Upgrading has not solved the problem. Still appears to be some form of port / bind issue based on the backtrace. To obfuscate things, this was my ossec master (wazuh docker image), so it was running in a docker container, on a virtual machine under VMWare.
Nothing complicated there, right? I'd love to hear any suggestions on where to look next to track down this problem. I can (apparently) get around it by disabling rootcheck, but since that's one of the key features of ossec I really want for security, it's not a very good solution. ------------------------------------------------ NMI watchdog: BUG: soft lockup - CPU#2 stuck for 23s! [ossec-syscheckd:16223] Modules linked in: xt_nat veth binfmt_misc ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtyp e xt_conntrack nf_nat nf_conntrack br_netfilter bridge stp llc iptable_filter vmw_vsock_vmci_transport vsock btrfs zlib_deflate raid6_pq xor intel_p owerclamp coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper vmw_balloon ablk_helper cryptd pcspkr sg vmw _vmci i2c_piix4 shpchp parport_pc parport nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic crct10dif_pclmul crct10dif_common crc32c_intel vmwgfx drm_kms_helper ata_piix syscopyarea serio_raw sysfillrect sysimgblt fb_sys_fops ttm vmxnet3 drm libata vmw_pvscsi i2c_core floppy fjes dm_mirror dm_region_hash dm_log dm_mod CPU: 2 PID: 16223 Comm: ossec-syscheckd Not tainted 3.10.0-514.10.2.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015 task: ffff88000593ce70 ti: ffff8800130ec000 task.ti: ffff8800130ec000 RIP: 0010:[<ffffffff8168dd52>] [<ffffffff8168dd52>] _raw_spin_lock+0x32/0x50 RSP: 0018:ffff8800130efde0 EFLAGS: 00000203 RAX: 000000000000411c RBX: 0000000000000020 RCX: 000000000000bb00 RDX: 000000000000384c RSI: 000000000000384c RDI: ffffc900016fe4f0 RBP: ffff8800130efde0 R08: ffff8800b7aa9380 R09: ffffc900016fe4f0 R10: 0000000000000008 R11: 0000000000000206 R12: ffffc900016fe3e0 R13: ffff88013ae99a80 R14: 0000000000000246 R15: ffff8800130efd78 FS: 00007efe439a5740(0000) GS:ffff88013ae80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b CR2: 000000000063e000 CR3: 0000000013e8c000 CR4: 00000000000407e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Stack: ffff8800130efe68 ffffffff815bc2b5 00000005811de175 ffff8800b8993640 0000000000000000 0000000000000000 0000000000000000 ffffffff81f96140 0000000000000000 ffffc900016fe4f0 ffffffff00000c01 ffffffff00000000 Call Trace: [<ffffffff815bc2b5>] inet_csk_get_port+0x385/0x5c0 [<ffffffff815eb71c>] inet_bind+0x14c/0x200 [<ffffffff81555330>] SYSC_bind+0xe0/0x120 [<ffffffff81136bf3>] ? __secure_computing+0x73/0x240 [<ffffffff8111efe6>] ? __audit_syscall_exit+0x1e6/0x280 [<ffffffff8111eda4>] ? __audit_syscall_entry+0xb4/0x110 [<ffffffff810392e3>] ? syscall_trace_enter+0x173/0x220 [<ffffffff8155616e>] SyS_bind+0xe/0x10 [<ffffffff81696c12>] tracesys+0xdd/0xe2 Code: 00 02 00 f0 0f c1 07 89 c2 c1 ea 10 66 39 c2 75 01 c3 55 83 e2 fe 0f b7 f2 48 89 e5 b8 00 80 00 00 eb 0d 66 0f 1f 44 00 00 f3 90 <83> e8 01 74 0a 0f b7 0f 66 39 ca 75 f1 5d c3 66 66 66 90 66 66 -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to ossec-list+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.