Kerneloops

Similar reports
Problem #700069
Component
kernel Tainted
Last affected version
0:3.10.0-957.el7
Executable
unknown
First occurrence
2024-03-23
Last occurrence
2024-03-23
Unique reports
1
Quality
-60

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-957.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_lock_irqsave
vmlinux 0xffffffff89d6a450
Build id: 3.10.0-957.el7.x86_64
-
2
? finish_wait
vmlinux 0xffffffff896c2938
Build id: 3.10.0-957.el7.x86_64
0x38
3
nfs_wait_client_init_complete
nfs 0xffffffffc0b7c371
Build id: 3.10.0-957.el7.x86_64
0xa1
4
? wake_up_atomic_t
vmlinux 0xffffffff896c2d00
Build id: 3.10.0-957.el7.x86_64
0x30
5
nfs_get_client
nfs 0xffffffffc0b7deab
Build id: 3.10.0-957.el7.x86_64
0x22b
6
nfs4_set_client
nfsv4 0xffffffffc0be739c
Build id: 3.10.0-957.el7.x86_64
0x9c
7
nfs4_create_server
nfsv4 0xffffffffc0be8b4e
Build id: 3.10.0-957.el7.x86_64
0x13e
8
nfs4_remote_mount
nfsv4 0xffffffffc0bdfbae
Build id: 3.10.0-957.el7.x86_64
0x2e
9
mount_fs
vmlinux 0xffffffff89845bde
Build id: 3.10.0-957.el7.x86_64
0x3e
10
? __alloc_percpu
vmlinux 0xffffffff897daff5
Build id: 3.10.0-957.el7.x86_64
0x15
11
vfs_kern_mount
vmlinux 0xffffffff89863777
Build id: 3.10.0-957.el7.x86_64
0x67
12
nfs_do_root_mount
nfsv4 0xffffffffc0bdfad6
Build id: 3.10.0-957.el7.x86_64
0x86
13
nfs4_try_mount
nfsv4 0xffffffffc0bdfed4
Build id: 3.10.0-957.el7.x86_64
0x44
14
? get_nfs_version
nfs 0xffffffffc0b7e6e7
Build id: 3.10.0-957.el7.x86_64
0x27
15
nfs_fs_mount
nfs 0xffffffffc0b8ad3b
Build id: 3.10.0-957.el7.x86_64
0x4cb
16
? nfs_clone_super
nfs 0xffffffffc0b8bca0
Build id: 3.10.0-957.el7.x86_64
0x140
17
? param_set_portnr
nfs 0xffffffffc0b89b40
Build id: 3.10.0-957.el7.x86_64
0x70
18
mount_fs
vmlinux 0xffffffff89845bde
Build id: 3.10.0-957.el7.x86_64
0x3e
19
? __alloc_percpu
vmlinux 0xffffffff897daff5
Build id: 3.10.0-957.el7.x86_64
0x15
20
vfs_kern_mount
vmlinux 0xffffffff89863777
Build id: 3.10.0-957.el7.x86_64
0x67
21
do_mount
vmlinux 0xffffffff89865d9f
Build id: 3.10.0-957.el7.x86_64
0x1ef
22
? __check_object_size
vmlinux 0xffffffff8983e03a
Build id: 3.10.0-957.el7.x86_64
0x1ca
23
? kmem_cache_alloc_trace
vmlinux 0xffffffff8981c4dc
Build id: 3.10.0-957.el7.x86_64
0x3c
24
SyS_mount
vmlinux 0xffffffff89866bd3
Build id: 3.10.0-957.el7.x86_64
0x83
25
system_call_fastpath
vmlinux 0xffffffff89d74ddb
Build id: 3.10.0-957.el7.x86_64
0x22
NMI watchdog: BUG: soft lockup - CPU#22 stuck for 22s! [mount.nfs:15993]
Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache cuse fuse rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) sunrpc iTCO_wdt iTCO_vendor_support skx_edac intel_powerclamp coretemp intel_rapl iosf_mbi kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ipmi_ssif joydev pcspkr mei_me lpc_ich mei i2c_i801 sg ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter wmi acpi_pad binfmt_misc knem(OE) ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic mlx5_ib(OE) ib_uverbs(OE) ib_core(OE) ast crct10dif_pclmul crct10dif_common crc32c_intel drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm mlx5_core(OE) igb drm ahci libahci mlxfw(OE) psample dca i2c_algo_bit
auxiliary(OE) devlink libata mlx_compat(OE) ptp drm_panel_orientation_quirks pps_core nfit libnvdimm dm_mirror dm_region_hash dm_log dm_mod xpmem(OE)
CPU: 22 PID: 15993 Comm: mount.nfs Tainted: G           OE  ------------   3.10.0-957.el7.x86_64 #1
Hardware name: THTF Chaoqiang R628/T1DM-E2, BIOS T1DM56.03 09/28/2019
task: ffff8d9bdb34e180 ti: ffff8d9bce744000 task.ti: ffff8d9bce744000
RIP: 0010:[<ffffffff89d6a450>]  [<ffffffff89d6a450>] _raw_spin_lock_irqsave+0x0/0x40
RSP: 0018:ffff8d9bce747a80  EFLAGS: 00000293
RAX: ffff8d9bdb34e180 RBX: ffff8d9bcea9bf28 RCX: ffff8d9bdb34e180
RDX: 0000000000000004 RSI: ffff8d9bce747ab8 RDI: ffffffffc0ba5070
RBP: ffff8d9bce747aa8 R08: ffffffffc0ba5078 R09: ffff8d9bd7b9bf00
R10: ffff8d9bcea9bf28 R11: 0000000000000005 R12: ffff8d9bcea9bf28
R13: ffff8d9bce747a70 R14: ffff8d9bddb1ab80 R15: ffff8d9bce747a70
FS:  00007f5289e28880(0000) GS:ffff8d9bddb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f923f5c8b90 CR3: 0000002fd8722000 CR4: 00000000007607e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
[<ffffffff896c2938>] ? finish_wait+0x38/0x70
[<ffffffffc0b7c371>] nfs_wait_client_init_complete+0xa1/0xe0 [nfs]
[<ffffffff896c2d00>] ? wake_up_atomic_t+0x30/0x30
[<ffffffffc0b7deab>] nfs_get_client+0x22b/0x470 [nfs]
[<ffffffffc0be739c>] nfs4_set_client+0x9c/0x150 [nfsv4]
[<ffffffffc0be8b4e>] nfs4_create_server+0x13e/0x3b0 [nfsv4]
[<ffffffffc0bdfbae>] nfs4_remote_mount+0x2e/0x60 [nfsv4]
[<ffffffff89845bde>] mount_fs+0x3e/0x1b0
[<ffffffff897daff5>] ? __alloc_percpu+0x15/0x20
[<ffffffff89863777>] vfs_kern_mount+0x67/0x110
[<ffffffffc0bdfad6>] nfs_do_root_mount+0x86/0xc0 [nfsv4]
[<ffffffffc0bdfed4>] nfs4_try_mount+0x44/0xc0 [nfsv4]
[<ffffffffc0b7e6e7>] ? get_nfs_version+0x27/0x90 [nfs]
[<ffffffffc0b8ad3b>] nfs_fs_mount+0x4cb/0xdc0 [nfs]
[<ffffffffc0b8bca0>] ? nfs_clone_super+0x140/0x140 [nfs]
[<ffffffffc0b89b40>] ? param_set_portnr+0x70/0x70 [nfs]
[<ffffffff89845bde>] mount_fs+0x3e/0x1b0
[<ffffffff897daff5>] ? __alloc_percpu+0x15/0x20
[<ffffffff89863777>] vfs_kern_mount+0x67/0x110
[<ffffffff89865d9f>] do_mount+0x1ef/0xce0
[<ffffffff8983e03a>] ? __check_object_size+0x1ca/0x250
[<ffffffff8981c4dc>] ? kmem_cache_alloc_trace+0x3c/0x200
[<ffffffff89866bd3>] SyS_mount+0x83/0xd0
[<ffffffff89d74ddb>] system_call_fastpath+0x22/0x27
Code: 02 00 00 31 c0 ba 01 00 00 00 f0 0f b1 17 85 c0 75 01 c3 55 89 c6 48 89 e5 e8 fd 1a ff ff 5d c3 90 66 2e 0f 1f 84 00 00 00 00 00 <0f> 1f 44 00 00 55 48 89 e5 53 9c 58 0f 1f 44 00 00 48 89 c3 fa