| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 1 / 2 |
| Operating system | Count |
|---|---|
| CentOS 7 | 2 |
| Architecture | Count |
|---|---|
| x86_64 | 2 |
| Related packages | Count |
|---|---|
| kernel | 2 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 899s! [systemd-logind:16061] Modules linked in: tcp_lp nls_utf8 isofs xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables devlink iptable_filter sunrpc intel_powerclamp crc32_pclmul vboxvideo(OE) ttm ghash_clmulni_intel snd_intel8x0 snd_ac97_codec drm_kms_helper ac97_bus snd_seq snd_seq_device syscopyarea joydev sysfillrect sysimgblt fb_sys_fops snd_pcm ppdev aesni_intel drm lrw gf128mul glue_helper ablk_helper snd_timer cryptd sg snd pcspkr vboxguest(OE) i2c_piix4 soundcore drm_panel_orientation_quirks parport_pc parport video binfmt_misc ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic sr_mod cdrom ata_generic pata_acpi ahci libahci ata_piix libata e1000 crct10dif_pclmul crct10dif_common crc32c_intel serio_raw dm_mirror dm_region_hash dm_log dm_mod fuse CPU: 0 PID: 16061 Comm: systemd-logind Kdump: loaded Tainted: G OEL ------------ 3.10.0-1160.36.2.el7.x86_64 #1 Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006 task: ffff99e6421b6300 ti: ffff99e5d6e70000 task.ti: ffff99e5d6e70000 RIP: 0010:[<ffffffff8f71be85>] [<ffffffff8f71be85>] avtab_search_node+0x55/0x90 RSP: 0018:ffff99e5d6e73a60 EFLAGS: 00000212 RAX: ffff99e5cfcd2198 RBX: ffffffff8fb8218f RCX: 0000000000000134 RDX: 0000000000000cd9 RSI: 0000000000000007 RDI: ffffffff9064b6c8 RBP: ffff99e5d6e73a60 R08: 0000000000000707 R09: ffff99e5cfc94000 R10: 00000000000004d7 R11: fffffb94028481c0 R12: 0000000000000000 R13: ffff99e500000001 R14: 000000019064b5e0 R15: ffff99e5d6e73ab0 FS: 00007f57c62e2900(0000) GS:ffff99e6dfc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055e58c7bab6e CR3: 00000001548ea000 CR4: 00000000000606f0 Call Trace: [<ffffffff8f723671>] context_struct_compute_av+0x1d1/0x4d0 [<ffffffff8f7247d4>] security_compute_av+0x104/0x2f0 [<ffffffff8fb824d5>] avc_compute_av+0x41/0x1e4 [<ffffffff8f70be4f>] avc_has_perm_noaudit+0xcf/0x140 [<ffffffff8f713cb3>] selinux_inode_permission+0xe3/0x1b0 [<ffffffff8f708fa2>] security_inode_permission+0x22/0x30 [<ffffffff8f65a062>] __inode_permission+0x52/0xd0 [<ffffffff8f65a0f8>] inode_permission+0x18/0x50 [<ffffffff8f65c7de>] link_path_walk+0x27e/0x8b0 [<ffffffff8f629376>] ? kmem_cache_alloc_trace+0x1d6/0x200 [<ffffffff8f65f3ce>] path_openat+0xae/0x5a0 [<ffffffff8f66163d>] do_filp_open+0x4d/0xb0 [<ffffffff8f66f737>] ? __alloc_fd+0x47/0x170 [<ffffffff8f64d3d4>] do_sys_open+0x124/0x220 [<ffffffff8fb95ec9>] ? system_call_after_swapgs+0x96/0x13a [<ffffffff8f64d4ee>] SyS_open+0x1e/0x20 [<ffffffff8fb95f92>] system_call_fastpath+0x25/0x2a [<ffffffff8fb95ed5>] ? system_call_after_swapgs+0xa2/0x13a Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b