System panicked in select_fallback_rq+0x50 due to stack overflow in XFS

Solution Unverified - Updated -

Issue

System panicked in select_fallback_rq():

BUG: unable to handle kernel paging request at fffffffde847dca0
IP: [<ffffffff81055750>] select_fallback_rq+0x50/0x100
PGD 1a87067 PUD 0 
Oops: 0000 [#1] SMP 
last sysfs file: /sys/devices/system/cpu/cpu31/cache/index2/shared_cpu_map
CPU 5 
Modules linked in: iptable_filter ip_tables xt_iprange bridge stp llc autofs4 nfs lockd fscache nfs_acl auth_rpcgss sunrpc bonding ipv6 xfs exportfs ext2 emcpvlumd(P)(U) emcpxcrypt(P)(U) emcpdm(P)(U) emcpgpx(P)(U) emcpmpx(P)(U) emcp(P)(U) uinput dcdbas microcode power_meter sb_edac edac_core iTCO_wdt iTCO_vendor_support shpchp sg ixgbe mdio igb dca ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif ahci qla2xxx scsi_transport_fc scsi_tgt megaraid_sas wmi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: ip_tables]

Pid: 8773, comm: xfslogd/5 Tainted: P        W  ----------------   2.6.32-220.el6.x86_64 #1 Dell Inc. PowerEdge R820/04K5X5
RIP: 0010:[<ffffffff81055750>]  [<ffffffff81055750>] select_fallback_rq+0x50/0x100
RSP: 0018:ffff885f35b5f9e0  EFLAGS: 00010082
RAX: ffffffffcccccccc RBX: 00000000ffffffff RCX: 0000000000000010
RDX: ffffffff81c08000 RSI: ffff885e7e2a4080 RDI: 0000000000000082
RBP: ffff885f35b5fa20 R08: ffff8801c531aee0 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff81c00880
R13: ffff885e7e2a42a0 R14: 0000000000000005 R15: ffff885e7e2a4080
FS:  0000000000000000(0000) GS:ffff8801ad0a0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: fffffffde847dca0 CR3: 0000005db6e78000 CR4: 00000000000406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process xfslogd/5 (pid: 8773, threadinfo ffff885f35b5e000, task ffff885f3bfd40c0)
Stack:
 0000000000000000 0000008200000001 ffff885f35b5fa20 ffff885e7e2a4080
<0> ffffffff81c1dfc0 0000000000000000 0000000000000005 0000000000000082
<0> ffff885f35b5fa90 ffffffff8105f9e9 ffff885f35b5fac0 000000008100bc0e
Call Trace:
 [<ffffffff8105f9e9>] try_to_wake_up+0x399/0x400
 [<ffffffff8105faa5>] wake_up_process+0x15/0x20
 [<ffffffff814ee67a>] __up+0x2a/0x40
 [<ffffffff81096962>] up+0x42/0x50
 [<ffffffffa05d3cc2>] xfs_buf_unlock+0x32/0x90 [xfs]
 [<ffffffffa059defa>] xfs_buf_item_unpin+0xca/0x1a0 [xfs]
 [<ffffffffa05c9fa0>] ? xfs_trans_committed_bulk+0x1d0/0x240 [xfs]
 [<ffffffffa05c9fa0>] xfs_trans_committed_bulk+0x1d0/0x240 [xfs]
 [<ffffffffa05be122>] xlog_cil_committed+0x32/0xc0 [xfs]
 [<ffffffffa05b9fdd>] xlog_state_do_callback+0x12d/0x2b0 [xfs]
 [<ffffffffa05ba1de>] xlog_state_done_syncing+0x7e/0xb0 [xfs]
 [<ffffffffa05ba88c>] xlog_iodone+0x5c/0xc0 [xfs]
 [<ffffffffa05d5710>] ? xfs_buf_iodone_work+0x0/0x50 [xfs]
 [<ffffffffa05d5736>] xfs_buf_iodone_work+0x26/0x50 [xfs]
 [<ffffffff8108b2b0>] worker_thread+0x170/0x2a0
 [<ffffffff81090bf0>] ? autoremove_wake_function+0x0/0x40
 [<ffffffff8108b140>] ? worker_thread+0x0/0x2a0
 [<ffffffff81090886>] kthread+0x96/0xa0
 [<ffffffff8100c14a>] child_rip+0xa/0x20
 [<ffffffff810907f0>] ? kthread+0x0/0xa0
 [<ffffffff8100c140>] ? child_rip+0x0/0x20
Code: f4 00 00 4c 8b 25 29 e6 5b 00 bb ff ff ff ff 48 63 d7 89 7d cc 4c 8d ae 20 02 00 00 48 8b 14 d5 20 6d bf 81 49 89 f7 48 63 04 10 <4c> 8b 34 c5 40 76 e1 81 0f 1f 84 00 00 00 00 00 89 df 4c 89 e2 
RIP  [<ffffffff81055750>] select_fallback_rq+0x50/0x100
 RSP <ffff885f35b5f9e0>
CR2: fffffffde847dca0

Environment

  • Red Hat Enterprise Linux 6.2
  • XFS

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content