Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-1160.80.1.el7
Executable
unknown
First occurrence
2023-02-17
Last occurrence
2023-02-17
Unique reports
1
Quality
-42

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.80.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffffb332ecd3
Build id: 3.10.0-1160.80.1.el7.x86_64
0x53
2
context_struct_compute_av
vmlinux 0xffffffffb33367c1
Build id: 3.10.0-1160.80.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffffb3337964
Build id: 3.10.0-1160.80.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffffb37b0b44
Build id: 3.10.0-1160.80.1.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffffb331e6bf
Build id: 3.10.0-1160.80.1.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffffb33268c3
Build id: 3.10.0-1160.80.1.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffffb331a872
Build id: 3.10.0-1160.80.1.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffffb3267882
Build id: 3.10.0-1160.80.1.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffffb3267928
Build id: 3.10.0-1160.80.1.el7.x86_64
0x18
10
link_path_walk
vmlinux 0xffffffffb326a09e
Build id: 3.10.0-1160.80.1.el7.x86_64
0x27e
11
? kmem_cache_alloc_trace
vmlinux 0xffffffffb3235b46
Build id: 3.10.0-1160.80.1.el7.x86_64
0x1d6
12
path_openat
vmlinux 0xffffffffb326ccbe
Build id: 3.10.0-1160.80.1.el7.x86_64
0xae
13
? user_path_at_empty
vmlinux 0xffffffffb326ee52
Build id: 3.10.0-1160.80.1.el7.x86_64
0x72
14
? __check_object_size
vmlinux 0xffffffffb325843a
Build id: 3.10.0-1160.80.1.el7.x86_64
0x1ca
15
do_filp_open
vmlinux 0xffffffffb326ef7d
Build id: 3.10.0-1160.80.1.el7.x86_64
0x4d
16
? __alloc_fd
vmlinux 0xffffffffb327d7a7
Build id: 3.10.0-1160.80.1.el7.x86_64
0x47
17
do_sys_open
vmlinux 0xffffffffb325a774
Build id: 3.10.0-1160.80.1.el7.x86_64
0x124
18
SyS_open
vmlinux 0xffffffffb325a88e
Build id: 3.10.0-1160.80.1.el7.x86_64
0x1e
19
system_call_fastpath
vmlinux 0xffffffffb37c539a
Build id: 3.10.0-1160.80.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 21397s! [gnome-shell:5226]
Modules linked in: tcp_lp xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc snd_intel8x0 snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm intel_powerclamp crc32_pclmul ppdev ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev pcspkr sg snd_timer i2c_piix4 snd parport_pc video soundcore parport ip_tables xfs libcrc32c
sd_mod crc_t10dif crct10dif_generic sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper ahci libahci ata_piix syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm libata crct10dif_pclmul crct10dif_common e1000 crc32c_intel serio_raw drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 0 PID: 5226 Comm: gnome-shell Kdump: loaded Tainted: G             L ------------   3.10.0-1160.80.1.el7.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
task: ffff961548f3a100 ti: ffff961548e0c000 task.ti: ffff961548e0c000
RIP: 0010:[<ffffffffb332ecd3>]  [<ffffffffb332ecd3>] avtab_search_node+0x53/0xa0
RSP: 0018:ffff961548e0fa60  EFLAGS: 00010206
RAX: ffff9616237dcdb0 RBX: ffffffffb37b07f2 RCX: 000000000000012e
RDX: 000000000000133d RSI: 0000000000000007 RDI: ffffffffb427d6c8
RBP: ffff961548e0fa60 R08: 0000000000000707 R09: ffff961620a78000
R10: 00000000000004bf R11: ffffec93c2216500 R12: 0000000000000000
R13: ffff96162133cc80 R14: ffffffffb3234579 R15: ffff961548e0fa88
FS:  00007f42227c8a80(0000) GS:ffff96162ec00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f41d56ff000 CR3: 0000000088f4c000 CR4: 00000000000206f0
Call Trace:
[<ffffffffb33367c1>] context_struct_compute_av+0x1d1/0x4e0
[<ffffffffb3337964>] security_compute_av+0x104/0x2f0
[<ffffffffb37b0b44>] avc_compute_av+0x41/0x1e8
[<ffffffffb331e6bf>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffffb33268c3>] selinux_inode_permission+0xe3/0x1b0
[<ffffffffb331a872>] security_inode_permission+0x22/0x30
[<ffffffffb3267882>] __inode_permission+0x52/0xe0
[<ffffffffb3267928>] inode_permission+0x18/0x50
[<ffffffffb326a09e>] link_path_walk+0x27e/0x8b0
[<ffffffffb3235b46>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffffb326ccbe>] path_openat+0xae/0x5a0
[<ffffffffb326ee52>] ? user_path_at_empty+0x72/0xc0
[<ffffffffb325843a>] ? __check_object_size+0x1ca/0x250
[<ffffffffb326ef7d>] do_filp_open+0x4d/0xc0
[<ffffffffb327d7a7>] ? __alloc_fd+0x47/0x180
[<ffffffffb325a774>] do_sys_open+0x124/0x220
[<ffffffffb325a88e>] SyS_open+0x1e/0x30
[<ffffffffb37c539a>] system_call_fastpath+0x25/0x2a
Code: 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 <74> 1b 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 cc cc cc cc