| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 1 / 1 |
| Operating system | Count |
|---|---|
| CentOS 7 | 1 |
| Architecture | Count |
|---|---|
| x86_64 | 1 |
| Related packages | Count |
|---|---|
| kernel | 1 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 months.
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 304s! [pgrep:4948] Modules linked in: nls_utf8 isofs fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc intel_powerclamp vboxvideo(OE) crc32_pclmul ttm snd_intel8x0 ghash_clmulni_intel snd_ac97_codec drm_kms_helper ac97_bus snd_seq syscopyarea ppdev sysfillrect joydev sysimgblt fb_sys_fops aesni_intel snd_seq_device drm lrw gf128mul glue_helper ablk_helper cryptd snd_pcm sg pcspkr snd_timer snd parport_pc i2c_piix4 parport video vboxguest(OE) i2c_core soundcore ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi ahci libahci ata_piix libata e1000 crct10dif_pclmul crct10dif_common crc32c_intel serio_raw dm_mirror dm_region_hash dm_log dm_mod CPU: 0 PID: 4948 Comm: pgrep Kdump: loaded Tainted: G OE ------------ 3.10.0-862.11.6.el7.x86_64 #1 Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006 task: ffff967f805e2f70 ti: ffff967fa3cb8000 task.ti: ffff967fa3cb8000 RIP: 0010:[<ffffffff87ce6945>] [<ffffffff87ce6945>] avtab_search_node+0x55/0x90 RSP: 0018:ffff967fa3cbbab8 EFLAGS: 00000212 RAX: ffff967fa3fd0390 RBX: ffff967fbffc9800 RCX: 0000000000000cca RDX: 0000000000000cc6 RSI: 0000000000000006 RDI: ffffffff88c08e08 RBP: ffff967fa3cbbab8 R08: 0000000000000007 R09: ffff967fa3f78000 R10: 000000000000332e R11: ffff967fb93fe240 R12: ffff967f00000141 R13: ffff967fbffcb008 R14: 0000000000000000 R15: ffff967fbffcb000 FS: 00007f2ee6ef3880(0000) GS:ffff967fbfc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f285d50d229 CR3: 000000001f87c000 CR4: 00000000000606f0 Call Trace: [<ffffffff87cedf09>] context_struct_compute_av+0x1a9/0x470 [<ffffffff87cee9e9>] security_compute_av+0xf9/0x2e0 [<ffffffff8811276d>] avc_compute_av+0x34/0x1b5 [<ffffffff87cd77d3>] avc_has_perm_noaudit+0xc3/0x110 [<ffffffff87c2ae32>] ? __inode_permission+0x52/0xd0 [<ffffffff87cdacb3>] selinux_inode_permission+0xe3/0x1b0 [<ffffffff87cd5052>] security_inode_permission+0x22/0x30 [<ffffffff87c2ae32>] __inode_permission+0x52/0xd0 [<ffffffff87c2aec8>] inode_permission+0x18/0x50 [<ffffffff87c2af68>] may_open+0x68/0x120 [<ffffffff87c2ef87>] do_last+0x1b7/0x12c0 [<ffffffff87c30167>] path_openat+0xd7/0x640 [<ffffffff87c31cfd>] do_filp_open+0x4d/0xb0 [<ffffffff87c3f124>] ? __alloc_fd+0xc4/0x170 [<ffffffff87c1e017>] do_sys_open+0x137/0x240 [<ffffffff881256d5>] ? system_call_after_swapgs+0xa2/0x146 [<ffffffff87c1e13e>] SyS_open+0x1e/0x20 [<ffffffff8812579b>] system_call_fastpath+0x22/0x27 [<ffffffff881256e1>] ? system_call_after_swapgs+0xae/0x146 Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b