System crashes at `sys_read+0x5e`
Issue
- System crashed with the below call trace.
...
[8199378.780464] TRAPS: [auth-link] flow registered [4]
[8199379.110378] BUG: unable to handle kernel paging request at 00002ac1631ab048
[8199379.110645] IP: [<ffffffffb285c5ee>] SyS_read+0x5e/0xd0
[8199379.110841] PGD fe73d2067 PUD fe73d1067 PMD f87d27067 PTE 800000025a79f867
[8199379.111034] Oops: 0003 [#1] SMP
[8199379.111220] Modules linked in: traps(OE) tcp_diag inet_diag gc_enforcement(OE) iptable_filter nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack symap_rh_ES_7_3_10_0_862_9_1_el7_x86_64(POE) symev_rh_ES_7_3_10_0_862_9_1_el7_x86_64(OE) vmw_vsock_vmci_transport vsock ext4 mbcache jbd2 iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper ablk_helper cryptd vmw_balloon joydev pcspkr vmw_vmci sg i2c_piix4 parport_pc parport binfmt_misc ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix sd_mod drm crc_t10dif crct10dif_generic libata crct10dif_pclmul crct10dif_common crc32c_intel nfit libnvdimm serio_raw vmxnet3 vmw_pvscsi drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod
[8199379.112607] fuse [last unloaded: traps]
[8199379.112923] CPU: 10 PID: 2950 Comm: pmd Kdump: loaded Tainted: P OE ------------ 3.10.0-1160.81.1.el7.x86_64 #1
[8199379.113273] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[8199379.113640] task: ffff8ac8bbe28000 ti: ffff8ac8b7318000 task.ti: ffff8ac8b7318000
[8199379.114025] RIP: 0010:[<ffffffffb285c5ee>] [<ffffffffb285c5ee>] SyS_read+0x5e/0xd0
[8199379.114419] RSP: 0018:ffff8ac8b731bf10 EFLAGS: 00010246
[8199379.114818] RAX: 0000000000000000 RBX: ffff8ab9d999d200 RCX: ffff8ac8b731bf18
[8199379.115228] RDX: 0000000000000000 RSI: 00002ac1631ab000 RDI: ffff8ab9d999d200
[8199379.115644] RBP: ffff8ac8b731bf48 R08: 0000000000000000 R09: 0000000000000000
[8199379.116066] R10: 00002ac1548021a0 R11: 0000000000000293 R12: 00002ac1631ab000
[8199379.116495] R13: ffff8ac8b731bf18 R14: 0000000000001fff R15: 0000000000000000
[8199379.116925] FS: 00002ac14cf3e6c0(0000) GS:ffff8ac8bd880000(0000) knlGS:0000000000000000
[8199379.117368] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[8199379.117828] CR2: 00002ac1631ab048 CR3: 0000000ff2aca000 CR4: 00000000007607e0
[8199379.118316] PKRU: 55555554
[8199379.118795] Call Trace:
[8199379.119273] [<ffffffffb2dc562e>] tracesys+0xa6/0xcc
[8199379.119754] Code: c3 49 83 e4 fc 74 7d 49 8b 44 24 48 48 8d 4d d0 4c 89 f2 4c 89 ee 4c 89 e7 48 89 45 d0 e8 eb f0 ff ff 48 85 c0 78 09 48 8b 55 d0 <49> 89 54 24 48 f6 c3 02 75 38 83 e3 01 74 10 4c 89 e7 48 89 45
[8199379.120846] RIP [<ffffffffb285c5ee>] SyS_read+0x5e/0xd0
[8199379.121386] RSP <ffff8ac8b731bf10>
[8199379.121929] CR2: 00002ac1631ab048
Environment
- Red Hat Enterprise Linux 7
- 3rd party module :
traps - 3rd party module :
symev*
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.