| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 1 / 1 |
| Operating system | Count |
|---|---|
| CentOS 7 | 1 |
| Architecture | Count |
|---|---|
| x86_64 | 1 |
| Related packages | Count |
|---|---|
| kernel | 1 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 days.
No reports in the last 20 weeks.
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [systemd-journal:27973] Modules linked in: tcp_lp binfmt_misc fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc crc32_pclmul ghash_clmulni_intel ppdev vboxvideo(OE) ttm drm_kms_helper vboxguest(OE) aesni_intel lrw gf128mul glue_helper joydev ablk_helper syscopyarea cryptd sysfillrect sysimgblt fb_sys_fops pcspkr parport_pc sg drm parport i2c_piix4 video drm_panel_orientation_quirks ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ahci libahci libata crct10dif_pclmul crct10dif_common e1000 crc32c_intel serio_raw dm_mirror dm_region_hash dm_log dm_mod CPU: 0 PID: 27973 Comm: systemd-journal Kdump: loaded Tainted: G OEL ------------ 3.10.0-1062.4.1.el7.x86_64 #1 Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006 task: ffff99f0a5fa5230 ti: ffff99f0f99e8000 task.ti: ffff99f0f99e8000 RIP: 0010:[<ffffffffb3b15835>] [<ffffffffb3b15835>] avtab_search_node+0x55/0x90 RSP: 0018:ffff99f0f99eba50 EFLAGS: 00010206 RAX: ffff99f0d65a9ee8 RBX: 0000000000000282 RCX: 0000000000000cda RDX: 0000000000000134 RSI: 0000000000000006 RDI: ffffffffb4a49048 RBP: ffff99f0f99eba50 R08: 0000000000000707 R09: ffff99f0b5e80000 R10: 000000000000336e R11: 0000000000000000 R12: ffff99f0b4e7d9a8 R13: 0000000000000001 R14: ffff99f0b5dfc540 R15: 0000000100000001 FS: 00007f8f68911880(0000) GS:ffff99f0ffc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000562d9447a9d0 CR3: 0000000004ec0000 CR4: 00000000000206f0 Call Trace: [<ffffffffb3b1d031>] context_struct_compute_av+0x1d1/0x4d0 [<ffffffffb3b1e194>] security_compute_av+0x104/0x2f0 [<ffffffffb3f77e7a>] avc_compute_av+0x41/0x1fe [<ffffffffb3b0583f>] avc_has_perm_noaudit+0xcf/0x140 [<ffffffffb3b0d513>] selinux_inode_permission+0xe3/0x1b0 [<ffffffffb3b02992>] security_inode_permission+0x22/0x30 [<ffffffffb3a54ce2>] __inode_permission+0x52/0xd0 [<ffffffffb3a54d78>] inode_permission+0x18/0x50 [<ffffffffb3a54f2a>] may_open+0x5a/0x120 [<ffffffffb3a57620>] do_last+0x1c0/0x1290 [<ffffffffb3a5a4ed>] path_openat+0xcd/0x5a0 [<ffffffffb3a5be5d>] do_filp_open+0x4d/0xb0 [<ffffffffb3a699b2>] ? __alloc_fd+0xc2/0x170 [<ffffffffb3a47db4>] do_sys_open+0x124/0x220 [<ffffffffb3f8be15>] ? system_call_after_swapgs+0xa2/0x146 [<ffffffffb3a47ece>] SyS_open+0x1e/0x20 [<ffffffffb3f8bede>] system_call_fastpath+0x25/0x2a [<ffffffffb3f8be21>] ? system_call_after_swapgs+0xae/0x146 Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b