Kerneloops

Similar reports
Problem #620990
Component
kernel Tainted
Last affected version
0:3.10.0-1062.4.1.el7
Executable
unknown
First occurrence
2025-03-05
Last occurrence
2025-03-05
Unique reports
1
Quality
-42

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1062.4.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffffb3b15835
Build id: 3.10.0-1062.4.1.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffffb3b1d031
Build id: 3.10.0-1062.4.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffffb3b1e194
Build id: 3.10.0-1062.4.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffffb3f77e7a
Build id: 3.10.0-1062.4.1.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffffb3b0583f
Build id: 3.10.0-1062.4.1.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffffb3b0d513
Build id: 3.10.0-1062.4.1.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffffb3b02992
Build id: 3.10.0-1062.4.1.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffffb3a54ce2
Build id: 3.10.0-1062.4.1.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffffb3a54d78
Build id: 3.10.0-1062.4.1.el7.x86_64
0x18
10
may_open
vmlinux 0xffffffffb3a54f2a
Build id: 3.10.0-1062.4.1.el7.x86_64
0x5a
11
do_last
vmlinux 0xffffffffb3a57620
Build id: 3.10.0-1062.4.1.el7.x86_64
0x1c0
12
path_openat
vmlinux 0xffffffffb3a5a4ed
Build id: 3.10.0-1062.4.1.el7.x86_64
0xcd
13
do_filp_open
vmlinux 0xffffffffb3a5be5d
Build id: 3.10.0-1062.4.1.el7.x86_64
0x4d
14
? __alloc_fd
vmlinux 0xffffffffb3a699b2
Build id: 3.10.0-1062.4.1.el7.x86_64
0xc2
15
do_sys_open
vmlinux 0xffffffffb3a47db4
Build id: 3.10.0-1062.4.1.el7.x86_64
0x124
16
? system_call_after_swapgs
vmlinux 0xffffffffb3f8be15
Build id: 3.10.0-1062.4.1.el7.x86_64
0xa2
17
SyS_open
vmlinux 0xffffffffb3a47ece
Build id: 3.10.0-1062.4.1.el7.x86_64
0x1e
18
system_call_fastpath
vmlinux 0xffffffffb3f8bede
Build id: 3.10.0-1062.4.1.el7.x86_64
0x25
19
? system_call_after_swapgs
vmlinux 0xffffffffb3f8be21
Build id: 3.10.0-1062.4.1.el7.x86_64
0xae
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [systemd-journal:27973]
Modules linked in: tcp_lp binfmt_misc fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc crc32_pclmul ghash_clmulni_intel ppdev vboxvideo(OE) ttm drm_kms_helper vboxguest(OE) aesni_intel lrw gf128mul glue_helper joydev ablk_helper syscopyarea cryptd sysfillrect sysimgblt fb_sys_fops pcspkr parport_pc sg drm parport i2c_piix4 video drm_panel_orientation_quirks
ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ahci libahci libata crct10dif_pclmul crct10dif_common e1000 crc32c_intel serio_raw dm_mirror dm_region_hash dm_log dm_mod
CPU: 0 PID: 27973 Comm: systemd-journal Kdump: loaded Tainted: G           OEL ------------   3.10.0-1062.4.1.el7.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
task: ffff99f0a5fa5230 ti: ffff99f0f99e8000 task.ti: ffff99f0f99e8000
RIP: 0010:[<ffffffffb3b15835>]  [<ffffffffb3b15835>] avtab_search_node+0x55/0x90
RSP: 0018:ffff99f0f99eba50  EFLAGS: 00010206
RAX: ffff99f0d65a9ee8 RBX: 0000000000000282 RCX: 0000000000000cda
RDX: 0000000000000134 RSI: 0000000000000006 RDI: ffffffffb4a49048
RBP: ffff99f0f99eba50 R08: 0000000000000707 R09: ffff99f0b5e80000
R10: 000000000000336e R11: 0000000000000000 R12: ffff99f0b4e7d9a8
R13: 0000000000000001 R14: ffff99f0b5dfc540 R15: 0000000100000001
FS:  00007f8f68911880(0000) GS:ffff99f0ffc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000562d9447a9d0 CR3: 0000000004ec0000 CR4: 00000000000206f0
Call Trace:
[<ffffffffb3b1d031>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffffb3b1e194>] security_compute_av+0x104/0x2f0
[<ffffffffb3f77e7a>] avc_compute_av+0x41/0x1fe
[<ffffffffb3b0583f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffffb3b0d513>] selinux_inode_permission+0xe3/0x1b0
[<ffffffffb3b02992>] security_inode_permission+0x22/0x30
[<ffffffffb3a54ce2>] __inode_permission+0x52/0xd0
[<ffffffffb3a54d78>] inode_permission+0x18/0x50
[<ffffffffb3a54f2a>] may_open+0x5a/0x120
[<ffffffffb3a57620>] do_last+0x1c0/0x1290
[<ffffffffb3a5a4ed>] path_openat+0xcd/0x5a0
[<ffffffffb3a5be5d>] do_filp_open+0x4d/0xb0
[<ffffffffb3a699b2>] ? __alloc_fd+0xc2/0x170
[<ffffffffb3a47db4>] do_sys_open+0x124/0x220
[<ffffffffb3f8be15>] ? system_call_after_swapgs+0xa2/0x146
[<ffffffffb3a47ece>] SyS_open+0x1e/0x20
[<ffffffffb3f8bede>] system_call_fastpath+0x25/0x2a
[<ffffffffb3f8be21>] ? system_call_after_swapgs+0xae/0x146
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b