カーネルがパニックになり wildcard_match_inDir() に kernel BUG at include/linux/dcache.h:364! メッセージが表示される
Issue
- カーネルがパニックになり wildcard_match_inDir() に kernel BUG at include/linux/dcache.h:364! メッセージが表示されます。
------------[ cut here ]------------
kernel BUG at include/linux/dcache.h:364!
invalid opcode:0000 [#1] SMP
last sysfs file:/sys/devices/pci0000:00/0000:00:03.0/0000:16:00.1/host1/rport-1:0-0/target1:0:0/1:0:0:0/state
CPU 0
Modules linked in: splxmod(U) iptable_filter ip_queue ip_tables autofs4 sunrpc cpufreq_ondemand acpi_cpufreq freq_table mperf bonding 8021q garp stp llc ipv6 vfat fat microcode shpchp sg i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support ioatdma dca be2net ext3 jbd mbcache dm_round_robin sd_mod crc_t10dif wmi qla2xxx scsi_transport_fc scsi_tgt dm_multipath dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
Pid:25190, comm: ps Not tainted 2.6.32-279.el6.x86_64 #1 IBM -[8737D2J]-/00Y2765
RIP:0010:[<ffffffffa030e945>] [<ffffffffa030e945>] wildcard_match_inDir+0x3f5/0x520 [splxmod]
RSP:0018:ffff880038337bd8 EFLAGS:00010246
RAX:0000000000000000 RBX: ffff8805f1401b00 RCX:00000000efd17419
RDX:00000000efd17419 RSI: ffffffff81a84040 RDI: ffffffffefd17418
RBP: ffff880038337c68 R08: ffff8805e8c9c408 R09:0000000000000000
R10:0000000000000000 R11:0000000000000000 R12: ffff8805f18ebd80
R13: ffff8805e751cfc0 R14: ffff880038337c08 R15: ffff880038337c18
FS:00007f1f362927a0(0000) GS:ffff88003c200000(0000) knlGS:0000000000000000
CS:0010 DS:0000 ES:0000 CR0:0000000080050033
CR2:000000000205e000 CR3:0000000248777000 CR4:00000000000406f0
DR0:0000000000000000 DR1:0000000000000000 DR2:0000000000000000
DR3:0000000000000000 DR6:00000000ffff0ff0 DR7:0000000000000400
Process ps (pid:25190, threadinfo ffff880038336000, task ffff8803d5cb8040)
Stack:
ffff8805ffc00040 00006266d5cb8040 ffff880038337c30 ffffffffa031530f
<d> 00000000d5cb8040 ffff8805e8c9cde0 ffff8805e751cfc8 ffff8805e8c9c408
<d> ffff8805f18ebd80 ffff8805f1401b00 ffff8805f18ebd80 ffff8805e8c9cde0
Call Trace:
[<ffffffffa030eb63>] inExcDirs+0xf3/0x250 [splxmod]
[<ffffffffa030f9c2>] needToScanThisOpen+0x122/0x300 [splxmod]
[<ffffffffa0307c8b>] openHook+0x37b/0xd90 [splxmod]
[<ffffffff8117ca75>] ? fput+0x25/0x30
[<ffffffff8117849d>] ? filp_close+0x5d/0x90
[<ffffffff81271ba5>] ?_atomic_dec_and_lock+0x55/0x80
[<ffffffffa0309321>] ? closeHook+0x1e1/0xbe0 [splxmod]
[<ffffffff8117b92f>] ? vfs_read+0x12f/0x1a0
[<ffffffff810d69e2>] ? audit_syscall_entry+0x272/0x2a0
[<ffffffff8100b0f2>] system_call_fastpath+0x16/0x1b
Code:18 00 00 00 4c 89 ee 48 c7 c7 35 e6 30 a0 41 ff d2 4c 8b 13 48 8b 85 70 ff ff ff 4d 85 d2 75 ca 4c 89 e3 49 89 c4 e9 2d fd ff ff <0f> 0b eb fe 8b b5 7c ff ff ff 48 c7 c2 fa 52 31 a0 48 c7 c7 a0
RIP [<ffffffffa030e945>] wildcard_match_inDir+0x3f5/0x520 [splxmod]
RSP <ffff880038337bd8>
crash> bt
PID:25190 TASK: ffff8803d5cb8040 CPU:0 COMMAND:"ps"
#0 [ffff880038337890] machine_kexec at ffffffff8103281b
#1 [ffff8800383378f0] crash_kexec at ffffffff810ba662
#2 [ffff8800383379c0] oops_end at ffffffff81501290
#3 [ffff8800383379f0] die at ffffffff8100f26b
#4 [ffff880038337a20] do_trap at ffffffff81500b84
#5 [ffff880038337a80] do_invalid_op at ffffffff8100ce35
#6 [ffff880038337b20] invalid_op at ffffffff8100bedb
[exception RIP: wildcard_match_inDir+1013]
RIP: ffffffffa030e945 RSP: ffff880038337bd8 RFLAGS:00010246
RAX:0000000000000000 RBX: ffff8805f1401b00 RCX:00000000efd17419
RDX:00000000efd17419 RSI: ffffffff81a84040 RDI: ffffffffefd17418
RBP: ffff880038337c68 R8: ffff8805e8c9c408 R9:0000000000000000
R10:0000000000000000 R11:0000000000000000 R12: ffff8805f18ebd80
R13: ffff8805e751cfc0 R14: ffff880038337c08 R15: ffff880038337c18
ORIG_RAX: ffffffffffffffff CS:0010 SS:0018
#7 [ffff880038337bd0] wildcard_match_inDir at ffffffffa030e6c6 [splxmod]
#8 [ffff880038337c70] inExcDirs at ffffffffa030eb63 [splxmod]
#9 [ffff880038337cb0] needToScanThisOpen at ffffffffa030f9c2 [splxmod]
#10 [ffff880038337d00] openHook at ffffffffa0307c8b [splxmod]
#11 [ffff880038337f80] system_call_fastpath at ffffffff8100b0f2
RIP:0000003869cda170 RSP:00007ffffbbc14a8 RFLAGS:00000287
RAX:0000000000000002 RBX: ffffffff8100b0f2 RCX:00007ffffbbc1594
RDX:0000000000000000 RSI:0000000000000000 RDI:000000386a211840
RBP:000000000000006a R8:0000000000000006 R9:0000000000000000
R10:00000000fffffffa R11:0000000000000246 R12:0000000000000000
R13:0000000000000000 R14:0000000000000020 R15:0000000001d9d2b0
ORIG_RAX:0000000000000002 CS:0033 SS:002b
Environment
- Red Hat Enterprise Linux 6 (2.6.32-279.el6.x86_64)
- TrendMicro ServerProtect Kernel Hook Module for Linux (splxmod)
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.