A message "BUG: Bad page map in process" followed by a kernel crash
Issue
- A message "BUG: Bad page map in process" followed by a kernel crash:
...
[ 884.816587] BUG: Bad page map in process pidstat pte:80000000101b1225 pmd:143392067
[ 884.816632] addr:00000000efb1d13b vm_flags:08000070 anon_vma:0000000000000000 mapping:00000000e0e5e738 index:4cc86b081
[ 884.816670] file:libnss_dns-2.28.so fault:xfs_filemap_fault [xfs] mmap:xfs_file_mmap [xfs] readpage:xfs_vm_readpage [xfs]
[ 884.816905] CPU: 0 PID: 14857 Comm: pidstat Kdump: loaded Tainted: G OE --------- - - 4.18.0-513.9.1.el8_9.x86_64 #1
[ 884.816908] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[ 884.816909] Call Trace:
[ 884.816914] dump_stack+0x41/0x60
[ 884.816922] print_bad_pte.cold.111+0x63/0xa6
[ 884.816927] vm_normal_page+0x9c/0xc0
[ 884.816929] smaps_pte_range+0x48d/0x670
[ 884.816935] walk_pgd_range+0x471/0xa30
[ 884.816938] __walk_page_range+0x57/0x180
[ 884.816940] walk_page_vma+0x66/0x90
[ 884.816942] smap_gather_stats+0x42/0xa0
[ 884.816944] show_smap+0x42/0x1c0
[ 884.816947] seq_read+0x163/0x420
[ 884.816952] vfs_read+0x91/0x150
[ 884.816956] ksys_read+0x4f/0xb0
[ 884.816958] do_syscall_64+0x5b/0x1b0
[ 884.816964] entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 884.816971] RIP: 0033:0x7f974a7ccd45
[ 884.816974] Code: fe ff ff 50 48 8d 3d 32 cb 06 00 e8 35 ee 01 00 0f 1f 44 00 00 f3 0f 1e fa 48 8d 05 f5 49 2a 00 8b 00 85 c0 75 0f 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 53 c3 66 90 41 54 49 89 d4 55 48 89 f5 53 89
[ 884.816976] RSP: 002b:00007ffe85a63d88 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 884.816979] RAX: ffffffffffffffda RBX: 0000564609b052c0 RCX: 00007f974a7ccd45
[ 884.816980] RDX: 0000000000000400 RSI: 0000564609b07880 RDI: 0000000000000004
[ 884.816981] RBP: 0000000000000d68 R08: 0000000000000000 R09: 0000000000000000
[ 884.816982] R10: 00007f974ac95580 R11: 0000000000000246 R12: 00007f974aa68860
[ 884.816983] R13: 00007f974aa693a0 R14: 00000000000000e6 R15: 0000564609b052c0
[ 884.816985] Disabling lock debugging due to kernel taint
[ 884.831638] BUG: unable to handle kernel paging request at fffff76943fb4008
[ 884.831680] PGD 23ffc7067 P4D 23ffc7067 PUD 23ffc6067 PMD 0
[ 884.831706] Oops: 0000 [#1] SMP PTI
[ 884.831723] CPU: 0 PID: 14857 Comm: pidstat Kdump: loaded Tainted: G B OE --------- - - 4.18.0-513.9.1.el8_9.x86_64 #1
[ 884.831763] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[ 884.831797] RIP: 0010:smaps_account+0x28/0x230
[ 884.831820] Code: 66 90 66 66 66 66 90 41 56 b8 00 10 00 00 45 89 c6 41 55 41 54 55 48 89 fd bf 01 00 00 00 53 48 89 f3 84 d2 0f 85 85 01 00 00 <48> 8b 73 08 48 8d 56 ff 83 e6 01 48 0f 44 d3 f6 42 18 01 74 27 48
[ 884.831882] RSP: 0018:ffffb4efc3567bd8 EFLAGS: 00010246
[ 884.831902] RAX: 0000000000001000 RBX: fffff76943fb4000 RCX: 0000000000000001
[ 884.831926] RDX: 0000000000000000 RSI: fffff76943fb4000 RDI: 0000000000000001
[ 884.831951] RBP: ffffb4efc3567db8 R08: 0000000000000001 R09: 0000000000000000
[ 884.831975] R10: 00000000001fd800 R11: 000000000000b7d8 R12: fffff76944005128
[ 884.831999] R13: 3030b4efc0200000 R14: 0000000000000001 R15: ffffb4efc3567db8
[ 884.832023] FS: 00007f974ac95580(0000) GS:ffff9482f7c00000(0000) knlGS:0000000000000000
[ 884.832052] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 884.832071] CR2: fffff76943fb4008 CR3: 0000000209ad2006 CR4: 00000000000606f0
[ 884.832120] Call Trace:
[ 884.832133] ? __die_body+0x1a/0x60
[ 884.832152] ? no_context+0x1ba/0x3f0
[ 884.832168] ? __bad_area_nosemaphore+0x16c/0x1c0
[ 884.832188] ? do_page_fault+0x37/0x130
[ 884.832203] ? page_fault+0x1e/0x30
[ 884.832219] ? smaps_account+0x28/0x230
[ 884.832235] ? follow_trans_huge_pmd+0x186/0x320
[ 884.832259] smaps_pte_range+0x4db/0x670
[ 884.832276] walk_pgd_range+0x471/0xa30
[ 884.832294] __walk_page_range+0x57/0x180
[ 884.832309] walk_page_vma+0x66/0x90
[ 884.832323] smap_gather_stats+0x42/0xa0
[ 884.832340] show_smap+0x42/0x1c0
[ 884.832836] seq_read+0x163/0x420
[ 884.833181] vfs_read+0x91/0x150
[ 884.833409] ksys_read+0x4f/0xb0
[ 884.833607] do_syscall_64+0x5b/0x1b0
[ 884.833805] entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 884.833995] RIP: 0033:0x7f974a7ccd45
[ 884.834166] Code: fe ff ff 50 48 8d 3d 32 cb 06 00 e8 35 ee 01 00 0f 1f 44 00 00 f3 0f 1e fa 48 8d 05 f5 49 2a 00 8b 00 85 c0 75 0f 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 53 c3 66 90 41 54 49 89 d4 55 48 89 f5 53 89
[ 884.834552] RSP: 002b:00007ffe85a63d88 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 884.834747] RAX: ffffffffffffffda RBX: 0000564609b052c0 RCX: 00007f974a7ccd45
[ 884.834935] RDX: 0000000000000400 RSI: 0000564609b07880 RDI: 0000000000000004
[ 884.835125] RBP: 0000000000000d68 R08: 0000000000000000 R09: 0000000000000000
[ 884.835316] R10: 00007f974ac95580 R11: 0000000000000246 R12: 00007f974aa68860
[ 884.835507] R13: 00007f974aa693a0 R14: 00000000000000e6 R15: 0000564609b052c0
[ 884.835708] Modules linked in: [...]
[ 884.837072] Red Hat flags: eBPF/rawtrace
[ 884.837272] CR2: fffff76943fb4008
...
Environment
- Red Hat Enterprise Linux 8.9.z
- A VMware virtual machine
- McAfee security module named mfe_aac_100707119
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.