Kerneloops

Similar reports
Problem #743819
Component
kernel Tainted
Last affected version
0:3.10.0-1160.76.1.el7
Executable
unknown
First occurrence
2025-04-03
Last occurrence
2025-07-09
Unique reports
4
Quality
-38

Statistics

Operating system Unique / Total count
CentOS 7 4 / 14
Operating system Count
CentOS 7 14
Architecture Count
x86_64 14
Related packages Count
kernel 14
 0:3.10.0-1160.76.1.el7 14

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff899865c9
Build id: 3.10.0-1160.76.1.el7.x86_64
0x19
2
__schedule_bug
vmlinux 0xffffffff899808f3
Build id: 3.10.0-1160.76.1.el7.x86_64
0x64
3
__schedule
vmlinux 0xffffffff8998c38d
Build id: 3.10.0-1160.76.1.el7.x86_64
0x63d
4
__cond_resched
vmlinux 0xffffffff892d77c6
Build id: 3.10.0-1160.76.1.el7.x86_64
0x26
5
_cond_resched
vmlinux 0xffffffff8998c69a
Build id: 3.10.0-1160.76.1.el7.x86_64
0x3a
6
__kmalloc
vmlinux 0xffffffff89428b55
Build id: 3.10.0-1160.76.1.el7.x86_64
0x55
7
? avpm_get_details_from_sock
protection_agent 0xffffffffc093b376
Build id: 3.10.0-1160.76.1.el7.x86_64
0x1c6
8
avpm_get_details_from_sock
protection_agent 0xffffffffc093b376
Build id: 3.10.0-1160.76.1.el7.x86_64
0x1c6
9
avpm_event_socket_listen
protection_agent 0xffffffffc093b6ee
Build id: 3.10.0-1160.76.1.el7.x86_64
0x9e
10
kauth_socket_graft_hook
protection_agent 0xffffffffc0930793
Build id: 3.10.0-1160.76.1.el7.x86_64
0x53
11
inet_accept
vmlinux 0xffffffff898e1f9e
Build id: 3.10.0-1160.76.1.el7.x86_64
0xce
12
SYSC_accept4
vmlinux 0xffffffff89838fb9
Build id: 3.10.0-1160.76.1.el7.x86_64
0x109
13
? do_tcp_setsockopt.isra.31
vmlinux 0xffffffff898b4da8
Build id: 3.10.0-1160.76.1.el7.x86_64
0x1a8
14
? sock_setsockopt
vmlinux 0xffffffff898408b8
Build id: 3.10.0-1160.76.1.el7.x86_64
0x1a8
15
SyS_accept4
vmlinux 0xffffffff8983b57e
Build id: 3.10.0-1160.76.1.el7.x86_64
0xe
16
SyS_accept
vmlinux 0xffffffff8983b590
Build id: 3.10.0-1160.76.1.el7.x86_64
0x10
17
system_call_fastpath
vmlinux 0xffffffff89999f92
Build id: 3.10.0-1160.76.1.el7.x86_64
0x25
BUG: scheduling while atomic: java/30641/0x10000200
Modules linked in: protection_agent(OE) binfmt_misc tcp_diag udp_diag inet_diag tcp_lp xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables devlink iptable_filter vmw_vsock_vmci_transport vsock sunrpc coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper vmw_balloon ablk_helper cryptd joydev pcspkr sg vmw_vmci i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common ahci crc32c_intel
nfit serio_raw libnvdimm drm libahci ata_piix vmw_pvscsi e1000 libata drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: protection_agent]
CPU: 2 PID: 30641 Comm: java Kdump: loaded Tainted: G           OE  ------------   3.10.0-1160.76.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016
Call Trace:
[<ffffffff899865c9>] dump_stack+0x19/0x1b
[<ffffffff899808f3>] __schedule_bug+0x64/0x72
[<ffffffff8998c38d>] __schedule+0x63d/0x680
[<ffffffff892d77c6>] __cond_resched+0x26/0x30
[<ffffffff8998c69a>] _cond_resched+0x3a/0x50
[<ffffffff89428b55>] __kmalloc+0x55/0x230
[<ffffffffc093b376>] ? avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc093b376>] avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc093b6ee>] avpm_event_socket_listen+0x9e/0x170 [protection_agent]
[<ffffffffc0930793>] kauth_socket_graft_hook+0x53/0x90 [protection_agent]
[<ffffffff898e1f9e>] inet_accept+0xce/0x130
[<ffffffff89838fb9>] SYSC_accept4+0x109/0x230
[<ffffffff898b4da8>] ? do_tcp_setsockopt.isra.31+0x1a8/0x940
[<ffffffff898408b8>] ? sock_setsockopt+0x1a8/0x8f0
[<ffffffff8983b57e>] SyS_accept4+0xe/0x10
[<ffffffff8983b590>] SyS_accept+0x10/0x20
[<ffffffff89999f92>] system_call_fastpath+0x25/0x2a