Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-1160.11.1.el7
Executable
unknown
First occurrence
2021-03-30
Last occurrence
2021-03-30
Unique reports
1
Quality
-41

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.11.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffffa5b1b705
Build id: 3.10.0-1160.11.1.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffffa5b22f11
Build id: 3.10.0-1160.11.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffffa5b24074
Build id: 3.10.0-1160.11.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffffa5f7ff26
Build id: 3.10.0-1160.11.1.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffffa5b0b6cf
Build id: 3.10.0-1160.11.1.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffffa5b13533
Build id: 3.10.0-1160.11.1.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffffa5b08822
Build id: 3.10.0-1160.11.1.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffffa5a59aa2
Build id: 3.10.0-1160.11.1.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffffa5a59b38
Build id: 3.10.0-1160.11.1.el7.x86_64
0x18
10
may_open
vmlinux 0xffffffffa5a59cea
Build id: 3.10.0-1160.11.1.el7.x86_64
0x5a
11
do_last
vmlinux 0xffffffffa5a5dbe0
Build id: 3.10.0-1160.11.1.el7.x86_64
0x1c0
12
? kmem_cache_alloc_trace
vmlinux 0xffffffffa5a28ba6
Build id: 3.10.0-1160.11.1.el7.x86_64
0x1d6
13
path_openat
vmlinux 0xffffffffa5a5ee2d
Build id: 3.10.0-1160.11.1.el7.x86_64
0xcd
14
? do_page_fault
vmlinux 0xffffffffa5f8e975
Build id: 3.10.0-1160.11.1.el7.x86_64
0x35
15
do_filp_open
vmlinux 0xffffffffa5a6107d
Build id: 3.10.0-1160.11.1.el7.x86_64
0x4d
16
? __alloc_fd
vmlinux 0xffffffffa5a6f177
Build id: 3.10.0-1160.11.1.el7.x86_64
0x47
17
do_sys_open
vmlinux 0xffffffffa5a4cbc4
Build id: 3.10.0-1160.11.1.el7.x86_64
0x124
18
SyS_open
vmlinux 0xffffffffa5a4ccde
Build id: 3.10.0-1160.11.1.el7.x86_64
0x1e
19
system_call_fastpath
vmlinux 0xffffffffa5f93f92
Build id: 3.10.0-1160.11.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#3 stuck for 21s! [systemd:1]
Modules linked in: ebtable_filter ebtables ip6table_filter ip6_tables devlink binfmt_misc overlay ipt_REJECT nf_reject_ipv4 xt_conntrack xt_multiport iptable_filter iptable_raw iptable_security iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 xt_REDIRECT nf_nat_redirect xt_addrtype iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack sunrpc intel_pmc_core iTCO_wdt ipmi_ssif intel_powerclamp coretemp intel_rapl iTCO_vendor_support ipmi_si ipmi_devintf ipmi_msghandler iosf_mbi kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr sg video pinctrl_sunrisepoint pinctrl_intel mei_me mei tpm_crb i2c_i801 ie31200_edac acpi_power_meter ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic
ast drm_kms_helper ahci syscopyarea sysfillrect sysimgblt fb_sys_fops ttm libahci crct10dif_pclmul crct10dif_common crc32c_intel drm libata igb uas ptp pps_core dca i2c_algo_bit drm_panel_orientation_quirks usb_storage i2c_hid dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 3 PID: 1 Comm: systemd Tainted: G             L ------------   3.10.0-1160.11.1.el7.x86_64 #1
Hardware name: LENOVO ThinkServer TS460               /ThinkServer TS460               , BIOS TB1TS298 05/29/2020
task: ffff9e4db1f50000 ti: ffff9e4db175c000 task.ti: ffff9e4db175c000
RIP: 0010:[<ffffffffa5b1b705>]  [<ffffffffa5b1b705>] avtab_search_node+0x55/0x90
RSP: 0018:ffff9e4db175fa40  EFLAGS: 00000216
RAX: ffff9e4da8781d50 RBX: 0000000000000134 RCX: 0000000000000a43
RDX: 0000000000001207 RSI: 0000000000000006 RDI: ffffffffa6a4c6c8
RBP: ffff9e4db175fa40 R08: 0000000000000707 R09: ffff9e4da1790000
R10: 0000000000002912 R11: 0000000000000000 R12: 0000000000000707
R13: ffff9e4d8d3c8000 R14: 00000000000004d6 R15: 0000000000000000
FS:  00007fce85477940(0000) GS:ffff9e54afd80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fce8548c000 CR3: 000000017c76a000 CR4: 00000000003607e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
[<ffffffffa5b22f11>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffffa5b24074>] security_compute_av+0x104/0x2f0
[<ffffffffa5f7ff26>] avc_compute_av+0x41/0x1e4
[<ffffffffa5b0b6cf>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffffa5b13533>] selinux_inode_permission+0xe3/0x1b0
[<ffffffffa5b08822>] security_inode_permission+0x22/0x30
[<ffffffffa5a59aa2>] __inode_permission+0x52/0xd0
[<ffffffffa5a59b38>] inode_permission+0x18/0x50
[<ffffffffa5a59cea>] may_open+0x5a/0x120
[<ffffffffa5a5dbe0>] do_last+0x1c0/0x1340
[<ffffffffa5a28ba6>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffffa5a5ee2d>] path_openat+0xcd/0x5a0
[<ffffffffa5f8e975>] ? do_page_fault+0x35/0x90
[<ffffffffa5a6107d>] do_filp_open+0x4d/0xb0
[<ffffffffa5a6f177>] ? __alloc_fd+0x47/0x170
[<ffffffffa5a4cbc4>] do_sys_open+0x124/0x220
[<ffffffffa5a4ccde>] SyS_open+0x1e/0x20
[<ffffffffa5f93f92>] system_call_fastpath+0x25/0x2a
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b