| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 1 / 1 |
| Operating system | Count |
|---|---|
| CentOS 7 | 1 |
| Architecture | Count |
|---|---|
| x86_64 | 1 |
| Related packages | Count |
|---|---|
| kernel | 1 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [sh:29545] Modules linked in: tcp_lp nls_utf8 isofs fuse xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter devlink vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event snd_ens1371 crc32_pclmul ghash_clmulni_intel snd_rawmidi snd_ac97_codec ac97_bus aesni_intel snd_seq ppdev lrw gf128mul snd_seq_device glue_helper ablk_helper cryptd snd_pcm vmw_balloon pcspkr snd_timer snd soundcore joydev sg parport_pc parport shpchp i2c_piix4 vmw_vmci ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx sd_mod crc_t10dif crct10dif_generic drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm crct10dif_pclmul ata_piix crct10dif_common crc32c_intel libata mptspi scsi_transport_spi serio_raw mptscsih e1000 mptbase i2c_core floppy dm_mirror dm_region_hash dm_log dm_mod CPU: 0 PID: 29545 Comm: sh Kdump: loaded Tainted: G L ------------ 3.10.0-862.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/31/2013 task: ffff9a96edf49fa0 ti: ffff9a96f3a08000 task.ti: ffff9a96f3a08000 RIP: 0010:[<ffffffffa4ee1f23>] [<ffffffffa4ee1f23>] avtab_search_node+0x53/0x90 RSP: 0018:ffff9a96f3a0bab8 EFLAGS: 00000206 RAX: ffff9a96e155cee8 RBX: 0000000000000030 RCX: 000000000000014a RDX: 000000000000120b RSI: 0000000000000006 RDI: ffffffffa5e07e08 RBP: ffff9a96f3a0bab8 R08: 0000000000000007 R09: ffff9a96e1558000 R10: 000000000000052e R11: ffff9a96dfa6c600 R12: ffff9a96d6333d68 R13: fffff584000001c1 R14: ffff9a96fffdb008 R15: 0000000000000000 FS: 00007f4bf5802740(0000) GS:ffff9a96fb600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4bf4eec750 CR3: 000000008b7c8000 CR4: 00000000001406f0 Call Trace: [<ffffffffa4ee94e9>] context_struct_compute_av+0x1a9/0x470 [<ffffffffa4ee9fc9>] security_compute_av+0xf9/0x2e0 [<ffffffffa530c901>] avc_compute_av+0x34/0x1b5 [<ffffffffa4ed2db3>] avc_has_perm_noaudit+0xc3/0x110 [<ffffffffa4d9346e>] ? __find_get_page+0x1e/0xa0 [<ffffffffa4ed6293>] selinux_inode_permission+0xe3/0x1b0 [<ffffffffa4ed0632>] security_inode_permission+0x22/0x30 [<ffffffffa4e26992>] __inode_permission+0x52/0xd0 [<ffffffffa4e26a28>] inode_permission+0x18/0x50 [<ffffffffa4e26ac8>] may_open+0x68/0x120 [<ffffffffa4e2aae7>] do_last+0x1b7/0x12c0 [<ffffffffa4e2bcc7>] path_openat+0xd7/0x640 [<ffffffffa4dc52dc>] ? handle_pte_fault+0x2dc/0xc30 [<ffffffffa4e2d85d>] do_filp_open+0x4d/0xb0 [<ffffffffa4e3acd7>] ? __alloc_fd+0x47/0x170 [<ffffffffa4e19b67>] do_sys_open+0x137/0x240 [<ffffffffa4e19c8e>] SyS_open+0x1e/0x20 [<ffffffffa531f7d5>] system_call_fastpath+0x1c/0x21 Code: 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 <74> 13 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00