.0-1160.95.1.el7.x86_64
0x5f
7
? cpumask_next_and
vmlinux 0xffffffff8959c565
Build id: 3.10.0-1160.95.1.el7.x86_64
0x35
8
smp_call_function_many
vmlinux 0xffffffff8931e1eb
Build id: 3.10.0-1160.95.1.el7.x86_64
0x22b
9
native_flush_tlb_others
vmlinux 0xffffffff89281fa8
Build id: 3.10.0-1160.95.1.el7.x86_64
0xb8
10
flush_tlb_mm_range
vmlinux 0xffffffff8928201b
Build id: 3.10.0-1160.95.1.el7.x86_64
0x6b
11
change_protection
vmlinux 0xffffffff8940a99d
Build id: 3.10.0-1160.95.1.el7.x86_64
0x5dd
12
mprotect_fixup
vmlinux 0xffffffff8940aba3
Build id: 3.10.0-1160.95.1.el7.x86_64
0x163
13
do_mprotect_pkey
vmlinux 0xffffffff8940b02e
Build id: 3.10.0-1160.95.1.el7.x86_64
0x23e
14
SyS_mprotect
vmlinux 0xffffffff8940b183
Build id: 3.10.0-1160.95.1.el7.x86_64
0x13
15
system_call_fastpath
vmlinux 0xffffffff899c539a
Build id: 3.10.0-1160.95.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#8 stuck for 56s! [telegraf:6202]
NMI watchdog: BUG: soft lockup - CPU#7 stuck for 37s! [VM Thread:5157]
Modules linked in: xt_multiport xt_set ipt_rpfilter iptable_raw ip_set_hash_ip ipt_REJECT nf_reject_ipv4 ip_set_hash_net ip_set vxlan ip6_udp_tunnel udp_tunnel ip6t_MASQUERADE nf_nat_masquerade_ipv6 ip6table_filter ip6table_mangle ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6_tables xt_mark xt_comment iptable_mangle nf_tables veth xt_nat xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat xt_addrtype iptable_filter br_netfilter bridge stp llc overlay(T) ip_vs nf_conntrack vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event sb_edac snd_ens1371 snd_rawmidi snd_ac97_codec btusb btrtl ac97_bus btbcm btintel iosf_mbi ppdev snd_seq crc32_pclmul bluetooth ghash_clmulni_intel
snd_seq_device aesni_intel snd_pcm lrw gf128mul rfkill snd_timer pcspkr snd glue_helper ablk_helper vmw_balloon cryptd i2c_piix4 joydev soundcore sg vmw_vmci parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix crct10dif_pclmul nfit crct10dif_common crc32c_intel drm libata e1000 libnvdimm nvme serio_raw nvme_core drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod synosnap(OE)
CPU: 7 PID: 5157 Comm: VM Thread Kdump: loaded Tainted: G        W  OEL ------------ T 3.10.0-1160.95.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
task: ffff9a13ae242100 ti: ffff9a15baa50000 task.ti: ffff9a15baa50000
RIP: 0010:[<ffffffff8931db16>]  [<ffffffff8931db16>] generic_exec_single+0x106/0x1c0
RSP: 0018:ffff9a15baa53be0  EFLAGS: 00000202
RAX: 0000000000000080 RBX: ffff9a15baa53bb0 RCX: 0000000000000004
RDX: ffffffff89a140d0 RSI: 0000000000000080 RDI: 0000000000000282
RBP: ffff9a15baa53c30 R08: ffffffff89a140c8 R09: 0000000000000000
R10: 0000000800000000 R11: 00007efefcfe6000 R12: 00002b851f25ae4b
R13: ffffffff892e8cc4 R14: ffff9a15baa53b80 R15: 0000000000000083
FS:  00007efea46d9700(0000) GS:ffff9a1841fc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c0000c5010 CR3: 000000037aa26000 CR4: 00000000003607e0
Call Trace:
[<ffffffff89281b10>] ? leave_mm+0x130/0x130
[<ffffffff894348c9>] ? ___slab_alloc+0x229/0x520
[<ffffffff89281b10>] ? leave_mm+0x130/0x130
[<ffffffff89281b10>] ? leave_mm+0x130/0x130
[<ffffffff8931dc2f>] smp_call_function_single+0x5f/0xa0
[<ffffffff8959c565>] ? cpumask_next_and+0x35/0x50
[<ffffffff8931e1eb>] smp_call_function_many+0x22b/0x270
[<ffffffff89281fa8>] native_flush_tlb_others+0xb8/0xc0
[<ffffffff8928201b>] flush_tlb_mm_range+0x6b/0x140
[<ffffffff8940a99d>] change_protection+0x5dd/0x680
[<ffffffff8940aba3>] mprotect_fixup+0x163/0x3b0
[<ffffffff8940b02e>] do_mprotect_pkey+0x23e/0x380
[<ffffffff8940b183>] SyS_mprotect+0x13/0x20
[<ffffffff899c539a>] system_call_fastpath+0x25/0x2a
Code: 14 c5 00 19 f5 89 48 89 df e8 87 67 29 00 84 c0 75 53 45 85 ed 74 16 f6 43 20 01 74 10 0f 1f 84 00 00 00 00 00 f3 90 f6 43 20 01 <75> f8 31 c0 48 8b 7c 24 28 65 48 33 3c 25 28 00 00 00 0f 85 8f