Server was panicked with message "BUG: unable to handle kernel NULL pointer dereference at 00000000000007d0" due to third party kernel module mvfs
Issue
- System was panicked with below call trace.
[ 1290.073223] BUG: unable to handle kernel NULL pointer dereference at 00000000000007d0
[ 1290.073228] IP: [<ffffffff9af8b85c>] _raw_spin_lock+0xc/0x30
[ 1290.073238] PGD 0
[ 1290.073240] Oops: 0002 [#1] SMP
[ 1290.073242] Modules linked in: mvfs(OE) nfsv3 nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache falcon_lsm_pinned_11312(E) vmw_vsock_vmci_transport vsock sunrpc ext4 mbcache jbd2 sb_edac ppdev iosf_mbi crc32_pclmul vmw_balloon ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr joydev sg vmw_vmci i2c_piix4 parport_pc parport binfmt_misc ip_tables xfs libcrc32c ata_generic pata_acpi vmwgfx sd_mod crc_t10dif drm_kms_helper crct10dif_generic syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ahci crct10dif_pclmul crct10dif_common ata_piix libahci drm crc32c_intel libata serio_raw vmxnet3 vmw_pvscsi drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: falcon_kal]
[ 1290.073274] CPU: 1 PID: 23159 Comm: kworker/1:1 Kdump: loaded Tainted: P OE ------------ 3.10.0-1160.25.1.el7.x86_64 #1
[ 1290.073276] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
[ 1290.073290] Workqueue: events mdki_dw_callback [mvfs]
[ 1290.073291] task: ffff88a288de6300 ti: ffff889bff3d0000 task.ti: ffff889bff3d0000
[ 1290.073293] RIP: 0010:[<ffffffff9af8b85c>] [<ffffffff9af8b85c>] _raw_spin_lock+0xc/0x30
[ 1290.073296] RSP: 0018:ffff889bff3d3d00 EFLAGS: 00010246
[ 1290.073297] RAX: 0000000000000000 RBX: ffff889bff3d3e00 RCX: 00000000000001ff
[ 1290.073298] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 00000000000007d0
[ 1290.073299] RBP: ffff889bff3d3d88 R08: 000000000001f0a0 R09: 0000000000000001
[ 1290.073300] R10: ffff889bffc07b00 R11: 7fffffffffffffff R12: 0000000000005a77
[ 1290.073301] R13: ffff88a29d65a540 R14: 00000000000007d0 R15: 00000000000001f4
[ 1290.073302] FS: 0000000000000000(0000) GS:ffff88a29d640000(0000) knlGS:0000000000000000
[ 1290.073303] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1290.073304] CR2: 00000000000007d0 CR3: 0000000451210000 CR4: 00000000001607e0
[ 1290.073338] Call Trace:
[ 1290.073346] [<ffffffffc0903394>] ? mvfs_mythread_subr+0xa5/0x7e4 [mvfs]
[ 1290.073350] [<ffffffff9a8e61d1>] ? put_prev_entity+0x31/0x400
[ 1290.073352] [<ffffffff9a8e2499>] ? pick_next_entity+0xa9/0x190
[ 1290.073354] [<ffffffff9a8e273c>] ? set_next_entity+0x3c/0xe0
[ 1290.073359] [<ffffffffc0903ae1>] mvfs_mythread+0xe/0x10 [mvfs]
[ 1290.073367] [<ffffffffc0936ccf>] mvfs_linux_enter_fs+0x32/0x34 [mvfs]
[ 1290.073372] [<ffffffffc0902af7>] mvfs_enter_fs+0x11/0xfa [mvfs]
[ 1290.073379] [<ffffffffc09380bf>] mvfs_get_thread_ptr+0x1c/0x21 [mvfs]
[ 1290.073385] [<ffffffffc09454ae>] mdki_linux_init_call_data+0x1a/0x21 [mvfs]
[ 1290.073390] [<ffffffffc094550a>] mdki_dw_callback+0x25/0x7d [mvfs]
[ 1290.073395] [<ffffffff9a8bddcf>] process_one_work+0x17f/0x440
[ 1290.073397] [<ffffffff9a8beee6>] worker_thread+0x126/0x3c0
[ 1290.073399] [<ffffffff9a8bedc0>] ? manage_workers.isra.26+0x2a0/0x2a0
[ 1290.073401] [<ffffffff9a8c5da1>] kthread+0xd1/0xe0
[ 1290.073403] [<ffffffff9a8c5cd0>] ? insert_kthread_work+0x40/0x40
[ 1290.073408] [<ffffffff9af95df7>] ret_from_fork_nospec_begin+0x21/0x21
[ 1290.073410] [<ffffffff9a8c5cd0>] ? insert_kthread_work+0x40/0x40
[ 1290.073411] Code: 5d c3 0f 1f 44 00 00 85 d2 74 e4 0f 1f 40 00 eb ed 66 0f 1f 44 00 00 b8 01 00 00 00 5d c3 90 0f 1f 44 00 00 31 c0 ba 01 00 00 00 <f0> 0f b1 17 85 c0 75 01 c3 55 89 c6 48 89 e5 e8 da 18 ff ff 5d
[ 1290.073428] RIP [<ffffffff9af8b85c>] _raw_spin_lock+0xc/0x30
[ 1290.073430] RSP <ffff889bff3d3d00>
[ 1290.073431] CR2: 00000000000007d0
Environment
- Red Hat Enterprise Linux
- Third-party kernel module [mvfs]
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.