Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-1160.71.1.el7
Executable
unknown
First occurrence
2025-10-28
Last occurrence
2025-10-28
Unique reports
1
Quality
-47

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.71.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff99b1bd65
Build id: 3.10.0-1160.71.1.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffff99b235d1
Build id: 3.10.0-1160.71.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffff99b24734
Build id: 3.10.0-1160.71.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffff99f85545
Build id: 3.10.0-1160.71.1.el7.x86_64
0x41
5
? finish_task_switch
vmlinux 0xffffffff998d4bee
Build id: 3.10.0-1160.71.1.el7.x86_64
0x4e
6
avc_has_perm_noaudit
vmlinux 0xffffffff99b0bd2f
Build id: 3.10.0-1160.71.1.el7.x86_64
0xcf
7
selinux_inode_permission
vmlinux 0xffffffff99b13b93
Build id: 3.10.0-1160.71.1.el7.x86_64
0xe3
8
security_inode_permission
vmlinux 0xffffffff99b08e82
Build id: 3.10.0-1160.71.1.el7.x86_64
0x22
9
__inode_permission
vmlinux 0xffffffff99a59f22
Build id: 3.10.0-1160.71.1.el7.x86_64
0x52
10
inode_permission
vmlinux 0xffffffff99a59fb8
Build id: 3.10.0-1160.71.1.el7.x86_64
0x18
11
may_open
vmlinux 0xffffffff99a5a16a
Build id: 3.10.0-1160.71.1.el7.x86_64
0x5a
12
do_last
vmlinux 0xffffffff99a5e050
Build id: 3.10.0-1160.71.1.el7.x86_64
0x1c0
13
? kmem_cache_alloc_trace
vmlinux 0xffffffff99a293c6
Build id: 3.10.0-1160.71.1.el7.x86_64
0x1d6
14
path_openat
vmlinux 0xffffffff99a5f29d
Build id: 3.10.0-1160.71.1.el7.x86_64
0xcd
15
do_filp_open
vmlinux 0xffffffff99a614ed
Build id: 3.10.0-1160.71.1.el7.x86_64
0x4d
16
? __alloc_fd
vmlinux 0xffffffff99a6f6b2
Build id: 3.10.0-1160.71.1.el7.x86_64
0xc2
17
do_sys_open
vmlinux 0xffffffff99a4d3c4
Build id: 3.10.0-1160.71.1.el7.x86_64
0x124
18
? system_call_after_swapgs
vmlinux 0xffffffff99f99ec9
Build id: 3.10.0-1160.71.1.el7.x86_64
0x96
19
SyS_open
vmlinux 0xffffffff99a4d4de
Build id: 3.10.0-1160.71.1.el7.x86_64
0x1e
20
system_call_fastpath
vmlinux 0xffffffff99f99f92
Build id: 3.10.0-1160.71.1.el7.x86_64
0x25
21
? system_call_after_swapgs
vmlinux 0xffffffff99f99ed5
Build id: 3.10.0-1160.71.1.el7.x86_64
0xa2
NMI watchdog: BUG: soft lockup - CPU#3 stuck for 122s! [systemd-journal:514]
Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables devlink ip6table_filter ip6_tables iptable_filter sunrpc snd_intel8x0 crc32_pclmul snd_ac97_codec ac97_bus snd_seq ghash_clmulni_intel snd_seq_device snd_pcm iTCO_wdt iTCO_vendor_support aesni_intel ppdev lrw gf128mul glue_helper ablk_helper snd_timer sg cryptd snd pcspkr lpc_ich parport_pc soundcore video i2c_piix4 parport ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi serio_raw vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ahci libahci ata_piix e1000 libata crct10dif_pclmul
crct10dif_common crc32c_intel drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 3 PID: 514 Comm: systemd-journal Kdump: loaded Not tainted 3.10.0-1160.71.1.el7.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
task: ffff950c7440c200 ti: ffff950c74d2c000 task.ti: ffff950c74d2c000
RIP: 0010:[<ffffffff99b1bd65>]  [<ffffffff99b1bd65>] avtab_search_node+0x55/0x90
RSP: 0018:ffff950c74d2fa40  EFLAGS: 00000206
RAX: ffff950cba374570 RBX: 000000000000015f RCX: 00000000000000c6
RDX: 0000000000000cd9 RSI: 0000000000000006 RDI: ffffffff9aa4c6c8
RBP: ffff950c74d2fa40 R08: 0000000000000707 R09: ffff950c74cec000
R10: 000000000000031e R11: 0000000000000293 R12: 0000000000000707
R13: ffff950cba2e0000 R14: 0000000000000582 R15: 0000000000000293
FS:  00007f573c68c880(0000) GS:ffff950cbfd80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb623071000 CR3: 000000007a5da000 CR4: 00000000000606e0
Call Trace:
[<ffffffff99b235d1>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffff99b24734>] security_compute_av+0x104/0x2f0
[<ffffffff99f85545>] avc_compute_av+0x41/0x1e4
[<ffffffff998d4bee>] ? finish_task_switch+0x4e/0x1c0
[<ffffffff99b0bd2f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffff99b13b93>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff99b08e82>] security_inode_permission+0x22/0x30
[<ffffffff99a59f22>] __inode_permission+0x52/0xd0
[<ffffffff99a59fb8>] inode_permission+0x18/0x50
[<ffffffff99a5a16a>] may_open+0x5a/0x120
[<ffffffff99a5e050>] do_last+0x1c0/0x1340
[<ffffffff99a293c6>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffff99a5f29d>] path_openat+0xcd/0x5a0
[<ffffffff99a614ed>] do_filp_open+0x4d/0xb0
[<ffffffff99a6f6b2>] ? __alloc_fd+0xc2/0x170
[<ffffffff99a4d3c4>] do_sys_open+0x124/0x220
[<ffffffff99f99ec9>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff99a4d4de>] SyS_open+0x1e/0x20
[<ffffffff99f99f92>] system_call_fastpath+0x25/0x2a
[<ffffffff99f99ed5>] ? system_call_after_swapgs+0xa2/0x13a
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 13 <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00 66 3b