| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 1 / 1 |
| Operating system | Count |
|---|---|
| CentOS 7 | 1 |
| Architecture | Count |
|---|---|
| x86_64 | 1 |
| Related packages | Count |
|---|---|
| kernel | 1 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
NMI watchdog: BUG: soft lockup - CPU#1 stuck for 21s! [gnome-shell:1648] Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc devlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_vs nf_conntrack vmw_vsock_vmci_transport vsock sunrpc dm_mirror dm_region_hash dm_log dm_mod snd_seq_midi snd_seq_midi_event sb_edac iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev vmw_balloon snd_ens1371 snd_rawmidi aesni_intel snd_ac97_codec ac97_bus lrw snd_seq gf128mul glue_helper ablk_helper cryptd snd_seq_device snd_pcm joydev pcspkr snd_timer sg snd vmw_vmci soundcore i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom sd_mod ata_generic crc_t10dif crct10dif_generic pata_acpi vmwgfx drm_kms_helper crct10dif_pclmul crct10dif_common crc32c_intel syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm nfit libnvdimm mptspi serio_raw ata_piix scsi_transport_spi libata mptscsih e1000 mptbase drm_panel_orientation_quirks CPU: 1 PID: 1648 Comm: gnome-shell Kdump: loaded Tainted: G L ------------ 3.10.0-1062.12.1.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/13/2018 task: ffff9754338d3150 ti: ffff97542bf24000 task.ti: ffff97542bf24000 RIP: 0010:[<ffffffff9d7163d2>] [<ffffffff9d7163d2>] generic_exec_single+0x102/0x1c0 RSP: 0018:ffff97542bf27be0 EFLAGS: 00000202 RAX: 0000000000000080 RBX: ffff97542bf27bb0 RCX: 0000000000000001 RDX: ffffffff9de13550 RSI: 0000000000000080 RDI: 0000000000000282 RBP: ffff97542bf27c30 R08: ffffffff9de13548 R09: 0000000000000000 R10: 0000000800000000 R11: 00003457070d5000 R12: ffffffffffffffff R13: 0000000000000002 R14: 0000000000000030 R15: 00000000338d3150 FS: 00007f1c9db86a80(0000) GS:ffff9754b9640000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00003457070d5008 CR3: 00000000abdf4000 CR4: 00000000000607e0 Call Trace: [<ffffffff9d67e2b0>] ? leave_mm+0x110/0x110 [<ffffffff9d7edb67>] ? arch_tlb_finish_mmu+0x47/0x80 [<ffffffff9d67e2b0>] ? leave_mm+0x110/0x110 [<ffffffff9d67e2b0>] ? leave_mm+0x110/0x110 [<ffffffff9d7164ef>] smp_call_function_single+0x5f/0xa0 [<ffffffff9d981685>] ? cpumask_next_and+0x35/0x50 [<ffffffff9d716a9b>] smp_call_function_many+0x22b/0x270 [<ffffffff9d67e478>] native_flush_tlb_others+0xb8/0xc0 [<ffffffff9d67e4eb>] flush_tlb_mm_range+0x6b/0x140 [<ffffffff9d7fc4dd>] change_protection+0x5cd/0x670 [<ffffffff9d7f16b4>] ? handle_pte_fault+0x6b4/0xe20 [<ffffffff9d7fc6e3>] mprotect_fixup+0x163/0x3a0 [<ffffffff9d7fcb72>] do_mprotect_pkey+0x252/0x360 [<ffffffff9d7fcc93>] SyS_mprotect+0x13/0x20 [<ffffffff9dd8dede>] system_call_fastpath+0x25/0x2a [<ffffffff9dd8de21>] ? system_call_after_swapgs+0xae/0x146 Code: 89 de 48 03 14 c5 20 e8 34 9e 48 89 df e8 37 23 28 00 84 c0 75 53 45 85 ed 74 16 f6 43 20 01 74 10 0f 1f 84 00 00 00 00 00 f3 90 <f6> 43 20 01 75 f8 31 c0 48 8b 7c 24 28 65 48 33 3c 25 28 00 00