Kerneloops

Similar reports
Problem #620990
Component
kernel Tainted
Last affected version
0:3.10.0-1160.62.1.el7
Executable
unknown
First occurrence
2022-05-20
Last occurrence
2022-05-20
Unique reports
1
Quality
-52

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.62.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff88f1bd25
Build id: 3.10.0-1160.62.1.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffff88f23591
Build id: 3.10.0-1160.62.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffff88f246f4
Build id: 3.10.0-1160.62.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffff89385525
Build id: 3.10.0-1160.62.1.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffff88f0bcef
Build id: 3.10.0-1160.62.1.el7.x86_64
0xcf
6
? page_fault
vmlinux 0xffffffff89390778
Build id: 3.10.0-1160.62.1.el7.x86_64
0x28
7
selinux_inode_permission
vmlinux 0xffffffff88f13b53
Build id: 3.10.0-1160.62.1.el7.x86_64
0xe3
8
security_inode_permission
vmlinux 0xffffffff88f08e42
Build id: 3.10.0-1160.62.1.el7.x86_64
0x22
9
__inode_permission
vmlinux 0xffffffff88e59ee2
Build id: 3.10.0-1160.62.1.el7.x86_64
0x52
10
inode_permission
vmlinux 0xffffffff88e59f78
Build id: 3.10.0-1160.62.1.el7.x86_64
0x18
11
link_path_walk
vmlinux 0xffffffff88e5c64e
Build id: 3.10.0-1160.62.1.el7.x86_64
0x27e
12
? kmem_cache_alloc_trace
vmlinux 0xffffffff88e29396
Build id: 3.10.0-1160.62.1.el7.x86_64
0x1d6
13
path_openat
vmlinux 0xffffffff88e5f23e
Build id: 3.10.0-1160.62.1.el7.x86_64
0xae
14
? arch_tlb_finish_mmu
vmlinux 0xffffffff88df0137
Build id: 3.10.0-1160.62.1.el7.x86_64
0x47
15
? unmap_region
vmlinux 0xffffffff88df9a44
Build id: 3.10.0-1160.62.1.el7.x86_64
0xf4
16
do_filp_open
vmlinux 0xffffffff88e614ad
Build id: 3.10.0-1160.62.1.el7.x86_64
0x4d
17
? __alloc_fd
vmlinux 0xffffffff88e6f5f7
Build id: 3.10.0-1160.62.1.el7.x86_64
0x47
18
do_sys_open
vmlinux 0xffffffff88e4d384
Build id: 3.10.0-1160.62.1.el7.x86_64
0x124
19
? system_call_after_swapgs
vmlinux 0xffffffff89399ec9
Build id: 3.10.0-1160.62.1.el7.x86_64
0x96
20
SyS_open
vmlinux 0xffffffff88e4d49e
Build id: 3.10.0-1160.62.1.el7.x86_64
0x1e
21
system_call_fastpath
vmlinux 0xffffffff89399f92
Build id: 3.10.0-1160.62.1.el7.x86_64
0x25
22
? system_call_after_swapgs
vmlinux 0xffffffff89399ed5
Build id: 3.10.0-1160.62.1.el7.x86_64
0xa2
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 377s! [polkitd:876]
Modules linked in: tcp_lp vboxsf(OE) tun devlink bridge stp llc ip_set sunrpc intel_powerclamp crc32_pclmul ghash_clmulni_intel joydev snd_intel8x0 snd_ac97_codec ac97_bus snd_seq ppdev snd_seq_device snd_pcm aesni_intel lrw gf128mul glue_helper ablk_helper cryptd snd_timer sg pcspkr snd vboxguest(OE) soundcore i2c_piix4 parport_pc parport video xfs libcrc32c sd_mod crc_t10dif sr_mod cdrom crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ahci drm ata_piix libahci libata e1000 crct10dif_pclmul crct10dif_common crc32c_intel serio_raw drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: ip_tables]
CPU: 0 PID: 876 Comm: polkitd Kdump: loaded Tainted: G           OEL ------------   3.10.0-1160.62.1.el7.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
task: ffff8cf316890000 ti: ffff8cf314440000 task.ti: ffff8cf314440000
RIP: 0010:[<ffffffff88f1bd25>]  [<ffffffff88f1bd25>] avtab_search_node+0x55/0x90
RSP: 0018:ffff8cf314443a60  EFLAGS: 00000206
RAX: ffff8cf31bafda20 RBX: 0000000000000a4e RCX: 000000000000012d
RDX: 0000000000000cdc RSI: 0000000000000007 RDI: ffffffff89e4c6c8
RBP: ffff8cf314443a60 R08: 0000000000000707 R09: ffff8cf31b5f8000
R10: 00000000000004bb R11: 0000000000000004 R12: 0000000000000707
R13: ffff8cf31b27c000 R14: 000000000000293f R15: 0000000000000004
FS:  00007f435f336900(0000) GS:ffff8cf35fc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f435f34a000 CR3: 00000000d4516000 CR4: 00000000000606f0
Call Trace:
[<ffffffff88f23591>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffff88f246f4>] security_compute_av+0x104/0x2f0
[<ffffffff89385525>] avc_compute_av+0x41/0x1e4
[<ffffffff88f0bcef>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffff89390778>] ? page_fault+0x28/0x30
[<ffffffff88f13b53>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff88f08e42>] security_inode_permission+0x22/0x30
[<ffffffff88e59ee2>] __inode_permission+0x52/0xd0
[<ffffffff88e59f78>] inode_permission+0x18/0x50
[<ffffffff88e5c64e>] link_path_walk+0x27e/0x8b0
[<ffffffff88e29396>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffff88e5f23e>] path_openat+0xae/0x5a0
[<ffffffff88df0137>] ? arch_tlb_finish_mmu+0x47/0x80
[<ffffffff88df9a44>] ? unmap_region+0xf4/0x140
[<ffffffff88e614ad>] do_filp_open+0x4d/0xb0
[<ffffffff88e6f5f7>] ? __alloc_fd+0x47/0x170
[<ffffffff88e4d384>] do_sys_open+0x124/0x220
[<ffffffff89399ec9>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff88e4d49e>] SyS_open+0x1e/0x20
[<ffffffff89399f92>] system_call_fastpath+0x25/0x2a
[<ffffffff89399ed5>] ? system_call_after_swapgs+0xa2/0x13a
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b