kernel panic in the __slab_free () function due to involvement of third party module [veeamsnap]

Solution Unverified - Updated -

Issue

  • Kernel crash with the following messages:
[11059117.770339] kernel BUG at mm/slub.c:380!
[11059117.772086] invalid opcode: 0000 [#1] SMP PTI
[11059117.772200] CPU: 9 PID: 2005695 Comm: snapshot operat Kdump: loaded Tainted: P           OE     -------- -  - 4.18.0-553.8.1.el8_10.x86_64 #1
[11059117.772374] Hardware name: oVirt oVirt Node, BIOS 1.11.0-2.el7 04/01/2014
[11059117.772472] RIP: 0010:__slab_free+0x19b/0x340
[11059117.772564] Code: 1f 44 00 00 eb 9c 41 f7 46 08 00 0d 21 00 0f 85 16 ff ff ff 4d 85 ed 0f 85 0d ff ff ff 80 4c 24 5b 80 45 31 ff e9 57 ff ff ff <0f> 0b 49 3b 54 24 28 75 c4 
49 89 5c 24 20 49 89 4c 24 28 49 0f ba
[11059117.772791] RSP: 0018:ffff9f714a87fb50 EFLAGS: 00010246
[11059117.772928] RAX: ffff944d47578880 RBX: ffff944d47578800 RCX: ffff944d47578800
[11059117.773052] RDX: 000000008020001a RSI: fffff74da61d5e00 RDI: ffff9444c0004fc0
[11059117.773175] RBP: ffff9f714a87fbf0 R08: 0000000000000001 R09: ffffffffc08585da
[11059117.773320] R10: ffff944d47578800 R11: 000000000000000a R12: fffff74da61d5e00
[11059117.773449] R13: ffff944d47578800 R14: ffff9444c0004fc0 R15: 000000000fd0000a
[11059117.773578] FS:  00007fefdf7fe700(0000) GS:ffff9455b7c40000(0000) knlGS:0000000000000000
[11059117.773716] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[11059117.773850] CR2: 00007ff008048670 CR3: 000000110744e002 CR4: 00000000003706e0
[11059117.774011] Call Trace:
[11059117.774147]  ? __die_body+0x1a/0x60
[11059117.774291]  ? die+0x2a/0x50
[11059117.774428]  ? do_trap+0xe7/0x110
[11059117.774569]  ? __slab_free+0x19b/0x340
[11059117.774712]  ? do_invalid_op+0x36/0x40
[11059117.774855]  ? __slab_free+0x19b/0x340
[11059117.775006]  ? invalid_op+0x14/0x20
[11059117.775166]  ? _defer_io_destroy.part.5+0x7a/0xa0 [veeamsnap]
[11059117.775348]  ? __slab_free+0x19b/0x340
[11059117.775499]  ? x2apic_send_IPI+0x46/0x50
[11059117.775652]  ? ttwu_queue_wakelist+0xf2/0x110
[11059117.775809]  ? _defer_io_destroy.part.5+0x7a/0xa0 [veeamsnap]
[11059117.775989]  kfree+0x22e/0x250
[11059117.776147]  _defer_io_destroy.part.5+0x7a/0xa0 [veeamsnap]
[11059117.776322]  _tracker_capture_snapshot+0x137/0x140 [veeamsnap]
[11059117.776504]  tracker_capture_snapshot+0x46/0x290 [veeamsnap]
[11059117.776682]  snapshot_Create+0x17d/0x2a0 [veeamsnap]
[11059117.776876]  ioctl_snapshot_create+0x13a/0x1e0 [veeamsnap]
[11059117.777056]  ctrl_unlocked_ioctl+0x4e/0x60 [veeamsnap]
[11059117.777239]  do_vfs_ioctl+0xa4/0x690
[11059117.777414]  ? security_file_ioctl+0x32/0x50
[11059117.777595]  ksys_ioctl+0x64/0xa0
[11059117.777770]  ? down_read+0xe/0xa0
[11059117.777970]  __x64_sys_ioctl+0x16/0x20
[11059117.778153]  tmhook_invoke+0x4a/0xa0 [tmhook]
[11059117.778365]  tmhook_handler+0x1a7/0x210 [tmhook]
[11059117.778551]  ? do_syscall_64+0x5b/0x1b0
[11059117.778734]  ? tmhook_invoke+0xa0/0xa0 [tmhook]
[11059117.778949]  do_syscall_64+0x5b/0x1b0
[11059117.779136]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[11059117.779322] RIP: 0033:0x7ff0b255762b
[11059117.779516] Code: 0f 1e fa 48 8b 05 5d b8 2c 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 2d b8 2c 00 f7 d8 64 89 01 48
[11059117.779922] RSP: 002b:00007fefdf7fd598 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[11059117.780118] RAX: ffffffffffffffda RBX: 0000000003e58b60 RCX: 00007ff0b255762b
[11059117.780312] RDX: 00007fefdf7fd5e0 RSI: 0000000040145610 RDI: 0000000000000031
[11059117.780501] RBP: 00007fefdf7fd620 R08: 0000000000000000 R09: 0000000000000002
[11059117.780691] R10: 00007fffda1c9000 R11: 0000000000000246 R12: 0000000040145610
[11059117.780880] R13: 00007fefdf7fd5e0 R14: 00007fefdf7fd710 R15: 00007fefdf7fd730
[11059117.781063] Modules linked in: bmhook(OE) tmhook(OE) dsa_filter(POE) dsa_filter_hook(OE) tcp_diag udp_diag inet_diag ib_core veeamsnap(OE) nft_counter xt_comment nft_compat nf_tables nfnetlink sunrpc intel_rapl_msr intel_rapl_common crct10dif_pclmul crc32_pclmul ghash_clmulni_intel rapl virtio_balloon joydev pcspkr i2c_piix4 binfmt_misc ip_tables xfs libcrc32c sr_mod sd_mod cdrom t10_pi sg ata_generic bochs drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt drm_ttm_helper ttm drm ata_piix libata crc32c_intel virtio_net virtio_console serio_raw net_failover virtio_scsi failover dm_mirror dm_region_hash dm_log dm_mod [last unloaded: tmhook]
[11059117.782373] Red Hat flags: eBPF/LSM eBPF/rawtrace eBPF/event

Environment

  • Red Hat Enterprise Linux 8
  • Third-Party [veeamsnap] kernel module

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content