Kerneloops

Similar reports
Problem #662037
Component
kernel
Last affected version
0:3.10.0-1062.el7
Executable
unknown
First occurrence
2024-06-28
Last occurrence
2025-01-08
Unique reports
2
Quality
-31

Statistics

Operating system Unique / Total count
CentOS 7 2 / 8
Operating system Count
CentOS 7 8
Architecture Count
x86_64 8
Related packages Count
kernel 8
 0:3.10.0-1062.el7 8

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
generic_exec_single
vmlinux 0xffffffff9e314a22
Build id: 3.10.0-1062.el7.x86_64
0x102
2
? leave_mm
vmlinux 0xffffffff9e27d1d0
Build id: 3.10.0-1062.el7.x86_64
0x110
3
? leave_mm
vmlinux 0xffffffff9e27d1d0
Build id: 3.10.0-1062.el7.x86_64
0x110
4
? leave_mm
vmlinux 0xffffffff9e27d1d0
Build id: 3.10.0-1062.el7.x86_64
0x110
5
smp_call_function_single
vmlinux 0xffffffff9e314b3f
Build id: 3.10.0-1062.el7.x86_64
0x5f
6
? cpumask_next_and
vmlinux 0xffffffff9e57f475
Build id: 3.10.0-1062.el7.x86_64
0x35
7
smp_call_function_many
vmlinux 0xffffffff9e3150eb
Build id: 3.10.0-1062.el7.x86_64
0x22b
8
native_flush_tlb_others
vmlinux 0xffffffff9e27d398
Build id: 3.10.0-1062.el7.x86_64
0xb8
9
flush_tlb_mm_range
vmlinux 0xffffffff9e27d40b
Build id: 3.10.0-1062.el7.x86_64
0x6b
10
change_protection
vmlinux 0xffffffff9e3fa5ad
Build id: 3.10.0-1062.el7.x86_64
0x5cd
11
? handle_pte_fault
vmlinux 0xffffffff9e3ef4a5
Build id: 3.10.0-1062.el7.x86_64
0x3d5
12
mprotect_fixup
vmlinux 0xffffffff9e3fa7b3
Build id: 3.10.0-1062.el7.x86_64
0x163
13
do_mprotect_pkey
vmlinux 0xffffffff9e3fac42
Build id: 3.10.0-1062.el7.x86_64
0x252
NMI watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [java:13713]
Modules linked in: binfmt_misc nf_conntrack_netlink nfnetlink xt_addrtype br_netfilter xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter devlink ip6_tables iptable_filter overlay(T) vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event ext4 mbcache jbd2 ppdev vmw_balloon crc32_pclmul snd_ens1371 ghash_clmulni_intel snd_rawmidi snd_ac97_codec ac97_bus aesni_intel snd_seq lrw gf128mul snd_seq_device glue_helper snd_pcm ablk_helper cryptd pcspkr snd_timer joydev snd sg soundcore vmw_vmci i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic
ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common crc32c_intel drm ata_piix nfit libnvdimm libata mptspi serio_raw e1000 scsi_transport_spi mptscsih mptbase drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
CPU: 1 PID: 13713 Comm: java Kdump: loaded Tainted: G             L ------------ T 3.10.0-1062.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/13/2018
task: ffff91f77c369070 ti: ffff91f781fe0000 task.ti: ffff91f781fe0000
RIP: 0010:[<ffffffff9e314a22>]  [<ffffffff9e314a22>] generic_exec_single+0x102/0x1c0
RSP: 0018:ffff91f781fe3be0  EFLAGS: 00000202
RAX: 0000000000000080 RBX: ffff91f781fe3bb0 RCX: 0000000000000005
RDX: ffffffff9ea13f10 RSI: 0000000000000080 RDI: 0000000000000282
RBP: ffff91f781fe3c30 R08: ffffffff9ea13f08 R09: 0000000000000000
R10: 0000000800000000 R11: 00007f5743af4000 R12: ffff91f7ea0962c0
R13: fffff7ecc0eeb980 R14: 0000000000000000 R15: fffff7ecc0eeb980
FS:  00007f571da02700(0000) GS:ffff91f7ed640000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5743aec600 CR3: 00000003bf340000 CR4: 00000000000007e0
Call Trace:
[<ffffffff9e27d1d0>] ? leave_mm+0x110/0x110
[<ffffffff9e27d1d0>] ? leave_mm+0x110/0x110
[<ffffffff9e27d1d0>] ? leave_mm+0x110/0x110
[<ffffffff9e314b3f>] smp_call_function_single+0x5f/0xa0
[<ffffffff9e57f475>] ? cpumask_next_and+0x35/0x50
[<ffffffff9e3150eb>] smp_call_function_many+0x22b/0x270
[<ffffffff9e27d398>] native_flush_tlb_others+0xb8/0xc0
[<ffffffff9e27d40b>] flush_tlb_mm_range+0x6b/0x140
[<ffffffff9e3fa5ad>] change_protection+0x5cd/0x670
[<ffffffff9e3ef4a5>] ? handle_pte_fault+0x3d5/0xe20
[<ffffffff9e3fa7b3>] mprotect_fixup+0x163/0x3a0
[<ffffffff9e3fac42>] do_mprotect_pkey+0x252/0x360