Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-862.el7
Executable
unknown
First occurrence
2024-08-28
Last occurrence
2024-08-28
Unique reports
1
Quality
-39

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-862.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff892e1f25
Build id: 3.10.0-862.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffff892e94e9
Build id: 3.10.0-862.el7.x86_64
0x1a9
3
security_compute_av
vmlinux 0xffffffff892e9fc9
Build id: 3.10.0-862.el7.x86_64
0xf9
4
avc_compute_av
vmlinux 0xffffffff8970c901
Build id: 3.10.0-862.el7.x86_64
0x34
5
avc_has_perm_noaudit
vmlinux 0xffffffff892d2db3
Build id: 3.10.0-862.el7.x86_64
0xc3
6
selinux_inode_permission
vmlinux 0xffffffff892d6293
Build id: 3.10.0-862.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffff892d0632
Build id: 3.10.0-862.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffff89226992
Build id: 3.10.0-862.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffff89226a28
Build id: 3.10.0-862.el7.x86_64
0x18
10
link_path_walk
vmlinux 0xffffffff8922852e
Build id: 3.10.0-862.el7.x86_64
0x27e
11
? kmem_cache_alloc_trace
vmlinux 0xffffffff891f7606
Build id: 3.10.0-862.el7.x86_64
0x1d6
12
path_openat
vmlinux 0xffffffff8922bca5
Build id: 3.10.0-862.el7.x86_64
0xb5
13
? handle_pte_fault
vmlinux 0xffffffff891c52dc
Build id: 3.10.0-862.el7.x86_64
0x2dc
14
do_filp_open
vmlinux 0xffffffff8922d85d
Build id: 3.10.0-862.el7.x86_64
0x4d
15
? __alloc_fd
vmlinux 0xffffffff8923acd7
Build id: 3.10.0-862.el7.x86_64
0x47
16
do_sys_open
vmlinux 0xffffffff89219b67
Build id: 3.10.0-862.el7.x86_64
0x137
17
SyS_open
vmlinux 0xffffffff89219c8e
Build id: 3.10.0-862.el7.x86_64
0x1e
18
system_call_fastpath
vmlinux 0xffffffff8971f7d5
Build id: 3.10.0-862.el7.x86_64
0x1c
NMI watchdog: BUG: soft lockup - CPU#1 stuck for 2256s! [systemd-logind:30278]
Modules linked in: tcp_lp nls_utf8 isofs rfcomm fuse veth xt_nat nf_conntrack_netlink nfnetlink xt_addrtype br_netfilter xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter devlink overlay(T) vmw_vsock_vmci_transport vsock bnep sunrpc snd_seq_midi snd_seq_midi_event snd_ens1371 iosf_mbi snd_rawmidi crc32_pclmul snd_ac97_codec ghash_clmulni_intel ac97_bus snd_seq snd_seq_device aesni_intel ppdev lrw btusb gf128mul snd_pcm glue_helper ablk_helper cryptd btrtl btbcm btintel bluetooth vmw_balloon joydev pcspkr rfkill snd_timer nfit sg snd vmw_vmci libnvdimm soundcore i2c_piix4 shpchp
parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx crct10dif_pclmul crct10dif_common crc32c_intel drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm serio_raw ata_piix drm libata mptspi e1000 scsi_transport_spi mptscsih mptbase i2c_core dm_mirror dm_region_hash dm_log dm_mod
CPU: 1 PID: 30278 Comm: systemd-logind Kdump: loaded Tainted: G             L ------------ T 3.10.0-862.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/29/2019
task: ffff95b83339bf40 ti: ffff95b81ced8000 task.ti: ffff95b81ced8000
RIP: 0010:[<ffffffff892e1f25>]  [<ffffffff892e1f25>] avtab_search_node+0x55/0x90
RSP: 0018:ffff95b81cedbac8  EFLAGS: 00000202
RAX: ffff95b83516e918 RBX: 00000000aa248115 RCX: 000000000000012e
RDX: 0000000000000cdf RSI: 0000000000000007 RDI: ffffffff8a207e08
RBP: ffff95b81cedbac8 R08: 0000000000000007 R09: ffff95b7b5b00000
R10: 00000000000004bf R11: 0000000000000001 R12: 0000561800000001
R13: 0000000142107140 R14: ffffffff8920f0e6 R15: ffff95b81cedba38
FS:  00007fe9df624900(0000) GS:ffff95b83a640000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe9de42eb05 CR3: 00000000aaaa6000 CR4: 00000000003607e0
Call Trace:
[<ffffffff892e94e9>] context_struct_compute_av+0x1a9/0x470
[<ffffffff892e9fc9>] security_compute_av+0xf9/0x2e0
[<ffffffff8970c901>] avc_compute_av+0x34/0x1b5
[<ffffffff892d2db3>] avc_has_perm_noaudit+0xc3/0x110
[<ffffffff892d6293>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff892d0632>] security_inode_permission+0x22/0x30
[<ffffffff89226992>] __inode_permission+0x52/0xd0
[<ffffffff89226a28>] inode_permission+0x18/0x50
[<ffffffff8922852e>] link_path_walk+0x27e/0x8b0
[<ffffffff891f7606>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffff8922bca5>] path_openat+0xb5/0x640
[<ffffffff891c52dc>] ? handle_pte_fault+0x2dc/0xc30
[<ffffffff8922d85d>] do_filp_open+0x4d/0xb0
[<ffffffff8923acd7>] ? __alloc_fd+0x47/0x170
[<ffffffff89219b67>] do_sys_open+0x137/0x240
[<ffffffff89219c8e>] SyS_open+0x1e/0x20
[<ffffffff8971f7d5>] system_call_fastpath+0x1c/0x21
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b