Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-1160.11.1.el7
Executable
unknown
First occurrence
2021-01-25
Last occurrence
2021-01-25
Unique reports
1
Quality
-35

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.11.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff9191b700
Build id: 3.10.0-1160.11.1.el7.x86_64
0x50
2
context_struct_compute_av
vmlinux 0xffffffff91922f11
Build id: 3.10.0-1160.11.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffff91924074
Build id: 3.10.0-1160.11.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffff91d7ff26
Build id: 3.10.0-1160.11.1.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffff9190b6cf
Build id: 3.10.0-1160.11.1.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffff91913533
Build id: 3.10.0-1160.11.1.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffff91908822
Build id: 3.10.0-1160.11.1.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffff91859aa2
Build id: 3.10.0-1160.11.1.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffff91859b38
Build id: 3.10.0-1160.11.1.el7.x86_64
0x18
10
may_open
vmlinux 0xffffffff91859cea
Build id: 3.10.0-1160.11.1.el7.x86_64
0x5a
11
do_last
vmlinux 0xffffffff9185dbe0
Build id: 3.10.0-1160.11.1.el7.x86_64
0x1c0
12
path_openat
vmlinux 0xffffffff9185ee2d
Build id: 3.10.0-1160.11.1.el7.x86_64
0xcd
13
? do_async_page_fault
vmlinux 0xffffffff91d8dfed
Build id: 3.10.0-1160.11.1.el7.x86_64
0x6d
14
do_filp_open
vmlinux 0xffffffff9186107d
Build id: 3.10.0-1160.11.1.el7.x86_64
0x4d
15
do_sys_open
vmlinux 0xffffffff9184cbc4
Build id: 3.10.0-1160.11.1.el7.x86_64
0x124
16
SyS_open
vmlinux 0xffffffff9184ccde
Build id: 3.10.0-1160.11.1.el7.x86_64
0x1e
17
system_call_fastpath
vmlinux 0xffffffff91d93f92
Build id: 3.10.0-1160.11.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [crond:1449]
Modules linked in: tcp_diag inet_diag uinput ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter crc32_pclmul ghash_clmulni_intel xfs aesni_intel lrw libcrc32c gf128mul glue_helper snd_hda_codec_generic ablk_helper cryptd snd_hda_intel snd_hda_codec ppdev pcspkr snd_hda_core joydev virtio_balloon parport_pc snd_hwdep snd_seq parport snd_seq_device sg snd_pcm i2c_piix4 snd_timer snd soundcore nfsd auth_rpcgss nfs_acl
lockd grace sunrpc ip_tables ext4 mbcache jbd2 virtio_net sr_mod virtio_console cdrom net_failover failover virtio_blk ata_generic pata_acpi qxl drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix crct10dif_pclmul crct10dif_common crc32c_intel libata serio_raw drm floppy virtio_pci virtio_ring drm_panel_orientation_quirks virtio dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 1 PID: 1449 Comm: crond Kdump: loaded Tainted: G             L ------------   3.10.0-1160.11.1.el7.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
task: ffff9889751ee300 ti: ffff988976b10000 task.ti: ffff988976b10000
RIP: 0010:[<ffffffff9191b700>]  [<ffffffff9191b700>] avtab_search_node+0x50/0x90
RSP: 0000:ffff988976b13a40  EFLAGS: 00000286
RAX: ffff988977c72be8 RBX: 000000000000014a RCX: 000000000000014b
RDX: 00000000000000e2 RSI: 0000000000000006 RDI: ffffffff9284c6c8
RBP: ffff988976b13a40 R08: 0000000000000707 R09: ffff988935cb0000
R10: 0000000000000532 R11: 0000000000000005 R12: 0000000000000707
R13: ffff988974d8c000 R14: 000000000000052e R15: 0000000000000005
FS:  00007f00a4330840(0000) GS:ffff98897fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000001901001 CR3: 0000000076bd0000 CR4: 0000000000340fe0
Call Trace:
[<ffffffff91922f11>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffff91924074>] security_compute_av+0x104/0x2f0
[<ffffffff91d7ff26>] avc_compute_av+0x41/0x1e4
[<ffffffff9190b6cf>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffff91913533>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff91908822>] security_inode_permission+0x22/0x30
[<ffffffff91859aa2>] __inode_permission+0x52/0xd0
[<ffffffff91859b38>] inode_permission+0x18/0x50
[<ffffffff91859cea>] may_open+0x5a/0x120
[<ffffffff9185dbe0>] do_last+0x1c0/0x1340
[<ffffffff9185ee2d>] path_openat+0xcd/0x5a0
[<ffffffff91d8dfed>] ? do_async_page_fault+0x6d/0xf0
[<ffffffff9186107d>] do_filp_open+0x4d/0xb0
[<ffffffff9184cbc4>] do_sys_open+0x124/0x220
[<ffffffff9184ccde>] SyS_open+0x1e/0x20
[<ffffffff91d93f92>] system_call_fastpath+0x25/0x2a
Code: b7 4e 02 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 <66> 3b 10 74 13 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f