Kernel panic by handling NULL pointer at set_page_dirty_lock with ib_core module

Solution Unverified - Updated -

Issue

  • Kernel panic occurs with the following messages.
BUG: unable to handle kernel NULL pointer dereference at (null)
IP: [<ffffffff8112e12e>] set_page_dirty_lock+0x1e/0x60
PGD 8608cd067 PUD 765fba067 PMD 0 
Oops: 0002 [#1] SMP 
last sysfs file: /sys/devices/virtual/dmi/id/sys_vendor
CPU 11 
Modules linked in: nfsd exportfs autofs4 nfs lockd fscache auth_rpcgss nfs_acl sunrpc cpufreq_ondemand acpi_cpufreq freq_table mperf bonding 8021q garp stp llc rdma_ucm(U) ib_ucm(U) rdma_cm(U) iw_cm(U) ib_addr(U) ib_ipoib(U) ib_cm(U) ib_sa(U) ipv6 ib_uverbs(U) ib_umad(U) iw_nes(U) libcrc32c mlx4_ib(U) ib_mthca(U) ib_mad(U) ib_core(U) cdc_ether usbnet mii microcode sg i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support shpchp igb dca ptp pps_core mlx4_en(U) mlx4_core(U) ext4 mbcache jbd2 sd_mod crc_t10dif mpt2sas scsi_transport_sas raid_class wmi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]

Pid: 2803, comm: psolid.x Not tainted 2.6.32-358.el6.x86_64 #1 IBM  -[7912FT3]-/00AM524
RIP: 0010:[<ffffffff8112e12e>]  [<ffffffff8112e12e>] set_page_dirty_lock+0x1e/0x60
RSP: 0018:ffff880765f0dd88  EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000013
RDX: 0000000000000000 RSI: ffffea003495dcb8 RDI: 0000000000000000
RBP: ffff880765f0dd98 R08: e5c0000000000000 R09: 2e00000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff881066a56000
R13: ffff881067be4640 R14: ffff880873564000 R15: 0000000000000001
FS:  00007f7311092720(0000) GS:ffff88089c4c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000008667d5000 CR4: 00000000001407e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process psolid.x (pid: 2803, threadinfo ffff880765f0c000, task ffff880710a67540)
Stack:
 ffff8810715e3000 ffff881066a56000 ffff880765f0ddf8 ffffffffa01db566
<d> 0000000000000000 0000000000000013 ffff881067be4660 0100000000005b70
<d> ffff880765f0de08 ffff881067be4640 ffff881071f51d80 ffff881067be4740
Call Trace:
 [<ffffffffa01db566>] __ib_umem_release+0xd6/0x120 [ib_core]
 [<ffffffffa01db5e7>] ib_umem_release+0x37/0x100 [ib_core]
 [<ffffffffa0231242>] mlx4_ib_dereg_mr+0x32/0x50 [mlx4_ib]
 [<ffffffffa01d6e55>] ib_dereg_mr+0x35/0x50 [ib_core]
 [<ffffffffa027a1ab>] ib_uverbs_dereg_mr+0x7b/0xf0 [ib_uverbs]
 [<ffffffffa0274507>] ib_uverbs_write+0xb7/0xd0 [ib_uverbs]
 [<ffffffff81180e7d>] ? rw_verify_area+0x5d/0xc0
 [<ffffffff81180f98>] vfs_write+0xb8/0x1a0
 [<ffffffff81181891>] sys_write+0x51/0x90
 [<ffffffff810dc565>] ? __audit_syscall_exit+0x265/0x290
 [<ffffffff8100b072>] system_call_fastpath+0x16/0x1b
Code: ff ff c9 c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 48 83 ec 10 48 89 1c 24 4c 89 64 24 08 0f 1f 44 00 00 48 89 fb e8 42 ff 3d 00 <f0> 0f ba 2b 00 19 c0 85 c0 75 21 48 89 df e8 df e8 ff ff 48 89 
RIP  [<ffffffff8112e12e>] set_page_dirty_lock+0x1e/0x60
 RSP <ffff880765f0dd88>
CR2: 0000000000000000

Environment

  • Red Hat Enterprise Linux 6

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.