RHEL 5.10 server panic at ext4:ext4_file_open+0x61/0xf5

Solution In Progress - Updated -

Issue

  • RHEL 5 server panic with below backtrace:
JBD: barrier-based sync failed on dm-0-8 - disabling barriers
JBD: barrier-based sync failed on dm-1-8 - disabling barriers
symap_rh_ES_5_2.6.18_274.3.1.el5_x86_64: module license 'Proprietary' taints kernel.
GPL init module ... 

-------------------------------------------------------------
FILE-PROTECTOR-ENTERPRISE_RHEL-5-64_x86-64-nCPU_5.1.0.37
From Protegrity USA, Inc. http://www.protegrity.com
SN[vpd-marathon-05062014-001] Production version.
-------------------------------------------------------------
JBD: barrier-based sync failed on dm-5-8 - disabling barriers
Unable to handle kernel NULL pointer dereference at 0000000000000018 RIP: 
 [<ffffffff88055b19>] :ext4:ext4_file_open+0x61/0xf5
PGD 0 
Oops: 0000 [1] SMP 
last sysfs file: /devices/pci0000:00/0000:00:00.0/irq
CPU 0 
Modules linked in: nfs lockd nfs_acl sunrpc dfp_rc4(PU) dfp_des(PU) dfp_bf(PU) dfp_aes(PU) dfpmod(PU) dfpgplmod(U) symap_rh_ES_5_2.6.18_274.3.1.el5_x86_64(PU) symev_rh_ES_5_2.6.18_274.3.1.el5_x86_64(U) be2iscsi ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp bnx2i cnic ipv6 xfrm_nalgo crypto_api uio cxgb3i libcxgbi cxgb3 8021q libiscsi_tcp libiscsi2 scsi_transport_iscsi2 scsi_transport_iscsi vmsync(U) vsock(U) vmmemctl(U) acpiphp ext3 jbd dm_multipath scsi_dh video backlight sbs power_meter hwmon i2c_ec dell_wmi wmi button battery asus_acpi acpi_memhotplug ac lp sg floppy pcspkr i2c_piix4 i2c_core vmci(U) parport_pc parport tpm_tis ide_cd tpm serio_raw cdrom tpm_bios pvscsi(U) vmxnet3(U) vmxnet(U) dm_raid45 dm_message dm_region_hash dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod ata_piix libata shpchp mptsas mptscsih mptbase scsi_transport_sas sd_mod scsi_mod ext4 jbd2 crc16 uhci_hcd ohci_hcd ehci_hcd
Pid: 4594, comm: sftp-server Tainted: P     --------------------    2.6.18-371.el5 #1
RIP: 0010:[<ffffffff88055b19>]  [<ffffffff88055b19>] :ext4:ext4_file_open+0x61/0xf5
RSP: 0018:ffff8101d2591958  EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff81023df93680 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff81023df93680 RDI: ffff8101d25919a8
RBP: 0000000000000000 R08: 0000000000000000 R09: ffff81023df93680
R10: 0000000000000010 R11: 0000000000000000 R12: ffff8101d033fdf8
R13: ffff81023ddcb800 R14: ffff81023ddcb400 R15: ffff81023df93680
FS:  00002b1a84930ee0(0000) GS:ffffffff80436000(0000) knlGS:00000000c9eb3b90
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000000018 CR3: 00000001de1f1000 CR4: 00000000000006e0
Process sftp-server (pid: 4594, threadinfo ffff8101d2590000, task ffff8101d2592830)
Stack:  ffff8101d2591a28 ffff8101d2762100 0000000000000000 0000000000000000
 0000000000000000 0000000000000000 0000000000000000 0000000000000000
 0000000000000000 0000000000000000 0000000000000000 ffff81023df93680
Call Trace:
 [<ffffffff88055ab8>] :ext4:ext4_file_open+0x0/0xf5
 [<ffffffff8001efeb>] __dentry_open+0xd9/0x1dc
 [<ffffffff886f5a90>] :dfpmod:iread+0x168/0x300
 [<ffffffff88706c32>] :dfpmod:vext_check_tfe_mode+0x3c2/0x112c
 [<ffffffff8002d675>] wake_up_bit+0x11/0x22
 [<ffffffff8002d675>] wake_up_bit+0x11/0x22
 [<ffffffff8805eeee>] :ext4:ext4_iget+0x657/0x68b
 [<ffffffff800fd6f8>] inotify_d_instantiate+0x12/0x3c
 [<ffffffff88707ba9>] :dfpmod:create_vext+0x20d/0x21a
 [<ffffffff88062853>] :ext4:ext4_lookup+0x0/0xd8
 [<ffffffff88719c3c>] :dfpmod:my_lookup+0x1b8/0x774
 [<ffffffff8000d0de>] do_lookup+0x14a/0x24b
 [<ffffffff8000a2a3>] __link_path_walk+0x9f4/0xf39
 [<ffffffff8000eba2>] link_path_walk+0x45/0xb8
 [<ffffffff8000ce13>] do_path_lookup+0x294/0x311
 [<ffffffff8803b977>] :jbd2:do_get_write_access+0x3e3/0x418
 [<ffffffff886f502b>] :dfpmod:path_to_vp+0x3d/0xd0
 [<ffffffff8870b3f4>] :dfpmod:path_stat+0x48/0x45c
 [<ffffffff8871bb3f>] :dfpmod:vpd_sys_newlstat+0xa1/0x2b8
 [<ffffffff80013f14>] __mark_inode_dirty+0x15b/0x16e
 [<ffffffff80025eae>] filldir+0x0/0xb7
 [<ffffffff800356ce>] vfs_readdir+0x94/0xa9
 [<ffffffff800ba4f5>] audit_filter_syscall+0x87/0xad
 [<ffffffff800bb279>] audit_syscall_entry+0x1a8/0x1d3
 [<ffffffff8005d29e>] tracesys+0xd5/0xdf


Code: 48 8b 5d 18 48 85 db 74 15 8b 03 85 c0 75 0c 0f 0b 68 ca e6 
RIP  [<ffffffff88055b19>] :ext4:ext4_file_open+0x61/0xf5
 RSP <ffff8101d2591958>

Environment

  • Red Hat Enterprise Linux 5.10
  • Third party kernel module 'dfpmod' from Protegrity USA.

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.