Kerneloops

Similar reports
Problem #620990
Component
kernel Tainted
Last affected version
0:3.10.0-862.11.6.el7
Executable
unknown
First occurrence
2021-11-19
Last occurrence
2021-11-19
Unique reports
1
Quality
-45

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-862.11.6.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff87ce6945
Build id: 3.10.0-862.11.6.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffff87cedf09
Build id: 3.10.0-862.11.6.el7.x86_64
0x1a9
3
security_compute_av
vmlinux 0xffffffff87cee9e9
Build id: 3.10.0-862.11.6.el7.x86_64
0xf9
4
avc_compute_av
vmlinux 0xffffffff8811276d
Build id: 3.10.0-862.11.6.el7.x86_64
0x34
5
avc_has_perm_noaudit
vmlinux 0xffffffff87cd77d3
Build id: 3.10.0-862.11.6.el7.x86_64
0xc3
6
? __inode_permission
vmlinux 0xffffffff87c2ae32
Build id: 3.10.0-862.11.6.el7.x86_64
0x52
7
selinux_inode_permission
vmlinux 0xffffffff87cdacb3
Build id: 3.10.0-862.11.6.el7.x86_64
0xe3
8
security_inode_permission
vmlinux 0xffffffff87cd5052
Build id: 3.10.0-862.11.6.el7.x86_64
0x22
9
__inode_permission
vmlinux 0xffffffff87c2ae32
Build id: 3.10.0-862.11.6.el7.x86_64
0x52
10
inode_permission
vmlinux 0xffffffff87c2aec8
Build id: 3.10.0-862.11.6.el7.x86_64
0x18
11
may_open
vmlinux 0xffffffff87c2af68
Build id: 3.10.0-862.11.6.el7.x86_64
0x68
12
do_last
vmlinux 0xffffffff87c2ef87
Build id: 3.10.0-862.11.6.el7.x86_64
0x1b7
13
path_openat
vmlinux 0xffffffff87c30167
Build id: 3.10.0-862.11.6.el7.x86_64
0xd7
14
do_filp_open
vmlinux 0xffffffff87c31cfd
Build id: 3.10.0-862.11.6.el7.x86_64
0x4d
15
? __alloc_fd
vmlinux 0xffffffff87c3f124
Build id: 3.10.0-862.11.6.el7.x86_64
0xc4
16
do_sys_open
vmlinux 0xffffffff87c1e017
Build id: 3.10.0-862.11.6.el7.x86_64
0x137
17
? system_call_after_swapgs
vmlinux 0xffffffff881256d5
Build id: 3.10.0-862.11.6.el7.x86_64
0xa2
18
SyS_open
vmlinux 0xffffffff87c1e13e
Build id: 3.10.0-862.11.6.el7.x86_64
0x1e
19
system_call_fastpath
vmlinux 0xffffffff8812579b
Build id: 3.10.0-862.11.6.el7.x86_64
0x22
20
? system_call_after_swapgs
vmlinux 0xffffffff881256e1
Build id: 3.10.0-862.11.6.el7.x86_64
0xae
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 304s! [pgrep:4948]
Modules linked in: nls_utf8 isofs fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc intel_powerclamp vboxvideo(OE) crc32_pclmul ttm snd_intel8x0 ghash_clmulni_intel snd_ac97_codec drm_kms_helper ac97_bus snd_seq syscopyarea ppdev sysfillrect joydev sysimgblt fb_sys_fops aesni_intel snd_seq_device drm lrw gf128mul glue_helper ablk_helper cryptd
snd_pcm sg pcspkr snd_timer snd parport_pc i2c_piix4 parport video vboxguest(OE) i2c_core soundcore ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi ahci libahci ata_piix libata e1000 crct10dif_pclmul crct10dif_common crc32c_intel serio_raw dm_mirror dm_region_hash dm_log dm_mod
CPU: 0 PID: 4948 Comm: pgrep Kdump: loaded Tainted: G           OE  ------------   3.10.0-862.11.6.el7.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
task: ffff967f805e2f70 ti: ffff967fa3cb8000 task.ti: ffff967fa3cb8000
RIP: 0010:[<ffffffff87ce6945>]  [<ffffffff87ce6945>] avtab_search_node+0x55/0x90
RSP: 0018:ffff967fa3cbbab8  EFLAGS: 00000212
RAX: ffff967fa3fd0390 RBX: ffff967fbffc9800 RCX: 0000000000000cca
RDX: 0000000000000cc6 RSI: 0000000000000006 RDI: ffffffff88c08e08
RBP: ffff967fa3cbbab8 R08: 0000000000000007 R09: ffff967fa3f78000
R10: 000000000000332e R11: ffff967fb93fe240 R12: ffff967f00000141
R13: ffff967fbffcb008 R14: 0000000000000000 R15: ffff967fbffcb000
FS:  00007f2ee6ef3880(0000) GS:ffff967fbfc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f285d50d229 CR3: 000000001f87c000 CR4: 00000000000606f0
Call Trace:
[<ffffffff87cedf09>] context_struct_compute_av+0x1a9/0x470
[<ffffffff87cee9e9>] security_compute_av+0xf9/0x2e0
[<ffffffff8811276d>] avc_compute_av+0x34/0x1b5
[<ffffffff87cd77d3>] avc_has_perm_noaudit+0xc3/0x110
[<ffffffff87c2ae32>] ? __inode_permission+0x52/0xd0
[<ffffffff87cdacb3>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff87cd5052>] security_inode_permission+0x22/0x30
[<ffffffff87c2ae32>] __inode_permission+0x52/0xd0
[<ffffffff87c2aec8>] inode_permission+0x18/0x50
[<ffffffff87c2af68>] may_open+0x68/0x120
[<ffffffff87c2ef87>] do_last+0x1b7/0x12c0
[<ffffffff87c30167>] path_openat+0xd7/0x640
[<ffffffff87c31cfd>] do_filp_open+0x4d/0xb0
[<ffffffff87c3f124>] ? __alloc_fd+0xc4/0x170
[<ffffffff87c1e017>] do_sys_open+0x137/0x240
[<ffffffff881256d5>] ? system_call_after_swapgs+0xa2/0x146
[<ffffffff87c1e13e>] SyS_open+0x1e/0x20
[<ffffffff8812579b>] system_call_fastpath+0x22/0x27
[<ffffffff881256e1>] ? system_call_after_swapgs+0xae/0x146
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b