A message "BUG: Bad page map in process" followed by a kernel crash

Solution Unverified - Updated -

Issue

  • A message "BUG: Bad page map in process" followed by a kernel crash:
        ...
[  884.816587] BUG: Bad page map in process pidstat  pte:80000000101b1225 pmd:143392067
[  884.816632] addr:00000000efb1d13b vm_flags:08000070 anon_vma:0000000000000000 mapping:00000000e0e5e738 index:4cc86b081
[  884.816670] file:libnss_dns-2.28.so fault:xfs_filemap_fault [xfs] mmap:xfs_file_mmap [xfs] readpage:xfs_vm_readpage [xfs]
[  884.816905] CPU: 0 PID: 14857 Comm: pidstat Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-513.9.1.el8_9.x86_64 #1
[  884.816908] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[  884.816909] Call Trace:
[  884.816914]  dump_stack+0x41/0x60
[  884.816922]  print_bad_pte.cold.111+0x63/0xa6
[  884.816927]  vm_normal_page+0x9c/0xc0
[  884.816929]  smaps_pte_range+0x48d/0x670
[  884.816935]  walk_pgd_range+0x471/0xa30
[  884.816938]  __walk_page_range+0x57/0x180
[  884.816940]  walk_page_vma+0x66/0x90
[  884.816942]  smap_gather_stats+0x42/0xa0
[  884.816944]  show_smap+0x42/0x1c0
[  884.816947]  seq_read+0x163/0x420
[  884.816952]  vfs_read+0x91/0x150
[  884.816956]  ksys_read+0x4f/0xb0
[  884.816958]  do_syscall_64+0x5b/0x1b0
[  884.816964]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[  884.816971] RIP: 0033:0x7f974a7ccd45
[  884.816974] Code: fe ff ff 50 48 8d 3d 32 cb 06 00 e8 35 ee 01 00 0f 1f 44 00 00 f3 0f 1e fa 48 8d 05 f5 49 2a 00 8b 00 85 c0 75 0f 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 53 c3 66 90 41 54 49 89 d4 55 48 89 f5 53 89
[  884.816976] RSP: 002b:00007ffe85a63d88 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[  884.816979] RAX: ffffffffffffffda RBX: 0000564609b052c0 RCX: 00007f974a7ccd45
[  884.816980] RDX: 0000000000000400 RSI: 0000564609b07880 RDI: 0000000000000004
[  884.816981] RBP: 0000000000000d68 R08: 0000000000000000 R09: 0000000000000000
[  884.816982] R10: 00007f974ac95580 R11: 0000000000000246 R12: 00007f974aa68860
[  884.816983] R13: 00007f974aa693a0 R14: 00000000000000e6 R15: 0000564609b052c0
[  884.816985] Disabling lock debugging due to kernel taint
[  884.831638] BUG: unable to handle kernel paging request at fffff76943fb4008
[  884.831680] PGD 23ffc7067 P4D 23ffc7067 PUD 23ffc6067 PMD 0 
[  884.831706] Oops: 0000 [#1] SMP PTI
[  884.831723] CPU: 0 PID: 14857 Comm: pidstat Kdump: loaded Tainted: G    B      OE    --------- -  - 4.18.0-513.9.1.el8_9.x86_64 #1
[  884.831763] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[  884.831797] RIP: 0010:smaps_account+0x28/0x230
[  884.831820] Code: 66 90 66 66 66 66 90 41 56 b8 00 10 00 00 45 89 c6 41 55 41 54 55 48 89 fd bf 01 00 00 00 53 48 89 f3 84 d2 0f 85 85 01 00 00 <48> 8b 73 08 48 8d 56 ff 83 e6 01 48 0f 44 d3 f6 42 18 01 74 27 48
[  884.831882] RSP: 0018:ffffb4efc3567bd8 EFLAGS: 00010246
[  884.831902] RAX: 0000000000001000 RBX: fffff76943fb4000 RCX: 0000000000000001
[  884.831926] RDX: 0000000000000000 RSI: fffff76943fb4000 RDI: 0000000000000001
[  884.831951] RBP: ffffb4efc3567db8 R08: 0000000000000001 R09: 0000000000000000
[  884.831975] R10: 00000000001fd800 R11: 000000000000b7d8 R12: fffff76944005128
[  884.831999] R13: 3030b4efc0200000 R14: 0000000000000001 R15: ffffb4efc3567db8
[  884.832023] FS:  00007f974ac95580(0000) GS:ffff9482f7c00000(0000) knlGS:0000000000000000
[  884.832052] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  884.832071] CR2: fffff76943fb4008 CR3: 0000000209ad2006 CR4: 00000000000606f0
[  884.832120] Call Trace:
[  884.832133]  ? __die_body+0x1a/0x60
[  884.832152]  ? no_context+0x1ba/0x3f0
[  884.832168]  ? __bad_area_nosemaphore+0x16c/0x1c0
[  884.832188]  ? do_page_fault+0x37/0x130
[  884.832203]  ? page_fault+0x1e/0x30
[  884.832219]  ? smaps_account+0x28/0x230
[  884.832235]  ? follow_trans_huge_pmd+0x186/0x320
[  884.832259]  smaps_pte_range+0x4db/0x670
[  884.832276]  walk_pgd_range+0x471/0xa30
[  884.832294]  __walk_page_range+0x57/0x180
[  884.832309]  walk_page_vma+0x66/0x90
[  884.832323]  smap_gather_stats+0x42/0xa0
[  884.832340]  show_smap+0x42/0x1c0
[  884.832836]  seq_read+0x163/0x420
[  884.833181]  vfs_read+0x91/0x150
[  884.833409]  ksys_read+0x4f/0xb0
[  884.833607]  do_syscall_64+0x5b/0x1b0
[  884.833805]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[  884.833995] RIP: 0033:0x7f974a7ccd45
[  884.834166] Code: fe ff ff 50 48 8d 3d 32 cb 06 00 e8 35 ee 01 00 0f 1f 44 00 00 f3 0f 1e fa 48 8d 05 f5 49 2a 00 8b 00 85 c0 75 0f 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 53 c3 66 90 41 54 49 89 d4 55 48 89 f5 53 89
[  884.834552] RSP: 002b:00007ffe85a63d88 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[  884.834747] RAX: ffffffffffffffda RBX: 0000564609b052c0 RCX: 00007f974a7ccd45
[  884.834935] RDX: 0000000000000400 RSI: 0000564609b07880 RDI: 0000000000000004
[  884.835125] RBP: 0000000000000d68 R08: 0000000000000000 R09: 0000000000000000
[  884.835316] R10: 00007f974ac95580 R11: 0000000000000246 R12: 00007f974aa68860
[  884.835507] R13: 00007f974aa693a0 R14: 00000000000000e6 R15: 0000564609b052c0
[  884.835708] Modules linked in: [...]
[  884.837072] Red Hat flags: eBPF/rawtrace
[  884.837272] CR2: fffff76943fb4008
        ...

Environment

  • Red Hat Enterprise Linux 8.9.z
  • A VMware virtual machine
  • McAfee security module named mfe_aac_100707119

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content