Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-1160.36.2.el7
Executable
unknown
First occurrence
2021-12-17
Last occurrence
2021-12-17
Unique reports
1
Quality
-45

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.36.2.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff83b1be85
Build id: 3.10.0-1160.36.2.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffff83b23671
Build id: 3.10.0-1160.36.2.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffff83b247d4
Build id: 3.10.0-1160.36.2.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffff83f824d5
Build id: 3.10.0-1160.36.2.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffff83b0be4f
Build id: 3.10.0-1160.36.2.el7.x86_64
0xcf
6
? page_fault
vmlinux 0xffffffff83f8c778
Build id: 3.10.0-1160.36.2.el7.x86_64
0x28
7
selinux_inode_permission
vmlinux 0xffffffff83b13cb3
Build id: 3.10.0-1160.36.2.el7.x86_64
0xe3
8
security_inode_permission
vmlinux 0xffffffff83b08fa2
Build id: 3.10.0-1160.36.2.el7.x86_64
0x22
9
__inode_permission
vmlinux 0xffffffff83a5a062
Build id: 3.10.0-1160.36.2.el7.x86_64
0x52
10
inode_permission
vmlinux 0xffffffff83a5a0f8
Build id: 3.10.0-1160.36.2.el7.x86_64
0x18
11
link_path_walk
vmlinux 0xffffffff83a5c7de
Build id: 3.10.0-1160.36.2.el7.x86_64
0x27e
12
? kmem_cache_alloc_trace
vmlinux 0xffffffff83a29376
Build id: 3.10.0-1160.36.2.el7.x86_64
0x1d6
13
path_openat
vmlinux 0xffffffff83a5f3ce
Build id: 3.10.0-1160.36.2.el7.x86_64
0xae
14
? arch_tlb_finish_mmu
vmlinux 0xffffffff839f0127
Build id: 3.10.0-1160.36.2.el7.x86_64
0x47
15
? unmap_region
vmlinux 0xffffffff839f9a34
Build id: 3.10.0-1160.36.2.el7.x86_64
0xf4
16
do_filp_open
vmlinux 0xffffffff83a6163d
Build id: 3.10.0-1160.36.2.el7.x86_64
0x4d
17
? __alloc_fd
vmlinux 0xffffffff83a6f737
Build id: 3.10.0-1160.36.2.el7.x86_64
0x47
18
do_sys_open
vmlinux 0xffffffff83a4d3d4
Build id: 3.10.0-1160.36.2.el7.x86_64
0x124
19
SyS_open
vmlinux 0xffffffff83a4d4ee
Build id: 3.10.0-1160.36.2.el7.x86_64
0x1e
20
system_call_fastpath
vmlinux 0xffffffff83f95f92
Build id: 3.10.0-1160.36.2.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [polkitd:749]
Modules linked in: tcp_lp xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev hv_utils ptp sg hv_balloon pps_core pcspkr i2c_piix4 ip_tables xfs dm_thin_pool dm_persistent_data dm_bio_prison dm_bufio libcrc32c sr_mod cdrom ata_generic pata_acpi sd_mod
crc_t10dif crct10dif_generic ata_piix hv_netvsc hv_storvsc scsi_transport_fc hyperv_keyboard hid_hyperv scsi_tgt libata hyperv_fb crct10dif_pclmul crct10dif_common crc32c_intel floppy serio_raw hv_vmbus dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 0 PID: 749 Comm: polkitd Kdump: loaded Tainted: G             L ------------   3.10.0-1160.36.2.el7.x86_64 #1
Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008  12/07/2018
task: ffff9d86b7a48000 ti: ffff9d86b7a50000 task.ti: ffff9d86b7a50000
RIP: 0010:[<ffffffff83b1be85>]  [<ffffffff83b1be85>] avtab_search_node+0x55/0x90
RSP: 0018:ffff9d86b7a53a60  EFLAGS: 00000202
RAX: ffff9d86b47b7a50 RBX: ffff9d86b6605510 RCX: 0000000000001212
RDX: 0000000000000cd9 RSI: 0000000000000007 RDI: ffffffff84a4b6c8
RBP: ffff9d86b7a53a60 R08: 0000000000000707 R09: ffff9d86b7940000
R10: 000000000000484f R11: 0000000000000004 R12: ffffe274004407c0
R13: ffff9d86b8ac3200 R14: 0000000000000001 R15: 0000000000000001
FS:  00007fc3fc6d5900(0000) GS:ffff9d86c1c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc3fc6f3000 CR3: 00000001f887e000 CR4: 00000000003606f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
[<ffffffff83b23671>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffff83b247d4>] security_compute_av+0x104/0x2f0
[<ffffffff83f824d5>] avc_compute_av+0x41/0x1e4
[<ffffffff83b0be4f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffff83f8c778>] ? page_fault+0x28/0x30
[<ffffffff83b13cb3>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff83b08fa2>] security_inode_permission+0x22/0x30
[<ffffffff83a5a062>] __inode_permission+0x52/0xd0
[<ffffffff83a5a0f8>] inode_permission+0x18/0x50
[<ffffffff83a5c7de>] link_path_walk+0x27e/0x8b0
[<ffffffff83a29376>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffff83a5f3ce>] path_openat+0xae/0x5a0
[<ffffffff839f0127>] ? arch_tlb_finish_mmu+0x47/0x80
[<ffffffff839f9a34>] ? unmap_region+0xf4/0x140
[<ffffffff83a6163d>] do_filp_open+0x4d/0xb0
[<ffffffff83a6f737>] ? __alloc_fd+0x47/0x170
[<ffffffff83a4d3d4>] do_sys_open+0x124/0x220
[<ffffffff83a4d4ee>] SyS_open+0x1e/0x20
[<ffffffff83f95f92>] system_call_fastpath+0x25/0x2a
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b