| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 1 / 1 |
| Operating system | Count |
|---|---|
| CentOS 7 | 1 |
| Architecture | Count |
|---|---|
| x86_64 | 1 |
| Related packages | Count |
|---|---|
| kernel | 1 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
NMI watchdog: BUG: soft lockup - CPU#12 stuck for 27s! [crond:1361] Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter devlink vmw_vsock_vmci_transport vsock sunrpc ext4 mbcache jbd2 sb_edac iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ppdev vmw_balloon joydev pcspkr sg vmw_vmci i2c_piix4 shpchp parport_pc nfit parport libnvdimm ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix drm libata mptspi scsi_transport_spi mptscsih mptbase crct10dif_pclmul crct10dif_common crc32c_intel serio_raw vmxnet3 i2c_core floppy dm_mirror dm_region_hash dm_log dm_mod CPU: 12 PID: 1361 Comm: crond Kdump: loaded Not tainted 3.10.0-862.2.3.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 task: ffff8adb99352f70 ti: ffff8adb96270000 task.ti: ffff8adb96270000 RIP: 0010:[<ffffffff8e2e1ec0>] [<ffffffff8e2e1ec0>] avtab_search_node+0x50/0x90 RSP: 0018:ffff8adb96273ab8 EFLAGS: 00010282 RAX: ffff8ad3b5e50858 RBX: 0000000000000007 RCX: 0000000000000149 RDX: 000000000000131c RSI: 0000000000000006 RDI: ffffffff8f207e08 RBP: ffff8adb96273ab8 R08: 0000000000000007 R09: ffff8adb9e2a0000 R10: 000000000000052a R11: 0000000000000006 R12: 00000000000003ce R13: 0000000000000006 R14: ffff8adb96273db8 R15: ffff8adb96273a98 FS: 00007f849bdd9840(0000) GS:ffff8adb9f500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055fbf7b90708 CR3: 0000000035638000 CR4: 00000000000407e0 Call Trace: [<ffffffff8e2e9489>] context_struct_compute_av+0x1a9/0x470 [<ffffffff8e2e9f69>] security_compute_av+0xf9/0x2e0 [<ffffffff8e70c927>] avc_compute_av+0x34/0x1b5 [<ffffffff8e2d2d53>] avc_has_perm_noaudit+0xc3/0x110 [<ffffffff8e2d6233>] selinux_inode_permission+0xe3/0x1b0 [<ffffffff8e2d05d2>] security_inode_permission+0x22/0x30 [<ffffffff8e226932>] __inode_permission+0x52/0xd0 [<ffffffff8e2269c8>] inode_permission+0x18/0x50 [<ffffffff8e226a68>] may_open+0x68/0x120 [<ffffffff8e22aa87>] do_last+0x1b7/0x12c0 [<ffffffff8e22bc67>] path_openat+0xd7/0x640 [<ffffffff8e1c530d>] ? handle_pte_fault+0x36d/0xc30 [<ffffffff8e22d7fd>] do_filp_open+0x4d/0xb0 [<ffffffff8e23ac77>] ? __alloc_fd+0x47/0x170 [<ffffffff8e219b07>] do_sys_open+0x137/0x240 [<ffffffff8e71f6d5>] ? system_call_after_swapgs+0xa2/0x146 [<ffffffff8e219c2e>] SyS_open+0x1e/0x20 [<ffffffff8e71f795>] system_call_fastpath+0x1c/0x21 [<ffffffff8e71f6e1>] ? system_call_after_swapgs+0xae/0x146 Code: b7 4e 02 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 <66> 3b 10 74 13 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f