Kernel panic in function vxg_api_deinitlock() due to "BUG: unable to handle kernel NULL pointer dereference "

Solution Verified - Updated -

Issue

  • Kernel panic occurred at vxg_api_deinitlock() function due to 3rd party module [vxglm]
  • Kernel panics with following messages:
[109825.409206] BUG: unable to handle kernel NULL pointer dereference at 0000000000000378
[109825.409451] PGD 0 P4D 0 
[109825.409489] Oops: 0000 [#1] SMP PTI
[109825.409530] CPU: 4 PID: 18951 Comm: vx_glmlist_thre Kdump: loaded Tainted: P        W  OE     -------- -  - 4.18.0-553.50.1.el8_10.x86_64 #1
[109825.409660] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[109825.409774] RIP: 0010:vxg_api_deinitlock+0x4c/0x280 [vxglm]
[109825.409872] Code: 28 00 00 00 48 89 45 d0 31 c0 0f b6 47 5c 83 e8 61 48 98 48 8d 04 80 48 8b 1c c5 b8 96 9a c3 4c 8d 6b 58 65 8b 05 74 d3 6b 3c <48> 8b 93 78 03 00 00 48 98 48 c1 e0 07 48 01 c2 f0 ff 02 8b b3 8c
[109825.410061] RSP: 0018:ffffb9192a713da0 EFLAGS: 00010297
[109825.410115] RAX: 0000000000000004 RBX: 0000000000000000 RCX: 00000000001d001b
[109825.410190] RDX: ffff9f56c011e058 RSI: ffff9f5e4535dfc0 RDI: ffff9f620f7a2100
[109825.410265] RBP: ffffb9192a713de0 R08: 0000000000000001 R09: 0000000000000000
[109825.410339] R10: ffff9f581cb12e38 R11: ffff9f5e45309700 R12: ffff9f620f7a2100
[109825.410414] R13: 0000000000000058 R14: 0000000000000003 R15: ffff9f5e45309790
[109825.410489] FS:  0000000000000000(0000) GS:ffff9f73fdf00000(0000) knlGS:0000000000000000
[109825.410573] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[109825.410632] CR2: 0000000000000378 CR3: 0000000e63c10004 CR4: 00000000007706e0
[109825.410722] PKRU: 55555554
[109825.410752] Call Trace:
[109825.410808]  ? __die_body+0x1a/0x60
[109825.410882]  ? no_context+0x1ba/0x3f0
[109825.410937]  ? vxg_free+0x19/0xa0 [vxglm]
[109825.410985]  ? __bad_area_nosemaphore+0x157/0x180
[109825.411036]  ? do_page_fault+0x37/0x12d
[109825.411078]  ? page_fault+0x1e/0x30
[109825.411143]  ? vxg_api_deinitlock+0x4c/0x280 [vxglm]
[109825.411200]  vx_glm_deinitlock+0x1f/0x40 [vxfs]
[109825.411602]  vx_hlock_putdata+0x8ad/0x1170 [vxfs]
[109825.411714]  vx_glm_cbfunc+0xb0/0x140 [vxfs]
[109825.411821]  vx_glmlist_thread+0x17d/0x1d0 [vxfs]
[109825.411932]  ? vx_glm_cbfunc+0x140/0x140 [vxfs]
[109825.412041]  ? vx_osdep_deinit+0x1b0/0x1b0 [vxfs]
[109825.412155]  vx_kthread_init+0x22/0x30 [vxfs]
[109825.412285]  kthread+0x134/0x150
[109825.412339]  ? set_kthread_struct+0x50/0x50
[109825.412389]  ret_from_fork+0x1f/0x40
[109825.412441] Modules linked in: mptcp_diag xsk_diag vsock_diag raw_diag unix_diag af_packet_diag netlink_diag udp_diag tcp_diag inet_diag nfsd nfs_acl vxfen(POE) vxglm(POE) vxgms(POE) gab(POE) nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache dmpaa(POE) vxspec(POE) vxcafs(POE) vxportal(POE) fdd(POE) llt(POE) vxio(POE) vxdmp(POE) amf(POE) rdma_cm iw_cm ib_cm ib_core vxfs(POE) veki(POE) storageapi(OE) traps(OE) nft_counter ipt_REJECT nf_reject_ipv4 sunrpc vsock_loopback vmw_vsock_virtio_transport_common nft_compat nf_tables vmw_vsock_vmci_transport nfnetlink vsock intel_rapl_msr intel_rapl_common intel_uncore_frequency_common isst_if_mbox_msr isst_if_common nfit libnvdimm drm_ttm_helper crct10dif_pclmul ttm crc32_pclmul vmw_balloon ghash_clmulni_intel drm_kms_helper rapl syscopyarea sysfillrect sysimgblt drm joydev pcspkr vmw_vmci i2c_piix4 binfmt_misc xfs dm_thin_pool dm_persistent_data dm_bio_prison dm_bufio libcrc32c sr_mod cdrom ata_generic
[109825.412513]  sd_mod t10_pi sg crc32c_intel ata_piix libata serio_raw vmxnet3 vmw_pvscsi dm_mirror dm_region_hash dm_log dm_mod fuse
[109825.413528] CR2: 0000000000000378

Environment

  • Red Hat Enterprise Linux 8
  • A third party kernel [vxglm] module.

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content