While running sosreport or running systool command, the system crashes after calling qla2x00_sysfs_read_optrom

Solution Verified - Updated -

Issue

  • While running SOSreport or systool command, the system crashes with messages printed similar to:
BUG: unable to handle kernel NULL pointer dereference at (null)
IP: [<ffffffff812a836b>] memcpy+0xb/0x120
PGD 0 
Oops: 0000 [#1] SMP 
last sysfs file: /sys/devices/pci0000:40/0000:40:03.0/0000:42:00.1/host8/bsg/fc_host8/dev
CPU 0 
...
Pid: 58050, comm: udevadm Not tainted 2.6.32-696.6.3.el6.x86_64 #1 Dell Inc. PowerEdge R620/0KCKR5
RIP: 0010:[<ffffffff812a836b>]  [<ffffffff812a836b>] memcpy+0xb/0x120
RSP: 0018:ffff881859237e10  EFLAGS: 00010246
RAX: ffff881858f02000 RBX: ffff881859237e50 RCX: 0000000000000200
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff881858f02000
RBP: ffff881859237e38 R08: 0000000000080000 R09: 00000000ffffffff
R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000001000
R13: 0000000000001000 R14: ffff8838534b3000 R15: ffff881859a10840
FS:  00007ffff7fc97a0(0000) GS:ffff880028200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000000000 CR3: 0000001858dc2000 CR4: 00000000000407f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process udevadm (pid: 58050, threadinfo ffff881859234000, task ffff8818567f7520)
Stack:
 ffffffff811c35a0 ffff881859237e38 ffff881858f02000 ffff8838534b35c8
<d> 0000000000001000 ffff881859237e78 ffffffffa00d2f44 00000000ffffff9c
<d> 0000000000000000 ffff881829c7adc0 ffff881859237f48 00007fffffffc510
Call Trace:
 [<ffffffff811c35a0>] ? memory_read_from_buffer+0x50/0x70
 [<ffffffffa00d2f44>] qla2x00_sysfs_read_optrom+0x94/0xc0 [qla2xxx]
 [<ffffffff8121a796>] read+0x126/0x210
 [<ffffffff8119a675>] vfs_read+0xb5/0x1a0
 [<ffffffff8119b426>] ? fget_light_pos+0x16/0x50
 [<ffffffff8119a9c1>] sys_read+0x51/0xb0
 [<ffffffff810ee4ce>] ? __audit_syscall_exit+0x25e/0x290
 [<ffffffff8100b0d2>] system_call_fastpath+0x16/0x1b
Code: 49 89 70 50 19 c0 49 89 70 58 41 c6 40 4c 04 83 e0 fc 83 c0 08 41 88 40 4d c9 c3 90 90 90 90 90 48 89 f8 89 d1 c1 e9 03 83 e2 07 <f3> 48 a5 89 d1 f3 a4 c3 20 48 83 ea 20 4c 8b 06 4c 8b 4e 08 4c 
RIP  [<ffffffff812a836b>] memcpy+0xb/0x120
 RSP <ffff881859237e10>
CR2: 0000000000000000

Environment

  • Red Hat Enterprise Linux
    • RHEL 7 with kernel versions older than kernel-3.10.0-693.el7
    • RHEL 6 with kernel versions older than kernel-2.6.32-754.el6
  • Qlogic FC HBAs (controlled by qla2xxx driver)

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content