Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-862.el7
Executable
unknown
First occurrence
2020-12-26
Last occurrence
2020-12-26
Unique reports
1
Quality
-41

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-862.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffffa4ee1f23
Build id: 3.10.0-862.el7.x86_64
0x53
2
context_struct_compute_av
vmlinux 0xffffffffa4ee94e9
Build id: 3.10.0-862.el7.x86_64
0x1a9
3
security_compute_av
vmlinux 0xffffffffa4ee9fc9
Build id: 3.10.0-862.el7.x86_64
0xf9
4
avc_compute_av
vmlinux 0xffffffffa530c901
Build id: 3.10.0-862.el7.x86_64
0x34
5
avc_has_perm_noaudit
vmlinux 0xffffffffa4ed2db3
Build id: 3.10.0-862.el7.x86_64
0xc3
6
? __find_get_page
vmlinux 0xffffffffa4d9346e
Build id: 3.10.0-862.el7.x86_64
0x1e
7
selinux_inode_permission
vmlinux 0xffffffffa4ed6293
Build id: 3.10.0-862.el7.x86_64
0xe3
8
security_inode_permission
vmlinux 0xffffffffa4ed0632
Build id: 3.10.0-862.el7.x86_64
0x22
9
__inode_permission
vmlinux 0xffffffffa4e26992
Build id: 3.10.0-862.el7.x86_64
0x52
10
inode_permission
vmlinux 0xffffffffa4e26a28
Build id: 3.10.0-862.el7.x86_64
0x18
11
may_open
vmlinux 0xffffffffa4e26ac8
Build id: 3.10.0-862.el7.x86_64
0x68
12
do_last
vmlinux 0xffffffffa4e2aae7
Build id: 3.10.0-862.el7.x86_64
0x1b7
13
path_openat
vmlinux 0xffffffffa4e2bcc7
Build id: 3.10.0-862.el7.x86_64
0xd7
14
? handle_pte_fault
vmlinux 0xffffffffa4dc52dc
Build id: 3.10.0-862.el7.x86_64
0x2dc
15
do_filp_open
vmlinux 0xffffffffa4e2d85d
Build id: 3.10.0-862.el7.x86_64
0x4d
16
? __alloc_fd
vmlinux 0xffffffffa4e3acd7
Build id: 3.10.0-862.el7.x86_64
0x47
17
do_sys_open
vmlinux 0xffffffffa4e19b67
Build id: 3.10.0-862.el7.x86_64
0x137
18
SyS_open
vmlinux 0xffffffffa4e19c8e
Build id: 3.10.0-862.el7.x86_64
0x1e
19
system_call_fastpath
vmlinux 0xffffffffa531f7d5
Build id: 3.10.0-862.el7.x86_64
0x1c
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [sh:29545]
Modules linked in: tcp_lp nls_utf8 isofs fuse xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter devlink vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event snd_ens1371 crc32_pclmul ghash_clmulni_intel snd_rawmidi snd_ac97_codec ac97_bus aesni_intel snd_seq ppdev lrw gf128mul snd_seq_device glue_helper ablk_helper cryptd snd_pcm vmw_balloon pcspkr snd_timer snd soundcore joydev sg parport_pc parport shpchp i2c_piix4 vmw_vmci ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx sd_mod crc_t10dif crct10dif_generic drm_kms_helper syscopyarea sysfillrect
sysimgblt fb_sys_fops ttm drm crct10dif_pclmul ata_piix crct10dif_common crc32c_intel libata mptspi scsi_transport_spi serio_raw mptscsih e1000 mptbase i2c_core floppy dm_mirror dm_region_hash dm_log dm_mod
CPU: 0 PID: 29545 Comm: sh Kdump: loaded Tainted: G             L ------------   3.10.0-862.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/31/2013
task: ffff9a96edf49fa0 ti: ffff9a96f3a08000 task.ti: ffff9a96f3a08000
RIP: 0010:[<ffffffffa4ee1f23>]  [<ffffffffa4ee1f23>] avtab_search_node+0x53/0x90
RSP: 0018:ffff9a96f3a0bab8  EFLAGS: 00000206
RAX: ffff9a96e155cee8 RBX: 0000000000000030 RCX: 000000000000014a
RDX: 000000000000120b RSI: 0000000000000006 RDI: ffffffffa5e07e08
RBP: ffff9a96f3a0bab8 R08: 0000000000000007 R09: ffff9a96e1558000
R10: 000000000000052e R11: ffff9a96dfa6c600 R12: ffff9a96d6333d68
R13: fffff584000001c1 R14: ffff9a96fffdb008 R15: 0000000000000000
FS:  00007f4bf5802740(0000) GS:ffff9a96fb600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4bf4eec750 CR3: 000000008b7c8000 CR4: 00000000001406f0
Call Trace:
[<ffffffffa4ee94e9>] context_struct_compute_av+0x1a9/0x470
[<ffffffffa4ee9fc9>] security_compute_av+0xf9/0x2e0
[<ffffffffa530c901>] avc_compute_av+0x34/0x1b5
[<ffffffffa4ed2db3>] avc_has_perm_noaudit+0xc3/0x110
[<ffffffffa4d9346e>] ? __find_get_page+0x1e/0xa0
[<ffffffffa4ed6293>] selinux_inode_permission+0xe3/0x1b0
[<ffffffffa4ed0632>] security_inode_permission+0x22/0x30
[<ffffffffa4e26992>] __inode_permission+0x52/0xd0
[<ffffffffa4e26a28>] inode_permission+0x18/0x50
[<ffffffffa4e26ac8>] may_open+0x68/0x120
[<ffffffffa4e2aae7>] do_last+0x1b7/0x12c0
[<ffffffffa4e2bcc7>] path_openat+0xd7/0x640
[<ffffffffa4dc52dc>] ? handle_pte_fault+0x2dc/0xc30
[<ffffffffa4e2d85d>] do_filp_open+0x4d/0xb0
[<ffffffffa4e3acd7>] ? __alloc_fd+0x47/0x170
[<ffffffffa4e19b67>] do_sys_open+0x137/0x240
[<ffffffffa4e19c8e>] SyS_open+0x1e/0x20
[<ffffffffa531f7d5>] system_call_fastpath+0x1c/0x21
Code: 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 <74> 13 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00