Info

Permalink
Function
__schedule_bug
First occurrence
2025-03-27
Last occurrence
2026-01-14
State
NEW
Components
kernel Tainted
Quality
-32

Statistics

Operating system Count
CentOS 7 287
Architecture Count
x86_64 287
Related packages Count
kernel 287
 0:3.10.0-1062.9.1.el7 154
 0:3.10.0-1160.119.1.el7 68
 0:3.10.0-1160.118.1.el7 41
 0:3.10.0-1160.76.1.el7 19
 0:3.10.0-1160.114.2.el7 5

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

Report backtrace


Complete report #1274668
Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff8f7865c9
Build id: 3.10.0-1160.76.1.el7.x86_64
0x19
2
__schedule_bug
vmlinux 0xffffffff8f7808f3
Build id: 3.10.0-1160.76.1.el7.x86_64
0x64
3
__schedule
vmlinux 0xffffffff8f78c38d
Build id: 3.10.0-1160.76.1.el7.x86_64
0x63d
4
__cond_resched
vmlinux 0xffffffff8f0d77c6
Build id: 3.10.0-1160.76.1.el7.x86_64
0x26
5
_cond_resched
vmlinux 0xffffffff8f78c69a
Build id: 3.10.0-1160.76.1.el7.x86_64
0x3a
6
__kmalloc
vmlinux 0xffffffff8f228b55
Build id: 3.10.0-1160.76.1.el7.x86_64
0x55
7
? avpm_get_details_from_sock
protection_agent 0xffffffffc09613d1
Build id: 3.10.0-1160.76.1.el7.x86_64
0x201
8
avpm_get_details_from_sock
protection_agent 0xffffffffc09613d1
Build id: 3.10.0-1160.76.1.el7.x86_64
0x201
9
avpm_event_socket_flow_establish
protection_agent 0xffffffffc09618cc
Build id: 3.10.0-1160.76.1.el7.x86_64
0xfc
10
kauth_socket_graft_hook
protection_agent 0xffffffffc0956793
Build id: 3.10.0-1160.76.1.el7.x86_64
0x53
11
inet_accept
vmlinux 0xffffffff8f6e1f9e
Build id: 3.10.0-1160.76.1.el7.x86_64
0xce
12
SYSC_accept4
vmlinux 0xffffffff8f638fb9
Build id: 3.10.0-1160.76.1.el7.x86_64
0x109
13
? recalc_sigpending
vmlinux 0xffffffff8f0b065b
Build id: 3.10.0-1160.76.1.el7.x86_64
0x1b
14
? __set_task_blocked
vmlinux 0xffffffff8f0b0fd1
Build id: 3.10.0-1160.76.1.el7.x86_64
0x41
15
? __set_current_blocked
vmlinux 0xffffffff8f0b3a02
Build id: 3.10.0-1160.76.1.el7.x86_64
0x42
16
SyS_accept4
vmlinux 0xffffffff8f63b57e
Build id: 3.10.0-1160.76.1.el7.x86_64
0xe
17
SyS_accept
vmlinux 0xffffffff8f63b590
Build id: 3.10.0-1160.76.1.el7.x86_64
0x10
18
system_call_fastpath
vmlinux 0xffffffff8f799f92
Build id: 3.10.0-1160.76.1.el7.x86_64
0x25
BUG: scheduling while atomic: postgres/1499/0x10000200
Modules linked in: protection_agent(OE) binfmt_misc tcp_lp xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables devlink iptable_filter vmw_vsock_vmci_transport vsock sunrpc coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw vmw_balloon gf128mul glue_helper ablk_helper cryptd sg joydev pcspkr i2c_piix4 vmw_vmci parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sd_mod nfit sysfillrect sysimgblt fb_sys_fops crc_t10dif crct10dif_generic ttm libnvdimm ahci crct10dif_pclmul crct10dif_common drm ata_piix libahci libata
crc32c_intel e1000 serio_raw vmw_pvscsi drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 2 PID: 1499 Comm: postgres Kdump: loaded Tainted: G        W  OE  ------------   3.10.0-1160.76.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016
Call Trace:
[<ffffffff8f7865c9>] dump_stack+0x19/0x1b
[<ffffffff8f7808f3>] __schedule_bug+0x64/0x72
[<ffffffff8f78c38d>] __schedule+0x63d/0x680
[<ffffffff8f0d77c6>] __cond_resched+0x26/0x30
[<ffffffff8f78c69a>] _cond_resched+0x3a/0x50
[<ffffffff8f228b55>] __kmalloc+0x55/0x230
[<ffffffffc09613d1>] ? avpm_get_details_from_sock+0x201/0x2e0 [protection_agent]
[<ffffffffc09613d1>] avpm_get_details_from_sock+0x201/0x2e0 [protection_agent]
[<ffffffffc09618cc>] avpm_event_socket_flow_establish+0xfc/0x220 [protection_agent]
[<ffffffffc0956793>] kauth_socket_graft_hook+0x53/0x90 [protection_agent]
[<ffffffff8f6e1f9e>] inet_accept+0xce/0x130
[<ffffffff8f638fb9>] SYSC_accept4+0x109/0x230
[<ffffffff8f0b065b>] ? recalc_sigpending+0x1b/0x70
[<ffffffff8f0b0fd1>] ? __set_task_blocked+0x41/0xa0
[<ffffffff8f0b3a02>] ? __set_current_blocked+0x42/0x70
[<ffffffff8f63b57e>] SyS_accept4+0xe/0x10
[<ffffffff8f63b590>] SyS_accept+0x10/0x20
[<ffffffff8f799f92>] system_call_fastpath+0x25/0x2a
Complete report #1202209
Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff98b7ac23
Build id: 3.10.0-1062.9.1.el7.x86_64
0x19
2
__schedule_bug
vmlinux 0xffffffff98b74fb4
Build id: 3.10.0-1062.9.1.el7.x86_64
0x64
3
__schedule
vmlinux 0xffffffff98b80921
Build id: 3.10.0-1062.9.1.el7.x86_64
0x781
4
? d_path
vmlinux 0xffffffff986651c5
Build id: 3.10.0-1062.9.1.el7.x86_64
0xe5
5
__cond_resched
vmlinux 0xffffffff984d7a86
Build id: 3.10.0-1062.9.1.el7.x86_64
0x26
6
_cond_resched
vmlinux 0xffffffff98b80caa
Build id: 3.10.0-1062.9.1.el7.x86_64
0x3a
7
__kmalloc
vmlinux 0xffffffff98626455
Build id: 3.10.0-1062.9.1.el7.x86_64
0x55
8
? avpm_get_details_from_sock
protection_agent 0xffffffffc0758376
Build id: 3.10.0-1062.9.1.el7.x86_64
0x1c6
9
avpm_get_details_from_sock
protection_agent 0xffffffffc0758376
Build id: 3.10.0-1062.9.1.el7.x86_64
0x1c6
10
avpm_event_socket_listen
protection_agent 0xffffffffc07586ee
Build id: 3.10.0-1062.9.1.el7.x86_64
0x9e
11
? release_sock
vmlinux 0xffffffff98a34a10
Build id: 3.10.0-1062.9.1.el7.x86_64
0x120
12
kauth_socket_graft_hook
protection_agent 0xffffffffc074d793
Build id: 3.10.0-1062.9.1.el7.x86_64
0x53
13
inet_accept
vmlinux 0xffffffff98ad7b0e
Build id: 3.10.0-1062.9.1.el7.x86_64
0xce
14
SYSC_accept4
vmlinux 0xffffffff98a2efc9
Build id: 3.10.0-1062.9.1.el7.x86_64
0x109
15
? recalc_sigpending
vmlinux 0xffffffff984b08ab
Build id: 3.10.0-1062.9.1.el7.x86_64
0x1b
16
? __set_task_blocked
vmlinux 0xffffffff984b1221
Build id: 3.10.0-1062.9.1.el7.x86_64
0x41
17
SyS_accept4
vmlinux 0xffffffff98a3158e
Build id: 3.10.0-1062.9.1.el7.x86_64
0xe
18
SyS_accept
vmlinux 0xffffffff98a315a0
Build id: 3.10.0-1062.9.1.el7.x86_64
0x10
19
system_call_fastpath
vmlinux 0xffffffff98b8dede
Build id: 3.10.0-1062.9.1.el7.x86_64
0x25
20
? system_call_after_swapgs
vmlinux 0xffffffff98b8de21
Build id: 3.10.0-1062.9.1.el7.x86_64
0xae
BUG: scheduling while atomic: postgres/2022/0x10000200
Modules linked in: tcp_lp xt_nat veth nf_conntrack_netlink xt_addrtype br_netfilter xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink overlay(T) mpt2sas raid_class scsi_transport_sas mptctl mptbase nf_nat_ftp nf_conntrack_ftp ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter protection_agent(OE) dell_rbu sunrpc intel_powerclamp coretemp uas kvm gpio_ich usb_storage iTCO_wdt iTCO_vendor_support dcdbas
irqbypass pcspkr sg i7core_edac ipmi_ssif ipmi_si lpc_ich ipmi_devintf ipmi_msghandler acpi_power_meter fuse ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic crct10dif_common ata_generic pata_acpi mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ata_piix crc32c_intel libata bnx2 drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
CPU: 0 PID: 2022 Comm: postgres Kdump: loaded Tainted: G        W  OE  ------------ T 3.10.0-1062.9.1.el7.x86_64 #1
Hardware name: Dell Inc. PowerEdge R210/0M877N, BIOS 1.1.4 10/30/2009
Call Trace:
[<ffffffff98b7ac23>] dump_stack+0x19/0x1b
[<ffffffff98b74fb4>] __schedule_bug+0x64/0x72
[<ffffffff98b80921>] __schedule+0x781/0x840
[<ffffffff986651c5>] ? d_path+0xe5/0x150
[<ffffffff984d7a86>] __cond_resched+0x26/0x30
[<ffffffff98b80caa>] _cond_resched+0x3a/0x50
[<ffffffff98626455>] __kmalloc+0x55/0x230
[<ffffffffc0758376>] ? avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc0758376>] avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc07586ee>] avpm_event_socket_listen+0x9e/0x170 [protection_agent]
[<ffffffff98a34a10>] ? release_sock+0x120/0x170
[<ffffffffc074d793>] kauth_socket_graft_hook+0x53/0x90 [protection_agent]
[<ffffffff98ad7b0e>] inet_accept+0xce/0x130
[<ffffffff98a2efc9>] SYSC_accept4+0x109/0x230
[<ffffffff984b08ab>] ? recalc_sigpending+0x1b/0x70
[<ffffffff984b1221>] ? __set_task_blocked+0x41/0xa0
[<ffffffff98a3158e>] SyS_accept4+0xe/0x10
[<ffffffff98a315a0>] SyS_accept+0x10/0x20
[<ffffffff98b8dede>] system_call_fastpath+0x25/0x2a
[<ffffffff98b8de21>] ? system_call_after_swapgs+0xae/0x146
Complete report #1186555
Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff9e1b1bec
Build id: 3.10.0-1160.119.1.el7.x86_64
0x19
2
__schedule_bug
vmlinux 0xffffffff9e1abd5a
Build id: 3.10.0-1160.119.1.el7.x86_64
0x64
3
__schedule
vmlinux 0xffffffff9e1b7c3d
Build id: 3.10.0-1160.119.1.el7.x86_64
0x63d
4
__cond_resched
vmlinux 0xffffffff9dadd526
Build id: 3.10.0-1160.119.1.el7.x86_64
0x26
5
_cond_resched
vmlinux 0xffffffff9e1b7f50
Build id: 3.10.0-1160.119.1.el7.x86_64
0x40
6
__kmalloc
vmlinux 0xffffffff9dc356f5
Build id: 3.10.0-1160.119.1.el7.x86_64
0x55
7
? avpm_get_details_from_sock
protection_agent 0xffffffffc09ed826
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1c6
8
avpm_get_details_from_sock
protection_agent 0xffffffffc09ed826
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1c6
9
avpm_event_socket_listen
protection_agent 0xffffffffc09edb9e
Build id: 3.10.0-1160.119.1.el7.x86_64
0x9e
10
kauth_socket_graft_hook
protection_agent 0xffffffffc09e27e3
Build id: 3.10.0-1160.119.1.el7.x86_64
0x53
11
inet_accept
vmlinux 0xffffffff9e10a5be
Build id: 3.10.0-1160.119.1.el7.x86_64
0xce
12
SYSC_accept4
vmlinux 0xffffffff9e05e0f9
Build id: 3.10.0-1160.119.1.el7.x86_64
0x109
13
? SyS_epoll_ctl
vmlinux 0xffffffff9dcad88a
Build id: 3.10.0-1160.119.1.el7.x86_64
0x12a
14
? wake_up_state
vmlinux 0xffffffff9dae1170
Build id: 3.10.0-1160.119.1.el7.x86_64
0x20
15
SyS_accept4
vmlinux 0xffffffff9e06074e
Build id: 3.10.0-1160.119.1.el7.x86_64
0xe
16
system_call_fastpath
vmlinux 0xffffffff9e1c539a
Build id: 3.10.0-1160.119.1.el7.x86_64
0x25
BUG: scheduling while atomic: psanhostd/1176/0x10000200
Modules linked in: tcp_diag udp_diag inet_diag ipmi_devintf ipmi_msghandler binfmt_misc ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter protection_agent(OE) sunrpc squashfs loop snd_hda_codec_realtek snd_hda_codec_generic snd_hda_intel snd_hda_codec snd_hda_core snd_hwdep snd_seq iTCO_wdt iTCO_vendor_support gpio_ich ppdev snd_seq_device coretemp snd_pcm sg pcspkr lpc_ich i2c_i801 parport_pc snd_timer parport snd soundcore
acpi_cpufreq ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic crct10dif_common sr_mod cdrom ata_generic pata_acpi i915 i2c_algo_bit iosf_mbi drm_kms_helper syscopyarea ata_piix sysfillrect sysimgblt fb_sys_fops drm libata serio_raw r8169 drm_panel_orientation_quirks floppy video dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 1 PID: 1176 Comm: psanhostd Kdump: loaded Tainted: G           OE  ------------   3.10.0-1160.119.1.el7.x86_64 #1
Hardware name:                  /DG41RQ, BIOS RQG4110H.86A.0009.2009.0108.1005 01/08/2009
Call Trace:
[<ffffffff9e1b1bec>] dump_stack+0x19/0x1f
[<ffffffff9e1abd5a>] __schedule_bug+0x64/0x76
[<ffffffff9e1b7c3d>] __schedule+0x63d/0x680
[<ffffffff9dadd526>] __cond_resched+0x26/0x40
[<ffffffff9e1b7f50>] _cond_resched+0x40/0x50
[<ffffffff9dc356f5>] __kmalloc+0x55/0x240
[<ffffffffc09ed826>] ? avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc09ed826>] avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc09edb9e>] avpm_event_socket_listen+0x9e/0x170 [protection_agent]
[<ffffffffc09e27e3>] kauth_socket_graft_hook+0x53/0x90 [protection_agent]
[<ffffffff9e10a5be>] inet_accept+0xce/0x130
[<ffffffff9e05e0f9>] SYSC_accept4+0x109/0x230
[<ffffffff9dcad88a>] ? SyS_epoll_ctl+0x12a/0xc70
[<ffffffff9dae1170>] ? wake_up_state+0x20/0x20
[<ffffffff9e06074e>] SyS_accept4+0xe/0x20
[<ffffffff9e1c539a>] system_call_fastpath+0x25/0x2a
Complete report #1197380
Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffffaadb1bec
Build id: 3.10.0-1160.119.1.el7.x86_64
0x19
2
__schedule_bug
vmlinux 0xffffffffaadabd5a
Build id: 3.10.0-1160.119.1.el7.x86_64
0x64
3
__schedule
vmlinux 0xffffffffaadb7c3d
Build id: 3.10.0-1160.119.1.el7.x86_64
0x63d
4
__cond_resched
vmlinux 0xffffffffaa6dd526
Build id: 3.10.0-1160.119.1.el7.x86_64
0x26
5
_cond_resched
vmlinux 0xffffffffaadb7f50
Build id: 3.10.0-1160.119.1.el7.x86_64
0x40
6
__kmalloc
vmlinux 0xffffffffaa8356f5
Build id: 3.10.0-1160.119.1.el7.x86_64
0x55
7
? avpm_get_details_from_sock
protection_agent 0xffffffffc0fb9826
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1c6
8
avpm_get_details_from_sock
protection_agent 0xffffffffc0fb9826
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1c6
9
avpm_event_socket_listen
protection_agent 0xffffffffc0fb9b9e
Build id: 3.10.0-1160.119.1.el7.x86_64
0x9e
10
kauth_socket_graft_hook
protection_agent 0xffffffffc0fae7e3
Build id: 3.10.0-1160.119.1.el7.x86_64
0x53
11
inet_accept
vmlinux 0xffffffffaad0a5be
Build id: 3.10.0-1160.119.1.el7.x86_64
0xce
12
SYSC_accept4
vmlinux 0xffffffffaac5e0f9
Build id: 3.10.0-1160.119.1.el7.x86_64
0x109
13
? fput
vmlinux 0xffffffffaa85e553
Build id: 3.10.0-1160.119.1.el7.x86_64
0x13
14
? SyS_epoll_wait
vmlinux 0xffffffffaa8ae47c
Build id: 3.10.0-1160.119.1.el7.x86_64
0xac
15
SyS_accept4
vmlinux 0xffffffffaac6074e
Build id: 3.10.0-1160.119.1.el7.x86_64
0xe
16
system_call_fastpath
vmlinux 0xffffffffaadc539a
Build id: 3.10.0-1160.119.1.el7.x86_64
0x25
BUG: scheduling while atomic: zabbix_agent2/1578/0x10000200
Modules linked in: tcp_diag udp_diag inet_diag vmnet(OE) ppdev parport_pc parport fuse vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) ipmi_devintf ipmi_msghandler ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter protection_agent(OE) sunrpc vfat fat intel_pmc_core intel_powerclamp coretemp intel_rapl kvm_intel kvm irqbypass crc32_pclmul iTCO_wdt mei_wdt iTCO_vendor_support dell_wmi ghash_clmulni_intel snd_hda_codec_realtek
dell_smbios snd_hda_codec_hdmi dell_wmi_descriptor dell_wmi_aio snd_hda_codec_generic aesni_intel intel_wmi_thunderbolt lrw sparse_keymap gf128mul glue_helper ablk_helper snd_hda_intel cryptd snd_hda_codec pcspkr snd_seq dcdbas snd_hda_core i2c_i801 snd_seq_device snd_hwdep snd_pcm usblp sg snd_timer mei_me snd mei idma64 virt_dma i2c_designware_platform soundcore i2c_designware_core pinctrl_cannonlake tpm_crb pinctrl_intel acpi_pad wmi ip_tables xfs libcrc32c sd_mod sr_mod cdrom crc_t10dif crct10dif_generic amdgpu i915 chash amd_iommu_v2 gpu_sched iosf_mbi ttm drm_kms_helper syscopyarea sysfillrect sysimgblt ahci fb_sys_fops crct10dif_pclmul crct10dif_common igb drm libahci e1000e libata crc32c_intel serio_raw dca ptp pps_core i2c_algo_bit drm_panel_orientation_quirks video i2c_hid
dm_mirror dm_region_hash dm_log dm_mod
CPU: 2 PID: 1578 Comm: zabbix_agent2 Kdump: loaded Tainted: G           OE  ------------   3.10.0-1160.119.1.el7.x86_64 #1
Hardware name: Dell Inc. Precision 3630 Tower/0NNNCT, BIOS 1.0.4 07/17/2018
Call Trace:
[<ffffffffaadb1bec>] dump_stack+0x19/0x1f
[<ffffffffaadabd5a>] __schedule_bug+0x64/0x76
[<ffffffffaadb7c3d>] __schedule+0x63d/0x680
[<ffffffffaa6dd526>] __cond_resched+0x26/0x40
[<ffffffffaadb7f50>] _cond_resched+0x40/0x50
[<ffffffffaa8356f5>] __kmalloc+0x55/0x240
[<ffffffffc0fb9826>] ? avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc0fb9826>] avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc0fb9b9e>] avpm_event_socket_listen+0x9e/0x170 [protection_agent]
[<ffffffffc0fae7e3>] kauth_socket_graft_hook+0x53/0x90 [protection_agent]
[<ffffffffaad0a5be>] inet_accept+0xce/0x130
[<ffffffffaac5e0f9>] SYSC_accept4+0x109/0x230
[<ffffffffaa85e553>] ? fput+0x13/0x20
[<ffffffffaa8ae47c>] ? SyS_epoll_wait+0xac/0x110
[<ffffffffaac6074e>] SyS_accept4+0xe/0x20
[<ffffffffaadc539a>] system_call_fastpath+0x25/0x2a
Complete report #1178583
Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff9bbb1bec
Build id: 3.10.0-1160.119.1.el7.x86_64
0x19
2
__schedule_bug
vmlinux 0xffffffff9bbabd5a
Build id: 3.10.0-1160.119.1.el7.x86_64
0x64
3
__schedule
vmlinux 0xffffffff9bbb7c3d
Build id: 3.10.0-1160.119.1.el7.x86_64
0x63d
4
__cond_resched
vmlinux 0xffffffff9b4dd526
Build id: 3.10.0-1160.119.1.el7.x86_64
0x26
5
_cond_resched
vmlinux 0xffffffff9bbb7f50
Build id: 3.10.0-1160.119.1.el7.x86_64
0x40
6
__kmalloc
vmlinux 0xffffffff9b6356f5
Build id: 3.10.0-1160.119.1.el7.x86_64
0x55
7
? avpm_get_details_from_sock
protection_agent 0xffffffffc0c55826
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1c6
8
avpm_get_details_from_sock
protection_agent 0xffffffffc0c55826
Build id: 3.10.0-1160.119.1.el7.x86_64
0x1c6
9
avpm_event_socket_listen
protection_agent 0xffffffffc0c55b9e
Build id: 3.10.0-1160.119.1.el7.x86_64
0x9e
10
kauth_socket_graft_hook
protection_agent 0xffffffffc0c4a7e3
Build id: 3.10.0-1160.119.1.el7.x86_64
0x53
11
inet_accept
vmlinux 0xffffffff9bb0a5be
Build id: 3.10.0-1160.119.1.el7.x86_64
0xce
12
SYSC_accept4
vmlinux 0xffffffff9ba5e0f9
Build id: 3.10.0-1160.119.1.el7.x86_64
0x109
13
SyS_accept4
vmlinux 0xffffffff9ba6074e
Build id: 3.10.0-1160.119.1.el7.x86_64
0xe
14
SyS_accept
vmlinux 0xffffffff9ba60770
Build id: 3.10.0-1160.119.1.el7.x86_64
0x10
15
system_call_fastpath
vmlinux 0xffffffff9bbc539a
Build id: 3.10.0-1160.119.1.el7.x86_64
0x25
BUG: scheduling while atomic: zabbix_agentd/1528/0x10000200
Modules linked in: tcp_diag udp_diag inet_diag tcp_lp fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 devlink tun ipmi_devintf ipmi_msghandler ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter protection_agent(OE) sunrpc intel_powerclamp coretemp intel_rapl kvm_intel kvm irqbypass crc32_pclmul ppdev iTCO_wdt iTCO_vendor_support snd_hda_codec_realtek snd_hda_codec_generic ghash_clmulni_intel snd_hda_codec_hdmi aesni_intel
lrw gf128mul glue_helper ablk_helper cryptd joydev snd_hda_intel i2c_i801 pcspkr sg snd_hda_codec snd_hda_core snd_hwdep snd_seq snd_seq_device snd_pcm parport_pc snd_timer parport snd tpm_infineon soundcore mei_me lpc_ich mei ip_tables xfs libcrc32c sr_mod sd_mod cdrom crc_t10dif crct10dif_generic uas i915 usb_storage i2c_algo_bit iosf_mbi drm_kms_helper ahci syscopyarea sysfillrect sysimgblt fb_sys_fops libahci drm libata crct10dif_pclmul crct10dif_common crc32c_intel serio_raw r8169 drm_panel_orientation_quirks video dm_mirror dm_region_hash dm_log dm_mod
CPU: 3 PID: 1528 Comm: zabbix_agentd Kdump: loaded Tainted: G           OE  ------------   3.10.0-1160.119.1.el7.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. H81M-D2V/H81M-D2V, BIOS FB 06/25/2014
Call Trace:
[<ffffffff9bbb1bec>] dump_stack+0x19/0x1f
[<ffffffff9bbabd5a>] __schedule_bug+0x64/0x76
[<ffffffff9bbb7c3d>] __schedule+0x63d/0x680
[<ffffffff9b4dd526>] __cond_resched+0x26/0x40
[<ffffffff9bbb7f50>] _cond_resched+0x40/0x50
[<ffffffff9b6356f5>] __kmalloc+0x55/0x240
[<ffffffffc0c55826>] ? avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc0c55826>] avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc0c55b9e>] avpm_event_socket_listen+0x9e/0x170 [protection_agent]
[<ffffffffc0c4a7e3>] kauth_socket_graft_hook+0x53/0x90 [protection_agent]
[<ffffffff9bb0a5be>] inet_accept+0xce/0x130
[<ffffffff9ba5e0f9>] SYSC_accept4+0x109/0x230
[<ffffffff9ba6074e>] SyS_accept4+0xe/0x20
[<ffffffff9ba60770>] SyS_accept+0x10/0x20
[<ffffffff9bbc539a>] system_call_fastpath+0x25/0x2a
Complete report #1178349
Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff899865c9
Build id: 3.10.0-1160.76.1.el7.x86_64
0x19
2
__schedule_bug
vmlinux 0xffffffff899808f3
Build id: 3.10.0-1160.76.1.el7.x86_64
0x64
3
__schedule
vmlinux 0xffffffff8998c38d
Build id: 3.10.0-1160.76.1.el7.x86_64
0x63d
4
__cond_resched
vmlinux 0xffffffff892d77c6
Build id: 3.10.0-1160.76.1.el7.x86_64
0x26
5
_cond_resched
vmlinux 0xffffffff8998c69a
Build id: 3.10.0-1160.76.1.el7.x86_64
0x3a
6
__kmalloc
vmlinux 0xffffffff89428b55
Build id: 3.10.0-1160.76.1.el7.x86_64
0x55
7
? avpm_get_details_from_sock
protection_agent 0xffffffffc093b376
Build id: 3.10.0-1160.76.1.el7.x86_64
0x1c6
8
avpm_get_details_from_sock
protection_agent 0xffffffffc093b376
Build id: 3.10.0-1160.76.1.el7.x86_64
0x1c6
9
avpm_event_socket_listen
protection_agent 0xffffffffc093b6ee
Build id: 3.10.0-1160.76.1.el7.x86_64
0x9e
10
kauth_socket_graft_hook
protection_agent 0xffffffffc0930793
Build id: 3.10.0-1160.76.1.el7.x86_64
0x53
11
inet_accept
vmlinux 0xffffffff898e1f9e
Build id: 3.10.0-1160.76.1.el7.x86_64
0xce
12
SYSC_accept4
vmlinux 0xffffffff89838fb9
Build id: 3.10.0-1160.76.1.el7.x86_64
0x109
13
? do_tcp_setsockopt.isra.31
vmlinux 0xffffffff898b4da8
Build id: 3.10.0-1160.76.1.el7.x86_64
0x1a8
14
? sock_setsockopt
vmlinux 0xffffffff898408b8
Build id: 3.10.0-1160.76.1.el7.x86_64
0x1a8
15
SyS_accept4
vmlinux 0xffffffff8983b57e
Build id: 3.10.0-1160.76.1.el7.x86_64
0xe
16
SyS_accept
vmlinux 0xffffffff8983b590
Build id: 3.10.0-1160.76.1.el7.x86_64
0x10
17
system_call_fastpath
vmlinux 0xffffffff89999f92
Build id: 3.10.0-1160.76.1.el7.x86_64
0x25
BUG: scheduling while atomic: java/30641/0x10000200
Modules linked in: protection_agent(OE) binfmt_misc tcp_diag udp_diag inet_diag tcp_lp xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables devlink iptable_filter vmw_vsock_vmci_transport vsock sunrpc coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper vmw_balloon ablk_helper cryptd joydev pcspkr sg vmw_vmci i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common ahci crc32c_intel
nfit serio_raw libnvdimm drm libahci ata_piix vmw_pvscsi e1000 libata drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: protection_agent]
CPU: 2 PID: 30641 Comm: java Kdump: loaded Tainted: G           OE  ------------   3.10.0-1160.76.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016
Call Trace:
[<ffffffff899865c9>] dump_stack+0x19/0x1b
[<ffffffff899808f3>] __schedule_bug+0x64/0x72
[<ffffffff8998c38d>] __schedule+0x63d/0x680
[<ffffffff892d77c6>] __cond_resched+0x26/0x30
[<ffffffff8998c69a>] _cond_resched+0x3a/0x50
[<ffffffff89428b55>] __kmalloc+0x55/0x230
[<ffffffffc093b376>] ? avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc093b376>] avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc093b6ee>] avpm_event_socket_listen+0x9e/0x170 [protection_agent]
[<ffffffffc0930793>] kauth_socket_graft_hook+0x53/0x90 [protection_agent]
[<ffffffff898e1f9e>] inet_accept+0xce/0x130
[<ffffffff89838fb9>] SYSC_accept4+0x109/0x230
[<ffffffff898b4da8>] ? do_tcp_setsockopt.isra.31+0x1a8/0x940
[<ffffffff898408b8>] ? sock_setsockopt+0x1a8/0x8f0
[<ffffffff8983b57e>] SyS_accept4+0xe/0x10
[<ffffffff8983b590>] SyS_accept+0x10/0x20
[<ffffffff89999f92>] system_call_fastpath+0x25/0x2a
Complete report #1173037
Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff9a1b1bec
Build id: 3.10.0-1160.118.1.el7.x86_64
0x19
2
__schedule_bug
vmlinux 0xffffffff9a1abd5a
Build id: 3.10.0-1160.118.1.el7.x86_64
0x64
3
__schedule
vmlinux 0xffffffff9a1b7c3d
Build id: 3.10.0-1160.118.1.el7.x86_64
0x63d
4
__cond_resched
vmlinux 0xffffffff99add526
Build id: 3.10.0-1160.118.1.el7.x86_64
0x26
5
_cond_resched
vmlinux 0xffffffff9a1b7f50
Build id: 3.10.0-1160.118.1.el7.x86_64
0x40
6
__kmalloc
vmlinux 0xffffffff99c356f5
Build id: 3.10.0-1160.118.1.el7.x86_64
0x55
7
? avpm_get_details_from_sock
protection_agent 0xffffffffc0a3e826
Build id: 3.10.0-1160.118.1.el7.x86_64
0x1c6
8
avpm_get_details_from_sock
protection_agent 0xffffffffc0a3e826
Build id: 3.10.0-1160.118.1.el7.x86_64
0x1c6
9
avpm_event_socket_listen
protection_agent 0xffffffffc0a3eb9e
Build id: 3.10.0-1160.118.1.el7.x86_64
0x9e
10
kauth_socket_graft_hook
protection_agent 0xffffffffc0a337e3
Build id: 3.10.0-1160.118.1.el7.x86_64
0x53
11
inet_accept
vmlinux 0xffffffff9a10a5be
Build id: 3.10.0-1160.118.1.el7.x86_64
0xce
12
SYSC_accept4
vmlinux 0xffffffff9a05e0f9
Build id: 3.10.0-1160.118.1.el7.x86_64
0x109
13
? mntput
vmlinux 0xffffffff99c80d44
Build id: 3.10.0-1160.118.1.el7.x86_64
0x24
14
? __fput
vmlinux 0xffffffff99c5e079
Build id: 3.10.0-1160.118.1.el7.x86_64
0x199
15
SyS_accept4
vmlinux 0xffffffff9a06074e
Build id: 3.10.0-1160.118.1.el7.x86_64
0xe
16
SyS_accept
vmlinux 0xffffffff9a060770
Build id: 3.10.0-1160.118.1.el7.x86_64
0x10
17
system_call_fastpath
vmlinux 0xffffffff9a1c539a
Build id: 3.10.0-1160.118.1.el7.x86_64
0x25
BUG: scheduling while atomic: zabbix_agentd/1450/0x10000200
Modules linked in: tcp_lp binfmt_misc fuse tcp_diag udp_diag inet_diag ipmi_devintf ipmi_msghandler ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter protection_agent(OE) sunrpc squashfs loop coretemp snd_hda_codec_realtek snd_hda_codec_hdmi snd_hda_codec_generic kvm_intel ppdev iTCO_wdt iTCO_vendor_support gpio_ich snd_hda_intel kvm snd_hda_codec snd_hda_core snd_hwdep snd_seq snd_seq_device irqbypass sg snd_pcm pcspkr
snd_timer snd soundcore parport_pc lpc_ich parport i2c_i801 acpi_cpufreq ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic crct10dif_common ata_generic pata_acpi radeon i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ata_piix libata serio_raw r8169 drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
CPU: 3 PID: 1450 Comm: zabbix_agentd Kdump: loaded Tainted: G           OE  ------------   3.10.0-1160.118.1.el7.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. P41T-ES3G/P41T-ES3G, BIOS F1 11/12/2009
Call Trace:
[<ffffffff9a1b1bec>] dump_stack+0x19/0x1f
[<ffffffff9a1abd5a>] __schedule_bug+0x64/0x76
[<ffffffff9a1b7c3d>] __schedule+0x63d/0x680
[<ffffffff99add526>] __cond_resched+0x26/0x40
[<ffffffff9a1b7f50>] _cond_resched+0x40/0x50
[<ffffffff99c356f5>] __kmalloc+0x55/0x240
[<ffffffffc0a3e826>] ? avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc0a3e826>] avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc0a3eb9e>] avpm_event_socket_listen+0x9e/0x170 [protection_agent]
[<ffffffffc0a337e3>] kauth_socket_graft_hook+0x53/0x90 [protection_agent]
[<ffffffff9a10a5be>] inet_accept+0xce/0x130
[<ffffffff9a05e0f9>] SYSC_accept4+0x109/0x230
[<ffffffff99c80d44>] ? mntput+0x24/0x40
[<ffffffff99c5e079>] ? __fput+0x199/0x230
[<ffffffff9a06074e>] SyS_accept4+0xe/0x20
[<ffffffff9a060770>] SyS_accept+0x10/0x20
[<ffffffff9a1c539a>] system_call_fastpath+0x25/0x2a