Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-1160.15.2.el7
Executable
unknown
First occurrence
2021-10-08
Last occurrence
2021-10-28
Unique reports
1
Quality
-42

Statistics

Operating system Unique / Total count
CentOS 7 1 / 4
Operating system Count
CentOS 7 4
Architecture Count
x86_64 4
Related packages Count
kernel 4
 0:3.10.0-1160.15.2.el7 4

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffffac11b895
Build id: 3.10.0-1160.15.2.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffffac1230a1
Build id: 3.10.0-1160.15.2.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffffac124204
Build id: 3.10.0-1160.15.2.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffffac580f36
Build id: 3.10.0-1160.15.2.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffffac10b85f
Build id: 3.10.0-1160.15.2.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffffac1136c3
Build id: 3.10.0-1160.15.2.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffffac1089b2
Build id: 3.10.0-1160.15.2.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffffac059aa2
Build id: 3.10.0-1160.15.2.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffffac059b38
Build id: 3.10.0-1160.15.2.el7.x86_64
0x18
10
link_path_walk
vmlinux 0xffffffffac05c021
Build id: 3.10.0-1160.15.2.el7.x86_64
0x81
11
? __schedule
vmlinux 0xffffffffac587af2
Build id: 3.10.0-1160.15.2.el7.x86_64
0x5a2
12
? kmem_cache_alloc_trace
vmlinux 0xffffffffac028ba6
Build id: 3.10.0-1160.15.2.el7.x86_64
0x1d6
13
path_openat
vmlinux 0xffffffffac05ee0e
Build id: 3.10.0-1160.15.2.el7.x86_64
0xae
14
? __schedule
vmlinux 0xffffffffac5878ff
Build id: 3.10.0-1160.15.2.el7.x86_64
0x3af
15
do_filp_open
vmlinux 0xffffffffac06107d
Build id: 3.10.0-1160.15.2.el7.x86_64
0x4d
16
? __alloc_fd
vmlinux 0xffffffffac06f177
Build id: 3.10.0-1160.15.2.el7.x86_64
0x47
17
do_sys_open
vmlinux 0xffffffffac04cbc4
Build id: 3.10.0-1160.15.2.el7.x86_64
0x124
18
SyS_open
vmlinux 0xffffffffac04ccde
Build id: 3.10.0-1160.15.2.el7.x86_64
0x1e
19
system_call_fastpath
vmlinux 0xffffffffac594f92
Build id: 3.10.0-1160.15.2.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#4 stuck for 40s! [irqbalance:1038]
Modules linked in: xt_multiport tcp_lp nf_conntrack_netlink xt_addrtype br_netfilter xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink binfmt_misc overlay(T) ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock sunrpc sb_edac iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd sg ppdev vmw_balloon pcspkr joydev i2c_piix4 parport_pc
parport vmw_vmci ip_tables xfs libcrc32c ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops crct10dif_pclmul ttm crct10dif_common ahci crc32c_intel nfit libahci serio_raw ata_piix libnvdimm drm libata vmxnet3 vmw_pvscsi drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 4 PID: 1038 Comm: irqbalance Kdump: loaded Tainted: G             L ------------ T 3.10.0-1160.15.2.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
task: ffff8a4a27fd5280 ti: ffff8a4a06bc8000 task.ti: ffff8a4a06bc8000
RIP: 0010:[<ffffffffac11b895>]  [<ffffffffac11b895>] avtab_search_node+0x55/0x90
RSP: 0018:ffff8a4a06bcba60  EFLAGS: 00000212
RAX: ffff8a49da019ee8 RBX: 0000000000001000 RCX: 0000000000000403
RDX: 0000000000000cd0 RSI: 0000000000000007 RDI: ffffffffad04c6c8
RBP: ffff8a4a06bcba60 R08: 0000000000000707 R09: ffff8a4a5105c000
R10: 0000000000001013 R11: 0000000000000004 R12: ffff8a4a06bcb9f8
R13: ffff8a4a06bcba40 R14: ffff8a507fd1fd08 R15: ffff8a4a06bcba40
FS:  00007f9776579780(0000) GS:ffff8a507fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055800f280f20 CR3: 00000001577d2000 CR4: 00000000003607e0
Call Trace:
[<ffffffffac1230a1>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffffac124204>] security_compute_av+0x104/0x2f0
[<ffffffffac580f36>] avc_compute_av+0x41/0x1e4
[<ffffffffac10b85f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffffac1136c3>] selinux_inode_permission+0xe3/0x1b0
[<ffffffffac1089b2>] security_inode_permission+0x22/0x30
[<ffffffffac059aa2>] __inode_permission+0x52/0xd0
[<ffffffffac059b38>] inode_permission+0x18/0x50
[<ffffffffac05c021>] link_path_walk+0x81/0x8b0
[<ffffffffac587af2>] ? __schedule+0x5a2/0x860
[<ffffffffac028ba6>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffffac05ee0e>] path_openat+0xae/0x5a0
[<ffffffffac5878ff>] ? __schedule+0x3af/0x860
[<ffffffffac06107d>] do_filp_open+0x4d/0xb0
[<ffffffffac06f177>] ? __alloc_fd+0x47/0x170
[<ffffffffac04cbc4>] do_sys_open+0x124/0x220
[<ffffffffac04ccde>] SyS_open+0x1e/0x20
[<ffffffffac594f92>] system_call_fastpath+0x25/0x2a
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b