The kernel crashes due to GPF happens in __list_add()

Solution Unverified - Updated -

Issue

  • The kernel crashed due to GPF happened in __list_add():
[307735.230352] general protection fault: 0000 [#1] SMP 
[307735.235516] Modules linked in: [...]
[307735.388619] CPU: 1 PID: 31036 Comm: find Kdump: loaded Tainted: P           OE  ------------   3.10.0-1160.76.1.el7.x86_64 #1
[307735.400001] Hardware name: Dell Inc. PowerEdge R750xs/0T0KGG, BIOS 1.9.2 11/17/2022
[307735.407746] task: ffff96aec8f090b0 ti: ffff96a5c32b8000 task.ti: ffff96a5c32b8000
[307735.415310] RIP: 0010:[<ffffffff909a649b>]  [<ffffffff909a649b>] __list_add+0x1b/0xc0
[307735.423254] RSP: 0018:ffff96a5c32bb418  EFLAGS: 00010046
[307735.428655] RAX: ffff96a5c32bb440 RBX: ffff96a5c32bb458 RCX: ffff96a5c32bbfd8
[307735.435881] RDX: ffff96a819f680b8 RSI: 00ff96a819f680b8 RDI: ffff96a5c32bb458
[307735.443101] RBP: ffff96a5c32bb430 R08: 00ff96a819f680b8 R09: ffff9691f3b00010
[307735.450321] R10: 0000000000000000 R11: 0000000000000f42 R12: ffff96a819f680b8
[307735.457541] R13: 00ff96a819f680b8 R14: ffff96aec8f090b0 R15: 0000000000000000
[307735.464761] FS:  00007fa4a040e840(0000) GS:ffff96b13f200000(0000) knlGS:0000000000000000
[307735.472932] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[307735.478763] CR2: 000000076f99b66b CR3: 000000360132e000 CR4: 0000000000760fe0
[307735.485986] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[307735.493205] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[307735.500425] PKRU: 55555554
[307735.503226] Call Trace:
[307735.505776]  [<ffffffff90d8c783>] wait_for_completion+0xd3/0x140
[307735.511876]  [<ffffffff906db2e0>] ? wake_up_state+0x20/0x20
[307735.517586]  [<ffffffffc13d0c99>] vx_bc_biowait+0x19/0x40 [vxfs]
[307735.523700]  [<ffffffffc11f8098>] vx_bread_bp+0x238/0x290 [vxfs]
[307735.529812]  [<ffffffffc11f8bc4>] vx_getblk_cmn+0x194/0x200 [vxfs]
[307735.536097]  [<ffffffffc11f8c88>] vx_getblk+0x28/0x30 [vxfs]
[307735.541883]  [<ffffffffc137d3f8>] vx_rdwrnomap+0x1a8/0x720 [vxfs]
[307735.548096]  [<ffffffffc137da33>] vx_kernread+0xc3/0xf0 [vxfs]
[307735.554030]  [<ffffffffc11de433>] vx_attr_indfind.isra.3+0xc3/0x2f0 [vxfs]
[307735.561009]  [<ffffffffc11de7dd>] vx_attr_find+0x17d/0x330 [vxfs]
[307735.567206]  [<ffffffffc11dea54>] vx_attr_kget+0xc4/0x440 [vxfs]
[307735.573330]  [<ffffffffc13548ed>] ? vx_rwsleep_rec_lock+0x7d/0x110 [vxfs]
[307735.580222]  [<ffffffffc11eb3fe>] vx_nxattr_read+0x5e/0xe0 [vxfs]
[307735.586436]  [<ffffffffc13e9600>] vx_linux_do_getxattr+0x320/0x470 [vxfs]
[307735.593311]  [<ffffffff90827d62>] ? ___slab_alloc+0x172/0x520
[307735.599984]  [<ffffffff90911a33>] ? inode_doinit_with_dentry+0x1d3/0x5b0
[307735.607556]  [<ffffffffc13cb5f2>] ? vx_alloc+0x152/0xc10 [vxfs]
[307735.614314]  [<ffffffffc13e981e>] vx_linux_getxattr_int+0xae/0x140 [vxfs]
[307735.621921]  [<ffffffffc13e98ed>] vx_linux_getxattr+0x3d/0x60 [vxfs]
[307735.629035]  [<ffffffff90911a6c>] inode_doinit_with_dentry+0x20c/0x5b0
[307735.636313]  [<ffffffff9091279c>] selinux_d_instantiate+0x1c/0x20
[307735.643139]  [<ffffffff90908451>] security_d_instantiate+0x21/0x40
[307735.650068]  [<ffffffffc13d8555>] vx_splice_alias_v2+0x225/0x2d0 [vxfs]
[307735.657418]  [<ffffffffc1363587>] ? vx_rddirahead_start+0xa7/0x240 [vxfs]
[307735.664926]  [<ffffffffc13ddd93>] vx_lookup+0x433/0x4b0 [vxfs]
[307735.671430]  [<ffffffff90869f78>] ? d_alloc+0x58/0x70
[307735.677132]  [<ffffffff90859023>] lookup_real+0x23/0x60
[307735.682992]  [<ffffffff90859a42>] __lookup_hash+0x42/0x60
[307735.689010]  [<ffffffff90d83175>] lookup_slow+0x42/0xa7
[307735.694833]  [<ffffffff9085d62e>] path_lookupat+0x89e/0x8d0
[307735.700988]  [<ffffffff9082917b>] ? kmem_cache_alloc+0x19b/0x1f0
[307735.707561]  [<ffffffff908601ff>] ? getname_flags+0x4f/0x1a0
[307735.713779]  [<ffffffff9085d68b>] filename_lookup+0x2b/0xc0
[307735.719898]  [<ffffffff90861397>] user_path_at_empty+0x67/0xc0
[307735.726271]  [<ffffffff908541a5>] ? cp_new_stat+0x165/0x1a0
[307735.732376]  [<ffffffff90861401>] user_path_at+0x11/0x20
[307735.738218]  [<ffffffff90853e53>] vfs_fstatat+0x63/0xc0
[307735.743973]  [<ffffffff908542c4>] SYSC_newfstatat+0x24/0x60
[307735.750074]  [<ffffffff9073ec56>] ? __audit_syscall_exit+0x1f6/0x2b0
[307735.756953]  [<ffffffff908546ee>] SyS_newfstatat+0xe/0x10
[307735.762875]  [<ffffffff90d99f92>] system_call_fastpath+0x25/0x2a
[307735.769397] Code: ff ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 55 48 89 e5 41 55 49 89 f5 41 54 49 89 d4 53 4c 8b 42 08 48 89 fb 49 39 f0 75 2a <4d> 8b 45 00 4d 39 c4 75 68 4c 39 e3 74 3e 4c 39 eb 74 39 49 89 
[307735.790859] RIP  [<ffffffff909a649b>] __list_add+0x1b/0xc0
[307735.796923]  RSP <ffff96a5c32bb418>

Environment

  • Red Hat Enterprise Linux 7.9.z - kernel-3.10.0-1160.76.1.el7
  • Many 3rd party modules (vxfs included) are installed and loaded.
NAME            TAINTS
veki            POE
vxportal        POE
fdd             POE
vxcafs          POE
amf             POE
vxspec          POE
dmpaa           POE
vxdmp           POE
gab             POE
vxodm           POE
vxglm           POE
vxfs            POE
llt             POE
vxio            POE
gc_enforcement  OE

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content