Kernel Panic in list_del() with general protection fault

Solution Unverified - Updated -

Issue

  • Kernel Panic in list_del() with general protection fault.

    lin_tape: IBMChgr0-----5_LLA changer_check_result sensekey: 5 asc: 83 ascq: 4
    lin_tape: IBMChgr0-----5_LLA changer_check_result sensekey: 5 asc: 83 ascq: 4
    ------------[ cut here ]------------
    WARNING: at lib/list_debug.c:48 list_del+0x6e/0xa0() (Not tainted)  <<---------------
    Hardware name: System x3550 M3 -[7944D2A]-
    list_del corruption. prev->next should be ffff88047ac8ff00, but was 3f3f3f3f3f3f3f3f
    Modules linked in: filepath(U) autofs4 nfs lockd fscache auth_rpcgss nfs_acl sunrpc lin_tape(U) cpufreq_ondemand acpi_cpufreq freq_table mperf bonding 8021q garp stp llc ipv6 vfat fat uinput stmp(U) pfo(U) osst bnx2 cdc_ether usbnet mii microcode serio_raw i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support ioatdma dca i7core_edac edac_core shpchp ext4 mbcache jbd2 dm_round_robin sr_mod cdrom sd_mod crc_t10dif pata_acpi ata_generic ata_piix bfa scsi_transport_fc scsi_tgt megaraid_sas dm_multipath dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
    Pid: 179, comm: kswapd1 Not tainted 2.6.32-358.el6.x86_64 #1
    Call Trace:
    [<ffffffff8106e2e7>] ? warn_slowpath_common+0x87/0xc0
    [<ffffffff8106e3d6>] ? warn_slowpath_fmt+0x46/0x50
    [<ffffffff81288dde>] ? list_del+0x6e/0xa0
    [<ffffffff81168d58>] ? free_block+0xc8/0x180
    [<ffffffff81168b96>] ? kmem_cache_free+0x246/0x2b0
    [<ffffffffa016e501>] ? ext4_destroy_inode+0x31/0xa0 [ext4]
    [<ffffffff8119cb4a>] ? __destroy_inode+0x2a/0xa0
    [<ffffffff8119cbef>] ? destroy_inode+0x2f/0x60
    [<ffffffff8119d077>] ? dispose_list+0xb7/0x120
    [<ffffffff8119d354>] ? shrink_icache_memory+0x274/0x2e0
    [<ffffffff81131e2a>] ? shrink_slab+0x12a/0x1a0
    [<ffffffff8113501a>] ? balance_pgdat+0x59a/0x820
    [<ffffffff811353d4>] ? kswapd+0x134/0x3c0
    [<ffffffff81096c80>] ? autoremove_wake_function+0x0/0x40
    [<ffffffff811352a0>] ? kswapd+0x0/0x3c0
    [<ffffffff81096916>] ? kthread+0x96/0xa0
    [<ffffffff8100c0ca>] ? child_rip+0xa/0x20
    [<ffffffff81096880>] ? kthread+0x0/0xa0
    [<ffffffff8100c0c0>] ? child_rip+0x0/0x20
    ---[ end trace 5fc4fdd75609baec ]---
    general protection fault: 0000 [#1] SMP   <<--------------
    last sysfs file: /sys/devices/pci0000:00/0000:00:07.0/0000:1a:00.0/host1/rport-1:0-1/target1:0:1/1:0:1:2/state
    CPU 14 
    Modules linked in: filepath(U) autofs4 nfs lockd fscache auth_rpcgss nfs_acl sunrpc lin_tape(U) cpufreq_ondemand acpi_cpufreq freq_table mperf bonding 8021q garp stp llc ipv6 vfat fat uinput stmp(U) pfo(U) osst bnx2 cdc_ether usbnet mii microcode serio_raw i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support ioatdma dca i7core_edac edac_core shpchp ext4 mbcache jbd2 dm_round_robin sr_mod cdrom sd_mod crc_t10dif pata_acpi ata_generic ata_piix bfa scsi_transport_fc scsi_tgt megaraid_sas dm_multipath dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
    
    Pid: 81, comm: events/14 Tainted: G        W  ---------------    2.6.32-358.el6.x86_64 #1 IBM System x3550 M3 -[7944D2A]-/00D4062
    RIP: 0010:[<ffffffff81288d80>]  [<ffffffff81288d80>] list_del+0x10/0xa0  <<-------------
    RSP: 0018:ffff88027cb1bd10  EFLAGS: 00010082
    RAX: 3f3f3f3f3f3f3f3f RBX: ffff88047ac8f6c0 RCX: 000000000000100d
    RDX: ffff88047bc5cac0 RSI: ffff88047bc5cae0 RDI: ffff88047ac8f6c0
    RBP: ffff88027cb1bd20 R08: ffff8802c80de680 R09: 0000000000000000
    R10: ffff880280076800 R11: 0000000000000000 R12: 000000000000002c
    R13: ffff880478637028 R14: 0000000000000002 R15: ffffea0000000000
    FS:  0000000000000000(0000) GS:ffff8802874c0000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
    CR2: 00000000004309ee CR3: 000000047bbe6000 CR4: 00000000000007e0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
    Process events/14 (pid: 81, threadinfo ffff88027cb1a000, task ffff88027cb12080)
    Stack:
    000000000000002c ffff880277e41ac0 ffff88027cb1bd80 ffffffff81168d58
    <d> ffff88047bc5cac0 ffff88047ac8f6c0 000000000000100d ffff8804368dec00
    <d> 0000000000000001 ffff880478637000 ffff880277e41ac0 000000000000002c
    Call Trace:
    [<ffffffff81168d58>] free_block+0xc8/0x180
    [<ffffffff81169041>] drain_array+0xc1/0x100
    [<ffffffff81169f60>] cache_reap+0xc0/0x250
    [<ffffffff8113b180>] ? vmstat_update+0x0/0x40
    [<ffffffff81169ea0>] ? cache_reap+0x0/0x250
    [<ffffffff81090ac0>] worker_thread+0x170/0x2a0
    [<ffffffff81096c80>] ? autoremove_wake_function+0x0/0x40
    [<ffffffff81090950>] ? worker_thread+0x0/0x2a0
    [<ffffffff81096916>] kthread+0x96/0xa0
    [<ffffffff8100c0ca>] child_rip+0xa/0x20
    [<ffffffff81096880>] ? kthread+0x0/0xa0
    [<ffffffff8100c0c0>] ? child_rip+0x0/0x20
    Code: 89 95 fc fe ff ff e9 ab fd ff ff 4c 8b ad e8 fe ff ff e9 db fd ff ff 90 90 90 90 55 48 89 e5 53 48 89 fb 48 83 ec 08 48 8b 47 08 <4c> 8b 00 4c 39 c7 75 39 48 8b 03 4c 8b 40 08 4c 39 c3 75 4c 48 
    RIP  [<ffffffff81288d80>] list_del+0x10/0xa0  <<------------
    

Environment

  • Red Hat Enterprise Linux 6

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content