カーネルがパニックになり wildcard_match_inDir() に kernel BUG at include/linux/dcache.h:364! メッセージが表示される
Issue
- カーネルがパニックになり wildcard_match_inDir() に kernel BUG at include/linux/dcache.h:364! メッセージが表示されます。
------------[ cut here ]------------
kernel BUG at include/linux/dcache.h:364!
invalid opcode:0000 [#1] SMP
last sysfs file:/sys/devices/pci0000:00/0000:00:03.0/0000:16:00.1/host1/rport-1:0-0/target1:0:0/1:0:0:0/state
CPU 0
Modules linked in: splxmod(U) iptable_filter ip_queue ip_tables autofs4 sunrpc cpufreq_ondemand acpi_cpufreq freq_table mperf bonding 8021q garp stp llc ipv6 vfat fat microcode shpchp sg i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support ioatdma dca be2net ext3 jbd mbcache dm_round_robin sd_mod crc_t10dif wmi qla2xxx scsi_transport_fc scsi_tgt dm_multipath dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
Pid:25190, comm: ps Not tainted 2.6.32-279.el6.x86_64 #1 IBM -[8737D2J]-/00Y2765
RIP:0010:[<ffffffffa030e945>] [<ffffffffa030e945>] wildcard_match_inDir+0x3f5/0x520 [splxmod]
RSP:0018:ffff880038337bd8 EFLAGS:00010246
RAX:0000000000000000 RBX: ffff8805f1401b00 RCX:00000000efd17419
RDX:00000000efd17419 RSI: ffffffff81a84040 RDI: ffffffffefd17418
RBP: ffff880038337c68 R08: ffff8805e8c9c408 R09:0000000000000000
R10:0000000000000000 R11:0000000000000000 R12: ffff8805f18ebd80
R13: ffff8805e751cfc0 R14: ffff880038337c08 R15: ffff880038337c18
FS:00007f1f362927a0(0000) GS:ffff88003c200000(0000) knlGS:0000000000000000
CS:0010 DS:0000 ES:0000 CR0:0000000080050033
CR2:000000000205e000 CR3:0000000248777000 CR4:00000000000406f0
DR0:0000000000000000 DR1:0000000000000000 DR2:0000000000000000
DR3:0000000000000000 DR6:00000000ffff0ff0 DR7:0000000000000400
Process ps (pid:25190, threadinfo ffff880038336000, task ffff8803d5cb8040)
Stack:
ffff8805ffc00040 00006266d5cb8040 ffff880038337c30 ffffffffa031530f
<d> 00000000d5cb8040 ffff8805e8c9cde0 ffff8805e751cfc8 ffff8805e8c9c408
<d> ffff8805f18ebd80 ffff8805f1401b00 ffff8805f18ebd80 ffff8805e8c9cde0
Call Trace:
[<ffffffffa030eb63>] inExcDirs+0xf3/0x250 [splxmod]
[<ffffffffa030f9c2>] needToScanThisOpen+0x122/0x300 [splxmod]
[<ffffffffa0307c8b>] openHook+0x37b/0xd90 [splxmod]
[<ffffffff8117ca75>] ? fput+0x25/0x30
[<ffffffff8117849d>] ? filp_close+0x5d/0x90
[<ffffffff81271ba5>] ?_atomic_dec_and_lock+0x55/0x80
[<ffffffffa0309321>] ? closeHook+0x1e1/0xbe0 [splxmod]
[<ffffffff8117b92f>] ? vfs_read+0x12f/0x1a0
[<ffffffff810d69e2>] ? audit_syscall_entry+0x272/0x2a0
[<ffffffff8100b0f2>] system_call_fastpath+0x16/0x1b
Code:18 00 00 00 4c 89 ee 48 c7 c7 35 e6 30 a0 41 ff d2 4c 8b 13 48 8b 85 70 ff ff ff 4d 85 d2 75 ca 4c 89 e3 49 89 c4 e9 2d fd ff ff <0f> 0b eb fe 8b b5 7c ff ff ff 48 c7 c2 fa 52 31 a0 48 c7 c7 a0
RIP [<ffffffffa030e945>] wildcard_match_inDir+0x3f5/0x520 [splxmod]
RSP <ffff880038337bd8>
crash> bt
PID:25190 TASK: ffff8803d5cb8040 CPU:0 COMMAND:"ps"
#0 [ffff880038337890] machine_kexec at ffffffff8103281b
#1 [ffff8800383378f0] crash_kexec at ffffffff810ba662
#2 [ffff8800383379c0] oops_end at ffffffff81501290
#3 [ffff8800383379f0] die at ffffffff8100f26b
#4 [ffff880038337a20] do_trap at ffffffff81500b84
#5 [ffff880038337a80] do_invalid_op at ffffffff8100ce35
#6 [ffff880038337b20] invalid_op at ffffffff8100bedb
[exception RIP: wildcard_match_inDir+1013]
RIP: ffffffffa030e945 RSP: ffff880038337bd8 RFLAGS:00010246
RAX:0000000000000000 RBX: ffff8805f1401b00 RCX:00000000efd17419
RDX:00000000efd17419 RSI: ffffffff81a84040 RDI: ffffffffefd17418
RBP: ffff880038337c68 R8: ffff8805e8c9c408 R9:0000000000000000
R10:0000000000000000 R11:0000000000000000 R12: ffff8805f18ebd80
R13: ffff8805e751cfc0 R14: ffff880038337c08 R15: ffff880038337c18
ORIG_RAX: ffffffffffffffff CS:0010 SS:0018
#7 [ffff880038337bd0] wildcard_match_inDir at ffffffffa030e6c6 [splxmod]
#8 [ffff880038337c70] inExcDirs at ffffffffa030eb63 [splxmod]
#9 [ffff880038337cb0] needToScanThisOpen at ffffffffa030f9c2 [splxmod]
#10 [ffff880038337d00] openHook at ffffffffa0307c8b [splxmod]
#11 [ffff880038337f80] system_call_fastpath at ffffffff8100b0f2
RIP:0000003869cda170 RSP:00007ffffbbc14a8 RFLAGS:00000287
RAX:0000000000000002 RBX: ffffffff8100b0f2 RCX:00007ffffbbc1594
RDX:0000000000000000 RSI:0000000000000000 RDI:000000386a211840
RBP:000000000000006a R8:0000000000000006 R9:0000000000000000
R10:00000000fffffffa R11:0000000000000246 R12:0000000000000000
R13:0000000000000000 R14:0000000000000020 R15:0000000001d9d2b0
ORIG_RAX:0000000000000002 CS:0033 SS:002b
Environment
- Red Hat Enterprise Linux 6 (2.6.32-279.el6.x86_64)
- TrendMicro ServerProtect Kernel Hook Module for Linux (splxmod)
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
