Kerneloops

Similar reports
Problem #620990
Component
kernel
Last affected version
0:3.10.0-1160.119.1.el7
Executable
unknown
First occurrence
2025-09-02
Last occurrence
2025-09-02
Unique reports
1
Quality
-39

Statistics

Operating system Unique / Total count
CentOS 7 1 / 1
Operating system Count
CentOS 7 1
Architecture Count
x86_64 1
Related packages Count
kernel 1
 0:3.10.0-1160.119.1.el7 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
avtab_search_node
vmlinux 0xffffffff9bb2f3a5
Build id: 3.10.0-1160.119.1.el7.x86_64
0x55
2
context_struct_compute_av
vmlinux 0xffffffff9bb36e91
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1d1
3
security_compute_av
vmlinux 0xffffffff9bb38034
Build id: 3.10.0-1160.119.1.el7.x86_64
0x104
4
avc_compute_av
vmlinux 0xffffffff9bfb0b44
Build id: 3.10.0-1160.119.1.el7.x86_64
0x41
5
avc_has_perm_noaudit
vmlinux 0xffffffff9bb1ed8f
Build id: 3.10.0-1160.119.1.el7.x86_64
0xcf
6
selinux_inode_permission
vmlinux 0xffffffff9bb26f93
Build id: 3.10.0-1160.119.1.el7.x86_64
0xe3
7
security_inode_permission
vmlinux 0xffffffff9bb1af42
Build id: 3.10.0-1160.119.1.el7.x86_64
0x22
8
__inode_permission
vmlinux 0xffffffff9ba67d02
Build id: 3.10.0-1160.119.1.el7.x86_64
0x52
9
inode_permission
vmlinux 0xffffffff9ba67da8
Build id: 3.10.0-1160.119.1.el7.x86_64
0x18
10
link_path_walk
vmlinux 0xffffffff9ba6ac8e
Build id: 3.10.0-1160.119.1.el7.x86_64
0x27e
11
? kmem_cache_alloc_trace
vmlinux 0xffffffff9ba35f56
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1d6
12
path_openat
vmlinux 0xffffffff9ba6db4e
Build id: 3.10.0-1160.119.1.el7.x86_64
0xae
13
? arch_tlb_finish_mmu
vmlinux 0xffffffff9b9fbc57
Build id: 3.10.0-1160.119.1.el7.x86_64
0x47
14
do_filp_open
vmlinux 0xffffffff9ba6f52d
Build id: 3.10.0-1160.119.1.el7.x86_64
0x4d
15
? __alloc_fd
vmlinux 0xffffffff9ba7dd97
Build id: 3.10.0-1160.119.1.el7.x86_64
0x47
16
do_sys_open
vmlinux 0xffffffff9ba5abf4
Build id: 3.10.0-1160.119.1.el7.x86_64
0x124
17
SyS_open
vmlinux 0xffffffff9ba5ad0e
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1e
18
system_call_fastpath
vmlinux 0xffffffff9bfc539a
Build id: 3.10.0-1160.119.1.el7.x86_64
0x25
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 3353s! [systemd:1]
Modules linked in: binfmt_misc tcp_lp rfcomm xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock bnep sunrpc dm_mirror dm_region_hash dm_log dm_mod snd_seq_midi snd_seq_midi_event iosf_mbi crc32_pclmul ghash_clmulni_intel btusb btrtl btbcm btintel ppdev snd_ens1371 aesni_intel snd_rawmidi bluetooth snd_ac97_codec lrw gf128mul ac97_bus
vmw_balloon glue_helper snd_seq ablk_helper cryptd snd_seq_device snd_pcm joydev rfkill snd_timer pcspkr snd sg soundcore vmw_vmci i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm nfit crct10dif_pclmul crct10dif_common crc32c_intel ata_piix libnvdimm mptspi libata scsi_transport_spi serio_raw mptscsih e1000 mptbase drm_panel_orientation_quirks fuse
CPU: 0 PID: 1 Comm: systemd Kdump: loaded Tainted: G             L ------------   3.10.0-1160.119.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/29/2019
task: ffff9c92b65b0000 ti: ffff9c92b65b8000 task.ti: ffff9c92b65b8000
RIP: 0010:[<ffffffff9bb2f3a5>]  [<ffffffff9bb2f3a5>] avtab_search_node+0x55/0xa0
RSP: 0018:ffff9c92b65bba60  EFLAGS: 00000202
RAX: ffff9c92390aed80 RBX: 0000000000000000 RCX: 0000000000000145
RDX: 000000000000122e RSI: 0000000000000007 RDI: ffffffff9ca7d6c8
RBP: ffff9c92b65bba60 R08: 0000000000000707 R09: ffff9c9239090000
R10: 000000000000051b R11: ffffe537009e4fc0 R12: ffffffff9bb36747
R13: ffff9c92b65bba40 R14: 0000000000000002 R15: ffff9c92bffd9008
FS:  00007f8960d8b940(0000) GS:ffff9c92b9600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055bc0676a378 CR3: 00000001301e8000 CR4: 00000000003607f0
Call Trace:
[<ffffffff9bb36e91>] context_struct_compute_av+0x1d1/0x4e0
[<ffffffff9bb38034>] security_compute_av+0x104/0x2f0
[<ffffffff9bfb0b44>] avc_compute_av+0x41/0x1e8
[<ffffffff9bb1ed8f>] avc_has_perm_noaudit+0xcf/0x140
[<ffffffff9bb26f93>] selinux_inode_permission+0xe3/0x1b0
[<ffffffff9bb1af42>] security_inode_permission+0x22/0x30
[<ffffffff9ba67d02>] __inode_permission+0x52/0xe0
[<ffffffff9ba67da8>] inode_permission+0x18/0x50
[<ffffffff9ba6ac8e>] link_path_walk+0x27e/0x8b0
[<ffffffff9ba35f56>] ? kmem_cache_alloc_trace+0x1d6/0x200
[<ffffffff9ba6db4e>] path_openat+0xae/0x5a0
[<ffffffff9b9fbc57>] ? arch_tlb_finish_mmu+0x47/0x80
[<ffffffff9ba6f52d>] do_filp_open+0x4d/0xc0
[<ffffffff9ba7dd97>] ? __alloc_fd+0x47/0x180
[<ffffffff9ba5abf4>] do_sys_open+0x124/0x220
[<ffffffff9ba5ad0e>] SyS_open+0x1e/0x30
[<ffffffff9bfc539a>] system_call_fastpath+0x25/0x2a
Code: 76 04 44 0f b7 d1 0f b7 c6 46 8d 14 90 0f b7 c2 c1 e0 09 44 01 d0 66 23 47 10 0f b7 c0 49 8b 04 c1 48 85 c0 74 10 66 3b 10 74 1b <72> 09 48 8b 40 10 48 85 c0 75 f0 31 c0 5d c3 cc cc cc cc 0f 1f