kernel BUG at fs/locks.c:697!

Solution Unverified - Updated -

Issue

  • The kernel crashes in __locks_insert_block() with a message "kernel BUG at fs/locks.c:697!"
[153422.609117] kernel BUG at fs/locks.c:697!
[153422.613252] invalid opcode: 0000 [#1] SMP NOPTI
[153422.617893] CPU: 56 PID: 423555 Comm: nfsd Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-477.15.1.el8_8.x86_64 #1
[153422.629744] Hardware name: Dell Inc. PowerEdge R650/0TCW38, BIOS 1.10.2 03/03/2023
[153422.637417] RIP: 0010:__locks_insert_block+0xe2/0xf0
[153422.642487] Code: 48 85 d2 74 04 48 89 4a 08 48 89 0c c5 00 46 51 be 49 89 74 24 20 5b 5d 41 5c 41 5d 41 5e e9 45 75 a3 00 49 8b 44 24 48 eb aa <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 9
0 0f 1f 44 00 00 41 54 55
[153422.661379] RSP: 0018:ff82c714eff0f558 EFLAGS: 00010202
[153422.666713] RAX: ff3e0111604ba970 RBX: ff3e01118594e428 RCX: ffffffffbe514600
[153422.673953] RDX: 0000000000000001 RSI: ff3e01118594e428 RDI: ff3e0111604ba948
[153422.681191] RBP: ff3e01118594e450 R08: ff82c714eff0f530 R09: ff3e010a87a8e0d8
[153422.688426] R10: ff82c714eff0f9f0 R11: ff3e010f00e80000 R12: ff3e012c8b470070
[153422.695665] R13: 0000000000000001 R14: 000000000000000c R15: ff3e01217de1fc00
[153422.702899] FS:  0000000000000000(0000) GS:ff3e011f90700000(0000) knlGS:0000000000000000
[153422.711093] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[153422.716946] CR2: 0000557e58c4c138 CR3: 0000002509a10003 CR4: 0000000000771ee0
[153422.724188] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[153422.731422] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[153422.738659] PKRU: 55555554
[153422.741462] Call Trace:
[153422.744016]  posix_lock_inode+0x5cd/0x8a0
[153422.748136]  ? _Z5RetryP15KernelOperation12RecLockQueuePvij+0xcd0/0xcd0 [mmfs26]
[153422.755733]  cxiFcntlLock+0x2db/0x740 [mmfslinux]
[153422.760565]  ? _Z19getCifsOpenInstancePi+0x19/0x1f0 [mmfs26]
[153422.766389]  ? update_load_avg+0x7e/0x710
[153422.770503]  ? newidle_balance+0x279/0x3c0
[153422.774706]  ? update_load_avg+0x7e/0x710
[153422.778814]  ? __switch_to+0x10c/0x450
[153422.782669]  ? finish_task_switch+0x86/0x2e0
[153422.787039]  ? update_load_avg+0x7e/0x710
[153422.791160]  ? _Z9gpfsFcntlPvP13gpfsVfsData_tS_S_S_P9cxiNode_txP10cxiFlock_tiPFivEPmP10ext_cred_tP9MMFSVInfo+0x1496/0x2470 [mmfs26]
[153422.803180]  _Z9gpfsFcntlPvP13gpfsVfsData_tS_S_S_P9cxiNode_txP10cxiFlock_tiPFivEPmP10ext_cred_tP9MMFSVInfo+0x1496/0x2470 [mmfs26]
[153422.815002]  ? ipoib_hard_header+0x40/0x70 [ib_ipoib]
[153422.820165]  ? _Z5RetryP15KernelOperation12RecLockQueuePvij+0xcd0/0xcd0 [mmfs26]
[153422.827729]  ? down+0x12/0x50
[153422.830802]  ? _ZN15KernelOperationD1Ev+0x56/0xb0 [mmfs26]
[153422.836452]  ? _Z33gpfsIsCifsBypassTraversalCheckingv+0xa8/0xc0 [mmfs26]
[153422.843329]  gpfs_f_lock+0x412/0x600 [mmfslinux]
[153422.848072]  ? locks_alloc_lock+0x17/0x70
[153422.852447]  ? kmem_cache_alloc+0x13f/0x280
[153422.856951]  nfsd4_lock+0xde3/0xfe0 [nfsd]
[153422.861360]  nfsd4_proc_compound+0x30e/0x670 [nfsd]
[153422.866540]  nfsd_dispatch+0x15e/0x290 [nfsd]
[153422.871190]  svc_process_common+0x360/0x5c0 [sunrpc]
[153422.876467]  ? svc_sock_secure_port+0x12/0x40 [sunrpc]
[153422.881905]  ? nfsd_svc+0x2f0/0x2f0 [nfsd]
[153422.886290]  ? nfsd_shutdown_threads+0x80/0x80 [nfsd]
[153422.891626]  svc_process+0xb7/0xf0 [sunrpc]
[153422.896103]  nfsd+0xe3/0x140 [nfsd]
[153422.899867]  kthread+0x134/0x150
[153422.903359]  ? set_kthread_struct+0x50/0x50
[153422.907801]  ret_from_fork+0x1f/0x40

Environment

  • Red Hat Enterprise Linux 8

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content