Kerneloops

Similar reports
Problem #620990
Component
kernel Tainted
Last affected version
0:3.10.0-1160.36.2.el7
Executable
unknown
First occurrence
2021-10-13
Last occurrence
2021-10-13
Unique reports
1
Quality
-43

Statistics

Operating system Unique / Total count
CentOS 7 1 / 2
Operating system Count
CentOS 7 2
Architecture Count
x86_64 2
Related packages Count
kernel 2
 0:3.10.0-1160.36.2.el7 2

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff8f71be85
Build id: 3.10.0-1160.36.2.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffff8f723671
Build id: 3.10.0-1160.36.2.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffff8f7247d4
Build id: 3.10.0-1160.36.2.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffff8fb824d5
Build id: 3.10.0-1160.36.2.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffff8f70be4f
Build id: 3.10.0-1160.36.2.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffff8f713cb3
Build id: 3.10.0-1160.36.2.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffff8f708fa2
Build id: 3.10.0-1160.36.2.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffff8f65a062
Build id: 3.10.0-1160.36.2.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffff8f65a0f8
Build id: 3.10.0-1160.36.2.el7.x86_64
0x18
10
link_path_walk
vmlinux 0xffffffff8f65c7de
Build id: 3.10.0-1160.36.2.el7.x86_64
0x27e
11
? kmem_cache_alloc_trace
vmlinux 0xffffffff8f629376
Build id: 3.10.0-1160.36.2.el7.x86_64
0x1d6
12
path_openat
vmlinux 0xffffffff8f65f3ce
Build id: 3.10.0-1160.36.2.el7.x86_64
0xae
13
do_filp_open
vmlinux 0xffffffff8f66163d
Build id: 3.10.0-1160.36.2.el7.x86_64
0x4d
14
? __alloc_fd
vmlinux 0xffffffff8f66f737
Build id: 3.10.0-1160.36.2.el7.x86_64
0x47
15
do_sys_open
vmlinux 0xffffffff8f64d3d4
Build id: 3.10.0-1160.36.2.el7.x86_64
0x124
16
? system_call_after_swapgs
vmlinux 0xffffffff8fb95ec9
Build id: 3.10.0-1160.36.2.el7.x86_64
0x96
17
SyS_open
vmlinux 0xffffffff8f64d4ee
Build id: 3.10.0-1160.36.2.el7.x86_64
0x1e
18
system_call_fastpath
vmlinux 0xffffffff8fb95f92
Build id: 3.10.0-1160.36.2.el7.x86_64
0x25
19
? system_call_after_swapgs
vmlinux 0xffffffff8fb95ed5
Build id: 3.10.0-1160.36.2.el7.x86_64
0xa2
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 899s! [systemd-logind:16061]
Modules linked in: tcp_lp nls_utf8 isofs xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables devlink iptable_filter sunrpc intel_powerclamp crc32_pclmul vboxvideo(OE) ttm ghash_clmulni_intel snd_intel8x0 snd_ac97_codec drm_kms_helper ac97_bus snd_seq snd_seq_device syscopyarea joydev sysfillrect sysimgblt fb_sys_fops snd_pcm ppdev aesni_intel drm lrw gf128mul glue_helper ablk_helper snd_timer cryptd sg snd pcspkr vboxguest(OE) i2c_piix4 soundcore drm_panel_orientation_quirks parport_pc parport video binfmt_misc ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic sr_mod cdrom ata_generic
pata_acpi ahci libahci ata_piix libata e1000 crct10dif_pclmul crct10dif_common crc32c_intel serio_raw dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 0 PID: 16061 Comm: systemd-logind Kdump: loaded Tainted: G           OEL ------------   3.10.0-1160.36.2.el7.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
task: ffff99e6421b6300 ti: ffff99e5d6e70000 task.ti: ffff99e5d6e70000
RIP: 0010:[<ffffffff8f71be85>]  [<ffffffff8f71be85>] avtab_search_node+0x55/0x90
RSP: 0018:ffff99e5d6e73a60  EFLAGS: 00000212
RAX: ffff99e5cfcd2198 RBX: ffffffff8fb8218f RCX: 0000000000000134
RDX: 0000000000000cd9 RSI: 0000000000000007 RDI: ffffffff9064b6c8
RBP: ffff99e5d6e73a60 R08: 0000000000000707 R09: ffff99e5cfc94000
R10: 00000000000004d7 R11: fffffb94028481c0 R12: 0000000000000000
R13: ffff99e500000001 R14: 000000019064b5e0 R15: ffff99e5d6e73ab0
FS:  00007f57c62e2900(0000) GS:ffff99e6dfc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055e58c7bab6e CR3: 00000001548ea000 CR4: 00000000000606f0
Call Trace:
[<ffffffff8f723671>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffff8f7247d4>] security_compute_av+0x104/0x2f0
[<ffffffff8fb824d5>] avc_compute_av+0x41/0x1e4
[<ffffffff8f70be4f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffff8f713cb3>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff8f708fa2>] security_inode_permission+0x22/0x30
[<ffffffff8f65a062>] __inode_permission+0x52/0xd0
[<ffffffff8f65a0f8>] inode_permission+0x18/0x50
[<ffffffff8f65c7de>] link_path_walk+0x27e/0x8b0
[<ffffffff8f629376>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffff8f65f3ce>] path_openat+0xae/0x5a0
[<ffffffff8f66163d>] do_filp_open+0x4d/0xb0
[<ffffffff8f66f737>] ? __alloc_fd+0x47/0x170
[<ffffffff8f64d3d4>] do_sys_open+0x124/0x220
[<ffffffff8fb95ec9>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8f64d4ee>] SyS_open+0x1e/0x20
[<ffffffff8fb95f92>] system_call_fastpath+0x25/0x2a
[<ffffffff8fb95ed5>] ? system_call_after_swapgs+0xa2/0x13a
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b