How to decode the User Space address for a Bad pagetable Kernel Panic for x86_64.
Issue
- We received a kernel panic with a message stating “Corrupted page table at address“ and “Bad pagetable”.
jpcnsvr: Corrupted page table at address 826d97e
PGD 75f048067 PUD 65642f075f7a8067 BAD
Bad pagetable: 000b [#1] SMP
last sysfs file: /sys/devices/virtual/block/sddlmaa/range
CPU 0
Modules linked in: splxmod(U) autofs4 nfs lockd fscache nfs_acl auth_rpcgss sunrpc ipmi_devintf ipmi_si ipmi_msghandler bonding 8021q garp stp llc ipv6 sddlmfdrv(P)(U) sddlmadrv(P)(U) uinput power_meter microcode sb_edac edac_core i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support ioatdma dca tg3 sg ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif pata_acpi ata_generic ata_piix lpfc scsi_transport_fc scsi_tgt megaraid_sas dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
Pid: 21818, comm: jpcnsvr Tainted: P --------------- 2.6.32-279.22.1.el6.x86_64 #1 NEC Express5800/R120d-2M [N8100-1785Y]/MS-S0051
RIP: 0010:[<ffffffff8118b779>] [<ffffffff8118b779>] do_sys_poll+0x349/0x520
RSP: 0018:ffff88075f25fb28 EFLAGS: 00010202
RAX: 0000000000000000 RBX: ffff88075f25ff04 RCX: 00000000000024f2
RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000
RBP: ffff88075f25ff38 R08: ffff88075f25fdf8 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 000000000826d978
R13: ffff88075f25fe24 R14: ffff88075fb38180 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff880028200000(0063) knlGS:00000000f76eb6d0
CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: ffffb7075f7a8208 CR3: 000000075f653000 CR4: 00000000000406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process jpcnsvr (pid: 21818, threadinfo ffff88075f25e000, task ffff88075fa65540)
Stack:
ffff88075f25fcd8 ffff88075f25fcd8 ffff88075fa65540 01ff88075f25fbe8
<d> 000000000826d978 00000000001e847f ffff88075f25fb88 ffff88075f25fef8
<d> ffff88075f25ff48 0000000100887949 0000000000000000 0000000000000286
Call Trace:
[<ffffffff8118b1e0>] ? __pollwait+0x0/0xf0
[<ffffffff8118b2d0>] ? pollwake+0x0/0x60
[<ffffffff8118b2d0>] ? pollwake+0x0/0x60
[<ffffffff8118b2d0>] ? pollwake+0x0/0x60
[<ffffffff8118b2d0>] ? pollwake+0x0/0x60
[<ffffffff814ecadb>] ? _spin_unlock_bh+0x1b/0x20
[<ffffffff8141a3be>] ? release_sock+0xce/0xe0
[<ffffffff814eb4fe>] ? mutex_lock+0x1e/0x50
[<ffffffff81180b87>] ? pipe_read+0x2a7/0x4e0
[<ffffffff8117660a>] ? do_sync_read+0xfa/0x140
[<ffffffff81090be0>] ? autoremove_wake_function+0x0/0x40
[<ffffffff811899f1>] ? sys_ioctl+0x81/0xa0
[<ffffffff81012a69>] ? read_tsc+0x9/0x20
[<ffffffff8109b669>] ? ktime_get_ts+0xa9/0xe0
[<ffffffff8118b09d>] ? poll_select_set_timeout+0x8d/0xa0
[<ffffffff8118bb41>] sys_poll+0x71/0x100
[<ffffffff810495c0>] sysenter_dispatch+0x7/0x2e
Code: 4c 8b a5 10 fc ff ff 48 8b bd 20 fc ff ff e8 df f9 ff ff 4c 8d 85 c0 fe ff ff 31 ff 41 8b 70 08 85 f6 7e 41 41 0f b7 50 12 89 f8 <66> 41 89 54 24 06 85 c0 0f 85 ce fd ff ff 4c 89 c1 31 d2 eb 1a
RIP [<ffffffff8118b779>] do_sys_poll+0x349/0x520
RSP <ffff88075f25fb28>
crash>
Environment
- Architecture x86_64
- Red Hat Enterprise Linux 6
- Red Hat Enterprise Linux 5
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.