A GFS2 filesystem triggers the following message that leads to a panic "list_add corruption. next->prev should be prev"
Issue
- A
GFS2filesystem triggers the following message that leads to a paniclist_add corruption. next->prev should be prev
Jan 28 15:33:52 node42 kernel: GFS2: fsid=HOME:Home.0: quota exceeded for user 2146
Jan 28 15:34:01 node42 kernel: ------------[ cut here ]------------
Jan 28 15:34:01 node42 kernel: WARNING: at lib/list_debug.c:26 __list_add+0x6d/0xa0() (Not tainted)
Jan 28 15:34:01 node42 kernel: Hardware name: S5520UR
Jan 28 15:34:01 node42 kernel: list_add corruption. next->prev should be prev (ffff880b6174a8d0), but was ffff8809b9930c70. (next=ffff8809b9930c70).
Jan 28 15:34:01 node42 kernel: Modules linked in: gfs2 dlm configfs bonding 8021q garp stp llc ipt_REJECT nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack iptable_filter ip_tables ip6_tables ipv6 nfsd lockd nfs_acl auth_rpcgss exportfs sunrpc dm_round_robin dm_multipath iTCO_wdt iTCO_vendor_support i2c_i801 lpc_ich mfd_core ioatdma i7core_edac edac_core ipmi_devintf sg igb dca i2c_algo_bit i2c_core ptp pps_core ext4 jbd2 mbcache sr_mod cdrom sd_mod crc_t10dif usb_storage pata_acpi ata_generic ata_piix mptsas mptscsih mptbase scsi_transport_sas qla2xxx scsi_transport_fc scsi_tgt dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
Jan 28 15:34:01 node42 kernel: Pid: 10718, comm: nfsd Not tainted 2.6.32-431.3.1.el6.x86_64 #1
Jan 28 15:34:01 node42 kernel: Call Trace:
Jan 28 15:34:01 node42 kernel: [<ffffffff81071e27>] ? warn_slowpath_common+0x87/0xc0
Jan 28 15:34:01 node42 kernel: [<ffffffff81071f16>] ? warn_slowpath_fmt+0x46/0x50
Jan 28 15:34:01 node42 kernel: [<ffffffff812944ed>] ? __list_add+0x6d/0xa0
Jan 28 15:34:01 node42 kernel: [<ffffffff811a6c02>] ? new_inode+0x72/0xb0
Jan 28 15:34:01 node42 kernel: [<ffffffffa04585d5>] ? gfs2_create_inode+0x1b5/0x1150 [gfs2]
Jan 28 15:34:01 node42 kernel: [<ffffffffa0457986>] ? gfs2_glock_nq_init+0x16/0x40 [gfs2]
Jan 28 15:34:01 node42 kernel: [<ffffffffa0463cb0>] ? gfs2_create+0x30/0x40 [gfs2]
Jan 28 15:34:01 node42 kernel: [<ffffffff8122772f>] ? security_inode_create+0x1f/0x30
Jan 28 15:34:01 node42 kernel: [<ffffffff811983d6>] ? vfs_create+0xe6/0x110
Jan 28 15:34:01 node42 kernel: [<ffffffffa02d63d5>] ? nfsd_create_v3+0x3d5/0x530 [nfsd]
Jan 28 15:34:01 node42 kernel: [<ffffffffa02ddc13>] ? nfsd3_proc_create+0x123/0x1b0 [nfsd]
Jan 28 15:34:01 node42 kernel: [<ffffffffa02ce425>] ? nfsd_dispatch+0xe5/0x230 [nfsd]
Jan 28 15:34:01 node42 kernel: [<ffffffffa0265844>] ? svc_process_common+0x344/0x640 [sunrpc]
Jan 28 15:34:01 node42 kernel: [<ffffffff81065df0>] ? default_wake_function+0x0/0x20
Jan 28 15:34:01 node42 kernel: [<ffffffffa0265e80>] ? svc_process+0x110/0x160 [sunrpc]
Jan 28 15:34:01 node42 kernel: [<ffffffffa02ceb52>] ? nfsd+0xc2/0x160 [nfsd]
Jan 28 15:34:01 node42 kernel: [<ffffffffa02cea90>] ? nfsd+0x0/0x160 [nfsd]
Jan 28 15:34:01 node42 kernel: [<ffffffff8109af06>] ? kthread+0x96/0xa0
Jan 28 15:34:01 node42 kernel: [<ffffffff8100c20a>] ? child_rip+0xa/0x20
Jan 28 15:34:01 node42 kernel: [<ffffffff8109ae70>] ? kthread+0x0/0xa0
Jan 28 15:34:01 node42 kernel: [<ffffffff8100c200>] ? child_rip+0x0/0x20
Jan 28 15:34:01 node42 kernel: ---[ end trace 512c83876914fe71 ]---
Jan 28 15:34:22 node42 kernel: GFS2: fsid=HOME:Home.0: quota exceeded for user 2146
- A
GFS2filesystem triggers the following message that leads to a paniclist_add corruption. next->prev should be prev
------------[ cut here ]------------
WARNING: at lib/list_debug.c:26 __list_add+0x6d/0xa0() (Not tainted)
Hardware name: RHEV Hypervisor
list_add corruption. next->prev should be prev (ffff8801f6de60d0), but was ffff8801daf58bb0. (next=ffff8801daebc410).
Modules linked in: nfsd lockd nfs_acl exportfs autofs4 gfs2 dlm configfs rpcsec_gss_krb5 auth_rpcgss sunrpc ipv6 microcode virtio_balloon virtio_console virtio_net i2c_piix4 i2c_core sg ext4 jbd2 mbcache virtio_blk sr_mod cdrom virtio_pci virtio_ring virtio pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: speedstep_lib]
Pid: 29352, comm: cp_wrapper.sh Not tainted 2.6.32-431.11.2.el6.x86_64 #1
Call Trace:
[<ffffffff81071e27>] ? warn_slowpath_common+0x87/0xc0
[<ffffffff81071f16>] ? warn_slowpath_fmt+0x46/0x50
[<ffffffff8129470d>] ? __list_add+0x6d/0xa0
[<ffffffff811a6e54>] ? iget5_locked+0x154/0x1b0
[<ffffffffa0264600>] ? iget_set+0x0/0x30 [gfs2]
[<ffffffffa0264eeb>] ? gfs2_inode_lookup+0x5b/0x230 [gfs2]
[<ffffffffa02569eb>] ? gfs2_dirent_search+0x16b/0x1a0 [gfs2]
[<ffffffffa0256f0e>] ? gfs2_dir_search+0x5e/0x80 [gfs2]
[<ffffffffa02652ae>] ? gfs2_lookupi+0xde/0x1e0 [gfs2]
[<ffffffffa02628c8>] ? do_promote+0x208/0x330 [gfs2]
[<ffffffffa026531d>] ? gfs2_lookupi+0x14d/0x1e0 [gfs2]
[<ffffffffa0271d86>] ? gfs2_lookup+0x36/0xd0 [gfs2]
[<ffffffff811a3a2e>] ? d_alloc+0x13e/0x1b0
[<ffffffff81198b05>] ? do_lookup+0x1a5/0x230
[<ffffffff81198e90>] ? __link_path_walk+0x200/0xff0
[<ffffffff8114a83d>] ? handle_pte_fault+0x2cd/0xb00
[<ffffffff81199f3a>] ? path_walk+0x6a/0xe0
[<ffffffff8119a14b>] ? filename_lookup+0x6b/0xc0
[<ffffffff8119b277>] ? user_path_at+0x57/0xa0
[<ffffffff8104a98c>] ? __do_page_fault+0x1ec/0x480
[<ffffffff8109b68c>] ? remove_wait_queue+0x3c/0x50
[<ffffffff8118eac0>] ? vfs_fstatat+0x50/0xa0
[<ffffffff8118ec3b>] ? vfs_stat+0x1b/0x20
[<ffffffff8118ec64>] ? sys_newstat+0x24/0x50
[<ffffffff810e2057>] ? audit_syscall_entry+0x1d7/0x200
[<ffffffff8100b072>] ? system_call_fastpath+0x16/0x1b
Environment
- Red Hat Enterprise Linux Server 6 (with the High Availability and Resilient Storage Add Ons)
- A Global Filesystem 2(
GFS2)
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.