Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-514.el7
Executable
unknown
First occurrence
2021-03-30
Last occurrence
2021-03-30
Unique reports
1
Quality
-44

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-514.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff812b9370
Build id: 3.10.0-514.el7.x86_64
0x50
2
context_struct_compute_av
vmlinux 0xffffffff812c06a9
Build id: 3.10.0-514.el7.x86_64
0x1a9
3
security_compute_av
vmlinux 0xffffffff812c1189
Build id: 3.10.0-514.el7.x86_64
0xf9
4
avc_compute_av
vmlinux 0xffffffff8168501e
Build id: 3.10.0-514.el7.x86_64
0x34
5
avc_has_perm_noaudit
vmlinux 0xffffffff812aae64
Build id: 3.10.0-514.el7.x86_64
0xc4
6
selinux_inode_permission
vmlinux 0xffffffff812ad6bf
Build id: 3.10.0-514.el7.x86_64
0xaf
7
security_inode_permission
vmlinux 0xffffffff812a88cc
Build id: 3.10.0-514.el7.x86_64
0x1c
8
__inode_permission
vmlinux 0xffffffff81209832
Build id: 3.10.0-514.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffff812098b8
Build id: 3.10.0-514.el7.x86_64
0x18
10
may_open
vmlinux 0xffffffff81209958
Build id: 3.10.0-514.el7.x86_64
0x68
11
do_last
vmlinux 0xffffffff8120cac7
Build id: 3.10.0-514.el7.x86_64
0x1b7
12
? kmem_cache_alloc_trace
vmlinux 0xffffffff811de2f6
Build id: 3.10.0-514.el7.x86_64
0x1d6
13
path_openat
vmlinux 0xffffffff8120dc72
Build id: 3.10.0-514.el7.x86_64
0xc2
14
? unlock_page
vmlinux 0xffffffff8118055b
Build id: 3.10.0-514.el7.x86_64
0x2b
15
do_filp_open
vmlinux 0xffffffff8120fdeb
Build id: 3.10.0-514.el7.x86_64
0x4b
16
? __alloc_fd
vmlinux 0xffffffff8121ca67
Build id: 3.10.0-514.el7.x86_64
0xa7
17
do_sys_open
vmlinux 0xffffffff811fd2f3
Build id: 3.10.0-514.el7.x86_64
0xf3
18
? do_page_fault
vmlinux 0xffffffff81691dc5
Build id: 3.10.0-514.el7.x86_64
0x35
19
SyS_open
vmlinux 0xffffffff811fd40e
Build id: 3.10.0-514.el7.x86_64
0x1e
20
system_call_fastpath
vmlinux 0xffffffff816965c9
Build id: 3.10.0-514.el7.x86_64
0x16
NMI watchdog: BUG: soft lockup - CPU#2 stuck for 21s! [crond:8821]
Modules linked in: xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun binfmt_misc ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock intel_powerclamp coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd sg pcspkr ppdev vmw_balloon shpchp parport_pc parport vmw_vmci i2c_piix4 nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables
xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops crct10dif_pclmul ttm crct10dif_common crc32c_intel mptspi drm ata_piix scsi_transport_spi serio_raw mptscsih libata vmxnet3 i2c_core mptbase floppy fjes dm_mirror dm_region_hash dm_log dm_mod
CPU: 2 PID: 8821 Comm: crond Tainted: G             L ------------   3.10.0-514.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
task: ffff8807abf2de20 ti: ffff88072bb98000 task.ti: ffff88072bb98000
RIP: 0010:[<ffffffff812b9370>]  [<ffffffff812b9370>] avtab_search_node+0x50/0x90
RSP: 0018:ffff88072bb9baf0  EFLAGS: 00010286
RAX: ffff88081ed32360 RBX: 0000000000000007 RCX: 00000000000004a5
RDX: 00000000000011d0 RSI: 0000000000000006 RDI: ffffffff81f7b488
RBP: ffff88072bb9baf0 R08: 0000000000000007 R09: ffff8808190c4000
R10: 000000000000129a R11: ffff8808169bc180 R12: 000000000000057a
R13: ffff8808169bc180 R14: ffffffff810b11ac R15: ffff88072bb9bad0
FS:  00007f52772f8840(0000) GS:ffff88083fc80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f527658d740 CR3: 000000081667e000 CR4: 00000000003407e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Stack:
ffff88072bb9bb68 ffffffff812c06a9 ffff88083fef7cc0 0000000600000006
ffff88083f698cc8 ffff8808122804e8 ffff88081e642c10 000011d0000011cf
0007000604a511d0 00000000234e2872 0000000000000006 ffff8808122804e8
Call Trace:
[<ffffffff812c06a9>] context_struct_compute_av+0x1a9/0x470
[<ffffffff812c1189>] security_compute_av+0xf9/0x2e0
[<ffffffff8168501e>] avc_compute_av+0x34/0x1b5
[<ffffffff812aae64>] avc_has_perm_noaudit+0xc4/0x110
[<ffffffff812ad6bf>] selinux_inode_permission+0xaf/0x170
[<ffffffff812a88cc>] security_inode_permission+0x1c/0x30
[<ffffffff81209832>] __inode_permission+0x52/0xc0
[<ffffffff812098b8>] inode_permission+0x18/0x50
[<ffffffff81209958>] may_open+0x68/0x110
[<ffffffff8120cac7>] do_last+0x1b7/0x12a0
[<ffffffff811de2f6>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffff8120dc72>] path_openat+0xc2/0x490
[<ffffffff8118055b>] ? unlock_page+0x2b/0x30
[<ffffffff8120fdeb>] do_filp_open+0x4b/0xb0
[<ffffffff8121ca67>] ? __alloc_fd+0xa7/0x130
[<ffffffff811fd2f3>] do_sys_open+0xf3/0x1f0
[<ffffffff81691dc5>] ? do_page_fault+0x35/0x90
[<ffffffff811fd40e>] SyS_open+0x1e/0x20
[<ffffffff816965c9>] system_call_fastpath+0x16/0x1b
Code: b7 4e 02 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 <66> 3b 10 74 13 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f