RHEL7 on VMware crashes with the following backtrace error: kernel BUG at drivers/net/vmxnet3/vmxnet3_drv.c:1372

Solution Verified - Updated -

Issue

  • RHEL 7.3 VMware guest crashes with the following backtrace:

    [2406727.448470] ------------[ cut here ]------------
    [2406727.448498] kernel BUG at drivers/net/vmxnet3/vmxnet3_drv.c:1372!
    [2406727.448516] invalid opcode: 0000 [#1] SMP 
    [2406727.448530] Modules linked in: oracleadvm(POE) oracleoks(POE) oracleafd(POE) nfsv3 rpcsec_gss_krb5 nfsv4 dns_resolver nfs fscache vmw_vsock_vmci_transport vsock ppdev vmw_balloon intel_powerclamp coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr sg parport_pc parport vmw_vmci i2c_piix4 shpchp nfsd auth_rpcgss nfs_acl lockd grace sunrpc binfmt_misc ip_tables ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic crct10dif_pclmul crct10dif_common crc32c_intel vmwgfx serio_raw drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm vmxnet3 drm ata_piix libata vmw_pvscsi i2c_core fjes dm_mirror dm_region_hash dm_log dm_mod
    [2406727.448782] CPU: 3 PID: 98000 Comm: ora_j003_iref03 Tainted: P           OE  ------------   3.10.0-514.6.2.el7.x86_64 #1
    [2406727.448814] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
    [2406727.448880] task: ffff88354d2fce70 ti: ffff882a76b6c000 task.ti: ffff882a76b6c000
    [2406727.448902] RIP: 0010:[<ffffffffa015a014>]  [<ffffffffa015a014>] vmxnet3_rq_rx_complete+0xb94/0xc10 [vmxnet3]
    [2406727.448942] RSP: 0000:ffff883f3d6c3d90  EFLAGS: 00010246
    [2406727.449532] RAX: 0000000000000001 RBX: ffff883629ae1538 RCX: 0000000000000000
    [2406727.449551] RDX: 00000000000005f2 RSI: 00000000000005f2 RDI: ffff8834f16e2a00
    [2406727.449569] RBP: ffff883f3d6c3df8 R08: 0000000000000000 R09: 0000000000000000
    [2406727.449588] R10: ffff88361fb60910 R11: ffff88361bbb4d98 R12: ffff883629ae08c0
    [2406727.449606] R13: ffff883629ae1440 R14: ffff880096bbc300 R15: ffff88361f28cde0
    [2406727.449625] FS:  00007ffff7fe3280(0000) GS:ffff883f3d6c0000(0000) knlGS:0000000000000000
    [2406727.449646] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    [2406727.449662] CR2: 00007fffd00156d0 CR3: 00000034c4277000 CR4: 00000000001407e0
    [2406727.449716] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    [2406727.449747] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
    [2406727.449781] Stack:
    [2406727.449788]  ffff883629ae1460 ffff88361bbb4d98 ffff88361fb60910 0000002f7523d340
    [2406727.449810]  0000000000000000 0000004000010000 ffff883629ae1500 0000009100000000
    [2406727.449832]  ffff883629ae08c0 ffff883629ae1460 0000000000000040 ffff883629ae1440
    [2406727.449855] Call Trace:
    [2406727.449862]  <IRQ> 
    [2406727.449873] 
    [2406727.449880]  [<ffffffffa015a53a>] vmxnet3_poll_rx_only+0x3a/0xb0 [vmxnet3]
    [2406727.449904]  [<ffffffff815702d0>] net_rx_action+0x170/0x380
    [2406727.449924]  [<ffffffff8108f21f>] __do_softirq+0xef/0x280
    [2406727.449944]  [<ffffffff8169825c>] call_softirq+0x1c/0x30
    [2406727.449963]  [<ffffffff8102d365>] do_softirq+0x65/0xa0
    [2406727.449980]  [<ffffffff8108f5b5>] irq_exit+0x115/0x120
    [2406727.450000]  [<ffffffff81698df8>] do_IRQ+0x58/0xf0
    [2406727.450022]  [<ffffffff8168df6d>] common_interrupt+0x6d/0x6d
    [2406727.450039]  <EOI> 
    [2406727.450048] 
    [2406727.450056]  [<ffffffff816968eb>] ? sysret_audit+0x17/0x21
    [2406727.450068] Code: b0 e8 91 23 1e e1 44 8b 4d b0 e9 41 f7 ff ff 0f 0b 0f 0b 31 c0 e9 08 f8 ff ff 0f 0b 41 3b 95 6c 01 00 00 0f 84 fc f4 ff     ff 0f 0b <0f> 0b 0f 0b 0f 0b 0f 0b 0f 0b 41 f6 47 09 40 0f 84 7c f5 ff ff 
    [2406727.450174] RIP  [<ffffffffa015a014>] vmxnet3_rq_rx_complete+0xb94/0xc10 [vmxnet3]
    [2406727.450199]  RSP <ffff883f3d6c3d90>
    

Environment

  • Red Hat Enterprise Linux 7
  • VMware virtualization
  • vmxnet3 NIC

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content