Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-1160.41.1.el7
Executable
unknown
First occurrence
2022-04-26
Last occurrence
2022-04-26
Unique reports
1
Quality
-41

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.41.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff9bb1beb0
Build id: 3.10.0-1160.41.1.el7.x86_64
0x50
2
context_struct_compute_av
vmlinux 0xffffffff9bb236a1
Build id: 3.10.0-1160.41.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffff9bb24804
Build id: 3.10.0-1160.41.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffff9bf824b5
Build id: 3.10.0-1160.41.1.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffff9bb0be7f
Build id: 3.10.0-1160.41.1.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffff9bb13ce3
Build id: 3.10.0-1160.41.1.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffff9bb08fd2
Build id: 3.10.0-1160.41.1.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffff9ba5a092
Build id: 3.10.0-1160.41.1.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffff9ba5a128
Build id: 3.10.0-1160.41.1.el7.x86_64
0x18
10
may_open
vmlinux 0xffffffff9ba5a2da
Build id: 3.10.0-1160.41.1.el7.x86_64
0x5a
11
do_last
vmlinux 0xffffffff9ba5e1d0
Build id: 3.10.0-1160.41.1.el7.x86_64
0x1c0
12
? kmem_cache_alloc_trace
vmlinux 0xffffffff9ba293a6
Build id: 3.10.0-1160.41.1.el7.x86_64
0x1d6
13
path_openat
vmlinux 0xffffffff9ba5f41d
Build id: 3.10.0-1160.41.1.el7.x86_64
0xcd
14
? getname_flags
vmlinux 0xffffffff9ba6039f
Build id: 3.10.0-1160.41.1.el7.x86_64
0x4f
15
do_filp_open
vmlinux 0xffffffff9ba6166d
Build id: 3.10.0-1160.41.1.el7.x86_64
0x4d
16
? __alloc_fd
vmlinux 0xffffffff9ba6f767
Build id: 3.10.0-1160.41.1.el7.x86_64
0x47
17
do_sys_open
vmlinux 0xffffffff9ba4d404
Build id: 3.10.0-1160.41.1.el7.x86_64
0x124
18
SyS_open
vmlinux 0xffffffff9ba4d51e
Build id: 3.10.0-1160.41.1.el7.x86_64
0x1e
19
system_call_fastpath
vmlinux 0xffffffff9bf95f92
Build id: 3.10.0-1160.41.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#2 stuck for 21s! [systemd:1]
Modules linked in: cfg80211 rfkill xt_nat veth xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink xt_addrtype iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables br_netfilter overlay(T) bridge stp llc ip_set vmw_vsock_vmci_transport vsock sunrpc sb_edac iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr joydev vmw_vmci ppdev i2c_piix4 vmw_balloon parport_pc parport sg sch_fq_codel xfs libcrc32c ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sd_mod sysfillrect sysimgblt fb_sys_fops crc_t10dif crct10dif_generic ttm drm ahci nfit ata_piix libahci libnvdimm crct10dif_pclmul libata crct10dif_common crc32c_intel serio_raw vmxnet3 vmw_pvscsi drm_panel_orientation_quirks
dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: ip_tables]
CPU: 2 PID: 1 Comm: systemd Kdump: loaded Tainted: G             L ------------ T 3.10.0-1160.41.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
task: ffff8fa3f64d8000 ti: ffff8fa0b62a4000 task.ti: ffff8fa0b62a4000
RIP: 0010:[<ffffffff9bb1beb0>]  [<ffffffff9bb1beb0>] avtab_search_node+0x50/0x90
RSP: 0018:ffff8fa0b62a7a40  EFLAGS: 00010282
RAX: ffff8fa769bb0b70 RBX: 0000000000001346 RCX: 00000000000000e2
RDX: 0000000000000123 RSI: 0000000000000006 RDI: ffffffff9ca4b6c8
RBP: ffff8fa0b62a7a40 R08: 0000000000000707 R09: ffff8fa76d080000
R10: 000000000000038e R11: ffff8fa315606fc0 R12: 0000000000000707
R13: ffff8fa76e5bc000 R14: 0000000000004d1e R15: ffff8fa315606fc0
FS:  00007f868927d940(0000) GS:ffff8fa36fc80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f86892a5000 CR3: 000000082c1e4000 CR4: 00000000003607e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
[<ffffffff9bb236a1>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffff9bb24804>] security_compute_av+0x104/0x2f0
[<ffffffff9bf824b5>] avc_compute_av+0x41/0x1e4
[<ffffffff9bb0be7f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffff9bb13ce3>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff9bb08fd2>] security_inode_permission+0x22/0x30
[<ffffffff9ba5a092>] __inode_permission+0x52/0xd0
[<ffffffff9ba5a128>] inode_permission+0x18/0x50
[<ffffffff9ba5a2da>] may_open+0x5a/0x120
[<ffffffff9ba5e1d0>] do_last+0x1c0/0x1340
[<ffffffff9ba293a6>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffff9ba5f41d>] path_openat+0xcd/0x5a0
[<ffffffff9ba6039f>] ? getname_flags+0x4f/0x1a0
[<ffffffff9ba6166d>] do_filp_open+0x4d/0xb0
[<ffffffff9ba6f767>] ? __alloc_fd+0x47/0x170
[<ffffffff9ba4d404>] do_sys_open+0x124/0x220
[<ffffffff9ba4d51e>] SyS_open+0x1e/0x20
[<ffffffff9bf95f92>] system_call_fastpath+0x25/0x2a
Code: b7 4e 02 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 <66> 3b 10 74 13 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f