Kernel panic due to general protection fault in kmem_cache_alloc()

Solution In Progress - Updated -

Issue

  • Kernel panic with the following call traces;
[923953.785893] general protection fault: 0000 [#1] SMP 
[923953.787239] Modules linked in: lin_tape(OF) ip6t_rpfilter ip6t_REJECT ipt_REJECT xt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw iptable_filter ip_tables iTCO_wdt iTCO_vendor_support ipmi_devintf intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr osst vfat fat dm_service_time cdc_ether usbnet mii sb_edac edac_core lpc_ich mfd_core ioatdma ch st shpchp wmi ipmi_si ipmi_msghandler nfsd auth_rpcgss nfs_acl lockd
[923953.794198]  sunrpc binfmt_misc dm_multipath xfs libcrc32c sr_mod cdrom mgag200 syscopyarea sysfillrect sysimgblt lpfc ixgbe drm_kms_helper igb ttm mdio sd_mod ahci ptp crc_t10dif crct10dif_common drm i2c_algo_bit scsi_transport_fc pps_core libahci libata usb_storage i2c_core megaraid_sas scsi_tgt dca dm_mirror dm_region_hash dm_log dm_mod [last unloaded: lin_tape]
[923953.798946] CPU: 7 PID: 1848 Comm: check_tsm Tainted: GF          O--------------   3.10.0-229.el7.x86_64 #1
[923953.800144] Hardware name: IBM System x3650 M4 -[7915AC1]-/00MV215, BIOS -[VVE142EUS-1.80]- 09/17/2014
[923953.801346] task: ffff881021f54440 ti: ffff88030d86c000 task.ti: ffff88030d86c000
[923953.802552] RIP: 0010:[<ffffffff811ab555>]  [<ffffffff811ab555>] kmem_cache_alloc+0x75/0x1d0
[923953.803836] RSP: 0018:ffff88030d86fe28  EFLAGS: 00010282
[923953.805068] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000002f1db59
[923953.806264] RDX: 0000000002f1db58 RSI: 00000000000080d0 RDI: ffff88103f403700
[923953.807450] RBP: ffff88030d86fe58 R08: 0000000000016460 R09: ffffffff811c850c
[923953.808627] R10: ffffffff811cf89e R11: 0000000000000246 R12: 240001025c008301
[923953.809826] R13: 00000000000080d0 R14: ffff88103f403700 R15: ffff88103f403700
[923953.811032] FS:  00007ffff7feb740(0000) GS:ffff88103f9c0000(0000) knlGS:0000000000000000
[923953.812195] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[923953.813340] CR2: 00000000006ef160 CR3: 0000000ef0f43000 CR4: 00000000001407e0
[923953.814474] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[923953.815593] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[923953.816688] Stack:
[923953.817792]  ffffffff811c850c 0000000000000000 ffff8808645e72c0 0000000000000002
[923953.818876]  ffffffff8164c140 00000000006ef160 ffff88030d86fe80 ffffffff811c850c
[923953.819968]  ffff88030d86fe78 ffff88101b71cc50 ffff88030d86fec0 ffff88030d86feb0
[923953.821045] Call Trace:
[923953.822094]  [<ffffffff811c850c>] ? get_empty_filp+0x5c/0x190
[923953.823134]  [<ffffffff811c850c>] get_empty_filp+0x5c/0x190
[923953.824150]  [<ffffffff811c865e>] alloc_file+0x1e/0xf0
[923953.825155]  [<ffffffff811cfea2>] create_pipe_files+0x132/0x220
[923953.826166]  [<ffffffff811cffc4>] __do_pipe_flags+0x34/0xf0
[923953.827158]  [<ffffffff811d011f>] SyS_pipe2+0x2f/0xc0
[923953.828129]  [<ffffffff8160b808>] ? page_fault+0x28/0x30
[923953.829076]  [<ffffffff811d01c0>] SyS_pipe+0x10/0x20
[923953.830001]  [<ffffffff81613da9>] system_call_fastpath+0x16/0x1b
[923953.830914] Code: cc 00 00 49 8b 50 08 4d 8b 20 49 8b 40 10 4d 85 e4 0f 84 1f 01 00 00 48 85 c0 0f 84 16 01 00 00 49 63 46 20 48 8d 4a 01 4d 8b 06 <49> 8b 1c 04 4c 89 e0 65 49 0f c7 08 0f 94 c0 84 c0 74 b9 49 63 
[923953.832859] RIP  [<ffffffff811ab555>] kmem_cache_alloc+0x75/0x1d0
[923953.833788]  RSP <ffff88030d86fe28>

Environment

  • Red Hat Enterprise Linux 7
  • kernel-3.10.0-229.el7.x86_64

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content