Info

Permalink
Function
__schedule_bug
First occurrence
2025-05-16
Last occurrence
2025-05-17
State
NEW
Components
kernel Tainted
Quality
-56

Statistics

Operating system Count
CentOS 7 5,091
Architecture Count
x86_64 5,091
Related packages Count
kernel 5,091
 0:3.10.0-1062.9.1.el7 5,091

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

Report backtrace

Complete report #1201957
Frame # Function Binary Source or offset Line
1
dump_stack
vmlinux 0xffffffffa057ac23
Build id: 3.10.0-1062.9.1.el7.x86_64
0x19
2
__schedule_bug
vmlinux 0xffffffffa0574fb4
Build id: 3.10.0-1062.9.1.el7.x86_64
0x64
3
__schedule
vmlinux 0xffffffffa0580921
Build id: 3.10.0-1062.9.1.el7.x86_64
0x781
4
? d_path
vmlinux 0xffffffffa00651c5
Build id: 3.10.0-1062.9.1.el7.x86_64
0xe5
5
__cond_resched
vmlinux 0xffffffff9fed7a86
Build id: 3.10.0-1062.9.1.el7.x86_64
0x26
6
_cond_resched
vmlinux 0xffffffffa0580caa
Build id: 3.10.0-1062.9.1.el7.x86_64
0x3a
7
__kmalloc
vmlinux 0xffffffffa0026455
Build id: 3.10.0-1062.9.1.el7.x86_64
0x55
8
? avpm_get_details_from_sock
protection_agent 0xffffffffc0a0a376
Build id: 3.10.0-1062.9.1.el7.x86_64
0x1c6
9
avpm_get_details_from_sock
protection_agent 0xffffffffc0a0a376
Build id: 3.10.0-1062.9.1.el7.x86_64
0x1c6
10
avpm_event_socket_listen
protection_agent 0xffffffffc0a0a6ee
Build id: 3.10.0-1062.9.1.el7.x86_64
0x9e
11
kauth_socket_graft_hook
protection_agent 0xffffffffc09ff793
Build id: 3.10.0-1062.9.1.el7.x86_64
0x53
12
inet_accept
vmlinux 0xffffffffa04d7b0e
Build id: 3.10.0-1062.9.1.el7.x86_64
0xce
13
SYSC_accept4
vmlinux 0xffffffffa042efc9
Build id: 3.10.0-1062.9.1.el7.x86_64
0x109
14
? __do_page_fault
vmlinux 0xffffffffa0588678
Build id: 3.10.0-1062.9.1.el7.x86_64
0x238
15
? system_call_after_swapgs
vmlinux 0xffffffffa058de21
Build id: 3.10.0-1062.9.1.el7.x86_64
0xae
16
? system_call_after_swapgs
vmlinux 0xffffffffa058de15
Build id: 3.10.0-1062.9.1.el7.x86_64
0xa2
17
? system_call_after_swapgs
vmlinux 0xffffffffa058de21
Build id: 3.10.0-1062.9.1.el7.x86_64
0xae
18
? system_call_after_swapgs
vmlinux 0xffffffffa058de15
Build id: 3.10.0-1062.9.1.el7.x86_64
0xa2
19
? system_call_after_swapgs
vmlinux 0xffffffffa058de21
Build id: 3.10.0-1062.9.1.el7.x86_64
0xae
20
SyS_accept4
vmlinux 0xffffffffa043158e
Build id: 3.10.0-1062.9.1.el7.x86_64
0xe
21
SyS_accept
vmlinux 0xffffffffa04315a0
Build id: 3.10.0-1062.9.1.el7.x86_64
0x10
22
system_call_fastpath
vmlinux 0xffffffffa058dede
Build id: 3.10.0-1062.9.1.el7.x86_64
0x25
23
? system_call_after_swapgs
vmlinux 0xffffffffa058de21
Build id: 3.10.0-1062.9.1.el7.x86_64
0xae
BUG: scheduling while atomic: postgres/2042/0x10000200
Modules linked in: protection_agent(OE) tcp_lp xt_nat veth nf_conntrack_netlink xt_addrtype br_netfilter xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink overlay(T) mpt2sas raid_class scsi_transport_sas mptctl mptbase nf_nat_ftp nf_conntrack_ftp ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter dell_rbu sunrpc uas usb_storage intel_powerclamp coretemp kvm iTCO_wdt iTCO_vendor_support gpio_ich dcdbas
irqbypass pcspkr sg i7core_edac lpc_ich ipmi_ssif ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter fuse ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic crct10dif_common ata_generic pata_acpi mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix crc32c_intel drm libata bnx2 drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod [last unloaded: protection_agent]
CPU: 3 PID: 2042 Comm: postgres Kdump: loaded Tainted: G           OE  ------------ T 3.10.0-1062.9.1.el7.x86_64 #1
Hardware name: Dell Inc. PowerEdge R210/0M877N, BIOS 1.1.4 10/30/2009
Call Trace:
[<ffffffffa057ac23>] dump_stack+0x19/0x1b
[<ffffffffa0574fb4>] __schedule_bug+0x64/0x72
[<ffffffffa0580921>] __schedule+0x781/0x840
[<ffffffffa00651c5>] ? d_path+0xe5/0x150
[<ffffffff9fed7a86>] __cond_resched+0x26/0x30
[<ffffffffa0580caa>] _cond_resched+0x3a/0x50
[<ffffffffa0026455>] __kmalloc+0x55/0x230
[<ffffffffc0a0a376>] ? avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc0a0a376>] avpm_get_details_from_sock+0x1c6/0x2f0 [protection_agent]
[<ffffffffc0a0a6ee>] avpm_event_socket_listen+0x9e/0x170 [protection_agent]
[<ffffffffc09ff793>] kauth_socket_graft_hook+0x53/0x90 [protection_agent]
[<ffffffffa04d7b0e>] inet_accept+0xce/0x130
[<ffffffffa042efc9>] SYSC_accept4+0x109/0x230
[<ffffffffa0588678>] ? __do_page_fault+0x238/0x500
[<ffffffffa058de21>] ? system_call_after_swapgs+0xae/0x146
[<ffffffffa058de15>] ? system_call_after_swapgs+0xa2/0x146
[<ffffffffa058de21>] ? system_call_after_swapgs+0xae/0x146
[<ffffffffa058de15>] ? system_call_after_swapgs+0xa2/0x146
[<ffffffffa058de21>] ? system_call_after_swapgs+0xae/0x146
[<ffffffffa043158e>] SyS_accept4+0xe/0x10
[<ffffffffa04315a0>] SyS_accept+0x10/0x20
[<ffffffffa058dede>] system_call_fastpath+0x25/0x2a
[<ffffffffa058de21>] ? system_call_after_swapgs+0xae/0x146