RHEL 8: kernel panic at svc_rdma_sendto+0x26

Solution Verified - Updated -

Issue

  • Kernel panic with below logs:
[   20.409139] NFSD: Using nfsdcld client tracking operations.
[   20.409142] NFSD: starting 90-second grace period (net f0000098)
[   20.412572] 8021q: 802.1Q VLAN Support v1.8
[   20.412586] 8021q: adding VLAN 0 to HW filter on device ens1f0
[   20.412600] 8021q: adding VLAN 0 to HW filter on device ens1f1
[   20.412616] 8021q: adding VLAN 0 to HW filter on device eno4
[   29.799499] BUG: unable to handle kernel NULL pointer dereference at 0000000000000058
[   29.799527] PGD 0 P4D 0 
[   29.799536] Oops: 0000 [#1] SMP NOPTI
[   29.799547] CPU: 54 PID: 4765 Comm: nfsd Kdump: loaded Not tainted 4.18.0-372.9.1.el8.x86_64 #1
[   29.799567] Hardware name: HPE ProLiant XL450 Gen10/ProLiant XL450 Gen10, BIOS U40 04/21/2022
[   29.799583] RIP: 0010:svc_rdma_sendto+0x26/0x350 [rpcrdma]
[   29.799627] Code: ff 0f 1f 00 0f 1f 44 00 00 41 57 41 56 41 55 49 89 fd 41 54 55 53 48 83 ec 28 4c 8b 67 20 48 8b 9f 90 01 00 00 49 8b 44 24 38 <4c> 8b 7b 58 a8 40 0f 85 f8 01 00 00 49 8b 44 24 38 a8 04 0f 85 eb
[   29.799677] RSP: 0018:ffffa892e2fe7e68 EFLAGS: 00010292
[   29.799691] RAX: 0000000000004111 RBX: 0000000000000000 RCX: 0000000000000000
[   29.799708] RDX: ffff9bd950ffb000 RSI: ffff9bd99fc041a8 RDI: ffff9bd99fc04000
[   29.799725] RBP: ffff9bc08994b400 R08: ffff9bd8aaa7da88 R09: ffffffffc0748500
[   29.799742] R10: ffff9bd7c8c15a00 R11: 0000000000000001 R12: ffff9bd8f913f800
[   29.799776] R13: ffff9bd99fc04000 R14: ffffffffc0b94660 R15: ffff9bd99fc04000
[   29.799794] FS:  0000000000000000(0000) GS:ffff9bef5f680000(0000) knlGS:0000000000000000
[   29.799815] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   29.799831] CR2: 0000000000000058 CR3: 0000002a8da10004 CR4: 00000000007706e0
[   29.799850] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   29.799869] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   29.799887] PKRU: 55555554
[   29.799896] Call Trace:
[   29.799908]  ? svc_process_common+0x10a/0x6f0 [sunrpc]
[   29.799962]  ? ktime_get+0x3e/0xa0
[   29.799980]  ? nfsd_shutdown_threads+0x80/0x80 [nfsd]
[   29.800017]  svc_send+0x51/0x170 [sunrpc]
[   29.800061]  ? nfsd_shutdown_threads+0x80/0x80 [nfsd]
[   29.800102]  nfsd+0xe3/0x140 [nfsd]
[   29.800126]  kthread+0x10a/0x120
[   29.800141]  ? set_kthread_struct+0x40/0x40
[   29.800159]  ret_from_fork+0x1f/0x40
[   29.800179] Modules linked in: 8021q garp mrp stp llc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nf_tables_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink vfat fat rpcrdma rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi ib_umad intel_rapl_msr intel_rapl_common isst_if_common rdma_cm ib_ipoib iw_cm ib_cm nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp ipmi_ssif coretemp crct10dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate irdma ice mlx5_ib ib_uverbs intel_uncore ib_core cdc_eem usbnet pcspkr joydev mii ses acpi_ipmi enclosure mei_me ioatdma scsi_transport_sas hpwdt lpc_ich hpilo mei dca wmi ipmi_si acpi_tad acpi_power_meter nfsd nfs_acl lockd auth_rpcgss grace dm_mod sunrpc xfs libcrc32c raid1 sd_mod t10_pi sg mlx5_core mgag200 drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ahci drm i40e
[   29.800259]  libahci crc32c_intel mlxfw libata pci_hyperv_intf tls megaraid_sas tg3 uas usb_storage psample i2c_algo_bit ipmi_devintf ipmi_msghandler fuse
[   29.800643] CR2: 0000000000000058

Environment

  • Red Hat Enterprise Linux 8
  • nfsd
  • Mellanox [ConnectX-5]
  • mlx5_core[ib_ipoib]
    • fw 20.32.1010 (HPE0000000035)

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content