| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 2 / 42 |
| Operating system | Count |
|---|---|
| CentOS 7 | 42 |
| Architecture | Count |
|---|---|
| x86_64 | 42 |
| Related packages | Count |
|---|---|
| kernel | 42 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
NMI watchdog: BUG: soft lockup - CPU#8 stuck for 22s! [exe:86462] Modules linked in: xt_addrtype ipt_MASQUERADE nf_nat_masquerade_ipv4 xt_conntrack nf_conntrack_netlink iptable_filter tcp_lp fuse xt_nat veth br_netfilter overlay(T) tun bridge stp llc devlink iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_set nfnetlink vmw_vsock_vmci_transport vsock sunrpc ppdev vmw_balloon crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd sg joydev pcspkr vmw_vmci i2c_piix4 parport_pc parport pcc_cpufreq ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm nfit mptspi ata_piix crct10dif_pclmul crct10dif_common crc32c_intel libnvdimm scsi_transport_spi libata mptscsih e1000 serio_raw mptbase drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod [last unloaded: iptable_filter] CPU: 8 PID: 86462 Comm: exe Kdump: loaded Tainted: G L ------------ T 3.10.0-1062.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 task: ffff9c660da63150 ti: ffff9c639b7a8000 task.ti: ffff9c639b7a8000 RIP: 0010:[<ffffffffa8ecc304>] [<ffffffffa8ecc304>] proc_sys_compare+0x44/0xc0 RSP: 0018:ffff9c639b7abb40 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000246 RCX: 0000000000000003 RDX: 0000000000000003 RSI: ffff9c60a7cf3ef8 RDI: ffff9c6621abb02e RBP: ffff9c639b7abb58 R08: 0000000000000036 R09: 0000000000000000 R10: fefefefefefefeff R11: ffff9c60a7cf3ec0 R12: 0000000000000002 R13: 0000000000000030 R14: 0000000000001000 R15: ffff9c66d7fda000 FS: 0000000004a30880(0063) GS:ffff9c66a8200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000fc22c0 CR3: 000000093bfe8000 CR4: 00000000007607e0 PKRU: 55555554 Call Trace: [<ffffffffa8e64102>] __d_lookup+0x152/0x160 [<ffffffffa8e54970>] lookup_fast+0xf0/0x230 [<ffffffffa8f02132>] ? security_inode_permission+0x22/0x30 [<ffffffffa8e58483>] link_path_walk+0x1b3/0x8b0 [<ffffffffa8f26a5e>] ? process_measurement+0x8e/0x250 [<ffffffffa8e58cea>] path_lookupat+0x7a/0x8b0 [<ffffffffa8e5723d>] ? do_last+0x66d/0x1290 [<ffffffffa8e23495>] ? kmem_cache_alloc+0x35/0x1f0 [<ffffffffa8e5a2ff>] ? getname_flags+0x4f/0x1a0 [<ffffffffa8e5954b>] filename_lookup+0x2b/0xc0 [<ffffffffa8e5b497>] user_path_at_empty+0x67/0xc0 [<ffffffffa8e5b5cd>] ? do_filp_open+0x4d/0xb0 [<ffffffffa8e5b501>] user_path_at+0x11/0x20 [<ffffffffa8e4e1e3>] vfs_fstatat+0x63/0xc0 [<ffffffffa8e4e654>] SYSC_newfstatat+0x24/0x60 [<ffffffffa8f01ade>] ? security_capable+0x1e/0x20 [<ffffffffa8d3ca56>] ? __audit_syscall_exit+0x1e6/0x280 [<ffffffffa8e4ea7e>] SyS_newfstatat+0xe/0x10 [<ffffffffa938bede>] system_call_fastpath+0x25/0x2a Code: 40 04 bb 01 00 00 00 39 d0 74 0c 89 d8 5b 41 5c 41 5d 5d c3 0f 1f 00 49 8b 78 08 89 c2 48 89 ce e8 e2 d4 0b 00 85 c0 89 c3 75 44 <4d> 8b 64 24 e0 4d 85 e4 74 3a 48 c7 c7 a0 14 e4 a9 4d 8b 6c 24