kernel panic in the __slab_free () function due to involvement of third party module [veeamsnap]
Issue
- Kernel crash with the following messages:
[11059117.770339] kernel BUG at mm/slub.c:380!
[11059117.772086] invalid opcode: 0000 [#1] SMP PTI
[11059117.772200] CPU: 9 PID: 2005695 Comm: snapshot operat Kdump: loaded Tainted: P OE -------- - - 4.18.0-553.8.1.el8_10.x86_64 #1
[11059117.772374] Hardware name: oVirt oVirt Node, BIOS 1.11.0-2.el7 04/01/2014
[11059117.772472] RIP: 0010:__slab_free+0x19b/0x340
[11059117.772564] Code: 1f 44 00 00 eb 9c 41 f7 46 08 00 0d 21 00 0f 85 16 ff ff ff 4d 85 ed 0f 85 0d ff ff ff 80 4c 24 5b 80 45 31 ff e9 57 ff ff ff <0f> 0b 49 3b 54 24 28 75 c4
49 89 5c 24 20 49 89 4c 24 28 49 0f ba
[11059117.772791] RSP: 0018:ffff9f714a87fb50 EFLAGS: 00010246
[11059117.772928] RAX: ffff944d47578880 RBX: ffff944d47578800 RCX: ffff944d47578800
[11059117.773052] RDX: 000000008020001a RSI: fffff74da61d5e00 RDI: ffff9444c0004fc0
[11059117.773175] RBP: ffff9f714a87fbf0 R08: 0000000000000001 R09: ffffffffc08585da
[11059117.773320] R10: ffff944d47578800 R11: 000000000000000a R12: fffff74da61d5e00
[11059117.773449] R13: ffff944d47578800 R14: ffff9444c0004fc0 R15: 000000000fd0000a
[11059117.773578] FS: 00007fefdf7fe700(0000) GS:ffff9455b7c40000(0000) knlGS:0000000000000000
[11059117.773716] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[11059117.773850] CR2: 00007ff008048670 CR3: 000000110744e002 CR4: 00000000003706e0
[11059117.774011] Call Trace:
[11059117.774147] ? __die_body+0x1a/0x60
[11059117.774291] ? die+0x2a/0x50
[11059117.774428] ? do_trap+0xe7/0x110
[11059117.774569] ? __slab_free+0x19b/0x340
[11059117.774712] ? do_invalid_op+0x36/0x40
[11059117.774855] ? __slab_free+0x19b/0x340
[11059117.775006] ? invalid_op+0x14/0x20
[11059117.775166] ? _defer_io_destroy.part.5+0x7a/0xa0 [veeamsnap]
[11059117.775348] ? __slab_free+0x19b/0x340
[11059117.775499] ? x2apic_send_IPI+0x46/0x50
[11059117.775652] ? ttwu_queue_wakelist+0xf2/0x110
[11059117.775809] ? _defer_io_destroy.part.5+0x7a/0xa0 [veeamsnap]
[11059117.775989] kfree+0x22e/0x250
[11059117.776147] _defer_io_destroy.part.5+0x7a/0xa0 [veeamsnap]
[11059117.776322] _tracker_capture_snapshot+0x137/0x140 [veeamsnap]
[11059117.776504] tracker_capture_snapshot+0x46/0x290 [veeamsnap]
[11059117.776682] snapshot_Create+0x17d/0x2a0 [veeamsnap]
[11059117.776876] ioctl_snapshot_create+0x13a/0x1e0 [veeamsnap]
[11059117.777056] ctrl_unlocked_ioctl+0x4e/0x60 [veeamsnap]
[11059117.777239] do_vfs_ioctl+0xa4/0x690
[11059117.777414] ? security_file_ioctl+0x32/0x50
[11059117.777595] ksys_ioctl+0x64/0xa0
[11059117.777770] ? down_read+0xe/0xa0
[11059117.777970] __x64_sys_ioctl+0x16/0x20
[11059117.778153] tmhook_invoke+0x4a/0xa0 [tmhook]
[11059117.778365] tmhook_handler+0x1a7/0x210 [tmhook]
[11059117.778551] ? do_syscall_64+0x5b/0x1b0
[11059117.778734] ? tmhook_invoke+0xa0/0xa0 [tmhook]
[11059117.778949] do_syscall_64+0x5b/0x1b0
[11059117.779136] entry_SYSCALL_64_after_hwframe+0x61/0xc6
[11059117.779322] RIP: 0033:0x7ff0b255762b
[11059117.779516] Code: 0f 1e fa 48 8b 05 5d b8 2c 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 2d b8 2c 00 f7 d8 64 89 01 48
[11059117.779922] RSP: 002b:00007fefdf7fd598 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[11059117.780118] RAX: ffffffffffffffda RBX: 0000000003e58b60 RCX: 00007ff0b255762b
[11059117.780312] RDX: 00007fefdf7fd5e0 RSI: 0000000040145610 RDI: 0000000000000031
[11059117.780501] RBP: 00007fefdf7fd620 R08: 0000000000000000 R09: 0000000000000002
[11059117.780691] R10: 00007fffda1c9000 R11: 0000000000000246 R12: 0000000040145610
[11059117.780880] R13: 00007fefdf7fd5e0 R14: 00007fefdf7fd710 R15: 00007fefdf7fd730
[11059117.781063] Modules linked in: bmhook(OE) tmhook(OE) dsa_filter(POE) dsa_filter_hook(OE) tcp_diag udp_diag inet_diag ib_core veeamsnap(OE) nft_counter xt_comment nft_compat nf_tables nfnetlink sunrpc intel_rapl_msr intel_rapl_common crct10dif_pclmul crc32_pclmul ghash_clmulni_intel rapl virtio_balloon joydev pcspkr i2c_piix4 binfmt_misc ip_tables xfs libcrc32c sr_mod sd_mod cdrom t10_pi sg ata_generic bochs drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt drm_ttm_helper ttm drm ata_piix libata crc32c_intel virtio_net virtio_console serio_raw net_failover virtio_scsi failover dm_mirror dm_region_hash dm_log dm_mod [last unloaded: tmhook]
[11059117.782373] Red Hat flags: eBPF/LSM eBPF/rawtrace eBPF/event
Environment
- Red Hat Enterprise Linux 8
- Third-Party [
veeamsnap] kernel module
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.