Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-862.2.3.el7
Executable
unknown
First occurrence
2023-03-19
Last occurrence
2023-03-19
Unique reports
1
Quality
-44

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-862.2.3.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff8e2e1ec0
Build id: 3.10.0-862.2.3.el7.x86_64
0x50
2
context_struct_compute_av
vmlinux 0xffffffff8e2e9489
Build id: 3.10.0-862.2.3.el7.x86_64
0x1a9
3
security_compute_av
vmlinux 0xffffffff8e2e9f69
Build id: 3.10.0-862.2.3.el7.x86_64
0xf9
4
avc_compute_av
vmlinux 0xffffffff8e70c927
Build id: 3.10.0-862.2.3.el7.x86_64
0x34
5
avc_has_perm_noaudit
vmlinux 0xffffffff8e2d2d53
Build id: 3.10.0-862.2.3.el7.x86_64
0xc3
6
selinux_inode_permission
vmlinux 0xffffffff8e2d6233
Build id: 3.10.0-862.2.3.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffff8e2d05d2
Build id: 3.10.0-862.2.3.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffff8e226932
Build id: 3.10.0-862.2.3.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffff8e2269c8
Build id: 3.10.0-862.2.3.el7.x86_64
0x18
10
may_open
vmlinux 0xffffffff8e226a68
Build id: 3.10.0-862.2.3.el7.x86_64
0x68
11
do_last
vmlinux 0xffffffff8e22aa87
Build id: 3.10.0-862.2.3.el7.x86_64
0x1b7
12
path_openat
vmlinux 0xffffffff8e22bc67
Build id: 3.10.0-862.2.3.el7.x86_64
0xd7
13
? handle_pte_fault
vmlinux 0xffffffff8e1c530d
Build id: 3.10.0-862.2.3.el7.x86_64
0x36d
14
do_filp_open
vmlinux 0xffffffff8e22d7fd
Build id: 3.10.0-862.2.3.el7.x86_64
0x4d
15
? __alloc_fd
vmlinux 0xffffffff8e23ac77
Build id: 3.10.0-862.2.3.el7.x86_64
0x47
16
do_sys_open
vmlinux 0xffffffff8e219b07
Build id: 3.10.0-862.2.3.el7.x86_64
0x137
17
? system_call_after_swapgs
vmlinux 0xffffffff8e71f6d5
Build id: 3.10.0-862.2.3.el7.x86_64
0xa2
18
SyS_open
vmlinux 0xffffffff8e219c2e
Build id: 3.10.0-862.2.3.el7.x86_64
0x1e
19
system_call_fastpath
vmlinux 0xffffffff8e71f795
Build id: 3.10.0-862.2.3.el7.x86_64
0x1c
20
? system_call_after_swapgs
vmlinux 0xffffffff8e71f6e1
Build id: 3.10.0-862.2.3.el7.x86_64
0xae
NMI watchdog: BUG: soft lockup - CPU#12 stuck for 27s! [crond:1361]
Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter devlink vmw_vsock_vmci_transport vsock sunrpc ext4 mbcache jbd2 sb_edac iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ppdev vmw_balloon joydev pcspkr sg vmw_vmci i2c_piix4 shpchp parport_pc nfit parport libnvdimm ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix drm libata mptspi scsi_transport_spi mptscsih mptbase crct10dif_pclmul
crct10dif_common crc32c_intel serio_raw vmxnet3 i2c_core floppy dm_mirror dm_region_hash dm_log dm_mod
CPU: 12 PID: 1361 Comm: crond Kdump: loaded Not tainted 3.10.0-862.2.3.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
task: ffff8adb99352f70 ti: ffff8adb96270000 task.ti: ffff8adb96270000
RIP: 0010:[<ffffffff8e2e1ec0>]  [<ffffffff8e2e1ec0>] avtab_search_node+0x50/0x90
RSP: 0018:ffff8adb96273ab8  EFLAGS: 00010282
RAX: ffff8ad3b5e50858 RBX: 0000000000000007 RCX: 0000000000000149
RDX: 000000000000131c RSI: 0000000000000006 RDI: ffffffff8f207e08
RBP: ffff8adb96273ab8 R08: 0000000000000007 R09: ffff8adb9e2a0000
R10: 000000000000052a R11: 0000000000000006 R12: 00000000000003ce
R13: 0000000000000006 R14: ffff8adb96273db8 R15: ffff8adb96273a98
FS:  00007f849bdd9840(0000) GS:ffff8adb9f500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055fbf7b90708 CR3: 0000000035638000 CR4: 00000000000407e0
Call Trace:
[<ffffffff8e2e9489>] context_struct_compute_av+0x1a9/0x470
[<ffffffff8e2e9f69>] security_compute_av+0xf9/0x2e0
[<ffffffff8e70c927>] avc_compute_av+0x34/0x1b5
[<ffffffff8e2d2d53>] avc_has_perm_noaudit+0xc3/0x110
[<ffffffff8e2d6233>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff8e2d05d2>] security_inode_permission+0x22/0x30
[<ffffffff8e226932>] __inode_permission+0x52/0xd0
[<ffffffff8e2269c8>] inode_permission+0x18/0x50
[<ffffffff8e226a68>] may_open+0x68/0x120
[<ffffffff8e22aa87>] do_last+0x1b7/0x12c0
[<ffffffff8e22bc67>] path_openat+0xd7/0x640
[<ffffffff8e1c530d>] ? handle_pte_fault+0x36d/0xc30
[<ffffffff8e22d7fd>] do_filp_open+0x4d/0xb0
[<ffffffff8e23ac77>] ? __alloc_fd+0x47/0x170
[<ffffffff8e219b07>] do_sys_open+0x137/0x240
[<ffffffff8e71f6d5>] ? system_call_after_swapgs+0xa2/0x146
[<ffffffff8e219c2e>] SyS_open+0x1e/0x20
[<ffffffff8e71f795>] system_call_fastpath+0x1c/0x21
[<ffffffff8e71f6e1>] ? system_call_after_swapgs+0xae/0x146
Code: b7 4e 02 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 <66> 3b 10 74 13 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f