A VMware guest crashes due to seemingly spurious exceptions trapped at NOPL instructions

Solution Unverified - Updated -

Issue

  • A VM crashes due to NULL pointer dereference and/or invalid_op exception seemingly caused by spurious exceptions trapped at NOPL instructions.
invalid opcode: 0000 [#1] SMP NOPTI
BUG: unable to handle kernel NULL pointer dereference at 0000000000000007
PGD 0 P4D 0 
Oops: 0002 [#2] SMP NOPTI
CPU: 3 PID: 0 Comm: swapper/3 Kdump: loaded Tainted: G           OE     -------- -  - 4.18.0-553.34.1.el8_10.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:vt_console_print+0x0/0x400
Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RSP: 0018:ffffb6c5463b0c60 EFLAGS: 00010046
RAX: 0000000000000007 RBX: 0000000000000047 RCX: 0000000000000000
RDX: 0000000000000035 RSI: ffffffff8c903b60 RDI: ffffffff8c0d9d80
RBP: ffffffff8c0d9d80 R08: ffffffff8a81be10 R09: 303030203a65646f
R10: 53205d31235b766e R11: 4954504f4e206e69 R12: ffffffff8c1c4960
R13: 0000000000000035 R14: ffffffff8c903b60 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff9d49ffcc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000007 CR3: 0000000024e10005 CR4: 0000000000770ee0
PKRU: 55555554
Call Trace:
 <IRQ>
 ? __die_body+0x1a/0x60
 ? no_context+0x1ba/0x3f0
 ? __bad_area_nosemaphore+0x157/0x180
 ? do_page_fault+0x37/0x12d
 ? page_fault+0x1e/0x30
 ? screen_glyph_unicode+0x90/0x90
 ? screen_glyph_unicode+0x90/0x90
 console_unlock+0x366/0x4b0
 vprintk_emit+0x151/0x250
 printk+0x58/0x73
 __die_header+0x6e/0x77
 __die+0x17/0x36
 die+0x2a/0x50
 do_trap+0xe7/0x110
 ? add_interrupt_randomness+0x2/0x230
 do_invalid_op+0x36/0x40
 ? add_interrupt_randomness+0x2/0x230
 invalid_op+0x14/0x20
RIP: 0010:add_interrupt_randomness+0x2/0x230
Code: 44 89 e2 89 ee e8 ce f0 3e 00 48 8b 03 48 85 c0 75 e6 5b 5d 41 5c e9 58 b9 6c 00 e9 53 b9 6c 00 0f 1f 84 00 00 00 00 00 0f 1f <44> 00 00 55 53 48 c7 c3 00 11 03 00 48 83 ec 10 65 48 8b 04 25 28
RSP: 0018:ffffb6c5463b0f58 EFLAGS: 00010046
RAX: 0000000000000001 RBX: ffff9d3b6a17ba00 RCX: 0000000000000003
RDX: ffff9d49ffcf4a40 RSI: ffff9d49ffcf4a40 RDI: 000000000000003a
RBP: 0000000000000001 R08: ffff9d49ffcf4a40 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff9d3b6a17ba00
R13: 0000000000000027 R14: 0000000000000000 R15: 0000000000000000
 ? srso_alias_return_thunk+0x5/0xfcdfd
 handle_irq_event_percpu+0x3a/0x80
 handle_irq_event+0x36/0x57
 handle_edge_irq+0x82/0x190
 handle_irq+0x1c/0x30
 do_IRQ+0x49/0xd0
 common_interrupt+0xf/0xf
 </IRQ>
RIP: 0010:native_safe_halt+0xe/0x20
Code: 00 a8 08 75 be e9 23 ff ff ff 31 ff e9 6a ff ff ff 90 90 90 90 90 90 90 90 90 90 90 e9 07 00 00 00 0f 00 2d 46 41 5e 00 fb f4 <e9> a8 dc 2d 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 e9 07 00 00
RSP: 0018:ffffb6c5462ebe28 EFLAGS: 00000246 ORIG_RAX: ffffffffffffffd8
RAX: 0000000080004000 RBX: ffff9d3b07324464 RCX: 0000000000000020
RDX: ffffffff8a7c6ea0 RSI: ffffffff8c0d1ce0 RDI: 0000000000000001
RBP: ffff9d3b07324464 R08: 0000000000000001 R09: ffff9d3b07324400
R10: 0000000000000315 R11: ffff9d49ffcf2484 R12: 0000000000000001
R13: ffffffff8c0d1ce0 R14: 0000000000000001 R15: 0000000000000001
 ? acpi_processor_thermal_init.cold.6+0x66/0x66
 ? srso_alias_return_thunk+0x5/0xfcdfd
 acpi_idle_do_entry+0x93/0xa0
 acpi_idle_enter+0x5f/0xd0
 cpuidle_enter_state+0x86/0x470
 cpuidle_enter+0x2c/0x40
 do_idle+0x26f/0x2d0
 cpu_startup_entry+0x6f/0x80
 start_secondary+0x187/0x1d0
 secondary_startup_64_no_verify+0xd1/0xdb
Modules linked in: ...
CR2: 0000000000000007

Environment

  • Red Hat Enterprise Linux 8
  • VMware vSphere ESXi hypervisor

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content