System panicked with BUG: unable to handle kernel paging request at ffffffffffffffaf in ec_mem_cache_get function of cbsensor_2_5_1230541 module.
Environment
- Red Hat Enterprise Linux.
- Third-Party Module [cbsensor_2_5_1230541].
Issue
- The server got crashed because it was unable to handle kernel paging requests.
[ 2080.356164] cbsensor_2_5_1230541: ec_mem_cache_get: Cache entry magic does not match. Failed to free memory: ffff9046396eb730
[ 2080.356167] CPU: 9 PID: 1878 Comm: elastic-agent Kdump: loaded Tainted: P OE ------------ T 3.10.0-1160.88.1.el7.x86_64 #1
[ 2080.356168] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[ 2080.356169] Call Trace:
[ 2080.356174] [<ffffffffbcdb1bec>] dump_stack+0x19/0x1f
[ 2080.356180] [<ffffffffc06d85fb>] ec_mem_cache_get+0x2b/0x50 [cbsensor_2_5_1230541]
[ 2080.356184] [<ffffffffc06e4b5c>] ec_process_tracking_get_exec_identity_ref+0x1c/0x50 [cbsensor_2_5_1230541]
[ 2080.356187] [<ffffffffc06e500f>] ec_process_exec_handle_set_exec_identity+0x2f/0x60 [cbsensor_2_5_1230541]
[ 2080.356190] [<ffffffffc06e5113>] ec_process_handle_alloc+0x63/0x90 [cbsensor_2_5_1230541]
[ 2080.356193] [<ffffffffc06e2a6e>] ec_hashtbl_handle_callback+0xe/0x10 [cbsensor_2_5_1230541]
[ 2080.356196] [<ffffffffc06e7501>] ec_hashtbl_get+0x51/0xa0 [cbsensor_2_5_1230541]
[ 2080.356198] [<ffffffffc06e7780>] ec_hashtbl_find+0x230/0x2c0 [cbsensor_2_5_1230541]
[ 2080.356201] [<ffffffffc06e2bc2>] ec_process_tracking_get_handle+0x32/0x50 [cbsensor_2_5_1230541]
[ 2080.356204] [<ffffffffc06da51c>] __ec_do_file_event+0xfc/0x410 [cbsensor_2_5_1230541]
[ 2080.356207] [<ffffffffc06da9e6>] __ec_sys_open+0xb6/0x100 [cbsensor_2_5_1230541]
[ 2080.356210] [<ffffffffc06db25d>] ec_sys_openat+0x8d/0xe0 [cbsensor_2_5_1230541]
[ 2080.356211] [<ffffffffc05e1d95>] tmhook_invoke.isra.8+0x45/0xa0 [tmhook]
[ 2080.356213] [<ffffffffc05e1f98>] tmhook_handler+0x1a8/0x2d0 [tmhook]
[ 2080.356215] [<ffffffffbcdc539a>] system_call_fastpath+0x25/0x2a
[ 2080.356228] BUG: unable to handle kernel paging request at ffffffffffffffaf
[ 2080.356251] IP: [<ffffffffc06d85da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1230541]
[ 2080.356273] PGD 64e214067 PUD 64e216067 PMD 0
[ 2080.356285] Oops: 0000 [#1] SMP
[ 2080.356294] Modules linked in: bmhook(OE) tmhook(OE) nfsv3 nfs_acl nfs lockd grace fscache dsa_filter(POE) dsa_filter_hook(OE) cbsensor_2_5_1230541(OE) vmw_vsock_vmci_transport vsock sunrpc iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel ppdev lrw gf128mul glue_helper ablk_helper cryptd vmw_balloon pcspkr joydev sg parport_pc parport vmw_vmci i2c_piix4 ip_tables xfs libcrc32c cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ahci drm libahci ata_piix crct10dif_pclmul nfit crct10dif_common libata crc32c_intel libnvdimm serio_raw vmxnet3 vmw_pvscsi drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse
[ 2080.356464] CPU: 9 PID: 1878 Comm: elastic-agent Kdump: loaded Tainted: P OE ------------ T 3.10.0-1160.88.1.el7.x86_64 #1
[ 2080.356487] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[ 2080.356508] task: ffff90463b493180 ti: ffff904610114000 task.ti: ffff904610114000
[ 2080.356523] RIP: 0010:[<ffffffffc06d85da>] [<ffffffffc06d85da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1230541]
[ 2080.356546] RSP: 0018:ffff904610117b58 EFLAGS: 00010082
[ 2080.356556] RAX: ffff9046396eb730 RBX: ffffffffffffffff RCX: 0000000000000006
[ 2080.356571] RDX: ffff904610117da8 RSI: ffff904610117da8 RDI: ffffffffffffffdf
[ 2080.356585] RBP: ffff904610117b88 R08: 6170747361665f6c R09: 2f353278302b6874
[ 2080.356599] R10: 0000000000000835 R11: 613278302f353278 R12: ffffffffc06f6b80
[ 2080.356613] R13: ffff904610117da8 R14: ffffffffffffffdf R15: ffffad7506f0dfc0
[..]
[ 2080.356694] PKRU: 55555554
[ 2080.356700] Call Trace:
[ 2080.356710] [<ffffffffc06e74e6>] ? ec_hashtbl_get+0x36/0xa0 [cbsensor_2_5_1230541]
[ 2080.356728] [<ffffffffc06db7a3>] ec_path_cache_get+0x23/0x60 [cbsensor_2_5_1230541]
[ 2080.356745] [<ffffffffbcdb1bec>] ? dump_stack+0x19/0x1f
[ 2080.356758] [<ffffffffc06e4680>] __ec_process_tracking_get_path_data+0x30/0x80 [cbsensor_2_5_1230541]
[ 2080.356779] [<ffffffffc06e4b5c>] ? ec_process_tracking_get_exec_identity_ref+0x1c/0x50 [cbsensor_2_5_1230541]
[ 2080.356800] [<ffffffffc06e501d>] ec_process_exec_handle_set_exec_identity+0x3d/0x60 [cbsensor_2_5_1230541]
[ 2080.356827] [<ffffffffc06e5113>] ec_process_handle_alloc+0x63/0x90 [cbsensor_2_5_1230541]
[ 2080.356846] [<ffffffffc06e2a6e>] ec_hashtbl_handle_callback+0xe/0x10 [cbsensor_2_5_1230541]
[ 2080.356864] [<ffffffffc06e7501>] ec_hashtbl_get+0x51/0xa0 [cbsensor_2_5_1230541]
[ 2080.356881] [<ffffffffc06e7780>] ec_hashtbl_find+0x230/0x2c0 [cbsensor_2_5_1230541]
[ 2080.356898] [<ffffffffc06e2bc2>] ec_process_tracking_get_handle+0x32/0x50 [cbsensor_2_5_1230541]
[ 2080.356917] [<ffffffffc06da51c>] __ec_do_file_event+0xfc/0x410 [cbsensor_2_5_1230541]
[ 2080.356935] [<ffffffffc06da9e6>] __ec_sys_open+0xb6/0x100 [cbsensor_2_5_1230541]
[ 2080.356951] [<ffffffffc06db25d>] ec_sys_openat+0x8d/0xe0 [cbsensor_2_5_1230541]
[ 2080.356967] [<ffffffffc05e1d95>] tmhook_invoke.isra.8+0x45/0xa0 [tmhook]
[ 2080.356982] [<ffffffffc05e1f98>] tmhook_handler+0x1a8/0x2d0 [tmhook]
[ 2080.356996] [<ffffffffbcdc539a>] system_call_fastpath+0x25/0x2a
[ 2080.357012] Code: 32 6d fc eb d6 48 8d 70 5c 48 89 da 48 c7 c7 e0 fe 6e c0 31 c0 e8 76 32 6d fc eb cf 0f 1f 44 00 00 0f 1f 44 00 00 48 85 ff 74 22 <81> 7f d0 ef be ad de 75 06 f0 48 ff 47 f0 c3 f6 05 40 e5 01 00
[ 2080.357087] RIP [<ffffffffc06d85da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1230541]
[ 2080.357106] RSP <ffff904610117b58>
[ 2080.357113] CR2: ffffffffffffffaf
Resolution
-
The
[cbsensor_2_5_1230541]module is not shipped by Red Hat. -
Engage the
[cbsensor_2_5_1230541]module vendor to investigate further on the issue.Workaround:
- Blacklist the module
[cbsensor_2_5_1230541]and check if this issue is reproducible.
How do I prevent a kernel module from loading automatically?
- Blacklist the module
Root Cause
- The server was crashed in the function of the third-party kernel module
[cbsensor_2_5_1230541].
Diagnostic Steps
- The kernel ring buffer shows call traces of the panic task which indicates a panic when operating in the code section of the third-party module
[cbsensor_2_5_1230541].
Kernel ring buffer:
crash> log
[ 2080.356164] cbsensor_2_5_1230541: ec_mem_cache_get: Cache entry magic does not match. Failed to free memory: ffff9046396eb730
[ 2080.356167] CPU: 9 PID: 1878 Comm: elastic-agent Kdump: loaded Tainted: P OE ------------ T 3.10.0-1160.88.1.el7.x86_64 #1
[ 2080.356168] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[ 2080.356169] Call Trace:
[ 2080.356174] [<ffffffffbcdb1bec>] dump_stack+0x19/0x1f
[ 2080.356180] [<ffffffffc06d85fb>] ec_mem_cache_get+0x2b/0x50 [cbsensor_2_5_1230541]
[ 2080.356184] [<ffffffffc06e4b5c>] ec_process_tracking_get_exec_identity_ref+0x1c/0x50 [cbsensor_2_5_1230541]
[ 2080.356187] [<ffffffffc06e500f>] ec_process_exec_handle_set_exec_identity+0x2f/0x60 [cbsensor_2_5_1230541]
[ 2080.356190] [<ffffffffc06e5113>] ec_process_handle_alloc+0x63/0x90 [cbsensor_2_5_1230541]
[ 2080.356193] [<ffffffffc06e2a6e>] ec_hashtbl_handle_callback+0xe/0x10 [cbsensor_2_5_1230541]
[ 2080.356196] [<ffffffffc06e7501>] ec_hashtbl_get+0x51/0xa0 [cbsensor_2_5_1230541]
[ 2080.356198] [<ffffffffc06e7780>] ec_hashtbl_find+0x230/0x2c0 [cbsensor_2_5_1230541]
[ 2080.356201] [<ffffffffc06e2bc2>] ec_process_tracking_get_handle+0x32/0x50 [cbsensor_2_5_1230541]
[ 2080.356204] [<ffffffffc06da51c>] __ec_do_file_event+0xfc/0x410 [cbsensor_2_5_1230541]
[ 2080.356207] [<ffffffffc06da9e6>] __ec_sys_open+0xb6/0x100 [cbsensor_2_5_1230541]
[ 2080.356210] [<ffffffffc06db25d>] ec_sys_openat+0x8d/0xe0 [cbsensor_2_5_1230541]
[ 2080.356211] [<ffffffffc05e1d95>] tmhook_invoke.isra.8+0x45/0xa0 [tmhook]
[ 2080.356213] [<ffffffffc05e1f98>] tmhook_handler+0x1a8/0x2d0 [tmhook]
[ 2080.356215] [<ffffffffbcdc539a>] system_call_fastpath+0x25/0x2a
[ 2080.356228] BUG: unable to handle kernel paging request at ffffffffffffffaf
[ 2080.356251] IP: [<ffffffffc06d85da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1230541]
[ 2080.356273] PGD 64e214067 PUD 64e216067 PMD 0
[ 2080.356285] Oops: 0000 [#1] SMP
[ 2080.356294] Modules linked in: bmhook(OE) tmhook(OE) nfsv3 nfs_acl nfs lockd grace fscache dsa_filter(POE) dsa_filter_hook(OE) cbsensor_2_5_1230541(OE) vmw_vsock_vmci_transport vsock sunrpc iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel ppdev lrw gf128mul glue_helper ablk_helper cryptd vmw_balloon pcspkr joydev sg parport_pc parport vmw_vmci i2c_piix4 ip_tables xfs libcrc32c cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ahci drm libahci ata_piix crct10dif_pclmul nfit crct10dif_common libata crc32c_intel libnvdimm serio_raw vmxnet3 vmw_pvscsi drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse
[ 2080.356464] CPU: 9 PID: 1878 Comm: elastic-agent Kdump: loaded Tainted: P OE ------------ T 3.10.0-1160.88.1.el7.x86_64 #1
[ 2080.356487] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[ 2080.356508] task: ffff90463b493180 ti: ffff904610114000 task.ti: ffff904610114000
[ 2080.356523] RIP: 0010:[<ffffffffc06d85da>] [<ffffffffc06d85da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1230541]
[ 2080.356546] RSP: 0018:ffff904610117b58 EFLAGS: 00010082
[ 2080.356556] RAX: ffff9046396eb730 RBX: ffffffffffffffff RCX: 0000000000000006
[ 2080.356571] RDX: ffff904610117da8 RSI: ffff904610117da8 RDI: ffffffffffffffdf
[ 2080.356585] RBP: ffff904610117b88 R08: 6170747361665f6c R09: 2f353278302b6874
[ 2080.356599] R10: 0000000000000835 R11: 613278302f353278 R12: ffffffffc06f6b80
[ 2080.356613] R13: ffff904610117da8 R14: ffffffffffffffdf R15: ffffad7506f0dfc0
[..]
[ 2080.356694] PKRU: 55555554
[ 2080.356700] Call Trace:
[ 2080.356710] [<ffffffffc06e74e6>] ? ec_hashtbl_get+0x36/0xa0 [cbsensor_2_5_1230541]
[ 2080.356728] [<ffffffffc06db7a3>] ec_path_cache_get+0x23/0x60 [cbsensor_2_5_1230541]
[ 2080.356745] [<ffffffffbcdb1bec>] ? dump_stack+0x19/0x1f
[ 2080.356758] [<ffffffffc06e4680>] __ec_process_tracking_get_path_data+0x30/0x80 [cbsensor_2_5_1230541]
[ 2080.356779] [<ffffffffc06e4b5c>] ? ec_process_tracking_get_exec_identity_ref+0x1c/0x50 [cbsensor_2_5_1230541]
[ 2080.356800] [<ffffffffc06e501d>] ec_process_exec_handle_set_exec_identity+0x3d/0x60 [cbsensor_2_5_1230541]
[ 2080.356827] [<ffffffffc06e5113>] ec_process_handle_alloc+0x63/0x90 [cbsensor_2_5_1230541]
[ 2080.356846] [<ffffffffc06e2a6e>] ec_hashtbl_handle_callback+0xe/0x10 [cbsensor_2_5_1230541]
[ 2080.356864] [<ffffffffc06e7501>] ec_hashtbl_get+0x51/0xa0 [cbsensor_2_5_1230541]
[ 2080.356881] [<ffffffffc06e7780>] ec_hashtbl_find+0x230/0x2c0 [cbsensor_2_5_1230541]
[ 2080.356898] [<ffffffffc06e2bc2>] ec_process_tracking_get_handle+0x32/0x50 [cbsensor_2_5_1230541]
[ 2080.356917] [<ffffffffc06da51c>] __ec_do_file_event+0xfc/0x410 [cbsensor_2_5_1230541]
[ 2080.356935] [<ffffffffc06da9e6>] __ec_sys_open+0xb6/0x100 [cbsensor_2_5_1230541]
[ 2080.356951] [<ffffffffc06db25d>] ec_sys_openat+0x8d/0xe0 [cbsensor_2_5_1230541]
[ 2080.356967] [<ffffffffc05e1d95>] tmhook_invoke.isra.8+0x45/0xa0 [tmhook]
[ 2080.356982] [<ffffffffc05e1f98>] tmhook_handler+0x1a8/0x2d0 [tmhook]
[ 2080.356996] [<ffffffffbcdc539a>] system_call_fastpath+0x25/0x2a
[ 2080.357012] Code: 32 6d fc eb d6 48 8d 70 5c 48 89 da 48 c7 c7 e0 fe 6e c0 31 c0 e8 76 32 6d fc eb cf 0f 1f 44 00 00 0f 1f 44 00 00 48 85 ff 74 22 <81> 7f d0 ef be ad de 75 06 f0 48 ff 47 f0 c3 f6 05 40 e5 01 00
[ 2080.357087] RIP [<ffffffffc06d85da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1230541]
[ 2080.357106] RSP <ffff904610117b58>
[ 2080.357113] CR2: ffffffffffffffaf
-
Backtrace of the panic task:
-
The server panicked in the function ec_mem_cache_get().
crash> bt
PID: 1878 TASK: ffff90463b493180 CPU: 9 COMMAND: "elastic-agent"
#0 [ffff9046101177e0] machine_kexec at ffffffffbc669514
#1 [ffff904610117840] __crash_kexec at ffffffffbc729e82
#2 [ffff904610117910] crash_kexec at ffffffffbc729f78
#3 [ffff904610117928] oops_end at ffffffffbcdbc818
#4 [ffff904610117950] no_context at ffffffffbc67974c
#5 [ffff9046101179a0] __bad_area_nosemaphore at ffffffffbc679a2a
#6 [ffff9046101179f0] bad_area_nosemaphore at ffffffffbc679b54
#7 [ffff904610117a00] __do_page_fault at ffffffffbcdbf8d0
#8 [ffff904610117a70] do_page_fault at ffffffffbcdbfb05
#9 [ffff904610117aa0] page_fault at ffffffffbcdbb7b8
[exception RIP: ec_mem_cache_get+10] <<-----------
RIP: ffffffffc06d85da RSP: ffff904610117b58 RFLAGS: 00010082
RAX: ffff9046396eb730 RBX: ffffffffffffffff RCX: 0000000000000006
RDX: ffff904610117da8 RSI: ffff904610117da8 RDI: ffffffffffffffdf
RBP: ffff904610117b88 R8: 6170747361665f6c R9: 2f353278302b6874
R10: 0000000000000835 R11: 613278302f353278 R12: ffffffffc06f6b80
R13: ffff904610117da8 R14: ffffffffffffffdf R15: ffffad7506f0dfc0
ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018
#10 [ffff904610117b58] ec_hashtbl_get at ffffffffc06e74e6 [cbsensor_2_5_1230541]
#11 [ffff904610117b90] ec_path_cache_get at ffffffffc06db7a3 [cbsensor_2_5_1230541]
#12 [ffff904610117bb0] __ec_process_tracking_get_path_data at ffffffffc06e4680 [cbsensor_2_5_1230541]
#13 [ffff904610117bd8] ec_process_exec_handle_set_exec_identity at ffffffffc06e501d [cbsensor_2_5_1230541]
#14 [ffff904610117c00] ec_process_handle_alloc at ffffffffc06e5113 [cbsensor_2_5_1230541]
#15 [ffff904610117c30] ec_hashtbl_handle_callback at ffffffffc06e2a6e [cbsensor_2_5_1230541]
#16 [ffff904610117c40] ec_hashtbl_get at ffffffffc06e7501 [cbsensor_2_5_1230541]
#17 [ffff904610117c78] ec_hashtbl_find at ffffffffc06e7780 [cbsensor_2_5_1230541]
#18 [ffff904610117cb8] ec_process_tracking_get_handle at ffffffffc06e2bc2 [cbsensor_2_5_1230541]
#19 [ffff904610117cd8] __ec_do_file_event at ffffffffc06da51c [cbsensor_2_5_1230541]
#20 [ffff904610117d50] __ec_sys_open at ffffffffc06da9e6 [cbsensor_2_5_1230541]
#21 [ffff904610117d80] ec_sys_openat at ffffffffc06db25d [cbsensor_2_5_1230541]
#22 [ffff904610117e38] tmhook_invoke at ffffffffc05e1d95 [tmhook]
#23 [ffff904610117e78] tmhook_handler at ffffffffc05e1f98 [tmhook]
#24 [ffff904610117f50] system_call_fastpath at ffffffffbcdc539a
RIP: 000056552b0f040e RSP: 000000c000a3d418 RFLAGS: 00000202
RAX: 0000000000000101 RBX: ffffffffffffff9c RCX: ffffffffffffffff
RDX: 0000000000080040 RSI: 000000c0000e66c0 RDI: ffffffffffffff9c
RBP: 000000c000a3d420 R8: 0000000000000000 R9: 0000000000000000
R10: 0000000000000180 R11: 0000000000000206 R12: 000000c0000e66c0
R13: 0000000000000000 R14: 000000c00100a1a0 R15: ffffffffffffffff
ORIG_RAX: 0000000000000101 CS: 0033 SS: 002b
crash>
- Dis-assembly of address:
crash> sym ec_mem_cache_get
ffffffffc06d85d0 (t) ec_mem_cache_get [cbsensor_2_5_1230541] <<-------
^ ^
| |
[Function Name] [Module Name]
-
Third-party modules:
-
Details of the third-party module:
[cbsensor_2_5_1230541].
crash> mod -t | grep -i 'cbsensor_2_5_1230541'
cbsensor_2_5_1230541 OE <<--------
crash>
This solution is part of Red Hat’s fast-track publication program, providing a huge library of solutions that Red Hat engineers have created while supporting our customers. To give you the knowledge you need the instant it becomes available, these articles may be presented in a raw and unedited form.
Comments