| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 1 / 1 |
| Operating system | Count |
|---|---|
| CentOS 7 | 1 |
| Architecture | Count |
|---|---|
| x86_64 | 1 |
| Related packages | Count |
|---|---|
| kernel | 1 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [systemd-journal:515] Modules linked in: veth xt_nat ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter xt_conntrack nf_nat nf_conntrack overlay(T) binfmt_misc vmw_vsock_vmci_transport vsock sunrpc coretemp crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ppdev ablk_helper cryptd vmw_balloon pcspkr joydev parport_pc sg parport vmw_vmci i2c_piix4 br_netfilter bridge stp llc ip_tables xfs libcrc32c sd_mod sr_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix drm libata mptspi scsi_transport_spi e1000 mptscsih mptbase crct10dif_pclmul crct10dif_common crc32c_intel serio_raw floppy drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse CPU: 0 PID: 515 Comm: systemd-journal Kdump: loaded Tainted: G W L ------------ T 3.10.0-1160.36.2.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 01/07/2011 task: ffff8db0b0cad280 ti: ffff8db0b2a80000 task.ti: ffff8db0b2a80000 RIP: 0010:[<ffffffffaad1be80>] [<ffffffffaad1be80>] avtab_search_node+0x50/0x90 RSP: 0018:ffff8db0b2a83a60 EFLAGS: 00010282 RAX: ffff8daeb651aa98 RBX: ffffffffaaad31d1 RCX: 00000000000000e2 RDX: 00000000000000e2 RSI: 0000000000000007 RDI: ffffffffabc4b6c8 RBP: ffff8db0b2a83a60 R08: 0000000000000707 R09: ffff8daeb6508000 R10: 000000000000038f R11: 0000000000000003 R12: 0000000000000282 R13: 0000000000000001 R14: 0000000000000282 R15: 0000000000000001 FS: 00007f7042e39880(0000) GS:ffff8db0bfc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe34bc41600 CR3: 0000000232ba8000 CR4: 00000000000007f0 Call Trace: [<ffffffffaad23671>] context_struct_compute_av+0x1d1/0x4d0 [<ffffffffaad247d4>] security_compute_av+0x104/0x2f0 [<ffffffffab1824d5>] avc_compute_av+0x41/0x1e4 [<ffffffffaad0be4f>] avc_has_perm_noaudit+0xcf/0x140 [<ffffffffaad13cb3>] selinux_inode_permission+0xe3/0x1b0 [<ffffffffaad08fa2>] security_inode_permission+0x22/0x30 [<ffffffffaac5a062>] __inode_permission+0x52/0xd0 [<ffffffffaac5a0f8>] inode_permission+0x18/0x50 [<ffffffffaac5c7de>] link_path_walk+0x27e/0x8b0 [<ffffffffaac29376>] ? kmem_cache_alloc_trace+0x1d6/0x200 [<ffffffffaac5f3ce>] path_openat+0xae/0x5a0 [<ffffffffaac6163d>] do_filp_open+0x4d/0xb0 [<ffffffffaac6f737>] ? __alloc_fd+0x47/0x170 [<ffffffffaac4d3d4>] do_sys_open+0x124/0x220 [<ffffffffab195ec9>] ? system_call_after_swapgs+0x96/0x13a [<ffffffffaac4d4ee>] SyS_open+0x1e/0x20 [<ffffffffab195f92>] system_call_fastpath+0x25/0x2a [<ffffffffab195ed5>] ? system_call_after_swapgs+0xa2/0x13a Code: b7 4e 02 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 <66> 3b 10 74 13 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f