Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-957.el7
Executable
unknown
First occurrence
2022-05-12
Last occurrence
2022-05-12
Unique reports
1
Quality
-41

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-957.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff9d90b125
Build id: 3.10.0-957.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffff9d9129f1
Build id: 3.10.0-957.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffff9d913b54
Build id: 3.10.0-957.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffff9dd610b5
Build id: 3.10.0-957.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffff9d8fba3f
Build id: 3.10.0-957.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffff9d8fefd3
Build id: 3.10.0-957.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffff9d8f8b92
Build id: 3.10.0-957.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffff9d84ce02
Build id: 3.10.0-957.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffff9d84ce98
Build id: 3.10.0-957.el7.x86_64
0x18
10
may_open
vmlinux 0xffffffff9d84cf38
Build id: 3.10.0-957.el7.x86_64
0x68
11
do_last
vmlinux 0xffffffff9d84f507
Build id: 3.10.0-957.el7.x86_64
0x1b7
12
path_openat
vmlinux 0xffffffff9d8523f7
Build id: 3.10.0-957.el7.x86_64
0xd7
13
? user_path_at_empty
vmlinux 0xffffffff9d853cd2
Build id: 3.10.0-957.el7.x86_64
0x72
14
? __check_object_size
vmlinux 0xffffffff9d83e03a
Build id: 3.10.0-957.el7.x86_64
0x1ca
15
do_filp_open
vmlinux 0xffffffff9d853dfd
Build id: 3.10.0-957.el7.x86_64
0x4d
16
? __alloc_fd
vmlinux 0xffffffff9d861487
Build id: 3.10.0-957.el7.x86_64
0x47
17
do_sys_open
vmlinux 0xffffffff9d83ff27
Build id: 3.10.0-957.el7.x86_64
0x137
18
SyS_open
vmlinux 0xffffffff9d84004e
Build id: 3.10.0-957.el7.x86_64
0x1e
19
system_call_fastpath
vmlinux 0xffffffff9dd74ddb
Build id: 3.10.0-957.el7.x86_64
0x22
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 37s! [pgrep:26732]
Modules linked in: tcp_lp fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock sunrpc ppdev snd_seq_midi snd_seq_midi_event crc32_pclmul ghash_clmulni_intel vmw_balloon aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev pcspkr snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm snd_timer
snd sg soundcore parport_pc parport vmw_vmci i2c_piix4 ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic crct10dif_pclmul crct10dif_common crc32c_intel serio_raw nfit libnvdimm e1000 ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm mptspi ata_piix scsi_transport_spi libata mptscsih mptbase drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
CPU: 0 PID: 26732 Comm: pgrep Not tainted 3.10.0-957.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
task: ffff9d3dc3a86180 ti: ffff9d3dda22c000 task.ti: ffff9d3dda22c000
RIP: 0010:[<ffffffff9d90b125>]  [<ffffffff9d90b125>] avtab_search_node+0x55/0x90
RSP: 0018:ffff9d3dda22fa50  EFLAGS: 00000206
RAX: ffff9d3df433ac60 RBX: ffffffff9dd609dd RCX: 0000000000000142
RDX: 0000000000000cc9 RSI: 0000000000000006 RDI: ffffffff9e82afa8
RBP: ffff9d3dda22fa50 R08: 0000000000000707 R09: ffff9d3df5b14000
R10: 000000000000050e R11: ffff9d3ddaa00e40 R12: 0000000000000000
R13: ffff9d3df43dc000 R14: 00000000000028f2 R15: ffff9d3df8bc15c0
FS:  00007fc6809ba880(0000) GS:ffff9d3dfc600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000951218 CR3: 000000000345c000 CR4: 0000000000760ff0
PKRU: 55555554
Call Trace:
[<ffffffff9d9129f1>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffff9d913b54>] security_compute_av+0x104/0x2f0
[<ffffffff9dd610b5>] avc_compute_av+0x41/0x1fe
[<ffffffff9d8fba3f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffff9d8fefd3>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff9d8f8b92>] security_inode_permission+0x22/0x30
[<ffffffff9d84ce02>] __inode_permission+0x52/0xd0
[<ffffffff9d84ce98>] inode_permission+0x18/0x50
[<ffffffff9d84cf38>] may_open+0x68/0x120
[<ffffffff9d84f507>] do_last+0x1b7/0x12a0
[<ffffffff9d8523f7>] path_openat+0xd7/0x640
[<ffffffff9d853cd2>] ? user_path_at_empty+0x72/0xc0
[<ffffffff9d83e03a>] ? __check_object_size+0x1ca/0x250
[<ffffffff9d853dfd>] do_filp_open+0x4d/0xb0
[<ffffffff9d861487>] ? __alloc_fd+0x47/0x170
[<ffffffff9d83ff27>] do_sys_open+0x137/0x240
[<ffffffff9d84004e>] SyS_open+0x1e/0x20
[<ffffffff9dd74ddb>] system_call_fastpath+0x22/0x27
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b