How to decode the User Space address for a Bad pagetable Kernel Panic for x86_64.

Solution Verified - Updated -

Issue

  • We received a kernel panic with a message stating “Corrupted page table at address“ and “Bad pagetable”.
jpcnsvr: Corrupted page table at address 826d97e
PGD 75f048067 PUD 65642f075f7a8067 BAD
Bad pagetable: 000b [#1] SMP 
last sysfs file: /sys/devices/virtual/block/sddlmaa/range
CPU 0 
Modules linked in: splxmod(U) autofs4 nfs lockd fscache nfs_acl auth_rpcgss sunrpc ipmi_devintf ipmi_si ipmi_msghandler bonding 8021q garp stp llc ipv6 sddlmfdrv(P)(U) sddlmadrv(P)(U) uinput power_meter microcode sb_edac edac_core i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support ioatdma dca tg3 sg ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif pata_acpi ata_generic ata_piix lpfc scsi_transport_fc scsi_tgt megaraid_sas dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]

Pid: 21818, comm: jpcnsvr Tainted: P           ---------------    2.6.32-279.22.1.el6.x86_64 #1 NEC Express5800/R120d-2M [N8100-1785Y]/MS-S0051
RIP: 0010:[<ffffffff8118b779>]  [<ffffffff8118b779>] do_sys_poll+0x349/0x520
RSP: 0018:ffff88075f25fb28  EFLAGS: 00010202
RAX: 0000000000000000 RBX: ffff88075f25ff04 RCX: 00000000000024f2
RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000
RBP: ffff88075f25ff38 R08: ffff88075f25fdf8 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 000000000826d978
R13: ffff88075f25fe24 R14: ffff88075fb38180 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff880028200000(0063) knlGS:00000000f76eb6d0
CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: ffffb7075f7a8208 CR3: 000000075f653000 CR4: 00000000000406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process jpcnsvr (pid: 21818, threadinfo ffff88075f25e000, task ffff88075fa65540)
Stack:
 ffff88075f25fcd8 ffff88075f25fcd8 ffff88075fa65540 01ff88075f25fbe8
<d> 000000000826d978 00000000001e847f ffff88075f25fb88 ffff88075f25fef8
<d> ffff88075f25ff48 0000000100887949 0000000000000000 0000000000000286
Call Trace:
 [<ffffffff8118b1e0>] ? __pollwait+0x0/0xf0
 [<ffffffff8118b2d0>] ? pollwake+0x0/0x60
 [<ffffffff8118b2d0>] ? pollwake+0x0/0x60
 [<ffffffff8118b2d0>] ? pollwake+0x0/0x60
 [<ffffffff8118b2d0>] ? pollwake+0x0/0x60
 [<ffffffff814ecadb>] ? _spin_unlock_bh+0x1b/0x20
 [<ffffffff8141a3be>] ? release_sock+0xce/0xe0
 [<ffffffff814eb4fe>] ? mutex_lock+0x1e/0x50
 [<ffffffff81180b87>] ? pipe_read+0x2a7/0x4e0
 [<ffffffff8117660a>] ? do_sync_read+0xfa/0x140
 [<ffffffff81090be0>] ? autoremove_wake_function+0x0/0x40
 [<ffffffff811899f1>] ? sys_ioctl+0x81/0xa0
 [<ffffffff81012a69>] ? read_tsc+0x9/0x20
 [<ffffffff8109b669>] ? ktime_get_ts+0xa9/0xe0
 [<ffffffff8118b09d>] ? poll_select_set_timeout+0x8d/0xa0
 [<ffffffff8118bb41>] sys_poll+0x71/0x100
 [<ffffffff810495c0>] sysenter_dispatch+0x7/0x2e
Code: 4c 8b a5 10 fc ff ff 48 8b bd 20 fc ff ff e8 df f9 ff ff 4c 8d 85 c0 fe ff ff 31 ff 41 8b 70 08 85 f6 7e 41 41 0f b7 50 12 89 f8 <66> 41 89 54 24 06 85 c0 0f 85 ce fd ff ff 4c 89 c1 31 d2 eb 1a 
RIP  [<ffffffff8118b779>] do_sys_poll+0x349/0x520
 RSP <ffff88075f25fb28>
crash> 

Environment

  • Architecture x86_64
  • Red Hat Enterprise Linux 6
  • Red Hat Enterprise Linux 5

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.