System crashed with error 'task_rq_lock+0x4d/0xa0'
Issue
-
System crashed with following error messages, call traces:
BUG: unable to handle kernel paging request at 000000057ae2a1a0 IP: [<ffffffff810635cd>] task_rq_lock+0x4d/0xa0 PGD ff0f59067 PUD 0 Oops: 0000 [#1] SMP last sysfs file: /sys/devices/system/cpu/online CPU 4 Modules linked in: autofs4 nfs lockd fscache auth_rpcgss nfs_acl sunrpc secvm2(P)(U) secfs2(P)(U) ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 ppdev microcode vmware_balloon parport_pc parport i2c_piix4 sg shpchp ext4 jbd2 mbcache sd_mod crc_t10dif sr_mod cdrom vmxnet3 vmw_pvscsi pata_acpi ata_generic ata_piix vmwgfx ttm drm_kms_helper drm i2c_core dm_mirror dm_region_hash dm_log dm_mod [last unloaded: speedstep_lib] Pid: 2980, comm: secfst Tainted: P W -- ------------ 2.6.32-696.13.2.el6.x86_64 #1 VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform RIP: 0010:[<ffffffff810635cd>] [<ffffffff810635cd>] task_rq_lock+0x4d/0xa0 RSP: 0018:ffff881026bafdb0 EFLAGS: 00010082 RAX: 00000000bf243120 RBX: 0000000000016ec0 RCX: 0000000000001000 RDX: 0000000000000282 RSI: ffff881026bafe08 RDI: ffff8807bf233cc8 RBP: ffff881026bafdd0 R08: 0000000000000000 R09: ffff8809ec80bc00 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8807bf233cc8 R13: ffff881026bafe08 R14: 0000000000016ec0 R15: 000000000000000f FS: 00007fa2c9511700(0000) GS:ffff880028300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b CR2: 000000057ae2a1a0 CR3: 0000001026846000 CR4: 00000000000007e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Process secfst (pid: 2980, threadinfo ffff881026bac000, task ffff881023c78ab0) Stack: ffff8807bf233cc8 ffff88033d7f1bd0 0000000000000000 0000000000000004 ffff881026bafe40 ffffffff8106c0fc 0000000000000000 ffff8809ec80bc00 0000000000000000 0000000000000000 0000000000001000 0000000000000282 Call Trace: [<ffffffff8106c0fc>] try_to_wake_up+0x3c/0x3e0 [<ffffffff8106c4f5>] wake_up_process+0x15/0x20 [<ffffffff8154bd72>] __mutex_unlock_slowpath+0x42/0x60 [<ffffffff8154bceb>] mutex_unlock+0x1b/0x20 [<ffffffffa03e0a15>] enc_page_job_done+0x55/0x160 [secfs2] [<ffffffffa03e187c>] encrypt_thread+0x14c/0x410 [secfs2] [<ffffffffa03e616f>] linux_wrapper_thread+0x9f/0xb0 [secfs2] [<ffffffffa03e1730>] ? encrypt_thread+0x0/0x410 [secfs2] [<ffffffff8100c28a>] child_rip+0xa/0x20 [<ffffffffa03e1730>] ? encrypt_thread+0x0/0x410 [secfs2] [<ffffffffa03e60d0>] ? linux_wrapper_thread+0x0/0xb0 [secfs2] [<ffffffff8100c280>] ? child_rip+0x0/0x20 Code: c3 c0 6e 01 00 49 89 fc 49 89 f5 9c 58 0f 1f 44 00 00 48 89 c2 fa 66 0f 1f 44 00 00 49 89 55 00 49 8b 44 24 08 49 89 de 8b 40 18 <4c> 03 34 c5 a0 18 c1 81 4c 89 f7 e8 03 a8 4e 00 49 8b 44 24 08 RIP [<ffffffff810635cd>] task_rq_lock+0x4d/0xa0 RSP <ffff881026bafdb0> CR2: 000000057ae2a1a0
Environment
- Red Hat Enterprise Linux 6.9
- VMware guest
secfs2encryption agent
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
