System crashed at 'BUG: unable to handle kernel paging request at ffffffff8161c690IP: [<ffffffffa01bf85f>] unhook_pipe+0x14f/0x390 [ktap_45364]'

Solution Unverified - Updated -

Environment

  • Red Hat Enterprise Linux 6
  • ktap_45364

Issue

  • System crashed at 'BUG: unable to handle kernel paging request at ffffffff8161c690IP: [] unhook_pipe+0x14f/0x390 [ktap_45364]'
SPLXMOD: SPLX 3.0: KHM loaded. Version [30110]
BUG: unable to handle kernel paging request at ffffffff8161c690
IP: [<ffffffffa01bf85f>] unhook_pipe+0x14f/0x390 [ktap_45364]
PGD 1a87067 PUD 1a8b063 PMD 80000000016001e1 
Oops: 0003 [#1] SMP 
last sysfs file: /sys/devices/pci0000:00/0000:00:18.0/0000:1b:00.0/irq
CPU 0 
Modules linked in: bluetooth rfkill ktap_45364(U) ipv6 uinput ppdev parport_pc parport microcode vmware_balloon sg vmxnet3 i2c_piix4 i2c_core shpchp ext3 jbd mbcache sd_mod crc_t10dif pata_acpi ata_generic ata_piix vmw_pvscsi mptspi mptscsih mptbase scsi_transport_spi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: splxmod]

Pid: 5547, comm: guard_stap Not tainted 2.6.32-220.el6.x86_64 #1 VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform
RIP: 0010:[<ffffffffa01bf85f>]  [<ffffffffa01bf85f>] unhook_pipe+0x14f/0x390 [ktap_45364]
RSP: 0018:ffff88013b1ebb68  EFLAGS: 00010002
RAX: 00000000000406f0 RBX: ffffffff8161c680 RCX: 0000000000000003
RDX: 0000000000040670 RSI: ffff88013910e380 RDI: 0000000000000002
RBP: ffff88013b1ebba8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: ffff88013b1812d8 R12: ffffffff81176320
R13: ffffffffa01c0690 R14: ffff88012fb12540 R15: ffff880138893cc0
FS:  0000000000000000(0000) GS:ffff880028200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff8161c690 CR3: 0000000001a85000 CR4: 00000000000406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process guard_stap (pid: 5547, threadinfo ffff88013b1ea000, task ffff8801389e7500)
Stack:
 ffff88013b8455c0 ffff88013fee2c00 0000000000000000 0000000300000000
<0> ffff88013910e380 ffff88013910e380 0000000000000010 ffff880137a69438
<0> ffff88013b1ebbb8 ffffffffa01bfade ffff88013b1ebbc8 ffffffffa01c1fd7
Call Trace:
 [<ffffffffa01bfade>] unhook_syscalls+0xe/0x50 [ktap_45364]
 [<ffffffffa01c1fd7>] ktap_release+0x47/0xa0 [ktap_45364]
 [<ffffffff81177e85>] __fput+0xf5/0x210
 [<ffffffff81177fc5>] fput+0x25/0x30
 [<ffffffff81173a0d>] filp_close+0x5d/0x90
 [<ffffffff8106c69f>] put_files_struct+0x7f/0xf0
 [<ffffffff8106c763>] exit_files+0x53/0x70
 [<ffffffff8106e805>] do_exit+0x185/0x860
 [<ffffffff8141bdbe>] ? sock_aio_write+0x15e/0x170
 [<ffffffff8106ef38>] do_group_exit+0x58/0xd0
 [<ffffffff81084276>] get_signal_to_deliver+0x1f6/0x460
 [<ffffffff8100a2d5>] do_signal+0x75/0x800
 [<ffffffff81012b59>] ? read_tsc+0x9/0x20
 [<ffffffff8118af98>] ? poll_select_copy_remaining+0xf8/0x150
 [<ffffffff8100aaf0>] do_notify_resume+0x90/0xc0
 [<ffffffff8100b3c1>] int_signal+0x12/0x17
Code: 04 00 01 0f 87 f3 01 00 00 49 c7 c5 90 06 1c a0 4c 8b 60 20 fa 66 0f 1f 44 00 00 f6 05 bf 65 a3 e1 20 75 48 e8 33 82 e7 e0 66 90 <4c> 89 63 10 fb 66 0f 1f 44 00 00 49 81 fd 90 06 1c a0 0f 84 a9 
RIP  [<ffffffffa01bf85f>] unhook_pipe+0x14f/0x390 [ktap_45364]
 RSP <ffff88013b1ebb68>
CR2: ffffffff8161c690

Resolution

  • Contact the vendor which provides ktap_45364.

This solution is part of Red Hat’s fast-track publication program, providing a huge library of solutions that Red Hat engineers have created while supporting our customers. To give you the knowledge you need the instant it becomes available, these articles may be presented in a raw and unedited form.

Comments