Kerneloops

Similar reports
Problem #620990
Component
kernel Tainted
Last affected version
0:3.10.0-1160.71.1.el7
Executable
unknown
First occurrence
2025-12-13
Last occurrence
2025-12-13
Unique reports
1
Quality
-52

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.71.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff8911bd63
Build id: 3.10.0-1160.71.1.el7.x86_64
0x53
2
context_struct_compute_av
vmlinux 0xffffffff891235d1
Build id: 3.10.0-1160.71.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffff89124734
Build id: 3.10.0-1160.71.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffff89585545
Build id: 3.10.0-1160.71.1.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffff8910bd2f
Build id: 3.10.0-1160.71.1.el7.x86_64
0xcf
6
? page_fault
vmlinux 0xffffffff89590778
Build id: 3.10.0-1160.71.1.el7.x86_64
0x28
7
? __radix_tree_lookup
vmlinux 0xffffffff8918da64
Build id: 3.10.0-1160.71.1.el7.x86_64
0x84
8
selinux_inode_permission
vmlinux 0xffffffff89113b93
Build id: 3.10.0-1160.71.1.el7.x86_64
0xe3
9
security_inode_permission
vmlinux 0xffffffff89108e82
Build id: 3.10.0-1160.71.1.el7.x86_64
0x22
10
__inode_permission
vmlinux 0xffffffff89059f22
Build id: 3.10.0-1160.71.1.el7.x86_64
0x52
11
inode_permission
vmlinux 0xffffffff89059fb8
Build id: 3.10.0-1160.71.1.el7.x86_64
0x18
12
link_path_walk
vmlinux 0xffffffff8905c491
Build id: 3.10.0-1160.71.1.el7.x86_64
0x81
13
? kmem_cache_alloc_trace
vmlinux 0xffffffff890293c6
Build id: 3.10.0-1160.71.1.el7.x86_64
0x1d6
14
path_openat
vmlinux 0xffffffff8905f27e
Build id: 3.10.0-1160.71.1.el7.x86_64
0xae
15
? do_read_fault.isra.63
vmlinux 0xffffffff88feee99
Build id: 3.10.0-1160.71.1.el7.x86_64
0x139
16
do_filp_open
vmlinux 0xffffffff890614ed
Build id: 3.10.0-1160.71.1.el7.x86_64
0x4d
17
? __alloc_fd
vmlinux 0xffffffff8906f6b2
Build id: 3.10.0-1160.71.1.el7.x86_64
0xc2
18
do_sys_open
vmlinux 0xffffffff8904d3c4
Build id: 3.10.0-1160.71.1.el7.x86_64
0x124
19
? system_call_after_swapgs
vmlinux 0xffffffff89599ec9
Build id: 3.10.0-1160.71.1.el7.x86_64
0x96
20
SyS_open
vmlinux 0xffffffff8904d4de
Build id: 3.10.0-1160.71.1.el7.x86_64
0x1e
21
system_call_fastpath
vmlinux 0xffffffff89599f92
Build id: 3.10.0-1160.71.1.el7.x86_64
0x25
22
? system_call_after_swapgs
vmlinux 0xffffffff89599ed5
Build id: 3.10.0-1160.71.1.el7.x86_64
0xa2
NMI watchdog: BUG: soft lockup - CPU#3 stuck for 3285s! [cleanup:4819]
Modules linked in: tcp_lp xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vboxsf(OE) sunrpc joydev ppdev crc32_pclmul snd_intel8x0 ghash_clmulni_intel aesni_intel lrw snd_ac97_codec gf128mul ac97_bus glue_helper snd_seq ablk_helper cryptd snd_seq_device vboxguest(OE) snd_pcm sg snd_timer snd parport_pc soundcore parport i2c_piix4 video pcspkr ip_tables xfs libcrc32c
sd_mod sr_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper e1000 syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ahci libahci drm crct10dif_pclmul crct10dif_common ata_piix libata crc32c_intel serio_raw drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 3 PID: 4819 Comm: cleanup Kdump: loaded Tainted: G           OEL ------------   3.10.0-1160.71.1.el7.x86_64 #1
Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
task: ffff8af1cc016300 ti: ffff8af295258000 task.ti: ffff8af295258000
RIP: 0010:[<ffffffff8911bd63>]  [<ffffffff8911bd63>] avtab_search_node+0x53/0x90
RSP: 0018:ffff8af29525ba60  EFLAGS: 00000206
RAX: ffff8af25bbd0690 RBX: ffff8af1d5b221b0 RCX: 0000000000000403
RDX: 0000000000000cdb RSI: 0000000000000007 RDI: ffffffff8a04c6c8
RBP: ffff8af29525ba60 R08: 0000000000000707 R09: ffff8af25bba0000
R10: 0000000000001013 R11: 0000000000000004 R12: fffff085816568c0
R13: ffff8af1cc320c80 R14: 0000000000000001 R15: 0000000000000001
FS:  00007f37c242c880(0000) GS:ffff8af2d5580000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f37bec686a0 CR3: 0000000050de4000 CR4: 00000000000606e0
Call Trace:
[<ffffffff891235d1>] context_struct_compute_av+0x1d1/0x4d0
[<ffffffff89124734>] security_compute_av+0x104/0x2f0
[<ffffffff89585545>] avc_compute_av+0x41/0x1e4
[<ffffffff8910bd2f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffff89590778>] ? page_fault+0x28/0x30
[<ffffffff8918da64>] ? __radix_tree_lookup+0x84/0xf0
[<ffffffff89113b93>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff89108e82>] security_inode_permission+0x22/0x30
[<ffffffff89059f22>] __inode_permission+0x52/0xd0
[<ffffffff89059fb8>] inode_permission+0x18/0x50
[<ffffffff8905c491>] link_path_walk+0x81/0x8b0
[<ffffffff890293c6>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffff8905f27e>] path_openat+0xae/0x5a0
[<ffffffff88feee99>] ? do_read_fault.isra.63+0x139/0x1b0
[<ffffffff890614ed>] do_filp_open+0x4d/0xb0
[<ffffffff8906f6b2>] ? __alloc_fd+0xc2/0x170
[<ffffffff8904d3c4>] do_sys_open+0x124/0x220
[<ffffffff89599ec9>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8904d4de>] SyS_open+0x1e/0x20
[<ffffffff89599f92>] system_call_fastpath+0x25/0x2a
[<ffffffff89599ed5>] ? system_call_after_swapgs+0xa2/0x13a
Code: 0f b7 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 <74> 13 72 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 0f 1f 40 00