Kerneloops

Similar reports
Problem #620990
Component
kernel Tainted
Last affected version
0:3.10.0-1160.49.1.el7
Executable
unknown
First occurrence
2021-12-30
Last occurrence
2021-12-30
Unique reports
1
Quality
-48

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.49.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffffb071bed5
Build id: 3.10.0-1160.49.1.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffffb07236c1
Build id: 3.10.0-1160.49.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffffb0724824
Build id: 3.10.0-1160.49.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffffb0b824b5
Build id: 3.10.0-1160.49.1.el7.x86_64
0x41
5
? mem_map_next.part.38
vmlinux 0xffffffffb0b80007
Build id: 3.10.0-1160.49.1.el7.x86_64
0x59
6
avc_has_perm_noaudit
vmlinux 0xffffffffb070be9f
Build id: 3.10.0-1160.49.1.el7.x86_64
0xcf
7
selinux_inode_permission
vmlinux 0xffffffffb0713d03
Build id: 3.10.0-1160.49.1.el7.x86_64
0xe3
8
security_inode_permission
vmlinux 0xffffffffb0708ff2
Build id: 3.10.0-1160.49.1.el7.x86_64
0x22
9
__inode_permission
vmlinux 0xffffffffb065a0b2
Build id: 3.10.0-1160.49.1.el7.x86_64
0x52
10
inode_permission
vmlinux 0xffffffffb065a148
Build id: 3.10.0-1160.49.1.el7.x86_64
0x18
11
may_open
vmlinux 0xffffffffb065a2fa
Build id: 3.10.0-1160.49.1.el7.x86_64
0x5a
12
do_last
vmlinux 0xffffffffb065e1f0
Build id: 3.10.0-1160.49.1.el7.x86_64
0x1c0
13
? kmem_cache_alloc_trace
vmlinux 0xffffffffb06293a6
Build id: 3.10.0-1160.49.1.el7.x86_64
0x1d6
14
path_openat
vmlinux 0xffffffffb065f43d
Build id: 3.10.0-1160.49.1.el7.x86_64
0xcd
15
do_filp_open
vmlinux 0xffffffffb066168d
Build id: 3.10.0-1160.49.1.el7.x86_64
0x4d
16
? __alloc_fd
vmlinux 0xffffffffb066f787
Build id: 3.10.0-1160.49.1.el7.x86_64
0x47
17
do_sys_open
vmlinux 0xffffffffb064d424
Build id: 3.10.0-1160.49.1.el7.x86_64
0x124
18
? system_call_after_swapgs
vmlinux 0xffffffffb0b95ec9
Build id: 3.10.0-1160.49.1.el7.x86_64
0x96
19
SyS_open
vmlinux 0xffffffffb064d53e
Build id: 3.10.0-1160.49.1.el7.x86_64
0x1e
20
system_call_fastpath
vmlinux 0xffffffffb0b95f92
Build id: 3.10.0-1160.49.1.el7.x86_64
0x25
21
? system_call_after_swapgs
vmlinux 0xffffffffb0b95ed5
Build id: 3.10.0-1160.49.1.el7.x86_64
0xa2
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 297s! [systemd:1]
Modules linked in: tcp_lp nls_utf8 isofs vboxsf(OE) xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc snd_intel8x0 snd_ac97_codec ac97_bus snd_seq joydev snd_seq_device ppdev snd_pcm sg snd_timer pcspkr snd vboxguest(OE) parport_pc parport video i2c_piix4 soundcore ip_tables xfs libcrc32c sr_mod cdrom ata_generic sd_mod crc_t10dif crct10dif_generic crct10dif_common
pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ahci ata_piix libahci libata drm e1000 crc32c_intel serio_raw drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 0 PID: 1 Comm: systemd Kdump: loaded Tainted: G           OE  ------------   3.10.0-1160.49.1.el7.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
task: ffffa0a198448000 ti: ffffa0a198444000 task.ti: ffffa0a198444000
RIP: 0010:[<ffffffffb071bed5>]  [<ffffffffb071bed5>] avtab_search_node+0x55/0x90
RSP: 0018:ffffa0a198447a40  EFLAGS: 00010287
RAX: ffffa0a15ab48630 RBX: ffffa0a1963fd540 RCX: 000000000000013c
RDX: 0000000000000126 RSI: 0000000000000006 RDI: ffffffffb164b6c8
RBP: ffffa0a198447a40 R08: 0000000000000707 R09: ffffa0a15abdc000
R10: 00000000000004f6 R11: ffffa0a1558e63c0 R12: 0000000000000000
R13: 0000000300000000 R14: ffffffffffffffff R15: ffffffffb05c862f
FS:  00007fbe2019a940(0000) GS:ffffa0a19fc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fbe201aa000 CR3: 0000000117d00000 CR4: 00000000000206f0
Call Trace:
[<ffffffffb07236c1>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffffb0724824>] security_compute_av+0x104/0x2f0
[<ffffffffb0b824b5>] avc_compute_av+0x41/0x1e4
[<ffffffffb0b80007>] ? mem_map_next.part.38+0x59/0x59
[<ffffffffb070be9f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffffb0713d03>] selinux_inode_permission+0xe3/0x1b0
[<ffffffffb0708ff2>] security_inode_permission+0x22/0x30
[<ffffffffb065a0b2>] __inode_permission+0x52/0xd0
[<ffffffffb065a148>] inode_permission+0x18/0x50
[<ffffffffb065a2fa>] may_open+0x5a/0x120
[<ffffffffb065e1f0>] do_last+0x1c0/0x1340
[<ffffffffb06293a6>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffffb065f43d>] path_openat+0xcd/0x5a0
[<ffffffffb066168d>] do_filp_open+0x4d/0xb0
[<ffffffffb066f787>] ? __alloc_fd+0x47/0x170
[<ffffffffb064d424>] do_sys_open+0x124/0x220
[<ffffffffb0b95ec9>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffffb064d53e>] SyS_open+0x1e/0x20
[<ffffffffb0b95f92>] system_call_fastpath+0x25/0x2a
[<ffffffffb0b95ed5>] ? system_call_after_swapgs+0xa2/0x13a
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b