Redhat Linux 6.5 crashes due to Endpoint Protection client symev module
search cancel

Redhat Linux 6.5 crashes due to Endpoint Protection client symev module

book

Article ID: 174775

calendar_today

Updated On:

Products

Endpoint Protection

Issue/Introduction

Redhat Enterprise Linux 6.5 crashes. The logs indicate that the crash was a result of the Symantec Endpoint Protection for Linux client module symev, in symev_nfsd4_proc_compound.

 

vmcore-dmesg :

<4>WARNING: at fs/namei.c:1552 lookup_one_len+0xf1/0x110() (Tainted: P           ---------------   )
<4>Hardware name: VMware Virtual Platform
<4>Modules linked in: nfsd lockd nfs_acl auth_rpcgss symap_rh_ES_6_2_6_32_431_el6_x86_64(P)(U) symev_rh_ES_6_2_6_32_431_el6_x86_64(U) sunrpc vsock(U) ipt_LOG xt_limit nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack iptable_filter ip_tables xfs exportfs uinput ppdev parport_pc parport microcode e1000 vmware_balloon sg vmci(U) i2c_piix4 i2c_core shpchp ext4 jbd2 mbcache sd_mod crc_t10dif sr_mod cdrom mptspi mptscsih mptbase scsi_transport_spi pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
<4>Pid: 4263, comm: nfsd Tainted: P           ---------------    2.6.32-431.20.3.el6.x86_64 #1
<4>Call Trace:
<4> [<ffffffff81071b37>] ? warn_slowpath_common+0x87/0xc0
<4> [<ffffffff81071b8a>] ? warn_slowpath_null+0x1a/0x20
<4> [<ffffffff81196dc1>] ? lookup_one_len+0xf1/0x110
<4> [<ffffffffa03ddbbe>] ? symev_nfsd4_proc_compound+0x45e/0x7b0 [symev_rh_ES_6_2_6_32_431_el6_x86_64]
<4> [<ffffffffa042d425>] ? nfsd_dispatch+0xe5/0x230 [nfsd]
<4> [<ffffffffa038a844>] ? svc_process_common+0x344/0x640 [sunrpc]
<4> [<ffffffff81061d00>] ? default_wake_function+0x0/0x20
<4> [<ffffffffa038ae80>] ? svc_process+0x110/0x160 [sunrpc]
<4> [<ffffffffa042db52>] ? nfsd+0xc2/0x160 [nfsd]
<4> [<ffffffffa042da90>] ? nfsd+0x0/0x160 [nfsd]
<4> [<ffffffff8109abf6>] ? kthread+0x96/0xa0
<4> [<ffffffff8100c20a>] ? child_rip+0xa/0x20
<4> [<ffffffff8109ab60>] ? kthread+0x0/0xa0
<4> [<ffffffff8100c200>] ? child_rip+0x0/0x20
<4>---[ end trace 566d10338a01a6ff ]---
<4>NOHZ: local_softirq_pending 100
<1>BUG: unable to handle kernel paging request at fffffffffffffffe
<1>IP: [<ffffffff811a4404>] dput+0x84/0x150
<4>PGD 1a87067 PUD 1a88067 PMD 0 
<4>Oops: 0000 [#1] SMP 
<4>last sysfs file: /sys/devices/system/cpu/online
<4>CPU 0 
<4>Modules linked in: symap_rh_ES_6_2_6_32_431_el6_x86_64(P)(U) nfsd lockd nfs_acl auth_rpcgss symev_rh_ES_6_2_6_32_431_el6_x86_64(U) sunrpc vsock(U) ipt_LOG xt_limit nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack iptable_filter ip_tables xfs exportfs uinput ppdev parport_pc parport microcode e1000 vmware_balloon sg vmci(U) i2c_piix4 i2c_core shpchp ext4 jbd2 mbcache sd_mod crc_t10dif sr_mod cdrom mptspi mptscsih mptbase scsi_transport_spi pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: symap_rh_ES_6_2_6_32_431_el6_x86_64]
<4>
<4>Pid: 4243, comm: nfsd Tainted: P        W  ---------------    2.6.32-431.20.3.el6.x86_64 #1 VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform
<4>RIP: 0010:[<ffffffff811a4404>]  [<ffffffff811a4404>] dput+0x84/0x150
<4>RSP: 0018:ffff880826edbd40  EFLAGS: 00010282
<4>RAX: 0000000002000000 RBX: fffffffffffffffe RCX: 0000000000000004
<4>RDX: ffffffffffffff00 RSI: ffffffffa04361d0 RDI: fffffffffffffffe
<4>RBP: ffff880826edbd50 R08: 0000000000000001 R09: 0000000000000000
<4>R10: ffff88082720e040 R11: 0000000000000000 R12: 000000000000001c
<4>R13: 0000000000000001 R14: ffff88040deaf400 R15: 0000000000000001
<4>FS:  0000000000000000(0000) GS:ffff88002c200000(0000) knlGS:0000000000000000
<4>CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
<4>CR2: fffffffffffffffe CR3: 0000000482176000 CR4: 00000000000407f0
<4>DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
<4>DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
<4>Process nfsd (pid: 4243, threadinfo ffff880826eda000, task ffff88082f90d500)
<4>Stack:
<4> ffff88082720d000 000000000000001c ffff880826edbdd0 ffffffffa03dd8f5
<4><d> ffff880826edbdd0 ffff88082720d198 ffff88082720e000 ffff880827220000
<4><d> ffff8808b338aa01 ffff88082720d198 0000000002000000 fffffffffffffffe
<4>Call Trace:
<4> [<ffffffffa03dd8f5>] symev_nfsd4_proc_compound+0x195/0x7b0 [symev_rh_ES_6_2_6_32_431_el6_x86_64]
<4> [<ffffffffa042d425>] nfsd_dispatch+0xe5/0x230 [nfsd]
<4> [<ffffffffa038a844>] svc_process_common+0x344/0x640 [sunrpc]
<4> [<ffffffff81061d00>] ? default_wake_function+0x0/0x20
<4> [<ffffffffa038ae80>] svc_process+0x110/0x160 [sunrpc]
<4> [<ffffffffa042db52>] nfsd+0xc2/0x160 [nfsd]
<4> [<ffffffffa042da90>] ? nfsd+0x0/0x160 [nfsd]
<4> [<ffffffff8109abf6>] kthread+0x96/0xa0
<4> [<ffffffff8100c20a>] child_rip+0xa/0x20
<4> [<ffffffff8109ab60>] ? kthread+0x0/0xa0
<4> [<ffffffff8100c200>] ? child_rip+0x0/0x20
<4>Code: 1a e8 81 09 0f 00 48 8b 83 90 00 00 00 83 a8 08 01 00 00 01 83 2d 30 f7 92 00 01 48 89 df e8 f4 e3 ff ff 48 85 c0 48 89 c3 74 7c <8b> 03 83 f8 01 74 7d 48 c7 c6 c0 43 a8 81 48 89 df e8 26 ec 0d 
<1>RIP  [<ffffffff811a4404>] dput+0x84/0x150
<4> RSP <ffff880826edbd40>
<4>CR2: fffffffffffffffe

Environment

RedHat Enterprise Linux Server 6.5

Resolution

This issue is fixed in Symantec Endpoint Protection 14.2 RU1. For information on how to obtain the latest build of Symantec Endpoint Protection, see Download the latest version of Symantec Endpoint Protection.