Server was panicked with message "BUG: unable to handle kernel NULL pointer dereference at 00000000000007d0" due to third party kernel module mvfs

Solution Unverified - Updated -

Issue

  • System was panicked with below call trace.
[ 1290.073223] BUG: unable to handle kernel NULL pointer dereference at 00000000000007d0
[ 1290.073228] IP: [<ffffffff9af8b85c>] _raw_spin_lock+0xc/0x30
[ 1290.073238] PGD 0 
[ 1290.073240] Oops: 0002 [#1] SMP 
[ 1290.073242] Modules linked in: mvfs(OE) nfsv3 nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache falcon_lsm_pinned_11312(E) vmw_vsock_vmci_transport vsock sunrpc ext4 mbcache jbd2 sb_edac ppdev iosf_mbi crc32_pclmul vmw_balloon ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr joydev sg vmw_vmci i2c_piix4 parport_pc parport binfmt_misc ip_tables xfs libcrc32c ata_generic pata_acpi vmwgfx sd_mod crc_t10dif drm_kms_helper crct10dif_generic syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ahci crct10dif_pclmul crct10dif_common ata_piix libahci drm crc32c_intel libata serio_raw vmxnet3 vmw_pvscsi drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: falcon_kal]
[ 1290.073274] CPU: 1 PID: 23159 Comm: kworker/1:1 Kdump: loaded Tainted: P           OE  ------------   3.10.0-1160.25.1.el7.x86_64 #1
[ 1290.073276] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
[ 1290.073290] Workqueue: events mdki_dw_callback [mvfs]
[ 1290.073291] task: ffff88a288de6300 ti: ffff889bff3d0000 task.ti: ffff889bff3d0000
[ 1290.073293] RIP: 0010:[<ffffffff9af8b85c>]  [<ffffffff9af8b85c>] _raw_spin_lock+0xc/0x30
[ 1290.073296] RSP: 0018:ffff889bff3d3d00  EFLAGS: 00010246
[ 1290.073297] RAX: 0000000000000000 RBX: ffff889bff3d3e00 RCX: 00000000000001ff
[ 1290.073298] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 00000000000007d0
[ 1290.073299] RBP: ffff889bff3d3d88 R08: 000000000001f0a0 R09: 0000000000000001
[ 1290.073300] R10: ffff889bffc07b00 R11: 7fffffffffffffff R12: 0000000000005a77
[ 1290.073301] R13: ffff88a29d65a540 R14: 00000000000007d0 R15: 00000000000001f4
[ 1290.073302] FS:  0000000000000000(0000) GS:ffff88a29d640000(0000) knlGS:0000000000000000
[ 1290.073303] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1290.073304] CR2: 00000000000007d0 CR3: 0000000451210000 CR4: 00000000001607e0
[ 1290.073338] Call Trace:
[ 1290.073346]  [<ffffffffc0903394>] ? mvfs_mythread_subr+0xa5/0x7e4 [mvfs]
[ 1290.073350]  [<ffffffff9a8e61d1>] ? put_prev_entity+0x31/0x400
[ 1290.073352]  [<ffffffff9a8e2499>] ? pick_next_entity+0xa9/0x190
[ 1290.073354]  [<ffffffff9a8e273c>] ? set_next_entity+0x3c/0xe0
[ 1290.073359]  [<ffffffffc0903ae1>] mvfs_mythread+0xe/0x10 [mvfs]
[ 1290.073367]  [<ffffffffc0936ccf>] mvfs_linux_enter_fs+0x32/0x34 [mvfs]
[ 1290.073372]  [<ffffffffc0902af7>] mvfs_enter_fs+0x11/0xfa [mvfs]
[ 1290.073379]  [<ffffffffc09380bf>] mvfs_get_thread_ptr+0x1c/0x21 [mvfs]
[ 1290.073385]  [<ffffffffc09454ae>] mdki_linux_init_call_data+0x1a/0x21 [mvfs]
[ 1290.073390]  [<ffffffffc094550a>] mdki_dw_callback+0x25/0x7d [mvfs]
[ 1290.073395]  [<ffffffff9a8bddcf>] process_one_work+0x17f/0x440
[ 1290.073397]  [<ffffffff9a8beee6>] worker_thread+0x126/0x3c0
[ 1290.073399]  [<ffffffff9a8bedc0>] ? manage_workers.isra.26+0x2a0/0x2a0
[ 1290.073401]  [<ffffffff9a8c5da1>] kthread+0xd1/0xe0
[ 1290.073403]  [<ffffffff9a8c5cd0>] ? insert_kthread_work+0x40/0x40
[ 1290.073408]  [<ffffffff9af95df7>] ret_from_fork_nospec_begin+0x21/0x21
[ 1290.073410]  [<ffffffff9a8c5cd0>] ? insert_kthread_work+0x40/0x40
[ 1290.073411] Code: 5d c3 0f 1f 44 00 00 85 d2 74 e4 0f 1f 40 00 eb ed 66 0f 1f 44 00 00 b8 01 00 00 00 5d c3 90 0f 1f 44 00 00 31 c0 ba 01 00 00 00 <f0> 0f b1 17 85 c0 75 01 c3 55 89 c6 48 89 e5 e8 da 18 ff ff 5d 
[ 1290.073428] RIP  [<ffffffff9af8b85c>] _raw_spin_lock+0xc/0x30
[ 1290.073430]  RSP <ffff889bff3d3d00>
[ 1290.073431] CR2: 00000000000007d0

Environment

  • Red Hat Enterprise Linux
  • Third-party kernel module [mvfs]

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content