RHEL 5.10 server panic at ext4:ext4_file_open+0x61/0xf5
Issue
- RHEL 5 server panic with below backtrace:
JBD: barrier-based sync failed on dm-0-8 - disabling barriers
JBD: barrier-based sync failed on dm-1-8 - disabling barriers
symap_rh_ES_5_2.6.18_274.3.1.el5_x86_64: module license 'Proprietary' taints kernel.
GPL init module ...
-------------------------------------------------------------
FILE-PROTECTOR-ENTERPRISE_RHEL-5-64_x86-64-nCPU_5.1.0.37
From Protegrity USA, Inc. http://www.protegrity.com
SN[vpd-marathon-05062014-001] Production version.
-------------------------------------------------------------
JBD: barrier-based sync failed on dm-5-8 - disabling barriers
Unable to handle kernel NULL pointer dereference at 0000000000000018 RIP:
[<ffffffff88055b19>] :ext4:ext4_file_open+0x61/0xf5
PGD 0
Oops: 0000 [1] SMP
last sysfs file: /devices/pci0000:00/0000:00:00.0/irq
CPU 0
Modules linked in: nfs lockd nfs_acl sunrpc dfp_rc4(PU) dfp_des(PU) dfp_bf(PU) dfp_aes(PU) dfpmod(PU) dfpgplmod(U) symap_rh_ES_5_2.6.18_274.3.1.el5_x86_64(PU) symev_rh_ES_5_2.6.18_274.3.1.el5_x86_64(U) be2iscsi ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp bnx2i cnic ipv6 xfrm_nalgo crypto_api uio cxgb3i libcxgbi cxgb3 8021q libiscsi_tcp libiscsi2 scsi_transport_iscsi2 scsi_transport_iscsi vmsync(U) vsock(U) vmmemctl(U) acpiphp ext3 jbd dm_multipath scsi_dh video backlight sbs power_meter hwmon i2c_ec dell_wmi wmi button battery asus_acpi acpi_memhotplug ac lp sg floppy pcspkr i2c_piix4 i2c_core vmci(U) parport_pc parport tpm_tis ide_cd tpm serio_raw cdrom tpm_bios pvscsi(U) vmxnet3(U) vmxnet(U) dm_raid45 dm_message dm_region_hash dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod ata_piix libata shpchp mptsas mptscsih mptbase scsi_transport_sas sd_mod scsi_mod ext4 jbd2 crc16 uhci_hcd ohci_hcd ehci_hcd
Pid: 4594, comm: sftp-server Tainted: P -------------------- 2.6.18-371.el5 #1
RIP: 0010:[<ffffffff88055b19>] [<ffffffff88055b19>] :ext4:ext4_file_open+0x61/0xf5
RSP: 0018:ffff8101d2591958 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff81023df93680 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff81023df93680 RDI: ffff8101d25919a8
RBP: 0000000000000000 R08: 0000000000000000 R09: ffff81023df93680
R10: 0000000000000010 R11: 0000000000000000 R12: ffff8101d033fdf8
R13: ffff81023ddcb800 R14: ffff81023ddcb400 R15: ffff81023df93680
FS: 00002b1a84930ee0(0000) GS:ffffffff80436000(0000) knlGS:00000000c9eb3b90
CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000000018 CR3: 00000001de1f1000 CR4: 00000000000006e0
Process sftp-server (pid: 4594, threadinfo ffff8101d2590000, task ffff8101d2592830)
Stack: ffff8101d2591a28 ffff8101d2762100 0000000000000000 0000000000000000
0000000000000000 0000000000000000 0000000000000000 0000000000000000
0000000000000000 0000000000000000 0000000000000000 ffff81023df93680
Call Trace:
[<ffffffff88055ab8>] :ext4:ext4_file_open+0x0/0xf5
[<ffffffff8001efeb>] __dentry_open+0xd9/0x1dc
[<ffffffff886f5a90>] :dfpmod:iread+0x168/0x300
[<ffffffff88706c32>] :dfpmod:vext_check_tfe_mode+0x3c2/0x112c
[<ffffffff8002d675>] wake_up_bit+0x11/0x22
[<ffffffff8002d675>] wake_up_bit+0x11/0x22
[<ffffffff8805eeee>] :ext4:ext4_iget+0x657/0x68b
[<ffffffff800fd6f8>] inotify_d_instantiate+0x12/0x3c
[<ffffffff88707ba9>] :dfpmod:create_vext+0x20d/0x21a
[<ffffffff88062853>] :ext4:ext4_lookup+0x0/0xd8
[<ffffffff88719c3c>] :dfpmod:my_lookup+0x1b8/0x774
[<ffffffff8000d0de>] do_lookup+0x14a/0x24b
[<ffffffff8000a2a3>] __link_path_walk+0x9f4/0xf39
[<ffffffff8000eba2>] link_path_walk+0x45/0xb8
[<ffffffff8000ce13>] do_path_lookup+0x294/0x311
[<ffffffff8803b977>] :jbd2:do_get_write_access+0x3e3/0x418
[<ffffffff886f502b>] :dfpmod:path_to_vp+0x3d/0xd0
[<ffffffff8870b3f4>] :dfpmod:path_stat+0x48/0x45c
[<ffffffff8871bb3f>] :dfpmod:vpd_sys_newlstat+0xa1/0x2b8
[<ffffffff80013f14>] __mark_inode_dirty+0x15b/0x16e
[<ffffffff80025eae>] filldir+0x0/0xb7
[<ffffffff800356ce>] vfs_readdir+0x94/0xa9
[<ffffffff800ba4f5>] audit_filter_syscall+0x87/0xad
[<ffffffff800bb279>] audit_syscall_entry+0x1a8/0x1d3
[<ffffffff8005d29e>] tracesys+0xd5/0xdf
Code: 48 8b 5d 18 48 85 db 74 15 8b 03 85 c0 75 0c 0f 0b 68 ca e6
RIP [<ffffffff88055b19>] :ext4:ext4_file_open+0x61/0xf5
RSP <ffff8101d2591958>
Environment
- Red Hat Enterprise Linux 5.10
- Third party kernel module 'dfpmod' from Protegrity USA.
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.