System crashed with error 'task_rq_lock+0x4d/0xa0'
Issue
-
System crashed with following error messages, call traces:
BUG: unable to handle kernel paging request at 000000057ae2a1a0 IP: [<ffffffff810635cd>] task_rq_lock+0x4d/0xa0 PGD ff0f59067 PUD 0 Oops: 0000 [#1] SMP last sysfs file: /sys/devices/system/cpu/online CPU 4 Modules linked in: autofs4 nfs lockd fscache auth_rpcgss nfs_acl sunrpc secvm2(P)(U) secfs2(P)(U) ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 ppdev microcode vmware_balloon parport_pc parport i2c_piix4 sg shpchp ext4 jbd2 mbcache sd_mod crc_t10dif sr_mod cdrom vmxnet3 vmw_pvscsi pata_acpi ata_generic ata_piix vmwgfx ttm drm_kms_helper drm i2c_core dm_mirror dm_region_hash dm_log dm_mod [last unloaded: speedstep_lib] Pid: 2980, comm: secfst Tainted: P W -- ------------ 2.6.32-696.13.2.el6.x86_64 #1 VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform RIP: 0010:[<ffffffff810635cd>] [<ffffffff810635cd>] task_rq_lock+0x4d/0xa0 RSP: 0018:ffff881026bafdb0 EFLAGS: 00010082 RAX: 00000000bf243120 RBX: 0000000000016ec0 RCX: 0000000000001000 RDX: 0000000000000282 RSI: ffff881026bafe08 RDI: ffff8807bf233cc8 RBP: ffff881026bafdd0 R08: 0000000000000000 R09: ffff8809ec80bc00 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8807bf233cc8 R13: ffff881026bafe08 R14: 0000000000016ec0 R15: 000000000000000f FS: 00007fa2c9511700(0000) GS:ffff880028300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b CR2: 000000057ae2a1a0 CR3: 0000001026846000 CR4: 00000000000007e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Process secfst (pid: 2980, threadinfo ffff881026bac000, task ffff881023c78ab0) Stack: ffff8807bf233cc8 ffff88033d7f1bd0 0000000000000000 0000000000000004 ffff881026bafe40 ffffffff8106c0fc 0000000000000000 ffff8809ec80bc00 0000000000000000 0000000000000000 0000000000001000 0000000000000282 Call Trace: [<ffffffff8106c0fc>] try_to_wake_up+0x3c/0x3e0 [<ffffffff8106c4f5>] wake_up_process+0x15/0x20 [<ffffffff8154bd72>] __mutex_unlock_slowpath+0x42/0x60 [<ffffffff8154bceb>] mutex_unlock+0x1b/0x20 [<ffffffffa03e0a15>] enc_page_job_done+0x55/0x160 [secfs2] [<ffffffffa03e187c>] encrypt_thread+0x14c/0x410 [secfs2] [<ffffffffa03e616f>] linux_wrapper_thread+0x9f/0xb0 [secfs2] [<ffffffffa03e1730>] ? encrypt_thread+0x0/0x410 [secfs2] [<ffffffff8100c28a>] child_rip+0xa/0x20 [<ffffffffa03e1730>] ? encrypt_thread+0x0/0x410 [secfs2] [<ffffffffa03e60d0>] ? linux_wrapper_thread+0x0/0xb0 [secfs2] [<ffffffff8100c280>] ? child_rip+0x0/0x20 Code: c3 c0 6e 01 00 49 89 fc 49 89 f5 9c 58 0f 1f 44 00 00 48 89 c2 fa 66 0f 1f 44 00 00 49 89 55 00 49 8b 44 24 08 49 89 de 8b 40 18 <4c> 03 34 c5 a0 18 c1 81 4c 89 f7 e8 03 a8 4e 00 49 8b 44 24 08 RIP [<ffffffff810635cd>] task_rq_lock+0x4d/0xa0 RSP <ffff881026bafdb0> CR2: 000000057ae2a1a0
Environment
- Red Hat Enterprise Linux 6.9
- VMware guest
secfs2encryption agent
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.