Kerneloops

Similar reports
Problem #620990
Component
kernel Tainted
Last affected version
0:3.10.0-1160.119.1.el7
Executable
unknown
First occurrence
2024-09-21
Last occurrence
2024-09-25
Unique reports
1
Quality
-39

Statistics

Operating system Unique / Total count
CentOS 7 1 / 2
Operating system Count
CentOS 7 2
Architecture Count
x86_64 2
Related packages Count
kernel 2
 0:3.10.0-1160.119.1.el7 2

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffffa4f2f39b
Build id: 3.10.0-1160.119.1.el7.x86_64
0x4b
2
context_struct_compute_av
vmlinux 0xffffffffa4f36e91
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffffa4f38034
Build id: 3.10.0-1160.119.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffffa53b0b44
Build id: 3.10.0-1160.119.1.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffffa4f1ed8f
Build id: 3.10.0-1160.119.1.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffffa4f26f93
Build id: 3.10.0-1160.119.1.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffffa4f1af42
Build id: 3.10.0-1160.119.1.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffffa4e67d02
Build id: 3.10.0-1160.119.1.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffffa4e67da8
Build id: 3.10.0-1160.119.1.el7.x86_64
0x18
10
may_open
vmlinux 0xffffffffa4e67e3a
Build id: 3.10.0-1160.119.1.el7.x86_64
0x5a
11
do_last
vmlinux 0xffffffffa4e6c8e0
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1c0
12
? kmem_cache_alloc_trace
vmlinux 0xffffffffa4e35f56
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1d6
13
path_openat
vmlinux 0xffffffffa4e6db6d
Build id: 3.10.0-1160.119.1.el7.x86_64
0xcd
14
do_filp_open
vmlinux 0xffffffffa4e6f52d
Build id: 3.10.0-1160.119.1.el7.x86_64
0x4d
15
? __alloc_fd
vmlinux 0xffffffffa4e7de12
Build id: 3.10.0-1160.119.1.el7.x86_64
0xc2
16
do_sys_open
vmlinux 0xffffffffa4e5abf4
Build id: 3.10.0-1160.119.1.el7.x86_64
0x124
17
SyS_open
vmlinux 0xffffffffa4e5ad0e
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1e
18
system_call_fastpath
vmlinux 0xffffffffa53c539a
Build id: 3.10.0-1160.119.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 31s! [systemd:1]
Modules linked in: xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vboxsf(OE) sunrpc joydev ppdev crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul vboxvideo(OE) glue_helper snd_intel8x0 ablk_helper cryptd snd_ac97_codec ac97_bus ttm snd_seq vboxguest(OE) drm_kms_helper snd_seq_device syscopyarea sysfillrect snd_pcm sysimgblt snd_timer i2c_piix4 fb_sys_fops
snd soundcore sg drm parport_pc drm_panel_orientation_quirks video parport pcspkr binfmt_misc ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi ahci libahci ata_piix crct10dif_pclmul crct10dif_common e1000 crc32c_intel serio_raw libata dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 0 PID: 1 Comm: systemd Tainted: G           OEL ------------   3.10.0-1160.119.1.el7.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
task: ffff990f30dd8000 ti: ffff990f30e50000 task.ti: ffff990f30e50000
RIP: 0010:[<ffffffffa4f2f39b>]  [<ffffffffa4f2f39b>] avtab_search_node+0x4b/0xa0
RSP: 0018:ffff990f30e53a40  EFLAGS: 00010206
RAX: ffff99139b50c168 RBX: 0000000000000002 RCX: 00000000000000e2
RDX: 00000000000000e2 RSI: 0000000000000006 RDI: ffffffffa5e7d6c8
RBP: ffff990f30e53a40 R08: 0000000000000707 R09: ffff990df5f94000
R10: 000000000000038e R11: ffff991396fe8e40 R12: 0000000000000000
R13: 000000030000001f R14: 000000000000001f R15: ffffffffa4dd36bf
FS:  00007f23867da940(0000) GS:ffff9913b4800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000882000 CR3: 00000005d7f1c000 CR4: 00000000000006f0
Call Trace:
[<ffffffffa4f36e91>] context_struct_compute_av+0x1d1/0x4e0
[<ffffffffa4f38034>] security_compute_av+0x104/0x2f0
[<ffffffffa53b0b44>] avc_compute_av+0x41/0x1e8
[<ffffffffa4f1ed8f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffffa4f26f93>] selinux_inode_permission+0xe3/0x1b0
[<ffffffffa4f1af42>] security_inode_permission+0x22/0x30
[<ffffffffa4e67d02>] __inode_permission+0x52/0xe0
[<ffffffffa4e67da8>] inode_permission+0x18/0x50
[<ffffffffa4e67e3a>] may_open+0x5a/0x130
[<ffffffffa4e6c8e0>] do_last+0x1c0/0x1380
[<ffffffffa4e35f56>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffffa4e6db6d>] path_openat+0xcd/0x5a0
[<ffffffffa4e6f52d>] do_filp_open+0x4d/0xc0
[<ffffffffa4e7de12>] ? __alloc_fd+0xc2/0x180
[<ffffffffa4e5abf4>] do_sys_open+0x124/0x220
[<ffffffffa4e5ad0e>] SyS_open+0x1e/0x30
[<ffffffffa53c539a>] system_call_fastpath+0x25/0x2a
Code: 3f 0f b7 16 0f b7 4e 02 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 <48> 85 c0 74 10 66 3b 10 74 1b 72 09 48 8b 40 10 48 85 c0 75 f0