カーネルがパニックになり wildcard_match_inDir() に kernel BUG at include/linux/dcache.h:364! メッセージが表示される

Solution Verified - Updated -

Issue

  • カーネルがパニックになり wildcard_match_inDir() に kernel BUG at include/linux/dcache.h:364! メッセージが表示されます。
------------[ cut here ]------------
kernel BUG at include/linux/dcache.h:364!
invalid opcode:0000 [#1] SMP 
last sysfs file:/sys/devices/pci0000:00/0000:00:03.0/0000:16:00.1/host1/rport-1:0-0/target1:0:0/1:0:0:0/state
CPU 0 
Modules linked in: splxmod(U) iptable_filter ip_queue ip_tables autofs4 sunrpc cpufreq_ondemand acpi_cpufreq freq_table mperf bonding 8021q garp stp llc ipv6 vfat fat microcode shpchp sg i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support ioatdma dca be2net ext3 jbd mbcache dm_round_robin sd_mod crc_t10dif wmi qla2xxx scsi_transport_fc scsi_tgt dm_multipath dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]

Pid:25190, comm: ps Not tainted 2.6.32-279.el6.x86_64 #1 IBM  -[8737D2J]-/00Y2765
RIP:0010:[<ffffffffa030e945>]  [<ffffffffa030e945>] wildcard_match_inDir+0x3f5/0x520 [splxmod]
RSP:0018:ffff880038337bd8  EFLAGS:00010246
RAX:0000000000000000 RBX: ffff8805f1401b00 RCX:00000000efd17419
RDX:00000000efd17419 RSI: ffffffff81a84040 RDI: ffffffffefd17418
RBP: ffff880038337c68 R08: ffff8805e8c9c408 R09:0000000000000000
R10:0000000000000000 R11:0000000000000000 R12: ffff8805f18ebd80
R13: ffff8805e751cfc0 R14: ffff880038337c08 R15: ffff880038337c18
FS:00007f1f362927a0(0000) GS:ffff88003c200000(0000) knlGS:0000000000000000
CS:0010 DS:0000 ES:0000 CR0:0000000080050033
CR2:000000000205e000 CR3:0000000248777000 CR4:00000000000406f0
DR0:0000000000000000 DR1:0000000000000000 DR2:0000000000000000
DR3:0000000000000000 DR6:00000000ffff0ff0 DR7:0000000000000400
Process ps (pid:25190, threadinfo ffff880038336000, task ffff8803d5cb8040)
Stack:
 ffff8805ffc00040 00006266d5cb8040 ffff880038337c30 ffffffffa031530f
<d> 00000000d5cb8040 ffff8805e8c9cde0 ffff8805e751cfc8 ffff8805e8c9c408
<d> ffff8805f18ebd80 ffff8805f1401b00 ffff8805f18ebd80 ffff8805e8c9cde0
Call Trace:
 [<ffffffffa030eb63>] inExcDirs+0xf3/0x250 [splxmod]
 [<ffffffffa030f9c2>] needToScanThisOpen+0x122/0x300 [splxmod]
 [<ffffffffa0307c8b>] openHook+0x37b/0xd90 [splxmod]
 [<ffffffff8117ca75>] ? fput+0x25/0x30
 [<ffffffff8117849d>] ? filp_close+0x5d/0x90
 [<ffffffff81271ba5>] ?_atomic_dec_and_lock+0x55/0x80
 [<ffffffffa0309321>] ? closeHook+0x1e1/0xbe0 [splxmod]
 [<ffffffff8117b92f>] ? vfs_read+0x12f/0x1a0
 [<ffffffff810d69e2>] ? audit_syscall_entry+0x272/0x2a0
 [<ffffffff8100b0f2>] system_call_fastpath+0x16/0x1b
Code:18 00 00 00 4c 89 ee 48 c7 c7 35 e6 30 a0 41 ff d2 4c 8b 13 48 8b 85 70 ff ff ff 4d 85 d2 75 ca 4c 89 e3 49 89 c4 e9 2d fd ff ff <0f> 0b eb fe 8b b5 7c ff ff ff 48 c7 c2 fa 52 31 a0 48 c7 c7 a0 
RIP  [<ffffffffa030e945>] wildcard_match_inDir+0x3f5/0x520 [splxmod]
 RSP <ffff880038337bd8>

crash> bt
PID:25190  TASK: ffff8803d5cb8040  CPU:0   COMMAND:"ps"
 #0 [ffff880038337890] machine_kexec at ffffffff8103281b
 #1 [ffff8800383378f0] crash_kexec at ffffffff810ba662
 #2 [ffff8800383379c0] oops_end at ffffffff81501290
 #3 [ffff8800383379f0] die at ffffffff8100f26b
 #4 [ffff880038337a20] do_trap at ffffffff81500b84
 #5 [ffff880038337a80] do_invalid_op at ffffffff8100ce35
 #6 [ffff880038337b20] invalid_op at ffffffff8100bedb
    [exception RIP: wildcard_match_inDir+1013]
    RIP: ffffffffa030e945  RSP: ffff880038337bd8  RFLAGS:00010246
    RAX:0000000000000000  RBX: ffff8805f1401b00  RCX:00000000efd17419
    RDX:00000000efd17419  RSI: ffffffff81a84040  RDI: ffffffffefd17418
    RBP: ffff880038337c68   R8: ffff8805e8c9c408   R9:0000000000000000
    R10:0000000000000000  R11:0000000000000000  R12: ffff8805f18ebd80
    R13: ffff8805e751cfc0  R14: ffff880038337c08  R15: ffff880038337c18
    ORIG_RAX: ffffffffffffffff  CS:0010  SS:0018
 #7 [ffff880038337bd0] wildcard_match_inDir at ffffffffa030e6c6 [splxmod]
 #8 [ffff880038337c70] inExcDirs at ffffffffa030eb63 [splxmod]
 #9 [ffff880038337cb0] needToScanThisOpen at ffffffffa030f9c2 [splxmod]
#10 [ffff880038337d00] openHook at ffffffffa0307c8b [splxmod]
#11 [ffff880038337f80] system_call_fastpath at ffffffff8100b0f2
    RIP:0000003869cda170  RSP:00007ffffbbc14a8  RFLAGS:00000287
    RAX:0000000000000002  RBX: ffffffff8100b0f2  RCX:00007ffffbbc1594
    RDX:0000000000000000  RSI:0000000000000000  RDI:000000386a211840
    RBP:000000000000006a   R8:0000000000000006   R9:0000000000000000
    R10:00000000fffffffa  R11:0000000000000246  R12:0000000000000000
    R13:0000000000000000  R14:0000000000000020  R15:0000000001d9d2b0
    ORIG_RAX:0000000000000002  CS:0033  SS:002b

Environment

  • Red Hat Enterprise Linux 6 (2.6.32-279.el6.x86_64)
  • TrendMicro ServerProtect Kernel Hook Module for Linux (splxmod)

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.