Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-1062.el7
Executable
unknown
First occurrence
2023-03-17
Last occurrence
2023-03-17
Unique reports
1
Quality
-44

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1062.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff88f14fd3
Build id: 3.10.0-1062.el7.x86_64
0x53
2
context_struct_compute_av
vmlinux 0xffffffff88f1c7d1
Build id: 3.10.0-1062.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffff88f1d934
Build id: 3.10.0-1062.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffff89378538
Build id: 3.10.0-1062.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffff88f04fdf
Build id: 3.10.0-1062.el7.x86_64
0xcf
6
? avc_has_perm_noaudit
vmlinux 0xffffffff88f04fdf
Build id: 3.10.0-1062.el7.x86_64
0xcf
7
selinux_inode_permission
vmlinux 0xffffffff88f0ccb3
Build id: 3.10.0-1062.el7.x86_64
0xe3
8
security_inode_permission
vmlinux 0xffffffff88f02132
Build id: 3.10.0-1062.el7.x86_64
0x22
9
__inode_permission
vmlinux 0xffffffff88e54452
Build id: 3.10.0-1062.el7.x86_64
0x52
10
inode_permission
vmlinux 0xffffffff88e544e8
Build id: 3.10.0-1062.el7.x86_64
0x18
11
may_open
vmlinux 0xffffffff88e5469a
Build id: 3.10.0-1062.el7.x86_64
0x5a
12
do_last
vmlinux 0xffffffff88e56d90
Build id: 3.10.0-1062.el7.x86_64
0x1c0
13
path_openat
vmlinux 0xffffffff88e59c5d
Build id: 3.10.0-1062.el7.x86_64
0xcd
14
? arch_tlb_finish_mmu
vmlinux 0xffffffff88debc37
Build id: 3.10.0-1062.el7.x86_64
0x47
15
? unmap_region
vmlinux 0xffffffff88df5544
Build id: 3.10.0-1062.el7.x86_64
0xf4
16
do_filp_open
vmlinux 0xffffffff88e5b5cd
Build id: 3.10.0-1062.el7.x86_64
0x4d
17
? __alloc_fd
vmlinux 0xffffffff88e69087
Build id: 3.10.0-1062.el7.x86_64
0x47
18
do_sys_open
vmlinux 0xffffffff88e47524
Build id: 3.10.0-1062.el7.x86_64
0x124
19
SyS_open
vmlinux 0xffffffff88e4763e
Build id: 3.10.0-1062.el7.x86_64
0x1e
20
system_call_fastpath
vmlinux 0xffffffff8938bede
Build id: 3.10.0-1062.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 43s! [systemd-logind:849]
Modules linked in: tcp_lp nls_utf8 isofs rfcomm fuse xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables devlink iptable_filter bnep vmw_vsock_vmci_transport vsock sunrpc snd_seq_midi snd_seq_midi_event crc32_pclmul ghash_clmulni_intel ppdev vmw_balloon snd_ens1371 aesni_intel snd_rawmidi lrw gf128mul snd_ac97_codec glue_helper ablk_helper cryptd btusb ac97_bus btrtl btbcm snd_seq btintel bluetooth snd_seq_device snd_pcm pcspkr joydev rfkill snd_timer sg snd soundcore vmw_vmci i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic
vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm crct10dif_pclmul crct10dif_common ata_piix crc32c_intel serio_raw e1000 mptspi scsi_transport_spi mptscsih mptbase drm_panel_orientation_quirks libata floppy dm_mirror dm_region_hash dm_log dm_mod
CPU: 0 PID: 849 Comm: systemd-logind Kdump: loaded Not tainted 3.10.0-1062.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/20/2014
task: ffff895835e98000 ti: ffff895834ac0000 task.ti: ffff895834ac0000
RIP: 0010:[<ffffffff88f14fd3>]  [<ffffffff88f14fd3>] avtab_search_node+0x53/0x90
RSP: 0018:ffff895834ac3a50  EFLAGS: 00000206
RAX: ffff8958386a3330 RBX: 0000000000000000 RCX: 0000000000000133
RDX: 0000000000000cda RSI: 0000000000000006 RDI: ffffffff89e49048
RBP: ffff895834ac3a50 R08: 0000000000000707 R09: ffff895835268000
R10: 00000000000004d2 R11: ffff89583587cfc0 R12: 0000000000000000
R13: ffffffff892366c5 R14: 0000000000000001 R15: ffff89583ffdb008
FS:  00007f2b6d741900(0000) GS:ffff89583b600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2b6d75a000 CR3: 0000000074ae4000 CR4: 00000000003406f0
Call Trace:
[<ffffffff88f1c7d1>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffff88f1d934>] security_compute_av+0x104/0x2f0
[<ffffffff89378538>] avc_compute_av+0x41/0x1fe
[<ffffffff88f04fdf>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffff88f04fdf>] ? avc_has_perm_noaudit+0xcf/0x140
[<ffffffff88f0ccb3>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff88f02132>] security_inode_permission+0x22/0x30
[<ffffffff88e54452>] __inode_permission+0x52/0xd0
[<ffffffff88e544e8>] inode_permission+0x18/0x50
[<ffffffff88e5469a>] may_open+0x5a/0x120
[<ffffffff88e56d90>] do_last+0x1c0/0x1290
[<ffffffff88e59c5d>] path_openat+0xcd/0x5a0
[<ffffffff88debc37>] ? arch_tlb_finish_mmu+0x47/0x80
[<ffffffff88df5544>] ? unmap_region+0xf4/0x140
[<ffffffff88e5b5cd>] do_filp_open+0x4d/0xb0
[<ffffffff88e69087>] ? __alloc_fd+0x47/0x170
[<ffffffff88e47524>] do_sys_open+0x124/0x220
[<ffffffff88e4763e>] SyS_open+0x1e/0x20
[<ffffffff8938bede>] system_call_fastpath+0x25/0x2a
Code: 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 <74> 13 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00