RHEL: kernel crash in dput called from Symantec function symev_nfsd4_proc_compound - BUG value of fffffffffffffffe which looks like ENOENT

Solution Unverified - Updated -

Issue

  • RHEL kernel crashed in dput with a BUG value of fffffffffffffffe (-2) which looks like negative ENOENT value.
  • kernel crashed with the following message
BUG: unable to handle kernel paging request at fffffffffffffffe
IP: [<ffffffff81193874>] dput+0x84/0x150
PGD 1a87067 PUD 1a88067 PMD 0 
Oops: 0000 [#1] SMP 
last sysfs file: /sys/devices/system/cpu/online
CPU 0 
Modules linked in: nfs fscache bridge stp llc nfsd lockd nfs_acl auth_rpcgss exportfs autofs4 sunrpc symap_rh_ES_6_2.6.32_131.0.15.el6_x86_64(P)(U) symev_rh_ES_6_2.6.32_131.0.15.el6_x86_64(U) sd_mod crc_t10dif be2iscsi iscsi_boot_sysfs bnx2i cnic uio cxgb4i cxgb4 cxgb3i libcxgbi cxgb3 mdio ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr ipv6 iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi uinput sg microcode virtio_balloon virtio_net virtio_console i2c_piix4 i2c_core ext4 mbcache jbd2 virtio_blk sr_mod cdrom virtio_pci virtio_ring virtio pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: speedstep_lib]

Pid: 5069, comm: nfsd Tainted: P        W  ---------------    2.6.32-279.el6.x86_64 #1 Red Hat RHEV Hypervisor
RIP: 0010:[<ffffffff81193874>]  [<ffffffff81193874>] dput+0x84/0x150
RSP: 0018:ffff880412e0fd40  EFLAGS: 00010282
RAX: 0000000002000000 RBX: fffffffffffffffe RCX: 0000000000000003
RDX: 0000000000000000 RSI: ffffffffa04661d0 RDI: fffffffffffffffe
RBP: ffff880412e0fd50 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: ffff880410a64000
R13: 000000000000001c R14: 0000000000000001 R15: fffffffffffffffe
FS:  0000000000000000(0000) GS:ffff880028200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: fffffffffffffffe CR3: 0000000412109000 CR4: 00000000000406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process nfsd (pid: 5069, threadinfo ffff880412e0e000, task ffff88036a38d540)
Stack:
 ffff880410a64198 ffff880410a64000 ffff880412e0fdd0 ffffffffa03939dd
<d> ffff880412f83000 ffff880412e1c000 ffff880410a64201 0000000000000002
<d> ffff880412e0fd90 02000000a0474f9e 0000000000000001 ffff880413a33600
Call Trace:
 [<ffffffffa03939dd>] symev_nfsd4_proc_compound+0x1ed/0x720 [symev_rh_ES_6_2.6.32_131.0.15.el6_x86_64]
 [<ffffffffa045d43e>] nfsd_dispatch+0xfe/0x240 [nfsd]
 [<ffffffffa03c75d4>] svc_process_common+0x344/0x640 [sunrpc]
 [<ffffffff81060250>] ? default_wake_function+0x0/0x20
 [<ffffffffa03c7c10>] svc_process+0x110/0x160 [sunrpc]
 [<ffffffffa045db62>] nfsd+0xc2/0x160 [nfsd]
 [<ffffffffa045daa0>] ? nfsd+0x0/0x160 [nfsd]
 [<ffffffff81091d66>] kthread+0x96/0xa0
 [<ffffffff8100c14a>] child_rip+0xa/0x20
 [<ffffffff81091cd0>] ? kthread+0x0/0xa0
 [<ffffffff8100c140>] ? child_rip+0x0/0x20
Code: 1a e8 a1 f6 0e 00 48 8b 83 90 00 00 00 83 a8 08 01 00 00 01 83 2d c0 b2 93 00 01 48 89 df e8 a4 e5 ff ff 48 85 c0 48 89 c3 74 7c <8b> 03 83 f8 01 74 7d 48 c7 c6 c0 3f a8 81 48 89 df e8 c6 e2 0d 
RIP  [<ffffffff81193874>] dput+0x84/0x150
 RSP <ffff880412e0fd40>
CR2: fffffffffffffffe

Environment

  • Red Hat Enterprise Linux 6
    • seen on Tainted kernel-2.6.32-279.el6
  • Red Hat Enterprise Linux 7
    • seen on Tainted kernel-3.10.0-327.36.3.el7
  • 3rd party modules (Symantec)
symap_rh_ES_6_2.6.32_131.0.15.el6_x86_64(P)(U)
symev_rh_ES_6_2.6.32_131.0.15.el6_x86_64(U)

symap_custom_3_10_0_327_36_3_el7_x86_64  POE
symev_custom_3_10_0_327_36_3_el7_x86_64  OE

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content