Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-1160.el7
Executable
unknown
First occurrence
2021-06-19
Last occurrence
2024-12-11
Unique reports
3
Quality
-41

Statistics

Operating system Unique / Total count
CentOS 7 3 / 3
Operating system Count
CentOS 7 3
Architecture Count
x86_64 3
Related packages Count
kernel 3
 0:3.10.0-1160.36.2.el7 1
 0:3.10.0-1160.el7 1
 0:3.10.0-1160.31.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff88f1b500
Build id: 3.10.0-1160.el7.x86_64
0x50
2
context_struct_compute_av
vmlinux 0xffffffff88f22d11
Build id: 3.10.0-1160.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffff88f23e74
Build id: 3.10.0-1160.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffff893802bc
Build id: 3.10.0-1160.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffff88f0b4ef
Build id: 3.10.0-1160.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffff88f13333
Build id: 3.10.0-1160.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffff88f08642
Build id: 3.10.0-1160.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffff88e598c2
Build id: 3.10.0-1160.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffff88e59958
Build id: 3.10.0-1160.el7.x86_64
0x18
10
may_open
vmlinux 0xffffffff88e59b0a
Build id: 3.10.0-1160.el7.x86_64
0x5a
11
do_last
vmlinux 0xffffffff88e5da00
Build id: 3.10.0-1160.el7.x86_64
0x1c0
12
? kmem_cache_alloc_trace
vmlinux 0xffffffff88e289c6
Build id: 3.10.0-1160.el7.x86_64
0x1d6
13
path_openat
vmlinux 0xffffffff88e5ec4d
Build id: 3.10.0-1160.el7.x86_64
0xcd
14
? do_read_fault.isra.63
vmlinux 0xffffffff88dee4d9
Build id: 3.10.0-1160.el7.x86_64
0x139
15
do_filp_open
vmlinux 0xffffffff88e60e9d
Build id: 3.10.0-1160.el7.x86_64
0x4d
16
? __alloc_fd
vmlinux 0xffffffff88e6ef97
Build id: 3.10.0-1160.el7.x86_64
0x47
17
do_sys_open
vmlinux 0xffffffff88e4c9e4
Build id: 3.10.0-1160.el7.x86_64
0x124
18
SyS_open
vmlinux 0xffffffff88e4cafe
Build id: 3.10.0-1160.el7.x86_64
0x1e
19
system_call_fastpath
vmlinux 0xffffffff89393f92
Build id: 3.10.0-1160.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#3 stuck for 24s! [crond:86717]
INFO: rcu_sched detected stalls on CPUs/tasks: { 1} 
Modules linked in:
tcp_lp nls_utf8 isofs rfcomm xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables devlink ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock bnep sunrpc snd_seq_midi snd_seq_midi_event iosf_mbi crc32_pclmul ppdev ghash_clmulni_intel btusb btrtl btbcm btintel aesni_intel snd_ens1371 vmw_balloon lrw gf128mul glue_helper ablk_helper snd_rawmidi cryptd bluetooth snd_ac97_codec ac97_bus snd_seq snd_seq_device sg joydev pcspkr snd_pcm rfkill snd_timer snd vmw_vmci soundcore i2c_piix4 parport_pc parport binfmt_misc ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi
vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm nfit ata_piix libnvdimm drm libata mptspi e1000 scsi_transport_spi crct10dif_pclmul crct10dif_common mptscsih crc32c_intel mptbase serio_raw drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 3 PID: 86717 Comm: crond Kdump: loaded Tainted: G             L ------------   3.10.0-1160.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/22/2020
task: ffff956887b3a100 ti: ffff956895570000 task.ti: ffff956895570000
RIP: 0010:[<ffffffff88f1b500>]  [<ffffffff88f1b500>] avtab_search_node+0x50/0x90
RSP: 0018:ffff956895573a40  EFLAGS: 00010282
RAX: ffff9568f1a92a08 RBX: 0000000000000001 RCX: 00000000000009f9
RDX: 0000000000000dd9 RSI: 0000000000000006 RDI: ffffffff89e4c6c8
RBP: ffff956895573a40 R08: 0000000000000707 R09: ffff9568b4f80000
R10: 00000000000027ea R11: 000000000000000d R12: ffffe782002178c0
R13: 0000000100000001 R14: ffff956887b3a100 R15: 0000000000000000
FS:  00007f590b699840(0000) GS:ffff9568fb6c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f590b4990a0 CR3: 0000000001004000 CR4: 00000000003607e0
Call Trace:
[<ffffffff88f22d11>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffff88f23e74>] security_compute_av+0x104/0x2f0
[<ffffffff893802bc>] avc_compute_av+0x41/0x1e4
[<ffffffff88f0b4ef>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffff88f13333>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff88f08642>] security_inode_permission+0x22/0x30
[<ffffffff88e598c2>] __inode_permission+0x52/0xd0
[<ffffffff88e59958>] inode_permission+0x18/0x50
[<ffffffff88e59b0a>] may_open+0x5a/0x120
[<ffffffff88e5da00>] do_last+0x1c0/0x1340
[<ffffffff88e289c6>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffff88e5ec4d>] path_openat+0xcd/0x5a0
[<ffffffff88dee4d9>] ? do_read_fault.isra.63+0x139/0x1b0
[<ffffffff88e60e9d>] do_filp_open+0x4d/0xb0
[<ffffffff88e6ef97>] ? __alloc_fd+0x47/0x170
[<ffffffff88e4c9e4>] do_sys_open+0x124/0x220
[<ffffffff88e4cafe>] SyS_open+0x1e/0x20
[<ffffffff89393f92>] system_call_fastpath+0x25/0x2a
Code: b7 4e 02 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 <66> 3b 10 74 13 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f