The kernel crashes in get_map() called from kmem_cache_close()

Solution Unverified - Updated -

Issue

  • The kernel crashes in get_map() called from kmem_cache_close().
[1540612.773898] BUG: unable to handle kernel paging request at fffffffff6d3cc10
[1540612.774167] IP: [<ffffffff811d8eff>] get_map+0x4f/0x70
[1540612.774462] PGD 19c1067 PUD 19c3067 PMD 0 
[1540612.774734] Oops: 0002 [#1] SMP 
[1540612.775005] Modules linked in: [...]
[1540612.778640] CPU: 0 PID: 86151 Comm: kworker/0:7 Tainted: P    B      OE  ------------ T 3.10.0-514.26.2.el7.x86_64 #1
[1540612.779178] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
[1540612.779756] Workqueue: events kmem_cache_destroy_work_func
[1540612.780383] task: ffff8801ef293ec0 ti: ffff8801be0d0000 task.ti: ffff8801be0d0000
[1540612.781019] RIP: 0010:[<ffffffff811d8eff>]  [<ffffffff811d8eff>] get_map+0x4f/0x70
[1540612.781633] RSP: 0018:ffff8801be0d3d60  EFLAGS: 00010203
[1540612.782268] RAX: 000063dfb69e6001 RBX: ffe708cc58680000 RCX: 000000ba0000005d
[1540612.782983] RDX: 000000000000001d RSI: 0000000000000040 RDI: ffff8802e4f47100
[1540612.783673] RBP: ffff8801be0d3d60 R08: 0000000000000010 R09: ffe708cc58680000
[1540612.784330] R10: 3178302b65646f6e R11: 30343178302f3034 R12: ffff88033161a020
[1540612.784972] R13: ffe708cc58680000 R14: ffff8802e4f47100 R15: ffffea00002d4840
[1540612.785624] FS:  0000000000000000(0000) GS:ffff880331600000(0000) knlGS:0000000000000000
[1540612.786323] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[1540612.786993] CR2: fffffffff6d3cc10 CR3: 00000000019be000 CR4: 00000000000007f0
[1540612.787693] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[1540612.788410] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[1540612.789120] Stack:
[1540612.789812]  ffff8801be0d3dc0 ffffffff811e0136 ffff8802e4f47100 00000000be0d3d98
[1540612.790533]  ffff8802a2642000 0000000000000010 ffff8802a2642010 ffff8802e4f47100
[1540612.791279]  ffff8802e4f47100 ffff880331616480 ffff88033161a700 0000000000000000
[1540612.792025] Call Trace:
[1540612.792767]  [<ffffffff811e0136>] kmem_cache_close+0x176/0x2f0
[1540612.793583]  [<ffffffff811e02c4>] __kmem_cache_shutdown+0x14/0x80
[1540612.794358]  [<ffffffff811a5e14>] kmem_cache_destroy+0x44/0xf0
[1540612.795134]  [<ffffffff811ee487>] kmem_cache_destroy_work_func+0x47/0x70
[1540612.795925]  [<ffffffff810a845b>] process_one_work+0x17b/0x470
[1540612.796703]  [<ffffffff810a9296>] worker_thread+0x126/0x410
[1540612.797484]  [<ffffffff810a9170>] ? rescuer_thread+0x460/0x460
[1540612.798285]  [<ffffffff810b0a4f>] kthread+0xcf/0xe0
[1540612.799076]  [<ffffffff810b0980>] ? kthread_create_on_node+0x140/0x140
[1540612.799885]  [<ffffffff81697658>] ret_from_fork+0x58/0x90
[1540612.800661]  [<ffffffff810b0980>] ? kthread_create_on_node+0x140/0x140
[1540612.801418] Code: 49 c1 f9 06 48 89 e5 49 c1 e1 0c 49 01 c1 48 85 c9 74 2a 66 0f 1f 84 00 00 00 00 00 48 63 77 18 48 89 c8 4c 29 c8 48 99 48 f7 fe <f0> 41 0f ab 00 48 63 47 20 48 8b 0c 01 48 85 c9 75 df 5d c3 0f 
[1540612.803013] RIP  [<ffffffff811d8eff>] get_map+0x4f/0x70
[1540612.803819]  RSP <ffff8801be0d3d60>
[1540612.804603] CR2: fffffffff6d3cc10
  • The following slab error appeared in kernel log just before the crash:
[1540612.771604] INFO: Object 0xffff88001322ce40 @offset=2096704
[1540612.771730] INFO: Object 0xffff88001322ce80 @offset=2096768
[1540612.771874] INFO: Object 0xffff88001322cec0 @offset=2096832
[1540612.772042] INFO: Object 0xffff88001322cf00 @offset=2096896
[1540612.772215] INFO: Object 0xffff88001322cf40 @offset=2096960
[1540612.772372] INFO: Object 0xffff88001322cf80 @offset=2097024
[1540612.772502] =============================================================================
[1540612.772655] BUG kmalloc-64(73:70b53faef9eeec538ce03b76938424a9a4c10769a2028e04229c36bb94d345d6) (Tainted: P    B      OE  ------------ T): Objects remaining in kmalloc-64(73:70b53faef9eeec538ce03b76938424a9a4c10769a2028e04229c36bb94d345d6
[1540612.773068] -----------------------------------------------------------------------------

[1540612.773559] INFO: Slab 0xffff88033161a020 objects=0 used=31 fp=0x000000ba0000005d flags=0x0000
[1540612.773815] CPU: 0 PID: 86151 Comm: kworker/0:7 Tainted: P    B      OE  ------------ T 3.10.0-514.26.2.el7.x86_64 #1
[1540612.773817] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
[1540612.773822] Workqueue: events kmem_cache_destroy_work_func
[1540612.773823]  ffff88033161a020 00000000d7d7a506 ffff8801be0d3c88 ffffffff81687033
[1540612.773825]  ffff8801be0d3d60 ffffffff811da714 ffff880300000020 ffff8801be0d3d70
[1540612.773827]  ffff8801be0d3d20 656a624f818df938 616d657220737463 6e6920676e696e69
[1540612.773828] Call Trace:
[1540612.773833]  [<ffffffff81687033>] dump_stack+0x19/0x1b
[1540612.773836]  [<ffffffff811da714>] slab_err+0xb4/0xe0
[1540612.773839]  [<ffffffff811dd84e>] ? __kmalloc+0x2e/0x240
[1540612.773840]  [<ffffffff811e01a5>] ? kmem_cache_close+0x1e5/0x2f0
[1540612.773841]  [<ffffffff811e010c>] kmem_cache_close+0x14c/0x2f0
[1540612.773843]  [<ffffffff811e02c4>] __kmem_cache_shutdown+0x14/0x80
[1540612.773847]  [<ffffffff811a5e14>] kmem_cache_destroy+0x44/0xf0
[1540612.773848]  [<ffffffff811ee487>] kmem_cache_destroy_work_func+0x47/0x70
[1540612.773851]  [<ffffffff810a845b>] process_one_work+0x17b/0x470
[1540612.773853]  [<ffffffff810a9296>] worker_thread+0x126/0x410
[1540612.773854]  [<ffffffff810a9170>] ? rescuer_thread+0x460/0x460
[1540612.773857]  [<ffffffff810b0a4f>] kthread+0xcf/0xe0
[1540612.773859]  [<ffffffff810b0980>] ? kthread_create_on_node+0x140/0x140
[1540612.773861]  [<ffffffff81697658>] ret_from_fork+0x58/0x90
[1540612.773863]  [<ffffffff810b0980>] ? kthread_create_on_node+0x140/0x140

Environment

  • Red Hat Enterprise Linux 7
  • 3rd parth "SolarFlare" modules installed and loaded
NAME                     TAINTS
falcon_lsm_pinned_14611  E
falcon_lsm_pinned_14713  E
falcon_kal               E
falcon_lsm_pinned_14812  E
falcon_nf_netcontain     PE
tmhook                   OE
falcon_lsm_serviceable   PE

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content