Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-1127.19.1.el7
Executable
unknown
First occurrence
2023-01-05
Last occurrence
2023-01-05
Unique reports
1
Quality
-41

Statistics

Operating system Unique / Total count
CentOS 7 1 / 2
Operating system Count
CentOS 7 2
Architecture Count
x86_64 2
Related packages Count
kernel 2
 0:3.10.0-1127.19.1.el7 2

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffffa731a7d5
Build id: 3.10.0-1127.19.1.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffffa7321fe1
Build id: 3.10.0-1127.19.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffffa7323144
Build id: 3.10.0-1127.19.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffffa777f27b
Build id: 3.10.0-1127.19.1.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffffa730a85f
Build id: 3.10.0-1127.19.1.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffffa7312683
Build id: 3.10.0-1127.19.1.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffffa73079b2
Build id: 3.10.0-1127.19.1.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffffa7258ee2
Build id: 3.10.0-1127.19.1.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffffa7258f78
Build id: 3.10.0-1127.19.1.el7.x86_64
0x18
10
may_open
vmlinux 0xffffffffa725912a
Build id: 3.10.0-1127.19.1.el7.x86_64
0x5a
11
do_last
vmlinux 0xffffffffa725d020
Build id: 3.10.0-1127.19.1.el7.x86_64
0x1c0
12
? kmem_cache_alloc_trace
vmlinux 0xffffffffa7228a86
Build id: 3.10.0-1127.19.1.el7.x86_64
0x1d6
13
path_openat
vmlinux 0xffffffffa725e26d
Build id: 3.10.0-1127.19.1.el7.x86_64
0xcd
14
? page_add_new_anon_rmap
vmlinux 0xffffffffa72010d8
Build id: 3.10.0-1127.19.1.el7.x86_64
0xb8
15
do_filp_open
vmlinux 0xffffffffa72604bd
Build id: 3.10.0-1127.19.1.el7.x86_64
0x4d
16
? __alloc_fd
vmlinux 0xffffffffa726e4e7
Build id: 3.10.0-1127.19.1.el7.x86_64
0x47
17
do_sys_open
vmlinux 0xffffffffa724c094
Build id: 3.10.0-1127.19.1.el7.x86_64
0x124
18
SyS_open
vmlinux 0xffffffffa724c1ae
Build id: 3.10.0-1127.19.1.el7.x86_64
0x1e
19
system_call_fastpath
vmlinux 0xffffffffa7792ed2
Build id: 3.10.0-1127.19.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 21s! [trivial-rewrite:25856]
Modules linked in: tcp_lp fuse xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables devlink iptable_filter vmw_vsock_vmci_transport vsock sunrpc sb_edac iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw ppdev gf128mul glue_helper ablk_helper cryptd joydev vmw_balloon pcspkr sg vmw_vmci parport_pc parport i2c_piix4 ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm sd_mod crc_t10dif crct10dif_generic drm ata_piix nfit ahci libnvdimm crct10dif_pclmul crct10dif_common libahci crc32c_intel serio_raw libata vmxnet3
vmw_pvscsi drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
CPU: 0 PID: 25856 Comm: trivial-rewrite Kdump: loaded Tainted: G             L ------------   3.10.0-1127.19.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
task: ffff978941d08000 ti: ffff97894eda0000 task.ti: ffff97894eda0000
RIP: 0010:[<ffffffffa731a7d5>]  [<ffffffffa731a7d5>] avtab_search_node+0x55/0x90
RSP: 0018:ffff97894eda3a40  EFLAGS: 00000206
RAX: ffff9789baeb6a50 RBX: ffff97894eda3a18 RCX: 0000000000000121
RDX: 0000000000000dad RSI: 0000000000000006 RDI: ffffffffa824b688
RBP: ffff97894eda3a40 R08: 0000000000000707 R09: ffff9789b73d0000
R10: 000000000000048a R11: 000000000000000d R12: 0000000000000246
R13: ffff97894eda3a48 R14: ffff97894eda3ac4 R15: 0000000000000038
FS:  00007f1163710880(0000) GS:ffff9789bfc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1161567ca8 CR3: 000000001044a000 CR4: 00000000001607f0
Call Trace:
[<ffffffffa7321fe1>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffffa7323144>] security_compute_av+0x104/0x2f0
[<ffffffffa777f27b>] avc_compute_av+0x41/0x1fe
[<ffffffffa730a85f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffffa7312683>] selinux_inode_permission+0xe3/0x1b0
[<ffffffffa73079b2>] security_inode_permission+0x22/0x30
[<ffffffffa7258ee2>] __inode_permission+0x52/0xd0
[<ffffffffa7258f78>] inode_permission+0x18/0x50
[<ffffffffa725912a>] may_open+0x5a/0x120
[<ffffffffa725d020>] do_last+0x1c0/0x1340
[<ffffffffa7228a86>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffffa725e26d>] path_openat+0xcd/0x5a0
[<ffffffffa72010d8>] ? page_add_new_anon_rmap+0xb8/0x170
[<ffffffffa72604bd>] do_filp_open+0x4d/0xb0
[<ffffffffa726e4e7>] ? __alloc_fd+0x47/0x170
[<ffffffffa724c094>] do_sys_open+0x124/0x220
[<ffffffffa724c1ae>] SyS_open+0x1e/0x20
[<ffffffffa7792ed2>] system_call_fastpath+0x25/0x2a
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b