| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 1 / 1 |
| Operating system | Count |
|---|---|
| CentOS 7 | 1 |
| Architecture | Count |
|---|---|
| x86_64 | 1 |
| Related packages | Count |
|---|---|
| kernel | 1 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 57s! [pool:938] Modules linked in: ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev snd_ens1371 snd_rawmidi aesni_intel snd_ac97_codec lrw ac97_bus vmw_balloon gf128mul glue_helper ablk_helper cryptd snd_seq snd_seq_device snd_pcm joydev pcspkr snd_timer sg snd vmw_vmci soundcore i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common ata_piix crc32c_intel libata drm nfit libnvdimm serio_raw mptspi scsi_transport_spi mptscsih e1000 mptbase drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse CPU: 0 PID: 938 Comm: pool Not tainted 3.10.0-1160.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/22/2020 task: ffff8b7136b99080 ti: ffff8b71afe60000 task.ti: ffff8b71afe60000 RIP: 0010:[<ffffffff9df1b505>] [<ffffffff9df1b505>] avtab_search_node+0x55/0x90 RSP: 0018:ffff8b71afe63a40 EFLAGS: 00000206 RAX: ffff8b713b123030 RBX: 0000000000000001 RCX: 0000000000000121 RDX: 000000000000090f RSI: 0000000000000006 RDI: ffffffff9ee4c6c8 RBP: ffff8b71afe63a40 R08: 0000000000000707 R09: ffff8b713b180000 R10: 000000000000048a R11: 0000000000000009 R12: ffffffff9dcc9abf R13: ffff8b71afe639d8 R14: ffff8b71b96159e0 R15: ffff8b71afe63a20 FS: 00007faf43fff700(0000) GS:ffff8b71b9600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007faf545f5000 CR3: 00000000b34d2000 CR4: 00000000003607f0 Call Trace: [<ffffffff9df22d11>] context_struct_compute_av+0x1d1/0x4d0 [<ffffffff9df23e74>] security_compute_av+0x104/0x2f0 [<ffffffff9e3802bc>] avc_compute_av+0x41/0x1e4 [<ffffffff9dce43cc>] ? update_curr+0x14c/0x1e0 [<ffffffff9df0b4ef>] avc_has_perm_noaudit+0xcf/0x140 [<ffffffff9df13333>] selinux_inode_permission+0xe3/0x1b0 [<ffffffff9df08642>] security_inode_permission+0x22/0x30 [<ffffffff9de598c2>] __inode_permission+0x52/0xd0 [<ffffffff9de59958>] inode_permission+0x18/0x50 [<ffffffff9de59b0a>] may_open+0x5a/0x120 [<ffffffff9de5da00>] do_last+0x1c0/0x1340 [<ffffffff9de289c6>] ? kmem_cache_alloc_trace+0x1d6/0x200 [<ffffffff9de5ec4d>] path_openat+0xcd/0x5a0 [<ffffffff9ddee4d9>] ? do_read_fault.isra.63+0x139/0x1b0 [<ffffffff9de60e9d>] do_filp_open+0x4d/0xb0 [<ffffffff9de6ef97>] ? __alloc_fd+0x47/0x170 [<ffffffff9de4c9e4>] do_sys_open+0x124/0x220 [<ffffffff9de4cafe>] SyS_open+0x1e/0x20 [<ffffffff9e393f92>] system_call_fastpath+0x25/0x2a Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b