Kerneloops

Similar reports
Problem #575829
Component
kernel Tainted
Last affected version
0:3.10.0-957.5.1.el7
Executable
unknown
First occurrence
2021-03-09
Last occurrence
2021-04-23
Unique reports
2
Quality
-47

Statistics

Operating system Unique / Total count
CentOS 7 2 / 7
Operating system Count
CentOS 7 7
Architecture Count
x86_64 7
Related packages Count
kernel 7
 0:3.10.0-957.5.1.el7 7

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff8c961e41
Build id: 3.10.0-957.5.1.el7.x86_64
0x19
2
__warn
vmlinux 0xffffffff8c297688
Build id: 3.10.0-957.5.1.el7.x86_64
0xd8
3
? do_execve_common.isra.24
vmlinux 0xffffffff8c449b51
Build id: 3.10.0-957.5.1.el7.x86_64
0x1
4
warn_slowpath_fmt
vmlinux 0xffffffff8c29770f
Build id: 3.10.0-957.5.1.el7.x86_64
0x5f
5
? fetch_deref_string_size
vmlinux 0xffffffff8c973f1a
Build id: 3.10.0-957.5.1.el7.x86_64
0x5a
6
kprobe_dispatcher
vmlinux 0xffffffff8c973c2e
Build id: 3.10.0-957.5.1.el7.x86_64
0x57e
7
? handle_pte_fault
vmlinux 0xffffffff8c3e94e4
Build id: 3.10.0-957.5.1.el7.x86_64
0x2f4
8
? do_execve_common.isra.24
vmlinux 0xffffffff8c449b51
Build id: 3.10.0-957.5.1.el7.x86_64
0x1
9
kprobe_ftrace_handler
vmlinux 0xffffffff8c96ee9a
Build id: 3.10.0-957.5.1.el7.x86_64
0xba
10
? do_execve_common.isra.24
vmlinux 0xffffffff8c449b55
Build id: 3.10.0-957.5.1.el7.x86_64
0x5
11
? prepare_bprm_creds
vmlinux 0xffffffff8c449b50
Build id: 3.10.0-957.5.1.el7.x86_64
0x80
12
? SyS_execve
vmlinux 0xffffffff8c44a669
Build id: 3.10.0-957.5.1.el7.x86_64
0x29
13
ftrace_ops_list_func
vmlinux 0xffffffff8c35c384
Build id: 3.10.0-957.5.1.el7.x86_64
0xf4
14
ftrace_regs_call
vmlinux 0xffffffff8c9788a4
Build id: 3.10.0-957.5.1.el7.x86_64
0x5
15
? do_execve_common.isra.24
vmlinux 0xffffffff8c449b51
Build id: 3.10.0-957.5.1.el7.x86_64
0x1
16
? do_execve_common.isra.24
vmlinux 0xffffffff8c449b55
Build id: 3.10.0-957.5.1.el7.x86_64
0x5
17
? SyS_execve
vmlinux 0xffffffff8c44a669
Build id: 3.10.0-957.5.1.el7.x86_64
0x29
18
stub_execve
vmlinux 0xffffffff8c975368
Build id: 3.10.0-957.5.1.el7.x86_64
0x48
WARNING: CPU: 3 PID: 26046 at kernel/trace/trace_kprobe.c:1155 kprobe_dispatcher+0x57e/0x590
profile buffer not large enough
Modules linked in:
udp_diag tcp_diag inet_diag binfmt_misc falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_kal(E) falcon_lsm_pinned_11110(E) xenfs xen_privcmd ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter falcon_lsm_pinned_10807(E) sb_edac intel_rapl joydev ppdev iosf_mbi sg crc32_pclmul ghash_clmulni_intel aesni_intel parport_pc lrw parport gf128mul glue_helper ablk_helper cryptd pcspkr i2c_piix4 ip_tables xfs libcrc32c
sr_mod cdrom ata_generic pata_acpi bochs_drm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ata_piix libata xen_netfront xen_blkfront crct10dif_pclmul crct10dif_common crc32c_intel serio_raw drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod [last unloaded: falcon_lsm_serviceable]
CPU: 3 PID: 26046 Comm: xagt Kdump: loaded Tainted: P            E  ------------   3.10.0-957.5.1.el7.x86_64 #1
Hardware name: Xen HVM domU, BIOS 4.7.5-1.22 10/25/2018
Call Trace:
[<ffffffff8c961e41>] dump_stack+0x19/0x1b
[<ffffffff8c297688>] __warn+0xd8/0x100
[<ffffffff8c449b51>] ? do_execve_common.isra.24+0x1/0x880
[<ffffffff8c29770f>] warn_slowpath_fmt+0x5f/0x80
[<ffffffff8c973f1a>] ? fetch_deref_string_size+0x5a/0x90
[<ffffffff8c973c2e>] kprobe_dispatcher+0x57e/0x590
[<ffffffff8c3e94e4>] ? handle_pte_fault+0x2f4/0xd10
[<ffffffff8c449b51>] ? do_execve_common.isra.24+0x1/0x880
[<ffffffff8c96ee9a>] kprobe_ftrace_handler+0xba/0x120
[<ffffffff8c449b55>] ? do_execve_common.isra.24+0x5/0x880
[<ffffffff8c449b50>] ? prepare_bprm_creds+0x80/0x80
[<ffffffff8c44a669>] ? SyS_execve+0x29/0x30
[<ffffffff8c35c384>] ftrace_ops_list_func+0xf4/0x120
[<ffffffff8c9788a4>] ftrace_regs_call+0x5/0x81
[<ffffffff8c449b51>] ? do_execve_common.isra.24+0x1/0x880
[<ffffffff8c449b55>] ? do_execve_common.isra.24+0x5/0x880
[<ffffffff8c44a669>] ? SyS_execve+0x29/0x30
[<ffffffff8c975368>] stub_execve+0x48/0x80