Kernel panic due to general protection fault in kmem_cache_alloc()
Issue
- Kernel panic with the following call traces;
[923953.785893] general protection fault: 0000 [#1] SMP
[923953.787239] Modules linked in: lin_tape(OF) ip6t_rpfilter ip6t_REJECT ipt_REJECT xt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw iptable_filter ip_tables iTCO_wdt iTCO_vendor_support ipmi_devintf intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr osst vfat fat dm_service_time cdc_ether usbnet mii sb_edac edac_core lpc_ich mfd_core ioatdma ch st shpchp wmi ipmi_si ipmi_msghandler nfsd auth_rpcgss nfs_acl lockd
[923953.794198] sunrpc binfmt_misc dm_multipath xfs libcrc32c sr_mod cdrom mgag200 syscopyarea sysfillrect sysimgblt lpfc ixgbe drm_kms_helper igb ttm mdio sd_mod ahci ptp crc_t10dif crct10dif_common drm i2c_algo_bit scsi_transport_fc pps_core libahci libata usb_storage i2c_core megaraid_sas scsi_tgt dca dm_mirror dm_region_hash dm_log dm_mod [last unloaded: lin_tape]
[923953.798946] CPU: 7 PID: 1848 Comm: check_tsm Tainted: GF O-------------- 3.10.0-229.el7.x86_64 #1
[923953.800144] Hardware name: IBM System x3650 M4 -[7915AC1]-/00MV215, BIOS -[VVE142EUS-1.80]- 09/17/2014
[923953.801346] task: ffff881021f54440 ti: ffff88030d86c000 task.ti: ffff88030d86c000
[923953.802552] RIP: 0010:[<ffffffff811ab555>] [<ffffffff811ab555>] kmem_cache_alloc+0x75/0x1d0
[923953.803836] RSP: 0018:ffff88030d86fe28 EFLAGS: 00010282
[923953.805068] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000002f1db59
[923953.806264] RDX: 0000000002f1db58 RSI: 00000000000080d0 RDI: ffff88103f403700
[923953.807450] RBP: ffff88030d86fe58 R08: 0000000000016460 R09: ffffffff811c850c
[923953.808627] R10: ffffffff811cf89e R11: 0000000000000246 R12: 240001025c008301
[923953.809826] R13: 00000000000080d0 R14: ffff88103f403700 R15: ffff88103f403700
[923953.811032] FS: 00007ffff7feb740(0000) GS:ffff88103f9c0000(0000) knlGS:0000000000000000
[923953.812195] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[923953.813340] CR2: 00000000006ef160 CR3: 0000000ef0f43000 CR4: 00000000001407e0
[923953.814474] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[923953.815593] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[923953.816688] Stack:
[923953.817792] ffffffff811c850c 0000000000000000 ffff8808645e72c0 0000000000000002
[923953.818876] ffffffff8164c140 00000000006ef160 ffff88030d86fe80 ffffffff811c850c
[923953.819968] ffff88030d86fe78 ffff88101b71cc50 ffff88030d86fec0 ffff88030d86feb0
[923953.821045] Call Trace:
[923953.822094] [<ffffffff811c850c>] ? get_empty_filp+0x5c/0x190
[923953.823134] [<ffffffff811c850c>] get_empty_filp+0x5c/0x190
[923953.824150] [<ffffffff811c865e>] alloc_file+0x1e/0xf0
[923953.825155] [<ffffffff811cfea2>] create_pipe_files+0x132/0x220
[923953.826166] [<ffffffff811cffc4>] __do_pipe_flags+0x34/0xf0
[923953.827158] [<ffffffff811d011f>] SyS_pipe2+0x2f/0xc0
[923953.828129] [<ffffffff8160b808>] ? page_fault+0x28/0x30
[923953.829076] [<ffffffff811d01c0>] SyS_pipe+0x10/0x20
[923953.830001] [<ffffffff81613da9>] system_call_fastpath+0x16/0x1b
[923953.830914] Code: cc 00 00 49 8b 50 08 4d 8b 20 49 8b 40 10 4d 85 e4 0f 84 1f 01 00 00 48 85 c0 0f 84 16 01 00 00 49 63 46 20 48 8d 4a 01 4d 8b 06 <49> 8b 1c 04 4c 89 e0 65 49 0f c7 08 0f 94 c0 84 c0 74 b9 49 63
[923953.832859] RIP [<ffffffff811ab555>] kmem_cache_alloc+0x75/0x1d0
[923953.833788] RSP <ffff88030d86fe28>
Environment
- Red Hat Enterprise Linux 7
- kernel-3.10.0-229.el7.x86_64
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.