System crashes at `sys_read+0x5e`

Solution Unverified - Updated -

Issue

  • System crashed with the below call trace.
...
[8199378.780464] TRAPS: [auth-link] flow registered [4]
[8199379.110378] BUG: unable to handle kernel paging request at 00002ac1631ab048
[8199379.110645] IP: [<ffffffffb285c5ee>] SyS_read+0x5e/0xd0
[8199379.110841] PGD fe73d2067 PUD fe73d1067 PMD f87d27067 PTE 800000025a79f867
[8199379.111034] Oops: 0003 [#1] SMP 
[8199379.111220] Modules linked in: traps(OE) tcp_diag inet_diag gc_enforcement(OE) iptable_filter nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack symap_rh_ES_7_3_10_0_862_9_1_el7_x86_64(POE) symev_rh_ES_7_3_10_0_862_9_1_el7_x86_64(OE) vmw_vsock_vmci_transport vsock ext4 mbcache jbd2 iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper ablk_helper cryptd vmw_balloon joydev pcspkr vmw_vmci sg i2c_piix4 parport_pc parport binfmt_misc ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix sd_mod drm crc_t10dif crct10dif_generic libata crct10dif_pclmul crct10dif_common crc32c_intel nfit libnvdimm serio_raw vmxnet3 vmw_pvscsi drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
[8199379.112607]  fuse [last unloaded: traps]
[8199379.112923] CPU: 10 PID: 2950 Comm: pmd Kdump: loaded Tainted: P           OE  ------------   3.10.0-1160.81.1.el7.x86_64 #1
[8199379.113273] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[8199379.113640] task: ffff8ac8bbe28000 ti: ffff8ac8b7318000 task.ti: ffff8ac8b7318000
[8199379.114025] RIP: 0010:[<ffffffffb285c5ee>]  [<ffffffffb285c5ee>] SyS_read+0x5e/0xd0
[8199379.114419] RSP: 0018:ffff8ac8b731bf10  EFLAGS: 00010246
[8199379.114818] RAX: 0000000000000000 RBX: ffff8ab9d999d200 RCX: ffff8ac8b731bf18
[8199379.115228] RDX: 0000000000000000 RSI: 00002ac1631ab000 RDI: ffff8ab9d999d200
[8199379.115644] RBP: ffff8ac8b731bf48 R08: 0000000000000000 R09: 0000000000000000
[8199379.116066] R10: 00002ac1548021a0 R11: 0000000000000293 R12: 00002ac1631ab000
[8199379.116495] R13: ffff8ac8b731bf18 R14: 0000000000001fff R15: 0000000000000000
[8199379.116925] FS:  00002ac14cf3e6c0(0000) GS:ffff8ac8bd880000(0000) knlGS:0000000000000000
[8199379.117368] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[8199379.117828] CR2: 00002ac1631ab048 CR3: 0000000ff2aca000 CR4: 00000000007607e0
[8199379.118316] PKRU: 55555554
[8199379.118795] Call Trace:
[8199379.119273]  [<ffffffffb2dc562e>] tracesys+0xa6/0xcc
[8199379.119754] Code: c3 49 83 e4 fc 74 7d 49 8b 44 24 48 48 8d 4d d0 4c 89 f2 4c 89 ee 4c 89 e7 48 89 45 d0 e8 eb f0 ff ff 48 85 c0 78 09 48 8b 55 d0 <49> 89 54 24 48 f6 c3 02 75 38 83 e3 01 74 10 4c 89 e7 48 89 45 
[8199379.120846] RIP  [<ffffffffb285c5ee>] SyS_read+0x5e/0xd0
[8199379.121386]  RSP <ffff8ac8b731bf10>
[8199379.121929] CR2: 00002ac1631ab048

Environment

  • Red Hat Enterprise Linux 7
  • 3rd party module : traps
  • 3rd party module : symev*

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content