Kerneloops

Similar reports
Problem #743819
Component
kernel Tainted
Last affected version
0:3.10.0-1062.9.1.el7
Executable
unknown
First occurrence
2025-05-17
Last occurrence
2026-01-27
Unique reports
9
Quality
-48

Statistics

Operating system Unique / Total count
CentOS 7 9 / 154
Operating system Count
CentOS 7 154
Architecture Count
x86_64 154
Related packages Count
kernel 154
 0:3.10.0-1062.9.1.el7 154

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff98b7ac23
Build id: 3.10.0-1062.9.1.el7.x86_64
0x19
2
__schedule_bug
vmlinux 0xffffffff98b74fb4
Build id: 3.10.0-1062.9.1.el7.x86_64
0x64
3
__schedule
vmlinux 0xffffffff98b80921
Build id: 3.10.0-1062.9.1.el7.x86_64
0x781
4
? d_path
vmlinux 0xffffffff986651c5
Build id: 3.10.0-1062.9.1.el7.x86_64
0xe5
5
__cond_resched
vmlinux 0xffffffff984d7a86
Build id: 3.10.0-1062.9.1.el7.x86_64
0x26
6
_cond_resched
vmlinux 0xffffffff98b80caa
Build id: 3.10.0-1062.9.1.el7.x86_64
0x3a
7
__kmalloc
vmlinux 0xffffffff98626455
Build id: 3.10.0-1062.9.1.el7.x86_64
0x55
8
? avpm_get_details_from_sock
protection_agent 0xffffffffc0758376
Build id: 3.10.0-1062.9.1.el7.x86_64
0x1c6
9
avpm_get_details_from_sock
protection_agent 0xffffffffc0758376
Build id: 3.10.0-1062.9.1.el7.x86_64
0x1c6
10
avpm_event_socket_listen
protection_agent 0xffffffffc07586ee
Build id: 3.10.0-1062.9.1.el7.x86_64
0x9e
11
? release_sock
vmlinux 0xffffffff98a34a10
Build id: 3.10.0-1062.9.1.el7.x86_64
0x120
12
kauth_socket_graft_hook
protection_agent 0xffffffffc074d793
Build id: 3.10.0-1062.9.1.el7.x86_64
0x53
13
inet_accept
vmlinux 0xffffffff98ad7b0e
Build id: 3.10.0-1062.9.1.el7.x86_64
0xce
14
SYSC_accept4
vmlinux 0xffffffff98a2efc9
Build id: 3.10.0-1062.9.1.el7.x86_64
0x109
15
? recalc_sigpending
vmlinux 0xffffffff984b08ab
Build id: 3.10.0-1062.9.1.el7.x86_64
0x1b
16
? __set_task_blocked
vmlinux 0xffffffff984b1221
Build id: 3.10.0-1062.9.1.el7.x86_64
0x41
17
SyS_accept4
vmlinux 0xffffffff98a3158e
Build id: 3.10.0-1062.9.1.el7.x86_64
0xe
18
SyS_accept
vmlinux 0xffffffff98a315a0
Build id: 3.10.0-1062.9.1.el7.x86_64
0x10
19
system_call_fastpath
vmlinux 0xffffffff98b8dede
Build id: 3.10.0-1062.9.1.el7.x86_64
0x25
20
? system_call_after_swapgs
vmlinux 0xffffffff98b8de21
Build id: 3.10.0-1062.9.1.el7.x86_64
0xae
BUG: scheduling while atomic: postgres/2022/0x10000200
Modules linked in: tcp_lp xt_nat veth nf_conntrack_netlink xt_addrtype br_netfilter xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink overlay(T) mpt2sas raid_class scsi_transport_sas mptctl mptbase nf_nat_ftp nf_conntrack_ftp ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter protection_agent(OE) dell_rbu sunrpc intel_powerclamp coretemp uas kvm gpio_ich usb_storage iTCO_wdt iTCO_vendor_support dcdbas
irqbypass pcspkr sg i7core_edac ipmi_ssif ipmi_si lpc_ich ipmi_devintf ipmi_msghandler acpi_power_meter fuse ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic crct10dif_common ata_generic pata_acpi mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ata_piix crc32c_intel libata bnx2 drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
CPU: 0 PID: 2022 Comm: postgres Kdump: loaded Tainted: G        W  OE  ------------ T 3.10.0-1062.9.1.el7.x86_64 #1
Hardware name: Dell Inc. PowerEdge R210/0M877N, BIOS 1.1.4 10/30/2009
Call Trace:
[<ffffffff98b7ac23>] dump_stack+0x19/0x1b
[<ffffffff98b74fb4>] __schedule_bug+0x64/0x72
[<ffffffff98b80921>] __schedule+0x781/0x840
[<ffffffff986651c5>] ? d_path+0xe5/0x150
[<ffffffff984d7a86>] __cond_resched+0x26/0x30
[<ffffffff98b80caa>] _cond_resched+0x3a/0x50
[<ffffffff98626455>] __kmalloc+0x55/0x230
[<ffffffffc0758376>] ? avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc0758376>] avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc07586ee>] avpm_event_socket_listen+0x9e/0x170 [protection_agent]
[<ffffffff98a34a10>] ? release_sock+0x120/0x170
[<ffffffffc074d793>] kauth_socket_graft_hook+0x53/0x90 [protection_agent]
[<ffffffff98ad7b0e>] inet_accept+0xce/0x130
[<ffffffff98a2efc9>] SYSC_accept4+0x109/0x230
[<ffffffff984b08ab>] ? recalc_sigpending+0x1b/0x70
[<ffffffff984b1221>] ? __set_task_blocked+0x41/0xa0
[<ffffffff98a3158e>] SyS_accept4+0xe/0x10
[<ffffffff98a315a0>] SyS_accept+0x10/0x20
[<ffffffff98b8dede>] system_call_fastpath+0x25/0x2a
[<ffffffff98b8de21>] ? system_call_after_swapgs+0xae/0x146