| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 2 / 4 |
| Operating system | Count |
|---|---|
| CentOS 7 | 4 |
| Architecture | Count |
|---|---|
| x86_64 | 4 |
| Related packages | Count |
|---|---|
| kernel | 4 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 31s! [reporter-urepor:26075] Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter devlink binfmt_misc vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event ext4 mbcache iosf_mbi crc32_pclmul jbd2 ghash_clmulni_intel ppdev snd_ens1371 aesni_intel snd_rawmidi snd_ac97_codec lrw gf128mul glue_helper ablk_helper vmw_balloon cryptd ac97_bus snd_seq snd_seq_device snd_pcm pcspkr snd_timer snd soundcore sg joydev parport_pc parport vmw_vmci i2c_piix4 ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common crc32c_intel nfit drm libnvdimm ata_piix libata serio_raw mptspi scsi_transport_spi e1000 mptscsih mptbase drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse CPU: 0 PID: 26075 Comm: reporter-urepor Kdump: loaded Tainted: G L ------------ 3.10.0-1160.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/29/2019 task: ffff919fef10a100 ti: ffff919ec1db4000 task.ti: ffff919ec1db4000 RIP: 0010:[<ffffffffc0277877>] [<ffffffffc0277877>] e1000_xmit_frame+0x7f7/0x1120 [e1000] RSP: 0018:ffff919ec1db7660 EFLAGS: 00000286 RAX: ffff9e7280703818 RBX: 0000000000000001 RCX: 00000000000000a3 RDX: 00000000000000a3 RSI: ffff919ef5f0fc00 RDI: ffff919ff7fbe000 RBP: ffff919ec1db76e0 R08: 0000000000000100 R09: 0000000022100000 R10: 037463656a6f7270 R11: 0000000000000000 R12: 0000000000000202 R13: 000000012fa35402 R14: 00000001f9600000 R15: ffffffff909b1650 FS: 00007fdf0c874700(0000) GS:ffff919ff9600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fdf170b3560 CR3: 00000000b511a000 CR4: 00000000003607f0 Call Trace: [<ffffffff90c54386>] dev_hard_start_xmit+0x246/0x3b0 [<ffffffff90c8242a>] sch_direct_xmit+0x11a/0x250 [<ffffffff90c57301>] __dev_queue_xmit+0x491/0x650 [<ffffffff90c574d0>] dev_queue_xmit+0x10/0x20 [<ffffffff90c641fd>] neigh_resolve_output+0x11d/0x220 [<ffffffff90ca505c>] ip_finish_output+0x27c/0x8d0 [<ffffffff90ca59db>] ip_output+0x7b/0xf0 [<ffffffff90ca4de0>] ? __ip_append_data.isra.50+0xa60/0xa60 [<ffffffff90ca3407>] ip_local_out_sk+0x37/0x40 [<ffffffff90ca6446>] ip_send_skb+0x16/0x50 [<ffffffff90cce85c>] udp_send_skb+0xac/0x2b0 [<ffffffff90ca3140>] ? ip_copy_metadata+0x170/0x170 [<ffffffff90ccfdc1>] udp_sendmsg+0x5e1/0xa70 [<ffffffff9090be65>] ? sock_has_perm+0x75/0x90 [<ffffffff90cdd589>] inet_sendmsg+0x69/0xb0 [<ffffffff9090bf93>] ? selinux_socket_sendmsg+0x23/0x30 [<ffffffff90c343a6>] sock_sendmsg+0xb6/0xf0 [<ffffffff90827439>] ? ___slab_alloc+0x229/0x520 [<ffffffff9098cfe4>] ? __radix_tree_lookup+0x84/0xf0 [<ffffffff90c35177>] ___sys_sendmsg+0x2f7/0x400 [<ffffffffc04ef92e>] ? __xfs_filemap_fault+0x8e/0x1d0 [xfs] [<ffffffff90c9bc63>] ? __ip_route_output_key_hash+0x223/0x7f0 [<ffffffff90ccc28f>] ? ip4_datagram_release_cb+0x6f/0x1c0 [<ffffffff90d8992e>] ? _raw_spin_unlock_bh+0x1e/0x20 [<ffffffff90ccf33f>] ? udp_lib_rehash+0x11f/0x150 [<ffffffff90d8992e>] ? _raw_spin_unlock_bh+0x1e/0x20 [<ffffffff90c36a1f>] __sys_sendmmsg+0x9f/0x190 [<ffffffff90c34910>] ? SYSC_connect+0x90/0x130 [<ffffffff90ca895c>] ? ip_setsockopt+0x2c/0x90 [<ffffffff90c36b22>] SyS_sendmmsg+0x12/0x30 [<ffffffff90d93f92>] system_call_fastpath+0x25/0x2a Code: 00 00 20 74 10 48 8b 83 00 03 00 00 f6 80 98 00 00 00 03 74 16 48 8b 5d c8 41 0f b7 47 2a 41 8b 57 18 48 03 83 90 0c 00 00 89 10 <48> 83 c4 58 31 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 84 00