System crash with "kernel BUG at block/blk-core.c:2771!"
Issue
- System crash with "kernel BUG at block/blk-core.c:2771!"
------------[ cut here ]------------
kernel BUG at block/blk-core.c:2771!
invalid opcode: 0000 [#1] SMP
[...]
[Tue May 28 19:41:24 EDT 2024] CPU: 51 PID: 121681 Comm: sftp-server Kdump: loaded Not tainted 3.10.0-1160.83.1.el7.x86_64 #1
[Tue May 28 19:41:24 EDT 2024] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[Tue May 28 19:41:24 EDT 2024] task: ffff8fa6d57d1080 ti: ffff8fa7a15d4000 task.ti: ffff8fa7a15d4000
[Tue May 28 19:41:24 EDT 2024] RIP: 0010:[<ffffffff8ed6b559>] [<ffffffff8ed6b559>] blk_start_request+0x49/0x50
[Tue May 28 19:41:24 EDT 2024] RSP: 0018:ffff8fa7a15d7748 EFLAGS: 00010002
[Tue May 28 19:41:24 EDT 2024] RAX: 0000000000000001 RBX: ffff8fa3d9c4b000 RCX: 0000000000000020
[Tue May 28 19:41:24 EDT 2024] RDX: 0000000000000000 RSI: 00000000f39328c8 RDI: ffff8fa3d9c4b000
[Tue May 28 19:41:24 EDT 2024] RBP: ffff8fa7a15d7750 R08: ffff8fa3d9c4b000 R09: ffff8fa7a15d75b8
[Tue May 28 19:41:24 EDT 2024] R10: ffff8fe1371a3400 R11: ffff8fa399ef5180 R12: ffff8fe139388800
[Tue May 28 19:41:24 EDT 2024] R13: ffff8fe137241380 R14: ffff8fa3d9c4b000 R15: 0000000000000000
[...]
[Tue May 28 19:41:24 EDT 2024] Call Trace:
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ef0c300>] scsi_request_fn+0x120/0x680
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ed68159>] __blk_run_queue+0x39/0x50
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ed6822a>] queue_unplugged+0x2a/0xa0
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ed6bc78>] blk_flush_plug_list+0x1d8/0x230
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ed6c0e4>] blk_finish_plug+0x14/0x50
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc088b814>] _xfs_buf_ioapply+0x334/0x460 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc088d465>] ? _xfs_buf_read+0x25/0x30 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc088d262>] __xfs_buf_submit+0x72/0x250 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc08bf2a9>] ? xfs_trans_read_buf_map+0xf9/0x2d0 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc088d465>] _xfs_buf_read+0x25/0x30 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc088d569>] xfs_buf_read_map+0xf9/0x160 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc08bf2a9>] xfs_trans_read_buf_map+0xf9/0x2d0 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc0869fab>] xfs_da_read_buf+0xdb/0x130 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc086a023>] xfs_da3_node_read+0x23/0x130 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc08adc67>] ? kmem_zone_alloc+0x97/0x130 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc086b322>] xfs_da3_node_lookup_int+0x72/0x350 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc08adc67>] ? kmem_zone_alloc+0x97/0x130 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc087759d>] xfs_dir2_node_lookup+0x4d/0x170 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc086e64d>] xfs_dir_lookup+0x1bd/0x1e0 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc08a0749>] xfs_lookup+0x69/0x140 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffffc089d458>] xfs_vn_lookup+0x78/0xc0 [xfs]
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec669a3>] lookup_real+0x23/0x60
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec673f2>] __lookup_hash+0x42/0x70
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8f1ae6fc>] lookup_slow+0x42/0xab
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec6b0ae>] path_lookupat+0x89e/0x8d0
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec357f5>] ? kmem_cache_alloc+0x35/0x1f0
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec6dcbf>] ? getname_flags+0x4f/0x1a0
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec6b10b>] filename_lookup+0x2b/0xd0
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec6ee87>] user_path_at_empty+0x67/0xc0
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec618b5>] ? cp_new_stat+0x165/0x1a0
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec6eef1>] user_path_at+0x11/0x20
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec61523>] vfs_fstatat+0x63/0xd0
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec61981>] SYSC_newlstat+0x31/0x70
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8eb467e6>] ? __audit_syscall_exit+0x1f6/0x2b0
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8ec61e4e>] SyS_newlstat+0xe/0x20
[Tue May 28 19:41:24 EDT 2024] [<ffffffff8f1c539a>] system_call_fastpath+0x25/0x2a
[...]
[Tue May 28 19:41:24 EDT 2024] RIP [<ffffffff8ed6b559>] blk_start_request+0x49/0x50
[Tue May 28 19:41:24 EDT 2024] RSP <ffff8fa7a15d7748>
- System crash with "kernel BUG at block/blk-core.c:2770!" in kernel
3.10.0-1127.18.2.el7
[1869141.853819] ------------[ cut here ]------------
[1869141.856041] kernel BUG at block/blk-core.c:2770!
[1869141.857791] invalid opcode: 0000 [#1] SMP
[1869141.859257] Modules linked in: binfmt_misc nfsv3 nfs fscache ipt_REJECT nf_reject_ipv4 nf_log_ipv4 nf_log_common xt_LOG xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc iptable_nat nf
_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6_tables iptable_filter vmw_vsock_vmci_transport vsock iosf_mbi crc32_pclmul g
hash_clmulni_intel aesni_intel lrw ppdev gf128mul glue_helper ablk_helper cryptd vmw_balloon sg joydev pcspkr vmw_vmci i2c_piix4 nfit parport_pc libnvdimm parport nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_t
ables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ahci sd_mod crc_t10dif ata_piix libahci crct10dif_generic
[1869141.865858] crct10dif_pclmul drm crct10dif_common libata crc32c_intel serio_raw vmw_pvscsi vmxnet3 drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod
[1869141.868444] CPU: 1 PID: 27094 Comm: wget Kdump: loaded Not tainted 3.10.0-1127.18.2.el7.x86_64 #1
[1869141.869722] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[1869141.870993] task: ffffa1463bd220e0 ti: ffffa1465fb30000 task.ti: ffffa1465fb30000
[1869141.872276] RIP: 0010:[<ffffffffb5155975>] [<ffffffffb5155975>] blk_start_request+0x45/0x50
[1869141.873531] RSP: 0018:ffffa1465fb33788 EFLAGS: 00010002
[1869141.874764] RAX: 0000000000000001 RBX: ffffa146b71dd200 RCX: 0000000000000020
[1869141.875988] RDX: 0000000000000000 RSI: 00000000c20e08f2 RDI: ffffa146b71dd200
[1869141.877180] RBP: ffffa1465fb33790 R08: ffffa146b71dd200 R09: 0000000000000000
[1869141.878371] R10: ffffa14635f00000 R11: ffffa1465fb0c540 R12: ffffa14734b56800
[1869141.879526] R13: ffffa14634cb0000 R14: ffffa146b71dd200 R15: 0000000000000000
[1869141.880670] FS: 00007f9cb6f50880(0000) GS:ffffa1473fc80000(0000) knlGS:0000000000000000
[1869141.881793] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1869141.882899] CR2: 00007fd711146c00 CR3: 00000000a4d4c000 CR4: 00000000003607e0
[1869141.884028] Call Trace:
[1869141.885110] [<ffffffffb52ebcf0>] scsi_request_fn+0x120/0x680
[1869141.886183] [<ffffffffb5152769>] __blk_run_queue+0x39/0x50
[1869141.887238] [<ffffffffb515282a>] queue_unplugged+0x2a/0xa0
[1869141.888252] [<ffffffffb5156068>] blk_flush_plug_list+0x1d8/0x230
[1869141.889251] [<ffffffffb51564d4>] blk_finish_plug+0x14/0x40
[1869141.890266] [<ffffffffc037f334>] _xfs_buf_ioapply+0x334/0x460 [xfs]
[1869141.891252] [<ffffffffc0380ee5>] ? _xfs_buf_read+0x25/0x30 [xfs]
[1869141.892215] [<ffffffffc0380ce2>] __xfs_buf_submit+0x72/0x250 [xfs]
[1869141.893150] [<ffffffffc03b1d49>] ? xfs_trans_read_buf_map+0xe9/0x2c0 [xfs]
[1869141.894071] [<ffffffffc0380ee5>] _xfs_buf_read+0x25/0x30 [xfs]
[1869141.894966] [<ffffffffc0380fe9>] xfs_buf_read_map+0xf9/0x160 [xfs]
[1869141.895849] [<ffffffffc03b1d49>] xfs_trans_read_buf_map+0xe9/0x2c0 [xfs]
[1869141.896699] [<ffffffffc0374cde>] xfs_imap_to_bp+0x6e/0xe0 [xfs]
[1869141.897527] [<ffffffffc03758de>] xfs_iread+0x7e/0x250 [xfs]
[1869141.898352] [<ffffffffc038a376>] xfs_iget+0x3d6/0x870 [xfs]
[1869141.899134] [<ffffffffc035d7a1>] ? xfs_da_state_free+0x21/0x30 [xfs]
[1869141.899898] [<ffffffffc036b6e5>] ? xfs_dir2_node_lookup+0xc5/0x170 [xfs]
[1869141.900652] [<ffffffffc0393c77>] xfs_lookup+0xf7/0x140 [xfs]
[1869141.901379] [<ffffffffc0390a08>] xfs_vn_lookup+0x78/0xc0 [xfs]
[1869141.902073] [<ffffffffb5057fd3>] lookup_real+0x23/0x60
[1869141.902752] [<ffffffffb50589f2>] __lookup_hash+0x42/0x60
[1869141.903407] [<ffffffffb557cb4f>] lookup_slow+0x42/0xa7
[1869141.904063] [<ffffffffb505c5ee>] path_lookupat+0x89e/0x8d0
[1869141.904672] [<ffffffffb50286f5>] ? kmem_cache_alloc+0x35/0x1f0
[1869141.905265] [<ffffffffb505f1bf>] ? getname_flags+0x4f/0x1a0
[1869141.905868] [<ffffffffb505c64b>] filename_lookup+0x2b/0xc0
[1869141.906459] [<ffffffffb5060357>] user_path_at_empty+0x67/0xc0
[1869141.907049] [<ffffffffb505f14d>] ? putname+0x3d/0x60
[1869141.907601] [<ffffffffb5052f85>] ? cp_new_stat+0x165/0x1a0
[1869141.908130] [<ffffffffb50603c1>] user_path_at+0x11/0x20
[1869141.908638] [<ffffffffb5052c33>] vfs_fstatat+0x63/0xc0
[1869141.909124] [<ffffffffb5052fee>] SYSC_newstat+0x2e/0x60
[1869141.909595] [<ffffffffb4f3efd6>] ? __audit_syscall_exit+0x1e6/0x280
[1869141.910041] [<ffffffffb50534ae>] SyS_newstat+0xe/0x10
[1869141.910478] [<ffffffffb5592ed2>] system_call_fastpath+0x25/0x2a
[1869141.910901] Code: 00 48 8b 83 78 01 00 00 48 85 c0 75 13 48 8b 43 58 a8 01 75 16 48 89 df e8 39 6e 00 00 5b 5d c3 8b 50 64 89 90 3c 01 00 00 eb e2 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 41
[1869141.911823] RIP [<ffffffffb5155975>] blk_start_request+0x45/0x50
[1869141.912274] RSP <ffffa1465fb33788>
Environment
- Red Hat Enterprise Linux 7
- 3.10.0-1127.18.2.el7 and higher
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.