RHEL: kernel crash in dput called from Symantec function symev_nfsd4_proc_compound - BUG value of fffffffffffffffe which looks like ENOENT
Issue
- RHEL kernel crashed in dput with a BUG value of fffffffffffffffe (-2) which looks like negative ENOENT value.
- kernel crashed with the following message
BUG: unable to handle kernel paging request at fffffffffffffffe
IP: [<ffffffff81193874>] dput+0x84/0x150
PGD 1a87067 PUD 1a88067 PMD 0
Oops: 0000 [#1] SMP
last sysfs file: /sys/devices/system/cpu/online
CPU 0
Modules linked in: nfs fscache bridge stp llc nfsd lockd nfs_acl auth_rpcgss exportfs autofs4 sunrpc symap_rh_ES_6_2.6.32_131.0.15.el6_x86_64(P)(U) symev_rh_ES_6_2.6.32_131.0.15.el6_x86_64(U) sd_mod crc_t10dif be2iscsi iscsi_boot_sysfs bnx2i cnic uio cxgb4i cxgb4 cxgb3i libcxgbi cxgb3 mdio ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr ipv6 iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi uinput sg microcode virtio_balloon virtio_net virtio_console i2c_piix4 i2c_core ext4 mbcache jbd2 virtio_blk sr_mod cdrom virtio_pci virtio_ring virtio pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: speedstep_lib]
Pid: 5069, comm: nfsd Tainted: P W --------------- 2.6.32-279.el6.x86_64 #1 Red Hat RHEV Hypervisor
RIP: 0010:[<ffffffff81193874>] [<ffffffff81193874>] dput+0x84/0x150
RSP: 0018:ffff880412e0fd40 EFLAGS: 00010282
RAX: 0000000002000000 RBX: fffffffffffffffe RCX: 0000000000000003
RDX: 0000000000000000 RSI: ffffffffa04661d0 RDI: fffffffffffffffe
RBP: ffff880412e0fd50 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: ffff880410a64000
R13: 000000000000001c R14: 0000000000000001 R15: fffffffffffffffe
FS: 0000000000000000(0000) GS:ffff880028200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: fffffffffffffffe CR3: 0000000412109000 CR4: 00000000000406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process nfsd (pid: 5069, threadinfo ffff880412e0e000, task ffff88036a38d540)
Stack:
ffff880410a64198 ffff880410a64000 ffff880412e0fdd0 ffffffffa03939dd
<d> ffff880412f83000 ffff880412e1c000 ffff880410a64201 0000000000000002
<d> ffff880412e0fd90 02000000a0474f9e 0000000000000001 ffff880413a33600
Call Trace:
[<ffffffffa03939dd>] symev_nfsd4_proc_compound+0x1ed/0x720 [symev_rh_ES_6_2.6.32_131.0.15.el6_x86_64]
[<ffffffffa045d43e>] nfsd_dispatch+0xfe/0x240 [nfsd]
[<ffffffffa03c75d4>] svc_process_common+0x344/0x640 [sunrpc]
[<ffffffff81060250>] ? default_wake_function+0x0/0x20
[<ffffffffa03c7c10>] svc_process+0x110/0x160 [sunrpc]
[<ffffffffa045db62>] nfsd+0xc2/0x160 [nfsd]
[<ffffffffa045daa0>] ? nfsd+0x0/0x160 [nfsd]
[<ffffffff81091d66>] kthread+0x96/0xa0
[<ffffffff8100c14a>] child_rip+0xa/0x20
[<ffffffff81091cd0>] ? kthread+0x0/0xa0
[<ffffffff8100c140>] ? child_rip+0x0/0x20
Code: 1a e8 a1 f6 0e 00 48 8b 83 90 00 00 00 83 a8 08 01 00 00 01 83 2d c0 b2 93 00 01 48 89 df e8 a4 e5 ff ff 48 85 c0 48 89 c3 74 7c <8b> 03 83 f8 01 74 7d 48 c7 c6 c0 3f a8 81 48 89 df e8 c6 e2 0d
RIP [<ffffffff81193874>] dput+0x84/0x150
RSP <ffff880412e0fd40>
CR2: fffffffffffffffe
Environment
- Red Hat Enterprise Linux 6
- seen on Tainted kernel-2.6.32-279.el6
- Red Hat Enterprise Linux 7
- seen on Tainted kernel-3.10.0-327.36.3.el7
- 3rd party modules (Symantec)
symap_rh_ES_6_2.6.32_131.0.15.el6_x86_64(P)(U)
symev_rh_ES_6_2.6.32_131.0.15.el6_x86_64(U)
symap_custom_3_10_0_327_36_3_el7_x86_64 POE
symev_custom_3_10_0_327_36_3_el7_x86_64 OE
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.