Kerneloops

Similar reports
Problem #699918
Component
kernel Tainted
Last affected version
0:3.10.0-693.17.1.el7
Executable
unknown
First occurrence
2024-02-16
Last occurrence
2024-02-16
Unique reports
1
Quality
-41

Statistics

Operating system Unique / Total count
CentOS 7 1 / 3
Operating system Count
CentOS 7 3
Architecture Count
x86_64 3
Related packages Count
kernel 3
 0:3.10.0-693.17.1.el7 3

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
smp_call_function_many
vmlinux 0xffffffff810fb892
Build id: 3.10.0-693.17.1.el7.x86_64
0x202
2
? netif_receive_skb_internal
vmlinux 0xffffffff815891f0
Build id: 3.10.0-693.17.1.el7.x86_64
0x20
3
? setup_data_read
vmlinux 0xffffffff81031b80
Build id: 3.10.0-693.17.1.el7.x86_64
0x90
4
? netif_receive_skb_internal
vmlinux 0xffffffff815891f1
Build id: 3.10.0-693.17.1.el7.x86_64
0x21
5
on_each_cpu
vmlinux 0xffffffff810fb94d
Build id: 3.10.0-693.17.1.el7.x86_64
0x2d
6
? netif_receive_skb_internal
vmlinux 0xffffffff815891f0
Build id: 3.10.0-693.17.1.el7.x86_64
0x20
7
text_poke_bp
vmlinux 0xffffffff810323aa
Build id: 3.10.0-693.17.1.el7.x86_64
0x6a
8
arch_jump_label_transform
vmlinux 0xffffffff8102f458
Build id: 3.10.0-693.17.1.el7.x86_64
0x68
9
__jump_label_update
vmlinux 0xffffffff81181a6f
Build id: 3.10.0-693.17.1.el7.x86_64
0x5f
10
jump_label_update
vmlinux 0xffffffff81181b2d
Build id: 3.10.0-693.17.1.el7.x86_64
0x9d
11
static_key_slow_inc
vmlinux 0xffffffff81181d8d
Build id: 3.10.0-693.17.1.el7.x86_64
0xad
12
net_enable_timestamp
vmlinux 0xffffffff815842a4
Build id: 3.10.0-693.17.1.el7.x86_64
0x44
13
sock_enable_timestamp
vmlinux 0xffffffff815720a5
Build id: 3.10.0-693.17.1.el7.x86_64
0x45
14
sock_setsockopt
vmlinux 0xffffffff8157242a
Build id: 3.10.0-693.17.1.el7.x86_64
0x37a
15
? sock_alloc_file
vmlinux 0xffffffff81569340
Build id: 3.10.0-693.17.1.el7.x86_64
0xa0
16
SyS_setsockopt
vmlinux 0xffffffff8156d3f6
Build id: 3.10.0-693.17.1.el7.x86_64
0xd6
17
system_call_fastpath
vmlinux 0xffffffff816b89fd
Build id: 3.10.0-693.17.1.el7.x86_64
0x16
NMI watchdog: BUG: soft lockup - CPU#6 stuck for 23s! [chronyd:774]
Modules linked in: file_protector(OE) snapapi26(OE) nfnetlink_queue nfnetlink_log bluetooth rfkill tcp_lp fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun nf_conntrack_ftp ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock dm_mirror dm_region_hash dm_log dm_mod ext4 sb_edac edac_core mbcache jbd2 iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper
ablk_helper cryptd ppdev vmw_balloon i2c_piix4 joydev pcspkr sg vmw_vmci shpchp nfit libnvdimm parport_pc parport nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper ata_piix syscopyarea sysfillrect sysimgblt libata fb_sys_fops ttm crct10dif_pclmul crct10dif_common crc32c_intel mptspi drm scsi_transport_spi mptscsih serio_raw vmxnet3 mptbase i2c_core [last unloaded: edd]
CPU: 6 PID: 774 Comm: chronyd Tainted: G        W  OEL ------------   3.10.0-693.17.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
task: ffff88032b8b1fa0 ti: ffff880034fb0000 task.ti: ffff880034fb0000
RIP: 0010:[<ffffffff810fb892>]  [<ffffffff810fb892>] smp_call_function_many+0x202/0x260
RSP: 0018:ffff880034fb3d18  EFLAGS: 00000202
RAX: 0000000000000000 RBX: 00000000000000fc RCX: ffff88033161cd30
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000000000000
RBP: ffff880034fb3d50 R08: ffff88017aca4800 R09: ffffffff81324cb9
R10: ffff88033179b9c0 R11: ffffea000afad400 R12: 0000000000000296
R13: ffff880034fb3cc8 R14: ffff880034fb3cd3 R15: ffffffff815881a2
FS:  00007f8f06387740(0000) GS:ffff880331780000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f97ddaca000 CR3: 0000000034fb4000 CR4: 00000000003607e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
[<ffffffff815891f0>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff81031b80>] ? setup_data_read+0x90/0x90
[<ffffffff815891f1>] ? netif_receive_skb_internal+0x21/0xc0
[<ffffffff810fb94d>] on_each_cpu+0x2d/0x60
[<ffffffff815891f0>] ? netif_receive_skb_internal+0x20/0xc0
[<ffffffff810323aa>] text_poke_bp+0x6a/0xf0
[<ffffffff8102f458>] arch_jump_label_transform+0x68/0xb0
[<ffffffff81181a6f>] __jump_label_update+0x5f/0x80
[<ffffffff81181b2d>] jump_label_update+0x9d/0xb0
[<ffffffff81181d8d>] static_key_slow_inc+0xad/0xb0
[<ffffffff815842a4>] net_enable_timestamp+0x44/0x50
[<ffffffff815720a5>] sock_enable_timestamp+0x45/0x50
[<ffffffff8157242a>] sock_setsockopt+0x37a/0x880
[<ffffffff81569340>] ? sock_alloc_file+0xa0/0x140
[<ffffffff8156d3f6>] SyS_setsockopt+0xd6/0xf0
[<ffffffff816b89fd>] system_call_fastpath+0x16/0x1b
Code: 48 63 35 76 b6 a2 00 89 c2 39 f0 0f 8d 85 fe ff ff 48 98 49 8b 0f 48 03 0c c5 20 8e b1 81 f6 41 20 01 74 cd 0f 1f 44 00 00 f3 90 <f6> 41 20 01 75 f8 48 63 35 45 b6 a2 00 eb b7 0f b6 4d cc 4c 89