| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 1 / 2 |
| Operating system | Count |
|---|---|
| CentOS 7 | 2 |
| Architecture | Count |
|---|---|
| x86_64 | 2 |
| Related packages | Count |
|---|---|
| kernel | 2 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 21s! [cpptools:58169] Modules linked in: tcp_lp rfcomm xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter devlink vmw_vsock_vmci_transport vsock fuse bnep sunrpc dm_mirror dm_region_hash dm_log dm_mod snd_seq_midi snd_seq_midi_event snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus snd_seq btusb snd_seq_device crc32_pclmul snd_pcm ghash_clmulni_intel btrtl ppdev aesni_intel snd_timer btbcm lrw btintel snd gf128mul bluetooth glue_helper soundcore ablk_helper cryptd rfkill vmw_balloon sg pcspkr joydev parport_pc parport i2c_piix4 vmw_vmci ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm crct10dif_pclmul crct10dif_common crc32c_intel ata_piix serio_raw nfit libata libnvdimm e1000 mptspi scsi_transport_spi mptscsih mptbase drm_panel_orientation_quirks CPU: 0 PID: 58169 Comm: cpptools Kdump: loaded Tainted: G W L ------------ 3.10.0-1160.108.1.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 task: ffff9ad9ad098000 ti: ffff9ad977be0000 task.ti: ffff9ad977be0000 RIP: 0010:[<ffffffffaca4acdc>] [<ffffffffaca4acdc>] __mem_cgroup_uncharge_common+0x4c/0x2f0 RSP: 0018:ffff9ad977be3a38 EFLAGS: 00010286 RAX: ffff9ada7e5d26c0 RBX: fffffed34756b7c0 RCX: 000000000009e936 RDX: ffff9adb3ffd8260 RSI: 0000000000000001 RDI: 000000000009e936 RBP: ffff9ad977be3a68 R08: 0000000000000000 R09: 00003ffffffff000 R10: ffff9adafb5630e0 R11: 0000000000000000 R12: ffffffffac8ec6ab R13: ffff9ad977be39e0 R14: ffffffffac8e5d58 R15: ffff9ad977be3998 FS: 00007f4f13c14b30(0000) GS:ffff9adb35600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000005b4006f4000 CR3: 0000000217ac4000 CR4: 00000000003607f0 Call Trace: [<ffffffffaca4f462>] mem_cgroup_uncharge_page+0x32/0x40 [<ffffffffaca0dae9>] page_remove_rmap+0xb9/0x160 [<ffffffffac9fd128>] unmap_page_range+0x738/0xc80 [<ffffffffac9fd6f1>] unmap_single_vma+0x81/0x100 [<ffffffffac9ff149>] unmap_vmas+0x49/0x90 [<ffffffffaca0953c>] exit_mmap+0xac/0x1a0 [<ffffffffac966c45>] ? __delayacct_add_tsk+0x175/0x1a0 [<ffffffffac89c07f>] mmput+0x6f/0x100 [<ffffffffac8a6128>] do_exit+0x288/0xa30 [<ffffffffac91a685>] ? futex_wait+0x1a5/0x290 [<ffffffffac8dd239>] ? ttwu_do_wakeup+0x19/0xf0 [<ffffffffac8a694f>] do_group_exit+0x3f/0xa0 [<ffffffffac8b825e>] get_signal_to_deliver+0x1ce/0x5e0 [<ffffffffac82d5b7>] do_signal+0x57/0x6f0 [<ffffffffac8e5d58>] ? __enqueue_entity+0x78/0x80 [<ffffffffac82c671>] ? __switch_to+0x151/0x590 [<ffffffffac82dcca>] do_notify_resume+0x7a/0xd0 [<ffffffffacfbb5bc>] retint_signal+0x48/0x8c Code: 85 c0 0f 85 7b 01 00 00 48 8b 07 49 89 fc 41 89 f5 41 be 01 00 00 00 f6 c4 40 0f 85 7f 01 00 00 4c 89 e7 e8 e7 52 00 00 48 89 c3 <48> 8b 00 a8 02 0f 84 4d 01 00 00 f0 0f ba 2b 00 19 c0 85 c0 0f