| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 1 / 2 |
| Operating system | Count |
|---|---|
| CentOS 7 | 2 |
| Architecture | Count |
|---|---|
| x86_64 | 2 |
| Related packages | Count |
|---|---|
| kernel | 2 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 days.
No reports in the last 20 weeks.
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 31s! [systemd:1] Modules linked in: xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vboxsf(OE) sunrpc joydev ppdev crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul vboxvideo(OE) glue_helper snd_intel8x0 ablk_helper cryptd snd_ac97_codec ac97_bus ttm snd_seq vboxguest(OE) drm_kms_helper snd_seq_device syscopyarea sysfillrect snd_pcm sysimgblt snd_timer i2c_piix4 fb_sys_fops snd soundcore sg drm parport_pc drm_panel_orientation_quirks video parport pcspkr binfmt_misc ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi ahci libahci ata_piix crct10dif_pclmul crct10dif_common e1000 crc32c_intel serio_raw libata dm_mirror dm_region_hash dm_log dm_mod fuse CPU: 0 PID: 1 Comm: systemd Tainted: G OEL ------------ 3.10.0-1160.119.1.el7.x86_64 #1 Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006 task: ffff990f30dd8000 ti: ffff990f30e50000 task.ti: ffff990f30e50000 RIP: 0010:[<ffffffffa4f2f39b>] [<ffffffffa4f2f39b>] avtab_search_node+0x4b/0xa0 RSP: 0018:ffff990f30e53a40 EFLAGS: 00010206 RAX: ffff99139b50c168 RBX: 0000000000000002 RCX: 00000000000000e2 RDX: 00000000000000e2 RSI: 0000000000000006 RDI: ffffffffa5e7d6c8 RBP: ffff990f30e53a40 R08: 0000000000000707 R09: ffff990df5f94000 R10: 000000000000038e R11: ffff991396fe8e40 R12: 0000000000000000 R13: 000000030000001f R14: 000000000000001f R15: ffffffffa4dd36bf FS: 00007f23867da940(0000) GS:ffff9913b4800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000882000 CR3: 00000005d7f1c000 CR4: 00000000000006f0 Call Trace: [<ffffffffa4f36e91>] context_struct_compute_av+0x1d1/0x4e0 [<ffffffffa4f38034>] security_compute_av+0x104/0x2f0 [<ffffffffa53b0b44>] avc_compute_av+0x41/0x1e8 [<ffffffffa4f1ed8f>] avc_has_perm_noaudit+0xcf/0x140 [<ffffffffa4f26f93>] selinux_inode_permission+0xe3/0x1b0 [<ffffffffa4f1af42>] security_inode_permission+0x22/0x30 [<ffffffffa4e67d02>] __inode_permission+0x52/0xe0 [<ffffffffa4e67da8>] inode_permission+0x18/0x50 [<ffffffffa4e67e3a>] may_open+0x5a/0x130 [<ffffffffa4e6c8e0>] do_last+0x1c0/0x1380 [<ffffffffa4e35f56>] ? kmem_cache_alloc_trace+0x1d6/0x200 [<ffffffffa4e6db6d>] path_openat+0xcd/0x5a0 [<ffffffffa4e6f52d>] do_filp_open+0x4d/0xc0 [<ffffffffa4e7de12>] ? __alloc_fd+0xc2/0x180 [<ffffffffa4e5abf4>] do_sys_open+0x124/0x220 [<ffffffffa4e5ad0e>] SyS_open+0x1e/0x30 [<ffffffffa53c539a>] system_call_fastpath+0x25/0x2a Code: 3f 0f b7 16 0f b7 4e 02 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 <48> 85 c0 74 10 66 3b 10 74 1b 72 09 48 8b 40 10 48 85 c0 75 f0