| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 1 / 1 |
| Operating system | Count |
|---|---|
| CentOS 7 | 1 |
| Architecture | Count |
|---|---|
| x86_64 | 1 |
| Related packages | Count |
|---|---|
| kernel | 1 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 37s! [pgrep:26732] Modules linked in: tcp_lp fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock sunrpc ppdev snd_seq_midi snd_seq_midi_event crc32_pclmul ghash_clmulni_intel vmw_balloon aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev pcspkr snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm snd_timer snd sg soundcore parport_pc parport vmw_vmci i2c_piix4 ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic crct10dif_pclmul crct10dif_common crc32c_intel serio_raw nfit libnvdimm e1000 ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm mptspi ata_piix scsi_transport_spi libata mptscsih mptbase drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod CPU: 0 PID: 26732 Comm: pgrep Not tainted 3.10.0-957.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 task: ffff9d3dc3a86180 ti: ffff9d3dda22c000 task.ti: ffff9d3dda22c000 RIP: 0010:[<ffffffff9d90b125>] [<ffffffff9d90b125>] avtab_search_node+0x55/0x90 RSP: 0018:ffff9d3dda22fa50 EFLAGS: 00000206 RAX: ffff9d3df433ac60 RBX: ffffffff9dd609dd RCX: 0000000000000142 RDX: 0000000000000cc9 RSI: 0000000000000006 RDI: ffffffff9e82afa8 RBP: ffff9d3dda22fa50 R08: 0000000000000707 R09: ffff9d3df5b14000 R10: 000000000000050e R11: ffff9d3ddaa00e40 R12: 0000000000000000 R13: ffff9d3df43dc000 R14: 00000000000028f2 R15: ffff9d3df8bc15c0 FS: 00007fc6809ba880(0000) GS:ffff9d3dfc600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000951218 CR3: 000000000345c000 CR4: 0000000000760ff0 PKRU: 55555554 Call Trace: [<ffffffff9d9129f1>] context_struct_compute_av+0x1d1/0x4d0 [<ffffffff9d913b54>] security_compute_av+0x104/0x2f0 [<ffffffff9dd610b5>] avc_compute_av+0x41/0x1fe [<ffffffff9d8fba3f>] avc_has_perm_noaudit+0xcf/0x140 [<ffffffff9d8fefd3>] selinux_inode_permission+0xe3/0x1b0 [<ffffffff9d8f8b92>] security_inode_permission+0x22/0x30 [<ffffffff9d84ce02>] __inode_permission+0x52/0xd0 [<ffffffff9d84ce98>] inode_permission+0x18/0x50 [<ffffffff9d84cf38>] may_open+0x68/0x120 [<ffffffff9d84f507>] do_last+0x1b7/0x12a0 [<ffffffff9d8523f7>] path_openat+0xd7/0x640 [<ffffffff9d853cd2>] ? user_path_at_empty+0x72/0xc0 [<ffffffff9d83e03a>] ? __check_object_size+0x1ca/0x250 [<ffffffff9d853dfd>] do_filp_open+0x4d/0xb0 [<ffffffff9d861487>] ? __alloc_fd+0x47/0x170 [<ffffffff9d83ff27>] do_sys_open+0x137/0x240 [<ffffffff9d84004e>] SyS_open+0x1e/0x20 [<ffffffff9dd74ddb>] system_call_fastpath+0x22/0x27 Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b