kernel panics at RIP : show_stack_log_lvl () when trying to access user mode address.

Solution Verified - Updated -

Issue

  • kernel panics with following stack traces when trying to access user mode address.
[6235787.971681] Stack:
[6235787.971742] BUG: unable to handle kernel paging request at 00007f78b5af86d0
[6235787.971744] IP: [<ffffffff810173d9>] show_stack_log_lvl+0x109/0x180
[6235787.971751] PGD 3ec7a63067 PUD 3ec1148067 PMD 3ec7a8f067 PTE 8000003ea4acf067
[6235787.971754] Oops: 0001 [#1] SMP 
[6235787.971756] Modules linked in: tcp_lp bnep bluetooth rfkill fuse binfmt_misc xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun 
...
[6235787.971803] CPU: 4 PID: 8148 Comm: oacore Tainted: P        W  OE  ------------   3.10.0-327.el7.x86_64 #1
[6235787.971804] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/30/2014
[6235787.971805] task: ffff883ec1168b80 ti: ffff883ea6ee8000 task.ti: ffff883ea6ee8000
[6235787.971806] RIP: 0010:[<ffffffff810173d9>]  [<ffffffff810173d9>] show_stack_log_lvl+0x109/0x180
[6235787.971809] RSP: 0018:ffff883f3e685da8  EFLAGS: 00010046
[6235787.971811] RAX: 00007f78b5af86d8 RBX: 00007f78b5af86d0 RCX: 0000000000000000
[6235787.971812] RDX: ffff883f3e683fc0 RSI: ffff883f3e685ef8 RDI: 0000000000000000
[6235787.971812] RBP: ffff883f3e685df8 R08: ffff883f3e67ffc0 R09: 000000000001bd6d
[6235787.971813] R10: 0000000000000000 R11: ffff883f3e685b1e R12: ffff883f3e685ef8
[6235787.971814] R13: 0000000000000000 R14: ffffffff8184fda6 R15: 0000000000000000
[6235787.971815] FS:  00007f78b5afd700(0000) GS:ffff883f3e680000(0000) knlGS:0000000000000000
[6235787.971816] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[6235787.971817] CR2: 00007f78b5af86d0 CR3: 0000003ec73eb000 CR4: 00000000003407e0
[6235787.971819] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[6235787.971821] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[6235787.971822] Stack:
[6235787.971823]  ffff883f00000008 ffff883f3e685e08 ffff883f3e685dc8 00000000ace69409
[6235787.971825]  00007f78b5af86d0 ffff883f3e685ef8 00007f78b5af86d0 ffffffff819556a8
[6235787.971829]  000000000000002b ffff883f3e685ef8 ffff883f3e685e58 ffffffff81017506
[6235787.971831] Call Trace:
[6235787.971832]  <NMI> 
[6235787.971833] 
[6235787.971835]  [<ffffffff81017506>] show_regs+0xb6/0x240
[6235787.971838]  [<ffffffff8163ecaa>] arch_trigger_all_cpu_backtrace_handler+0x5a/0x110
[6235787.971839]  [<ffffffff8163e339>] nmi_handle.isra.0+0x69/0xb0
[6235787.971841]  [<ffffffff8163e450>] do_nmi+0xd0/0x340
[6235787.971845]  [<ffffffff8163d771>] end_repeat_nmi+0x1e/0x2e
[6235787.971848]  [<ffffffff8164589c>] ? system_call_after_swapgs+0x9/0x60
[6235787.971851]  [<ffffffff8164589c>] ? system_call_after_swapgs+0x9/0x60
[6235787.971853]  [<ffffffff8164589c>] ? system_call_after_swapgs+0x9/0x60
[6235787.971853]  <<EOE>> 
[6235787.971854] Code: 
[6235787.971855] 4d b8 4c 89 45 c0 48 89 55 c8 48 8b 5b f8 e8 49 78 61 00 48 8b 55 c8 4c 8b 45 c0 8b 4d b8 85 c9 74 05 f6 c1 03 74 4c 48 8d 43 08 <48> 8b 33 48 c7 c7 9e fd 84 81 89 4d b4 4c 89 45 b8 48 89 45 c8 
[6235787.971874] RIP  [<ffffffff810173d9>] show_stack_log_lvl+0x109/0x180
[6235787.971876]  RSP <ffff883f3e685da8>
[6235787.971877] CR2: 00007f78b5af86d0

Environment

  • Red Hat Enterprise Linux 7.2

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.