Skip to content

Instantly share code, notes, and snippets.

@jhmartin
Created April 27, 2020 22:22
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save jhmartin/be44fb59133b145c147e7ee59bcf279e to your computer and use it in GitHub Desktop.
Save jhmartin/be44fb59133b145c147e7ee59bcf279e to your computer and use it in GitHub Desktop.
Kernel warning that appears to be related to Trend Micro / Deep Security Agent (dsa_agent). Correlates to a mass failure of Amazon Linux 2 ECS tasks.
Linux xxx 4.14.173-137.229.amzn2.x86_64 #1 SMP Wed Apr 1 18:06:08 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
[ 641.849894] ------------[ cut here ]------------
[ 641.852726] WARNING: CPU: 10 PID: 5454 at lib/vsprintf.c:2119 vsnprintf+0x2c1/0x4d0
[ 641.857834] Modules linked in: veth xt_REDIRECT nf_nat_redirect xt_nat xt_tcpudp xfs bmhook(OE) tmhook(OE) dsa_filter(POE) dsa_filter_hook(OE) ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter xt_conntrack nf_nat nf_conntrack libcrc32c br_netfilter bridge stp llc overlay crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd mousedev evdev glue_helper psmouse cryptd button sunrpc binfmt_misc ena ip_tables x_tables ext4 crc16 mbcache jbd2 fscrypto nvme crc32c_intel nvme_core ipv6 crc_ccitt autofs4
[ 641.887061] CPU: 10 PID: 5454 Comm: dsa.Scheduler_0 Tainted: P OE 4.14.173-137.229.amzn2.x86_64 #1
[ 641.892783] Hardware name: Amazon EC2 c5.4xlarge/, BIOS 1.0 10/16/2017
[ 641.896189] task: ffff8887b640c000 task.stack: ffffc90003e4c000
[ 641.899415] RIP: 0010:vsnprintf+0x2c1/0x4d0
[ 641.902072] RSP: 0018:ffffc90003e4fc10 EFLAGS: 00010292
[ 641.905059] RAX: 0000000000000000 RBX: ffff8885728befd0 RCX: ffffc90003e4fc68
[ 641.908707] RDX: ffffffffa0482e3f RSI: ffffffffffffffee RDI: ffff88849d67fc12
[ 641.912347] RBP: ffffc90003e4fcc0 R08: 0000000000000000 R09: 0000000000000001
[ 641.916002] R10: ffffc90003e4fcd0 R11: ffff88849d67fc12 R12: ffffc90003e4fd38
[ 641.919572] R13: 000000000000000b R14: 0000000000000077 R15: 000000000000000d
[ 641.923138] FS: 00007f6d45698700(0000) GS:ffff8887ed480000(0000) knlGS:0000000000000000
[ 641.928196] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 641.931323] CR2: 00007f6d58960740 CR3: 00000007c301c006 CR4: 00000000007606e0
[ 641.934893] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 641.938512] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 641.942153] PKRU: 55555554
[ 641.944409] Call Trace:
[ 641.946559] snprintf+0x45/0x70
[ 641.948880] __dump_write_data+0x114/0x190 [dsa_filter]
[ 641.951854] ? path_openat+0x635/0x16f0
[ 641.954390] lin_netdev_dump+0x118/0x220 [dsa_filter]
[ 641.957314] proc_chx_interfaces_read+0x15/0x40 [dsa_filter]
[ 641.960431] read_wrapper+0x179/0x270 [dsa_filter]
[ 641.963272] proc_reg_read+0x40/0x70
[ 641.965723] __vfs_read+0x36/0x150
[ 641.968180] vfs_read+0x89/0x130
[ 641.970548] SyS_read+0x5a/0xd0
[ 641.972896] do_syscall_64+0x67/0x110
[ 641.975436] entry_SYSCALL_64_after_hwframe+0x3d/0xa2
[ 641.978346] RIP: 0033:0x7f6d57e7c4f3
[ 641.980783] RSP: 002b:00007f6d4568fb80 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 641.985672] RAX: ffffffffffffffda RBX: 00007f6d0c9fab30 RCX: 00007f6d57e7c4f3
[ 641.989232] RDX: 0000000000001fff RSI: 00007f6d0c9fab30 RDI: 000000000000002c
[ 641.992794] RBP: 0000000000001fff R08: 0000000000000000 R09: 0000000000000001
[ 641.996355] R10: 00007f6d59e61c20 R11: 0000000000000246 R12: 00007f6d0c9fab30
[ 641.999914] R13: 00007f6d45690148 R14: 00007f6d4568ffc0 R15: 00007f6d456900d0
[ 642.003473] Code: ff 3c 0d 0f 84 e2 01 00 00 3c 0e 0f 85 57 ff ff ff 83 fa 2f 77 59 89 d0 49 03 46 10 83 c2 08 41 89 16 48 0f bf 10 e9 54 ff ff ff <0f> 0b e9 e0 fd ff ff e8 33 cd a7 ff 83 fa 2f 77 25 89 d0 49 03
[ 642.013313] ---[ end trace 9d9ef077b561ea41 ]---
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment