Kerneloops

Similar reports
Problem #743819
Component
kernel Tainted
Last affected version
0:3.10.0-1160.76.1.el7
Executable
unknown
First occurrence
2025-07-26
Last occurrence
2025-08-08
Unique reports
2
Quality
-42

Statistics

Operating system Unique / Total count
CentOS 7 2 / 5
Operating system Count
CentOS 7 5
Architecture Count
x86_64 5
Related packages Count
kernel 5
 0:3.10.0-1160.76.1.el7 5

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffff8f7865c9
Build id: 3.10.0-1160.76.1.el7.x86_64
0x19
2
__schedule_bug
vmlinux 0xffffffff8f7808f3
Build id: 3.10.0-1160.76.1.el7.x86_64
0x64
3
__schedule
vmlinux 0xffffffff8f78c38d
Build id: 3.10.0-1160.76.1.el7.x86_64
0x63d
4
__cond_resched
vmlinux 0xffffffff8f0d77c6
Build id: 3.10.0-1160.76.1.el7.x86_64
0x26
5
_cond_resched
vmlinux 0xffffffff8f78c69a
Build id: 3.10.0-1160.76.1.el7.x86_64
0x3a
6
__kmalloc
vmlinux 0xffffffff8f228b55
Build id: 3.10.0-1160.76.1.el7.x86_64
0x55
7
? avpm_get_details_from_sock
protection_agent 0xffffffffc09613d1
Build id: 3.10.0-1160.76.1.el7.x86_64
0x201
8
avpm_get_details_from_sock
protection_agent 0xffffffffc09613d1
Build id: 3.10.0-1160.76.1.el7.x86_64
0x201
9
avpm_event_socket_flow_establish
protection_agent 0xffffffffc09618cc
Build id: 3.10.0-1160.76.1.el7.x86_64
0xfc
10
kauth_socket_graft_hook
protection_agent 0xffffffffc0956793
Build id: 3.10.0-1160.76.1.el7.x86_64
0x53
11
inet_accept
vmlinux 0xffffffff8f6e1f9e
Build id: 3.10.0-1160.76.1.el7.x86_64
0xce
12
SYSC_accept4
vmlinux 0xffffffff8f638fb9
Build id: 3.10.0-1160.76.1.el7.x86_64
0x109
13
? recalc_sigpending
vmlinux 0xffffffff8f0b065b
Build id: 3.10.0-1160.76.1.el7.x86_64
0x1b
14
? __set_task_blocked
vmlinux 0xffffffff8f0b0fd1
Build id: 3.10.0-1160.76.1.el7.x86_64
0x41
15
? __set_current_blocked
vmlinux 0xffffffff8f0b3a02
Build id: 3.10.0-1160.76.1.el7.x86_64
0x42
16
SyS_accept4
vmlinux 0xffffffff8f63b57e
Build id: 3.10.0-1160.76.1.el7.x86_64
0xe
17
SyS_accept
vmlinux 0xffffffff8f63b590
Build id: 3.10.0-1160.76.1.el7.x86_64
0x10
18
system_call_fastpath
vmlinux 0xffffffff8f799f92
Build id: 3.10.0-1160.76.1.el7.x86_64
0x25
BUG: scheduling while atomic: postgres/1499/0x10000200
Modules linked in: protection_agent(OE) binfmt_misc tcp_lp xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables devlink iptable_filter vmw_vsock_vmci_transport vsock sunrpc coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw vmw_balloon gf128mul glue_helper ablk_helper cryptd sg joydev pcspkr i2c_piix4 vmw_vmci parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sd_mod nfit sysfillrect sysimgblt fb_sys_fops crc_t10dif crct10dif_generic ttm libnvdimm ahci crct10dif_pclmul crct10dif_common drm ata_piix libahci libata
crc32c_intel e1000 serio_raw vmw_pvscsi drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 2 PID: 1499 Comm: postgres Kdump: loaded Tainted: G        W  OE  ------------   3.10.0-1160.76.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016
Call Trace:
[<ffffffff8f7865c9>] dump_stack+0x19/0x1b
[<ffffffff8f7808f3>] __schedule_bug+0x64/0x72
[<ffffffff8f78c38d>] __schedule+0x63d/0x680
[<ffffffff8f0d77c6>] __cond_resched+0x26/0x30
[<ffffffff8f78c69a>] _cond_resched+0x3a/0x50
[<ffffffff8f228b55>] __kmalloc+0x55/0x230
[<ffffffffc09613d1>] ? avpm_get_details_from_sock+0x201/0x2e0 [protection_agent]
[<ffffffffc09613d1>] avpm_get_details_from_sock+0x201/0x2e0 [protection_agent]
[<ffffffffc09618cc>] avpm_event_socket_flow_establish+0xfc/0x220 [protection_agent]
[<ffffffffc0956793>] kauth_socket_graft_hook+0x53/0x90 [protection_agent]
[<ffffffff8f6e1f9e>] inet_accept+0xce/0x130
[<ffffffff8f638fb9>] SYSC_accept4+0x109/0x230
[<ffffffff8f0b065b>] ? recalc_sigpending+0x1b/0x70
[<ffffffff8f0b0fd1>] ? __set_task_blocked+0x41/0xa0
[<ffffffff8f0b3a02>] ? __set_current_blocked+0x42/0x70
[<ffffffff8f63b57e>] SyS_accept4+0xe/0x10
[<ffffffff8f63b590>] SyS_accept+0x10/0x20
[<ffffffff8f799f92>] system_call_fastpath+0x25/0x2a