Kerneloops

Similar reports
Problem #620990
Component
kernel Tainted
Last affected version
0:3.10.0-1160.80.1.el7
Executable
unknown
First occurrence
2022-11-23
Last occurrence
2022-11-23
Unique reports
1
Quality
-37

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.80.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffffb652ecd0
Build id: 3.10.0-1160.80.1.el7.x86_64
0x50
2
context_struct_compute_av
vmlinux 0xffffffffb65367c1
Build id: 3.10.0-1160.80.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffffb6537964
Build id: 3.10.0-1160.80.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffffb69b0b44
Build id: 3.10.0-1160.80.1.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffffb651e6bf
Build id: 3.10.0-1160.80.1.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffffb65268c3
Build id: 3.10.0-1160.80.1.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffffb651a872
Build id: 3.10.0-1160.80.1.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffffb6467882
Build id: 3.10.0-1160.80.1.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffffb6467928
Build id: 3.10.0-1160.80.1.el7.x86_64
0x18
10
link_path_walk
vmlinux 0xffffffffb646a09e
Build id: 3.10.0-1160.80.1.el7.x86_64
0x27e
11
? kmem_cache_alloc_trace
vmlinux 0xffffffffb6435b46
Build id: 3.10.0-1160.80.1.el7.x86_64
0x1d6
12
path_openat
vmlinux 0xffffffffb646ccbe
Build id: 3.10.0-1160.80.1.el7.x86_64
0xae
13
do_filp_open
vmlinux 0xffffffffb646ef7d
Build id: 3.10.0-1160.80.1.el7.x86_64
0x4d
14
? __alloc_fd
vmlinux 0xffffffffb647d7a7
Build id: 3.10.0-1160.80.1.el7.x86_64
0x47
15
do_sys_open
vmlinux 0xffffffffb645a774
Build id: 3.10.0-1160.80.1.el7.x86_64
0x124
16
SyS_open
vmlinux 0xffffffffb645a88e
Build id: 3.10.0-1160.80.1.el7.x86_64
0x1e
17
system_call_fastpath
vmlinux 0xffffffffb69c539a
Build id: 3.10.0-1160.80.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 45s! [dbus-daemon:681]
Modules linked in: snd_hda_codec_idt snd_hda_codec_generic intel_pmc_core intel_powerclamp snd_hda_intel iosf_mbi snd_hda_codec snd_hda_core crc32_pclmul iTCO_wdt snd_hwdep iTCO_vendor_support snd_seq ghash_clmulni_intel ppdev joydev snd_seq_device aesni_intel snd_pcm sg lrw gf128mul glue_helper ablk_helper cryptd pcspkr snd_timer snd lpc_ich soundcore i2c_piix4 vboxguest(OE) parport_pc parport video nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic vmwgfx ahci libahci drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common crc32c_intel libata serio_raw drm e1000 drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
CPU: 0 PID: 681 Comm: dbus-daemon Tainted: G           OEL ------------   3.10.0-1160.80.1.el7.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
task: ffff9f56345b6300 ti: ffff9f5657044000 task.ti: ffff9f5657044000
RIP: 0010:[<ffffffffb652ecd0>]  [<ffffffffb652ecd0>] avtab_search_node+0x50/0xa0
RSP: 0018:ffff9f5657047a60  EFLAGS: 00010286
RAX: ffff9f563472b978 RBX: ffff9f565a0a60c0 RCX: 00000000000004bc
RDX: 0000000000000cd9 RSI: 0000000000000007 RDI: ffffffffb747d6c8
RBP: ffff9f5657047a60 R08: 0000000000000707 R09: ffff9f5635114000
R10: 00000000000012f7 R11: 0000000000000246 R12: 0000000000000304
R13: 00000001345b6368 R14: ffff9f5659598068 R15: ffffffffb62d8cb2
FS:  00007f86e4b63880(0000) GS:ffff9f565fc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f40631178a0 CR3: 00000000571dc000 CR4: 00000000000206f0
Call Trace:
[<ffffffffb65367c1>] context_struct_compute_av+0x1d1/0x4e0
[<ffffffffb6537964>] security_compute_av+0x104/0x2f0
[<ffffffffb69b0b44>] avc_compute_av+0x41/0x1e8
[<ffffffffb651e6bf>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffffb65268c3>] selinux_inode_permission+0xe3/0x1b0
[<ffffffffb651a872>] security_inode_permission+0x22/0x30
[<ffffffffb6467882>] __inode_permission+0x52/0xe0
[<ffffffffb6467928>] inode_permission+0x18/0x50
[<ffffffffb646a09e>] link_path_walk+0x27e/0x8b0
[<ffffffffb6435b46>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffffb646ccbe>] path_openat+0xae/0x5a0
[<ffffffffb646ef7d>] do_filp_open+0x4d/0xc0
[<ffffffffb647d7a7>] ? __alloc_fd+0x47/0x180
[<ffffffffb645a774>] do_sys_open+0x124/0x220
[<ffffffffb645a88e>] SyS_open+0x1e/0x30
[<ffffffffb69c539a>] system_call_fastpath+0x25/0x2a
Code: b7 4e 02 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 <66> 3b 10 74 1b 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 cc