| Operating system | Unique / Total count |
|---|---|
| CentOS 7 | 4 / 14 |
| Operating system | Count |
|---|---|
| CentOS 7 | 14 |
| Architecture | Count |
|---|---|
| x86_64 | 14 |
| Related packages | Count |
|---|---|
| kernel | 14 |
Packages names with count less than the total count of reports are most probably not the cause of the problem.
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 days.
No reports in the last 20 weeks.
BUG: scheduling while atomic: java/30641/0x10000200 Modules linked in: protection_agent(OE) binfmt_misc tcp_diag udp_diag inet_diag tcp_lp xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables devlink iptable_filter vmw_vsock_vmci_transport vsock sunrpc coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper vmw_balloon ablk_helper cryptd joydev pcspkr sg vmw_vmci i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common ahci crc32c_intel nfit serio_raw libnvdimm drm libahci ata_piix vmw_pvscsi e1000 libata drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: protection_agent] CPU: 2 PID: 30641 Comm: java Kdump: loaded Tainted: G OE ------------ 3.10.0-1160.76.1.el7.x86_64 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016 Call Trace: [<ffffffff899865c9>] dump_stack+0x19/0x1b [<ffffffff899808f3>] __schedule_bug+0x64/0x72 [<ffffffff8998c38d>] __schedule+0x63d/0x680 [<ffffffff892d77c6>] __cond_resched+0x26/0x30 [<ffffffff8998c69a>] _cond_resched+0x3a/0x50 [<ffffffff89428b55>] __kmalloc+0x55/0x230 [<ffffffffc093b376>] ? avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent] [<ffffffffc093b376>] avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent] [<ffffffffc093b6ee>] avpm_event_socket_listen+0x9e/0x170 [protection_agent] [<ffffffffc0930793>] kauth_socket_graft_hook+0x53/0x90 [protection_agent] [<ffffffff898e1f9e>] inet_accept+0xce/0x130 [<ffffffff89838fb9>] SYSC_accept4+0x109/0x230 [<ffffffff898b4da8>] ? do_tcp_setsockopt.isra.31+0x1a8/0x940 [<ffffffff898408b8>] ? sock_setsockopt+0x1a8/0x8f0 [<ffffffff8983b57e>] SyS_accept4+0xe/0x10 [<ffffffff8983b590>] SyS_accept+0x10/0x20 [<ffffffff89999f92>] system_call_fastpath+0x25/0x2a