A GFS2 filesystem triggers the following message that leads to a panic "list_add corruption. next->prev should be prev"
Issue
- A
GFS2filesystem triggers the following message that leads to a paniclist_add corruption. next->prev should be prev
Jan 28 15:33:52 node42 kernel: GFS2: fsid=HOME:Home.0: quota exceeded for user 2146
Jan 28 15:34:01 node42 kernel: ------------[ cut here ]------------
Jan 28 15:34:01 node42 kernel: WARNING: at lib/list_debug.c:26 __list_add+0x6d/0xa0() (Not tainted)
Jan 28 15:34:01 node42 kernel: Hardware name: S5520UR
Jan 28 15:34:01 node42 kernel: list_add corruption. next->prev should be prev (ffff880b6174a8d0), but was ffff8809b9930c70. (next=ffff8809b9930c70).
Jan 28 15:34:01 node42 kernel: Modules linked in: gfs2 dlm configfs bonding 8021q garp stp llc ipt_REJECT nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack iptable_filter ip_tables ip6_tables ipv6 nfsd lockd nfs_acl auth_rpcgss exportfs sunrpc dm_round_robin dm_multipath iTCO_wdt iTCO_vendor_support i2c_i801 lpc_ich mfd_core ioatdma i7core_edac edac_core ipmi_devintf sg igb dca i2c_algo_bit i2c_core ptp pps_core ext4 jbd2 mbcache sr_mod cdrom sd_mod crc_t10dif usb_storage pata_acpi ata_generic ata_piix mptsas mptscsih mptbase scsi_transport_sas qla2xxx scsi_transport_fc scsi_tgt dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
Jan 28 15:34:01 node42 kernel: Pid: 10718, comm: nfsd Not tainted 2.6.32-431.3.1.el6.x86_64 #1
Jan 28 15:34:01 node42 kernel: Call Trace:
Jan 28 15:34:01 node42 kernel: [<ffffffff81071e27>] ? warn_slowpath_common+0x87/0xc0
Jan 28 15:34:01 node42 kernel: [<ffffffff81071f16>] ? warn_slowpath_fmt+0x46/0x50
Jan 28 15:34:01 node42 kernel: [<ffffffff812944ed>] ? __list_add+0x6d/0xa0
Jan 28 15:34:01 node42 kernel: [<ffffffff811a6c02>] ? new_inode+0x72/0xb0
Jan 28 15:34:01 node42 kernel: [<ffffffffa04585d5>] ? gfs2_create_inode+0x1b5/0x1150 [gfs2]
Jan 28 15:34:01 node42 kernel: [<ffffffffa0457986>] ? gfs2_glock_nq_init+0x16/0x40 [gfs2]
Jan 28 15:34:01 node42 kernel: [<ffffffffa0463cb0>] ? gfs2_create+0x30/0x40 [gfs2]
Jan 28 15:34:01 node42 kernel: [<ffffffff8122772f>] ? security_inode_create+0x1f/0x30
Jan 28 15:34:01 node42 kernel: [<ffffffff811983d6>] ? vfs_create+0xe6/0x110
Jan 28 15:34:01 node42 kernel: [<ffffffffa02d63d5>] ? nfsd_create_v3+0x3d5/0x530 [nfsd]
Jan 28 15:34:01 node42 kernel: [<ffffffffa02ddc13>] ? nfsd3_proc_create+0x123/0x1b0 [nfsd]
Jan 28 15:34:01 node42 kernel: [<ffffffffa02ce425>] ? nfsd_dispatch+0xe5/0x230 [nfsd]
Jan 28 15:34:01 node42 kernel: [<ffffffffa0265844>] ? svc_process_common+0x344/0x640 [sunrpc]
Jan 28 15:34:01 node42 kernel: [<ffffffff81065df0>] ? default_wake_function+0x0/0x20
Jan 28 15:34:01 node42 kernel: [<ffffffffa0265e80>] ? svc_process+0x110/0x160 [sunrpc]
Jan 28 15:34:01 node42 kernel: [<ffffffffa02ceb52>] ? nfsd+0xc2/0x160 [nfsd]
Jan 28 15:34:01 node42 kernel: [<ffffffffa02cea90>] ? nfsd+0x0/0x160 [nfsd]
Jan 28 15:34:01 node42 kernel: [<ffffffff8109af06>] ? kthread+0x96/0xa0
Jan 28 15:34:01 node42 kernel: [<ffffffff8100c20a>] ? child_rip+0xa/0x20
Jan 28 15:34:01 node42 kernel: [<ffffffff8109ae70>] ? kthread+0x0/0xa0
Jan 28 15:34:01 node42 kernel: [<ffffffff8100c200>] ? child_rip+0x0/0x20
Jan 28 15:34:01 node42 kernel: ---[ end trace 512c83876914fe71 ]---
Jan 28 15:34:22 node42 kernel: GFS2: fsid=HOME:Home.0: quota exceeded for user 2146
- A
GFS2filesystem triggers the following message that leads to a paniclist_add corruption. next->prev should be prev
------------[ cut here ]------------
WARNING: at lib/list_debug.c:26 __list_add+0x6d/0xa0() (Not tainted)
Hardware name: RHEV Hypervisor
list_add corruption. next->prev should be prev (ffff8801f6de60d0), but was ffff8801daf58bb0. (next=ffff8801daebc410).
Modules linked in: nfsd lockd nfs_acl exportfs autofs4 gfs2 dlm configfs rpcsec_gss_krb5 auth_rpcgss sunrpc ipv6 microcode virtio_balloon virtio_console virtio_net i2c_piix4 i2c_core sg ext4 jbd2 mbcache virtio_blk sr_mod cdrom virtio_pci virtio_ring virtio pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: speedstep_lib]
Pid: 29352, comm: cp_wrapper.sh Not tainted 2.6.32-431.11.2.el6.x86_64 #1
Call Trace:
[<ffffffff81071e27>] ? warn_slowpath_common+0x87/0xc0
[<ffffffff81071f16>] ? warn_slowpath_fmt+0x46/0x50
[<ffffffff8129470d>] ? __list_add+0x6d/0xa0
[<ffffffff811a6e54>] ? iget5_locked+0x154/0x1b0
[<ffffffffa0264600>] ? iget_set+0x0/0x30 [gfs2]
[<ffffffffa0264eeb>] ? gfs2_inode_lookup+0x5b/0x230 [gfs2]
[<ffffffffa02569eb>] ? gfs2_dirent_search+0x16b/0x1a0 [gfs2]
[<ffffffffa0256f0e>] ? gfs2_dir_search+0x5e/0x80 [gfs2]
[<ffffffffa02652ae>] ? gfs2_lookupi+0xde/0x1e0 [gfs2]
[<ffffffffa02628c8>] ? do_promote+0x208/0x330 [gfs2]
[<ffffffffa026531d>] ? gfs2_lookupi+0x14d/0x1e0 [gfs2]
[<ffffffffa0271d86>] ? gfs2_lookup+0x36/0xd0 [gfs2]
[<ffffffff811a3a2e>] ? d_alloc+0x13e/0x1b0
[<ffffffff81198b05>] ? do_lookup+0x1a5/0x230
[<ffffffff81198e90>] ? __link_path_walk+0x200/0xff0
[<ffffffff8114a83d>] ? handle_pte_fault+0x2cd/0xb00
[<ffffffff81199f3a>] ? path_walk+0x6a/0xe0
[<ffffffff8119a14b>] ? filename_lookup+0x6b/0xc0
[<ffffffff8119b277>] ? user_path_at+0x57/0xa0
[<ffffffff8104a98c>] ? __do_page_fault+0x1ec/0x480
[<ffffffff8109b68c>] ? remove_wait_queue+0x3c/0x50
[<ffffffff8118eac0>] ? vfs_fstatat+0x50/0xa0
[<ffffffff8118ec3b>] ? vfs_stat+0x1b/0x20
[<ffffffff8118ec64>] ? sys_newstat+0x24/0x50
[<ffffffff810e2057>] ? audit_syscall_entry+0x1d7/0x200
[<ffffffff8100b072>] ? system_call_fastpath+0x16/0x1b
Environment
- Red Hat Enterprise Linux Server 6 (with the High Availability and Resilient Storage Add Ons)
- A Global Filesystem 2(
GFS2)
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
