Kerneloops

Similar reports
Problem #620990
Component
kernel Tainted
Last affected version
0:3.10.0-1160.el7
Executable
unknown
First occurrence
2024-03-07
Last occurrence
2024-03-07
Unique reports
1
Quality
-43

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffffafd1b510
Build id: 3.10.0-1160.el7.x86_64
0x60
2
context_struct_compute_av
vmlinux 0xffffffffafd22d11
Build id: 3.10.0-1160.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffffafd23e74
Build id: 3.10.0-1160.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffffb01802bc
Build id: 3.10.0-1160.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffffafd0b4ef
Build id: 3.10.0-1160.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffffafd13333
Build id: 3.10.0-1160.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffffafd08642
Build id: 3.10.0-1160.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffffafc598c2
Build id: 3.10.0-1160.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffffafc59958
Build id: 3.10.0-1160.el7.x86_64
0x18
10
link_path_walk
vmlinux 0xffffffffafc5c03e
Build id: 3.10.0-1160.el7.x86_64
0x27e
11
? xfs_iunlock
xfs 0xffffffffc025b389
Build id: 3.10.0-1160.el7.x86_64
0xa9
12
path_openat
vmlinux 0xffffffffafc5f071
Build id: 3.10.0-1160.el7.x86_64
0x4f1
13
do_filp_open
vmlinux 0xffffffffafc60e9d
Build id: 3.10.0-1160.el7.x86_64
0x4d
14
? __alloc_fd
vmlinux 0xffffffffafc6f012
Build id: 3.10.0-1160.el7.x86_64
0xc2
15
do_sys_open
vmlinux 0xffffffffafc4c9e4
Build id: 3.10.0-1160.el7.x86_64
0x124
16
? system_call_after_swapgs
vmlinux 0xffffffffb0193ec9
Build id: 3.10.0-1160.el7.x86_64
0x96
17
SyS_open
vmlinux 0xffffffffafc4cafe
Build id: 3.10.0-1160.el7.x86_64
0x1e
18
system_call_fastpath
vmlinux 0xffffffffb0193f92
Build id: 3.10.0-1160.el7.x86_64
0x25
19
? system_call_after_swapgs
vmlinux 0xffffffffb0193ed5
Build id: 3.10.0-1160.el7.x86_64
0xa2
NMI watchdog: BUG: soft lockup - CPU#1 stuck for 32768s! [gsd-color:2627]
Modules linked in: tcp_lp nls_utf8 isofs xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc crc32_pclmul vboxvideo(OE) snd_intel8x0 snd_ac97_codec ghash_clmulni_intel ac97_bus ttm snd_seq snd_seq_device drm_kms_helper aesni_intel joydev syscopyarea sysfillrect lrw snd_pcm ppdev sysimgblt gf128mul fb_sys_fops glue_helper ablk_helper cryptd drm snd_timer
sg vboxguest(OE) snd parport_pc parport video i2c_piix4 drm_panel_orientation_quirks soundcore pcspkr ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi ahci ata_piix crct10dif_pclmul crct10dif_common libahci crc32c_intel serio_raw libata e1000 dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 1 PID: 2627 Comm: gsd-color Kdump: loaded Tainted: G           OEL ------------   3.10.0-1160.el7.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
task: ffff898c5232a100 ti: ffff898bf31a8000 task.ti: ffff898bf31a8000
RIP: 0010:[<ffffffffafd1b510>]  [<ffffffffafd1b510>] avtab_search_node+0x60/0x90
RSP: 0018:ffff898bf31aba60  EFLAGS: 00010287
RAX: ffff898c1bbb0ba0 RBX: ffffffffafaca1a9 RCX: 0000000000000138
RDX: 000000000000013b RSI: 0000000000000007 RDI: ffffffffb0c4c6c8
RBP: ffff898bf31aba60 R08: 0000000000000707 R09: ffff898c1b914000
R10: 00000000000004e7 R11: ffff898c1ad8bc00 R12: 0000000000000040
R13: 0000000080285607 R14: 00000000000f423f R15: 0000000000000000
FS:  00007f8bf0940a40(0000) GS:ffff898c5fc80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff108cdd760 CR3: 00000000b3396000 CR4: 00000000000206e0
Call Trace:
[<ffffffffafd22d11>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffffafd23e74>] security_compute_av+0x104/0x2f0
[<ffffffffb01802bc>] avc_compute_av+0x41/0x1e4
[<ffffffffafd0b4ef>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffffafd13333>] selinux_inode_permission+0xe3/0x1b0
[<ffffffffafd08642>] security_inode_permission+0x22/0x30
[<ffffffffafc598c2>] __inode_permission+0x52/0xd0
[<ffffffffafc59958>] inode_permission+0x18/0x50
[<ffffffffafc5c03e>] link_path_walk+0x27e/0x8b0
[<ffffffffc025b389>] ? xfs_iunlock+0xa9/0x120 [xfs]
[<ffffffffafc5f071>] path_openat+0x4f1/0x5a0
[<ffffffffafc60e9d>] do_filp_open+0x4d/0xb0
[<ffffffffafc6f012>] ? __alloc_fd+0xc2/0x170
[<ffffffffafc4c9e4>] do_sys_open+0x124/0x220
[<ffffffffb0193ec9>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffffafc4cafe>] SyS_open+0x1e/0x20
[<ffffffffb0193f92>] system_call_fastpath+0x25/0x2a
[<ffffffffb0193ed5>] ? system_call_after_swapgs+0xa2/0x13a
Code: 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 72 09 48 8b 40 10 48 85 c0 75 f0 <31> c0 5d c3 0f 1f 40 00 66 3b 48 02 75 e7 66 3b 70 04 74 0c 66