Kernel panics at copy_from_kernel_nofault() due to page fault.

Solution Verified - Updated -

Issue

  • Kernel gets panic with below stack showing in kernel ring buffer.
[4052886.480834] BUG: unable to handle page fault for address: ffffffffff600022
[4052886.481198] #PF: supervisor read access in kernel mode
[4052886.481426] #PF: error_code(0x0000) - not-present page
[4052886.481655] PGD 1575a15067 P4D 1575a15067 PUD 1575a17067 PMD 1575a19067 PTE 0
[4052886.481973] Oops: 0000 [#1] PREEMPT SMP PTI
[4052886.482165] CPU: 20 PID: 942932 Comm: cluster-kube-ap Kdump: loaded Not tainted 5.14.0-284.66.1.el9_2.x86_64 #1
[4052886.482598] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[4052886.483050] RIP: 0010:copy_from_kernel_nofault+0x3b/0xf0
[4052886.483290] Code: f3 48 89 d6 48 89 df e8 b3 d6 d9 ff 84 c0 0f 84 b3 00 00 00 65 48 8b 04 25 40 8f 01 00 83 80 08 15 00 00 01 49 83 fc 07 76 19 <48> 8b 03 48 89 45 00 49 83 ec 08 48 83 c5 08 48 83 c3 08 49 83 fc
[4052886.484080] RSP: 0018:ffffb1a295ef7d28 EFLAGS: 00010202
[4052886.484310] RAX: ffff9be0888e0000 RBX: ffffffffff600022 RCX: 0000000000000010
[4052886.484616] RDX: 0000000000000008 RSI: 0000000000000008 RDI: ffffffffff600022
[4052886.484922] RBP: ffffb1a295ef7da8 R08: 0000000000000001 R09: 0000000000000000
[4052886.485230] R10: 0000000000000000 R11: ffff9be0888e0010 R12: 0000000000000008
[4052886.485535] R13: 00000000059b4380 R14: 0000000000000000 R15: ffffb1a295ef7e30
[4052886.485844] FS:  00007fc304ff9700(0000) GS:ffff9be69fd00000(0000) knlGS:0000000000000000
[4052886.486200] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[4052886.486468] CR2: ffffffffff600022 CR3: 0000001c67694002 CR4: 00000000007706e0
[4052886.486792] PKRU: 55555554
[4052886.486919] Call Trace:
[4052886.487038]  <TASK>
[4052886.487146]  bpf_probe_read_kernel+0x18/0x50
[4052886.487348]  bpf_prog_0cebbd2cf7d705f9_accept4_x+0x2e3/0x15a5
[4052886.487609]  ? copy_from_kernel_nofault+0x1d/0xf0
[4052886.487826]  ? bpf_probe_read_kernel+0x18/0x50
[4052886.488026]  ? bpf_prog_9ac386c2cb2749fa_sys_exit+0x2c7/0x539
[4052886.488281]  bpf_trace_run2+0x36/0xa0
[4052886.488449]  syscall_exit_work+0xb0/0x150
[4052886.488640]  syscall_exit_to_user_mode+0x9/0x40
[4052886.488847]  do_syscall_64+0x69/0x90
[4052886.489012]  ? arch_do_signal_or_restart+0xef/0x100
[4052886.489232]  ? exit_to_user_mode_loop+0x9c/0x130
[4052886.489439]  ? exit_to_user_mode_prepare+0xb6/0x100
[4052886.489656]  ? sysvec_reschedule_ipi+0x34/0x110
[4052886.489860]  entry_SYSCALL_64_after_hwframe+0x64/0xce
[4052886.490087] RIP: 0033:0x41abce
[4052886.490230] Code: e8 0d 25 ff 1f 00 00 48 8b 94 c2 00 40 10 00 48 89 f0 eb 02 31 d2 48 89 54 24 20 90 48 85 d2 0f 84 8e 00 00 00 90 40 8a 72 63 <40> 80 fe 01 75 12 4c 8b 42 18 4c 39 c0 72 09 0f 1f 00 48 39 42 70
[4052886.491017] RSP: 002b:00007fc304ff8cf8 EFLAGS: 00000202
[4052886.491250] RAX: 000000c000b36870 RBX: 000000c00027a120 RCX: 0000000000000078
[4052886.492452] RDX: 00007fc35c20cd68 RSI: 000000c000b36801 RDI: 0000000000000012
[4052886.493471] RBP: 00007fc304ff8d20 R08: 0000000000000078 R09: 00000000008bc750
[4052886.494447] R10: 000000c000b36870 R11: 0000000000000010 R12: 0000000000000004
[4052886.495427] R13: 0000000000000000 R14: 000000c0009e8d00 R15: 000000c0008d8000
[4052886.496400]  </TASK>
[4052886.497155] Modules linked in: veth nf_conntrack_netlink xt_recent xt_statistic xt_nat xt_addrtype xt_mark xt_MASQUERADE nft_chain_nat ipt_REJECT nf_reject_ipv4 xt_CT xt_conntrack xt_comment nft_compat nft_counter nf_tables overlay rfkill vxlan ip6_udp_tunnel udp_tunnel nfnetlink_cttimeout nfnetlink openvswitch nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ib_core vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock ext4 mbcache jbd2 intel_rapl_msr intel_rapl_common vmwgfx intel_uncore_frequency_common isst_if_mbox_msr isst_if_common nfit drm_ttm_helper ttm libnvdimm drm_kms_helper vmw_balloon syscopyarea rapl sysfillrect sysimgblt pcspkr vmw_vmci fb_sys_fops i2c_piix4 joydev drm ip_tables xfs libcrc32c dm_multipath ata_generic nvme_tcp nvme_fabrics nvme nvme_core sd_mod ata_piix nvme_common t10_pi sg crct10dif_pclmul crc32_pclmul libata crc32c_intel ghash_clmulni_intel vmxnet3 vmw_pvscsi serio_raw dm_mirror dm_region_hash dm_log dm_mod fuse
[4052886.505906] CR2: ffffffffff600022

Environment

  • Red Hat Enterprise Linux 9
  • Red Hat Enterprise Linux 8
  • OpenShift Container Platform 4.14, 4.15, 4.16, 4.17

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content