kernel panics at RIP : show_stack_log_lvl () when trying to access user mode address.
Issue
- kernel panics with following stack traces when trying to access user mode address.
[6235787.971681] Stack:
[6235787.971742] BUG: unable to handle kernel paging request at 00007f78b5af86d0
[6235787.971744] IP: [<ffffffff810173d9>] show_stack_log_lvl+0x109/0x180
[6235787.971751] PGD 3ec7a63067 PUD 3ec1148067 PMD 3ec7a8f067 PTE 8000003ea4acf067
[6235787.971754] Oops: 0001 [#1] SMP
[6235787.971756] Modules linked in: tcp_lp bnep bluetooth rfkill fuse binfmt_misc xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun
...
[6235787.971803] CPU: 4 PID: 8148 Comm: oacore Tainted: P W OE ------------ 3.10.0-327.el7.x86_64 #1
[6235787.971804] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/30/2014
[6235787.971805] task: ffff883ec1168b80 ti: ffff883ea6ee8000 task.ti: ffff883ea6ee8000
[6235787.971806] RIP: 0010:[<ffffffff810173d9>] [<ffffffff810173d9>] show_stack_log_lvl+0x109/0x180
[6235787.971809] RSP: 0018:ffff883f3e685da8 EFLAGS: 00010046
[6235787.971811] RAX: 00007f78b5af86d8 RBX: 00007f78b5af86d0 RCX: 0000000000000000
[6235787.971812] RDX: ffff883f3e683fc0 RSI: ffff883f3e685ef8 RDI: 0000000000000000
[6235787.971812] RBP: ffff883f3e685df8 R08: ffff883f3e67ffc0 R09: 000000000001bd6d
[6235787.971813] R10: 0000000000000000 R11: ffff883f3e685b1e R12: ffff883f3e685ef8
[6235787.971814] R13: 0000000000000000 R14: ffffffff8184fda6 R15: 0000000000000000
[6235787.971815] FS: 00007f78b5afd700(0000) GS:ffff883f3e680000(0000) knlGS:0000000000000000
[6235787.971816] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[6235787.971817] CR2: 00007f78b5af86d0 CR3: 0000003ec73eb000 CR4: 00000000003407e0
[6235787.971819] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[6235787.971821] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[6235787.971822] Stack:
[6235787.971823] ffff883f00000008 ffff883f3e685e08 ffff883f3e685dc8 00000000ace69409
[6235787.971825] 00007f78b5af86d0 ffff883f3e685ef8 00007f78b5af86d0 ffffffff819556a8
[6235787.971829] 000000000000002b ffff883f3e685ef8 ffff883f3e685e58 ffffffff81017506
[6235787.971831] Call Trace:
[6235787.971832] <NMI>
[6235787.971833]
[6235787.971835] [<ffffffff81017506>] show_regs+0xb6/0x240
[6235787.971838] [<ffffffff8163ecaa>] arch_trigger_all_cpu_backtrace_handler+0x5a/0x110
[6235787.971839] [<ffffffff8163e339>] nmi_handle.isra.0+0x69/0xb0
[6235787.971841] [<ffffffff8163e450>] do_nmi+0xd0/0x340
[6235787.971845] [<ffffffff8163d771>] end_repeat_nmi+0x1e/0x2e
[6235787.971848] [<ffffffff8164589c>] ? system_call_after_swapgs+0x9/0x60
[6235787.971851] [<ffffffff8164589c>] ? system_call_after_swapgs+0x9/0x60
[6235787.971853] [<ffffffff8164589c>] ? system_call_after_swapgs+0x9/0x60
[6235787.971853] <<EOE>>
[6235787.971854] Code:
[6235787.971855] 4d b8 4c 89 45 c0 48 89 55 c8 48 8b 5b f8 e8 49 78 61 00 48 8b 55 c8 4c 8b 45 c0 8b 4d b8 85 c9 74 05 f6 c1 03 74 4c 48 8d 43 08 <48> 8b 33 48 c7 c7 9e fd 84 81 89 4d b4 4c 89 45 b8 48 89 45 c8
[6235787.971874] RIP [<ffffffff810173d9>] show_stack_log_lvl+0x109/0x180
[6235787.971876] RSP <ffff883f3e685da8>
[6235787.971877] CR2: 00007f78b5af86d0
Environment
- Red Hat Enterprise Linux 7
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.