Operating system | Count |
---|---|
CentOS 7 | 1 |
Architecture | Count |
---|---|
x86_64 | 1 |
Related packages | Count |
---|---|
kernel | 1 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
NMI watchdog: BUG: soft lockup - CPU#2 stuck for 23s! [ksmtuned:17787] Modules linked in: falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_kal(E) falcon_lsm_pinned_14203(E) falcon_lsm_pinned_14108(E) falcon_lsm_pinned_14006(E) devlink binfmt_misc ipt_MASQUERADE nf_nat_masquerade_ipv4 ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_nat nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw ipt_REJECT nf_reject_ipv4 nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack iptable_filter ppdev iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel snd_hda_codec_generic lrw gf128mul glue_helper ablk_helper cryptd joydev snd_hda_intel virtio_balloon snd_hda_codec sg snd_hda_core snd_hwdep parport_pc snd_seq parport snd_seq_device snd_pcm snd_timer snd i2c_piix4 pcspkr soundcore auth_rpcgss sunrpc ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi virtio_net virtio_blk cirrus drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ata_piix libata crct10dif_pclmul crct10dif_common crc32c_intel virtio_pci virtio_ring serio_raw virtio drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod [last unloaded: falcon_kal] CPU: 2 PID: 17787 Comm: ksmtuned Kdump: loaded Tainted: P EL ------------ 3.10.0-1062.4.1.el7.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 task: ffffa04bf4628000 ti: ffffa047c0374000 task.ti: ffffa047c0374000 RIP: 0010:[<ffffffffc072e3ee>] [<ffffffffc072e3ee>] cshook_network_ops_inet6_sockraw_release+0xf07e/0x1a830 [falcon_lsm_serviceable] RSP: 0018:ffffa047c0377608 EFLAGS: 00010202 RAX: 0000000000000008 RBX: ffffa04a38b2d090 RCX: ffffb43819cf1486 RDX: 0000000000000000 RSI: ffffa053d134a410 RDI: 0000000000000001 RBP: ffffa047c0377680 R08: 0000000000000001 R09: ffffffffc068fbae R10: 00000000e003000e R11: ffffddd03d60ec00 R12: 0000000000000001 R13: 0000000000000001 R14: ffffa047c03776b0 R15: 0000000000000001 FS: 00007fb5ee493740(0000) GS:ffffa053df080000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000081927002 CR3: 0000002340378000 CR4: 00000000001606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: [<ffffffffa1d05e2f>] ? __getnstimeofday64+0x3f/0xd0 [<ffffffffc072e6e1>] cshook_network_ops_inet6_sockraw_release+0xf371/0x1a830 [falcon_lsm_serviceable] [<ffffffffc07646b8>] cshook_systemcalltable_pre_compat_sys_ioctl+0x20a08/0x2e870 [falcon_lsm_serviceable] [<ffffffffc06fd2df>] _ZdlPv+0x2ae6f/0x396b0 [falcon_lsm_serviceable] [<ffffffffc06fd96e>] _ZdlPv+0x2b4fe/0x396b0 [falcon_lsm_serviceable] [<ffffffffc06fd9f9>] _ZdlPv+0x2b589/0x396b0 [falcon_lsm_serviceable] [<ffffffffc06fd6f7>] _ZdlPv+0x2b287/0x396b0 [falcon_lsm_serviceable] [<ffffffffc073beeb>] cshook_security_sb_free_security+0x114b/0x3950 [falcon_lsm_serviceable] [<ffffffffc073cfc2>] cshook_security_sb_free_security+0x2222/0x3950 [falcon_lsm_serviceable] [<ffffffffc073dcff>] cshook_security_sb_free_security+0x2f5f/0x3950 [falcon_lsm_serviceable] [<ffffffffc073a704>] cshook_security_file_permission+0x874/0xdb0 [falcon_lsm_serviceable] [<ffffffffc073aa81>] cshook_security_file_permission+0xbf1/0xdb0 [falcon_lsm_serviceable] [<ffffffffc073aca5>] cshook_security_bprm_check_security+0x65/0xb0 [falcon_lsm_serviceable] [<ffffffffc06ba5ec>] pinnedhook_security_bprm_check_security+0x5c/0x90 [falcon_lsm_pinned_14203] [<ffffffffa1f0243d>] security_bprm_check+0x1d/0x30 [<ffffffffa1e502ea>] search_binary_handler+0x2a/0x1c0 [<ffffffffa1e51a56>] do_execve_common.isra.24+0x616/0x880 [<ffffffffa1e51f59>] SyS_execve+0x29/0x30 [<ffffffffa238c478>] stub_execve+0x48/0x80 Code: 44 24 1c ff 50 68 48 85 c0 41 ba 09 00 00 e0 44 8b 44 24 1c 0f 84 b4 00 00 00 8b 7b 64 85 ff 74 2d 48 8b 73 68 41 ba 0e 00 03 e0 <66> 44 39 26 0f 84 99 00 00 00 31 c9 eb 0e 48 83 c6 20 66 44 39