The kernel crashes repeatedly on boot due to an OOB bug in the kernel's inbox mpt3sas driver

Solution Verified - Updated -

Issue

  • The kernel crashes repeatedly on boot due to an OOB bug in the kernel's inbox mpt3sas driver.
        ...
megaraid_sas 0000:61:00.0: scanning for scsi0...
megaraid_sas 0000:61:00.0: 20047 (792829341s/0x0001/CRIT) - VD ee/1 is now DEGRADED
megaraid_sas 0000:61:00.0: scanning for scsi0...
systemd-udevd[34358]: segfault at 7f8a71f2a586 ip 00007f8a70ff8e35 sp 00007ffd84a287d8 error 5 in libc-2.28.so[7f8a70f2d000+1bb000]
Code: 00 00 0f 1f 00 31 c0 c5 f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 89 f9 48 89 fa c5 f9 ef c0 83 e1 3f 83 f9 20 77 2b <c5> fd 74 0f c5 fd d7 c1 85 c0 0f 85 eb 00 00 00 48 83 c7 20 83 e1
swap_info_get: Bad swap offset entry 3fffffffffc67
BUG: Bad page map in process systemd-udevd  pte:00073000 pmd:a898b65067
addr:000000003128fe43 vm_flags:08000075 anon_vma:0000000000000000 mapping:00000000e2788aaa index:62
file:libsystemd-shared-239.so fault:xfs_filemap_fault [xfs] mmap:xfs_file_mmap [xfs] readpage:xfs_vm_readpage [xfs]
CPU: 184 PID: 34358 Comm: systemd-udevd Kdump: loaded Not tainted 4.18.0-477.89.1.el8_8.x86_64 #1
   ...
Call Trace:
 dump_stack+0x41/0x60
 print_bad_pte.cold.110+0x63/0xa6
 unmap_page_range+0x98b/0xf40
 unmap_vmas+0xc0/0xe0
 exit_mmap+0x9d/0x170
 mmput+0x58/0x130
 do_exit+0x2fb/0xb00
 do_group_exit+0x3a/0xa0
 get_signal+0x158/0x870
 ? __send_signal+0x359/0x4b0
 ? page_fault+0x8/0x30
 do_signal+0x36/0x690
 ? force_sig_info+0xc7/0xe0
 ? srso_alias_return_thunk+0x5/0xfcdfd
 ? force_sig_fault+0x59/0x80
 ? page_fault+0x8/0x30
 exit_to_usermode_loop+0x89/0x100
 prepare_exit_to_usermode+0x9f/0xb0
 retint_user+0x8/0x8
RIP: 0033:0x7f8a70ff8e35
Code: Unable to access opcode bytes at RIP 0x7f8a70ff8e0b.
RSP: 002b:00007ffd84a287d8 EFLAGS: 00010283
RAX: 00007f8a72232a20 RBX: 00007f8a71f2a586 RCX: 0000000000000006
RDX: 00007f8a71f2a586 RSI: 00007ffd84a28800 RDI: 00007f8a71f2a586
RBP: 00007ffd84a28800 R08: 12229ca7e648c4d4 R09: 43535f5952544e45
R10: 0000000000000019 R11: 9cd10eaf3d974cca R12: 00007f8a71f2a586
R13: 000055a1c3af265c R14: 000055a1c57ed0a0 R15: 000055a1c5833c00
Disabling lock debugging due to kernel taint
        ...
swap_info_get: Bad swap offset entry 3fffffffffca8
swap_info_get: Bad swap file entry 402cf6338af330e
swap_info_get: Bad swap offset entry 3fffffffffc50
swap_info_get: Bad swap file entry c009dbafde899de
swap_info_get: Bad swap file entry 400f7c312cdd0bb
BUG: Bad rss-counter state mm:000000002808156e idx:0 val:238
BUG: Bad rss-counter state mm:000000002808156e idx:2 val:-181
general protection fault, probably for non-canonical address 0x3de61901173d0bef: 0000 [#1] SMP NOPTI
CPU: 448 PID: 35281 Comm: setroubleshootd Kdump: loaded Tainted: G    B            --------- -  - 4.18.0-477.89.1.el8_8.x86_64 #1
   ...
RIP: 0010:kmem_cache_alloc+0xda/0x280
Code: 49 49 8b 50 08 49 8b 00 49 83 78 10 00 48 89 04 24 0f 84 6a 01 00 00 48 85 c0 0f 84 61 01 00 00 8b 4d 20 48 8b 7d 00 48 01 c1 <48> 8b 19 48 89 ce 48 33 9d 90 01 00 00 48 8d 4a 01 48 0f ce 48 31
RSP: 0018:ff6f9a3501a57d00 EFLAGS: 00010202
RAX: 3de61901173d0bcf RBX: 00000000006000c0 RCX: 3de61901173d0bef
RDX: 0000000000002140 RSI: 00000000006000c0 RDI: 0000000000039e40
RBP: ff4e5e89d000e800 R08: ff4e5e896f639e40 R09: 0000000000000000
R10: 0000000000000051 R11: 0000000000000000 R12: 00000000006000c0
R13: ffffffffb64f24bd R14: ff4e5e8a2edee3c0 R15: ff4e5e29ed489fb8
FS:  00007f7d65e9b700(0000) GS:ff4e5e896f600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7d6691a000 CR3: 00000078c3a78002 CR4: 0000000000771ee0
PKRU: 55555554
Call Trace:
 anon_vma_fork+0x9d/0x120
 dup_mm+0x4b6/0x590
 copy_process+0x19dd/0x1cd0
 _do_fork+0x8b/0x340
 do_syscall_64+0x5b/0x1b0
 entry_SYSCALL_64_after_hwframe+0x61/0xc6
RIP: 0033:0x7f7d7ea7a913
Code: db 0f 85 28 01 00 00 64 4c 8b 0c 25 10 00 00 00 45 31 c0 4d 8d 91 d0 02 00 00 31 d2 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 b9 00 00 00 41 89 c5 85 c0 0f 85 c6 00 00
RSP: 002b:00007f7d65e983f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f7d7ea7a913
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
RBP: 0000000000000001 R08: 0000000000000000 R09: 00007f7d65e9b700
R10: 00007f7d65e9b9d0 R11: 0000000000000246 R12: 0000000000000004
R13: 00007f7d7fbf9b70 R14: 0000000000000003 R15: 00007f7d65eeb9d8
Modules linked in: ...
        ...
megaraid_sas 0000:61:00.0: scanning for scsi0...
megaraid_sas 0000:61:00.0: 14107 (790880616s/0x0001/CRIT) - VD ee/1 is now DEGRADED
mpt3sas_cm0: log_info(0x310f0400): originator(PL), code(0x0f), sub_code(0x0400)
mpt3sas_cm0: log_info(0x3003011d): originator(IOP), code(0x03), sub_code(0x011d)
mpt3sas_cm1: log_info(0x310f0400): originator(PL), code(0x0f), sub_code(0x0400)
mpt3sas_cm1: log_info(0x3003011d): originator(IOP), code(0x03), sub_code(0x011d)
mpt3sas_cm0: log_info(0x30030109): originator(IOP), code(0x03), sub_code(0x0109)
        ...
mpt3sas_cm1: log_info(0x30030109): originator(IOP), code(0x03), sub_code(0x0109)
mpt3sas_cm0: log_info(0x30030109): originator(IOP), code(0x03), sub_code(0x0109)
mpt3sas_cm0: log_info(0x30030109): originator(IOP), code(0x03), sub_code(0x0109)
mpt3sas_cm1: log_info(0x30030109): originator(IOP), code(0x03), sub_code(0x0109)
mpt3sas_cm1: log_info(0x30030109): originator(IOP), code(0x03), sub_code(0x0109)
iostat: Corrupted page table at address 5620ec48d6c0
PGD 628eefb067 P4D 61b27b0067 PUD 16973402677754b5 
Bad pagetable: 001d [#1] SMP NOPTI
CPU: 192 PID: 60873 Comm: iostat Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-477.10.1.el8_8.x86_
64 #1
   ...
RIP: 0033:0x5620ec48d6c0
iostat: Corrupted page table at address 5620ec48d696
PGD 628eefb067 P4D 61b27b0067 PUD 16973402677754b5 
Bad pagetable: 0009 [#2] SMP NOPTI
CPU: 192 PID: 60873 Comm: iostat Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-477.10.1.el8_8.x86_
64 #1
   ...
RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40
Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 a3 7c 41 00 0f 1f 00 0f 01 cb 83 fa 40 0f 82 7
0 ff ff ff 89 d1 <f3> a4 31 c0 0f 01 ca e9 86 7c 41 00 66 0f 1f 44 00 00 83 f8 12 74
RSP: 0000:ff5f3b78ad597d68 EFLAGS: 00050046
RAX: 0000000000000002 RBX: ff1ae7471d764000 RCX: 0000000000000040
RDX: 0000000000000040 RSI: 00005620ec48d696 RDI: ff5f3b78ad597da0
RBP: 0000000000000040 R08: 0000000000000000 R09: c0000000fffdffff
R10: 0000000000000001 R11: ff5f3b78ad597c08 R12: 00fffffffffff000
R13: 00005620ec48d696 R14: ff5f3b78ad597da0 R15: 0000000000000000
FS:  00007f68b4e33540(0000) GS:ff1ae7a349600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005620ec48d696 CR3: 000000628ec52002 CR4: 0000000000771ee0
PKRU: 55555554
Call Trace:
 __probe_kernel_read+0x54/0x90
 show_opcodes+0x56/0xa0
 show_iret_regs+0x15/0x37
 __show_regs+0x1d/0x30
 show_regs+0x2d/0x40
 __die_body+0x1a/0x60
 pgtable_bad+0x70/0x90
 __do_page_fault+0x2d8/0x450
 do_page_fault+0x37/0x130
 ? page_fault+0x8/0x30
 page_fault+0x1e/0x30
RIP: 0033:0x5620ec48d6c0
        ...
iostat: Corrupted page table at address 5620ec48d696
WARNING: stack recursion on stack type 5
BUG: stack guard page was hit at 0000000048852ff1 (stack is 00000000e335ca9e..00000000c65b8cbb)
kernel stack overflow (double-fault): 0000 [#18] SMP NOPTI
CPU: 192 PID: 60873 Comm: iostat Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-477.10.1.el8_8.x86_64 #1
   ...
RIP: 0010:cfb_imageblit+0x1c/0x4d0
Code: ff ff 49 89 d0 48 89 f5 e9 3f fb ff ff 90 0f 1f 44 00 00 8b 87 90 03 00 00 85 c0 0f 85 57 03 00 00 41 57 41 56 41 55 49 89 f5 <41> 54 49 89 fc 55 53 48 83 ec 38 8b 46 08 8b 76 04 44 8b 77 68 41
RSP: 0000:ff5f3b78ad594000 EFLAGS: 00010046
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000001
RDX: ff1ae7456f84a6c0 RSI: ff1ae7456f84a660 RDI: ff1ae744e3ab7400
RBP: 0000000000000001 R08: 0000000000000000 R09: 00000000ffffffff
R10: 0000000000000001 R11: 0000000000000000 R12: ff1ae7456f84a660
R13: ff1ae7456f84a660 R14: ff1ae744e3ab7400 R15: ff1ae7456f84a6b0
FS:  00007f68b4e33540(0000) GS:ff1ae7a349600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ff5f3b78ad593ff8 CR3: 000000628ec52002 CR4: 0000000000771ee0
PKRU: 55555554
Call Trace:
 soft_cursor+0x194/0x230
 bit_cursor+0x377/0x610
 ? get_color+0x26/0x120
 ? bit_putcs+0x550/0x550
 fbcon_scroll+0x9c/0xc20
 con_scroll+0x20f/0x230
 lf+0xa4/0xb0
 vt_console_print+0x314/0x400
 console_unlock+0x366/0x4b0
 vprintk_emit+0x151/0x250
 printk+0x58/0x73
 pgtable_bad+0x3d/0x90
 __do_page_fault+0x2d8/0x450
 do_page_fault+0x37/0x130
 page_fault+0x1e/0x30
RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40
Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 a3 7c 41 00 0f 1f 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 <f3> a4 31 c0 0f 01 ca e9 86 7c 41 00 66 0f 1f 44 00 00 83 f8 12 74
RSP: 0000:ff5f3b78ad594568 EFLAGS: 00050046
RAX: 0000000000000002 RBX: ff1ae7471d764000 RCX: 0000000000000040
RDX: 0000000000000040 RSI: 00005620ec48d696 RDI: ff5f3b78ad5945a0
RBP: 0000000000000040 R08: 0000000000000000 R09: c0000000fffdffff
R10: 0000000000000001 R11: ff5f3b78ad594408 R12: ffffffffffffffff
R13: 00005620ec48d696 R14: ff5f3b78ad5945a0 R15: 0000000000000000
 __probe_kernel_read+0x54/0x90
 show_opcodes+0x56/0xa0
 ? irq_work_queue+0x9/0x30
 show_iret_regs+0x15/0x37
 __show_regs+0x1d/0x30
 ? page_fault+0x1e/0x30
 ? unwind_next_frame+0x334/0x540
 ? is_bpf_text_address+0xa/0x20
 show_trace_log_lvl+0x2c7/0x321
 ? page_fault+0x1e/0x30
 ? page_fault+0x1e/0x30
 __die_body+0x1a/0x60
 pgtable_bad+0x70/0x90
 __do_page_fault+0x2d8/0x450
 do_page_fault+0x37/0x130
 page_fault+0x1e/0x30
RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40
Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 a3 7c 41 00 0f 1f 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 <f3> a4 31 c0 0f 01 ca e9 86 7c 41 00 66 0f 1f 44 00 00 83 f8 12 74
RSP: 0000:ff5f3b78ad5948e8 EFLAGS: 00050046
RAX: 0000000000000002 RBX: ff1ae7471d764000 RCX: 0000000000000040
RDX: 0000000000000040 RSI: 00005620ec48d696 RDI: ff5f3b78ad594920
RBP: 0000000000000040 R08: 0000000000000000 R09: c0000000fffdffff
R10: 0000000000000001 R11: ff5f3b78ad594788 R12: ffffffffffffffff
R13: 00005620ec48d696 R14: ff5f3b78ad594920 R15: 0000000000000000
 __probe_kernel_read+0x54/0x90
 show_opcodes+0x56/0xa0
 ? irq_work_queue+0x9/0x30
 show_iret_regs+0x15/0x37
 __show_regs+0x1d/0x30
 ? page_fault+0x1e/0x30
 ? unwind_next_frame+0x334/0x540
 ? is_bpf_text_address+0xa/0x20
 show_trace_log_lvl+0x2c7/0x321
 ? page_fault+0x1e/0x30
 ? page_fault+0x1e/0x30
 __die_body+0x1a/0x60
 pgtable_bad+0x70/0x90
 __do_page_fault+0x2d8/0x450
 do_page_fault+0x37/0x130
 page_fault+0x1e/0x30
RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40
Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 a3 7c 41 00 0f 1f 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 <f3> a4 31 c0 0f 01 ca e9 86 7c 41 00 66 0f 1f 44 00 00 83 f8 12 74
RSP: 0000:ff5f3b78ad594c68 EFLAGS: 00050046
RAX: 0000000000000002 RBX: ff1ae7471d764000 RCX: 0000000000000040
RDX: 0000000000000040 RSI: 00005620ec48d696 RDI: ff5f3b78ad594ca0
RBP: 0000000000000040 R08: 0000000000000000 R09: c0000000fffdffff
R10: 0000000000000001 R11: ff5f3b78ad594b08 R12: ffffffffffffffff
R13: 00005620ec48d696 R14: ff5f3b78ad594ca0 R15: 0000000000000000
 __probe_kernel_read+0x54/0x90
 show_opcodes+0x56/0xa0
 ? irq_work_queue+0x9/0x30
 show_iret_regs+0x15/0x37
 __show_regs+0x1d/0x30
 ? page_fault+0x1e/0x30
 ? unwind_next_frame+0x334/0x540
 ? is_bpf_text_address+0xa/0x20
 show_trace_log_lvl+0x2c7/0x321
 ? page_fault+0x1e/0x30
 ? page_fault+0x1e/0x30
 __die_body+0x1a/0x60
 pgtable_bad+0x70/0x90
 __do_page_fault+0x2d8/0x450
 do_page_fault+0x37/0x130
 page_fault+0x1e/0x30
RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40
Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 a3 7c 41 00 0f 1f 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 <f3> a4 31 c0 0f 01 ca e9 86 7c 41 00 66 0f 1f 44 00 00 83 f8 12 74
RSP: 0000:ff5f3b78ad594fe8 EFLAGS: 00050046
RAX: 0000000000000002 RBX: ff1ae7471d764000 RCX: 0000000000000040
RDX: 0000000000000040 RSI: 00005620ec48d696 RDI: ff5f3b78ad595020
RBP: 0000000000000040 R08: 0000000000000000 R09: c0000000fffdffff
R10: 0000000000000001 R11: ff5f3b78ad594e88 R12: ffffffffffffffff
R13: 00005620ec48d696 R14: ff5f3b78ad595020 R15: 0000000000000000
 __probe_kernel_read+0x54/0x90
 show_opcodes+0x56/0xa0
 ? irq_work_queue+0x9/0x30
 show_iret_regs+0x15/0x37
 __show_regs+0x1d/0x30
 ? page_fault+0x1e/0x30
 ? unwind_next_frame+0x334/0x540
 ? is_bpf_text_address+0xa/0x20
 show_trace_log_lvl+0x2c7/0x321
 ? page_fault+0x1e/0x30
 ? page_fault+0x1e/0x30
 __die_body+0x1a/0x60
 pgtable_bad+0x70/0x90
 __do_page_fault+0x2d8/0x450
 do_page_fault+0x37/0x130
 page_fault+0x1e/0x30
RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40
Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 a3 7c 41 00 0f 1f 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 <f3> a4 31 c0 0f 01 ca e9 86 7c 41 00 66 0f 1f 44 00 00 83 f8 12 74
RSP: 0000:ff5f3b78ad595368 EFLAGS: 00050046
RAX: 0000000000000002 RBX: ff1ae7471d764000 RCX: 0000000000000040
RDX: 0000000000000040 RSI: 00005620ec48d696 RDI: ff5f3b78ad5953a0
RBP: 0000000000000040 R08: 0000000000000000 R09: c0000000fffdffff
R10: 0000000000000001 R11: ff5f3b78ad595208 R12: ffffffffffffffff
R13: 00005620ec48d696 R14: ff5f3b78ad5953a0 R15: 0000000000000000
 __probe_kernel_read+0x54/0x90
 show_opcodes+0x56/0xa0
 ? irq_work_queue+0x9/0x30
 show_iret_regs+0x15/0x37
 __show_regs+0x1d/0x30
 ? page_fault+0x1e/0x30
 ? unwind_next_frame+0x334/0x540
 ? is_bpf_text_address+0xa/0x20
 show_trace_log_lvl+0x2c7/0x321
 ? page_fault+0x1e/0x30
 ? page_fault+0x1e/0x30
 __die_body+0x1a/0x60
 pgtable_bad+0x70/0x90
 __do_page_fault+0x2d8/0x450
 do_page_fault+0x37/0x130
 page_fault+0x1e/0x30
RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40
Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 a3 7c 41 00 0f 1f 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 <f3> a4 31 c0 0f 01 ca e9 86 7c 41 00 66 0f 1f 44 00 00 83 f8 12 74
RSP: 0000:ff5f3b78ad5956e8 EFLAGS: 00050046
RAX: 0000000000000002 RBX: ff1ae7471d764000 RCX: 0000000000000040
RDX: 0000000000000040 RSI: 00005620ec48d696 RDI: ff5f3b78ad595720
RBP: 0000000000000040 R08: 0000000000000000 R09: c0000000fffdffff
R10: 0000000000000001 R11: ff5f3b78ad595588 R12: ffffffffffffffff
R13: 00005620ec48d696 R14: ff5f3b78ad595720 R15: 0000000000000000
 __probe_kernel_read+0x54/0x90
 show_opcodes+0x56/0xa0
 ? irq_work_queue+0x9/0x30
 show_iret_regs+0x15/0x37
 __show_regs+0x1d/0x30
 ? page_fault+0x1e/0x30
 ? unwind_next_frame+0x334/0x540
 ? is_bpf_text_address+0xa/0x20
 show_trace_log_lvl+0x2c7/0x321
 ? page_fault+0x1e/0x30
 ? page_fault+0x1e/0x30
 __die_body+0x1a/0x60
 pgtable_bad+0x70/0x90
 __do_page_fault+0x2d8/0x450
 do_page_fault+0x37/0x130
 page_fault+0x1e/0x30
RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40
Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 a3 7c 41 00 0f 1f 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 <f3> a4 31 c0 0f 01 ca e9 86 7c 41 00 66 0f 1f 44 00 00 83 f8 12 74
RSP: 0000:ff5f3b78ad595a68 EFLAGS: 00050046
RAX: 000000
Lost 5103 message(s)!

Environment

  • Red Hat Enterprise Linux 8.8 GA - 4.18.0-477.10.1.el8_8
  • The kernel's inbox mpt3sas driver 43.100.00.00

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content