mic module loaded system caused kernel panic at _wake_up_common+0x31/0x90

Solution Unverified - Updated -

Issue

  • mic module loaded system caused kernel panic at _wake_up_common+0x31/0x90

    <1>BUG: unable to handle kernel NULL pointer dereference at (null)
    <1>IP: [<ffffffff810513f1>] __wake_up_common+0x31/0x90
    <4>PGD cf600a067 PUD ad5bf1067 PMD 0 
    <4>Oops: 0000 [#1] SMP 
    <4>last sysfs file: /sys/devices/pci0000:80/0000:80:03.0/0000:84:00.0/mic/mic3/cmdline
    <4>CPU 0 
    <4>Modules linked in: nfsd lockd nfs_acl auth_rpcgss exportfs iptable_filter ip_tables autofs4 ipmi_devintf sunrpc cpufreq_ondemand acpi_cpufreq freq_table mperf bonding 8021q garp stp llc ipv6 mic(U) uinput acpi_pad igb dca ptp pps_core sg microcode serio_raw i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer snd soundcore snd_page_alloc shpchp ext4 mbcache jbd2 sd_mod crc_t10dif megaraid_sas sr_mod cdrom isci libsas scsi_transport_sas ahci wmi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
    <4>
    <4>Pid: 2397, comm: SCIF INTR 1 Not tainted 2.6.32-358.el6.x86_64 #1 Supermicro SYS-7047GR-TPRF/X9DRG-QF
    <4>RIP: 0010:[<ffffffff810513f1>]  [<ffffffff810513f1>] __wake_up_common+0x31/0x90
    <4>RSP: 0018:ffff881064e81c30  EFLAGS: 00010082
    <4>RAX: ffffffffffffffe8 RBX: ffff882066ef6da8 RCX: 0000000000000000
    <4>RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff882066ef6da8
    <4>RBP: ffff881064e81c70 R08: 0000000000000000 R09: 00000000ffffffff
    <4>R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000282
    <4>R13: ffff882066ef6db0 R14: 0000000000000000 R15: 0000000000000000
    <4>FS:  0000000000000000(0000) GS:ffff880028200000(0000) knlGS:0000000000000000
    <4>CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
    <4>CR2: 0000000000000000 CR3: 0000001066025000 CR4: 00000000001407f0
    <4>DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    <4>DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
    <4>Process SCIF INTR 1 (pid: 2397, threadinfo ffff881064e80000, task ffff881062ed0080)
    <4>Stack:
    <4> 00000000ffffffff 0000000300000001 0000000000016700 ffff882066ef6da8
    <4><d> 0000000000000282 0000000000000003 0000000000000001 0000000000000000
    <4><d> ffff881064e81cb0 ffffffff81055aa8 00000000ffffffff ffff881064e81d80
    <4>Call Trace:
    <4> [<ffffffff81055aa8>] __wake_up+0x48/0x70
    <4> [<ffffffffa029f55b>] scif_discntack_resp+0x2b/0x30 [mic]
    <4> [<ffffffffa029f0a5>] micscif_nodeqp_msg_handler+0x45/0x70 [mic]
    <4> [<ffffffffa02a1986>] micscif_nodeqp_intrhandler+0xe6/0x410 [mic]
    <4> [<ffffffff8150d6e0>] ? thread_return+0x4e/0x76e
    <4> [<ffffffffa029c1b0>] ? micscif_intr_bh_handler+0x0/0x70 [mic]
    <4> [<ffffffffa029c1f9>] micscif_intr_bh_handler+0x49/0x70 [mic]
    <4> [<ffffffff81090ac0>] worker_thread+0x170/0x2a0
    <4> [<ffffffff81096c80>] ? autoremove_wake_function+0x0/0x40
    <4> [<ffffffff81090950>] ? worker_thread+0x0/0x2a0
    <4> [<ffffffff81096916>] kthread+0x96/0xa0
    <4> [<ffffffff8100c0ca>] child_rip+0xa/0x20
    <4> [<ffffffff81096880>] ? kthread+0x0/0xa0
    <4> [<ffffffff8100c0c0>] ? child_rip+0x0/0x20
    <4>Code: 41 56 41 55 41 54 53 48 83 ec 18 0f 1f 44 00 00 89 75 cc 89 55 c8 4c 8d 6f 08 48 8b 57 08 41 89 cf 4d 89 c6 48 8d 42 e8 49 39 d5 <48> 8b 58 18 74 3f 48 83 eb 18 eb 0a 0f 1f 00 48 89 d8 48 8d 5a 
    <1>RIP  [<ffffffff810513f1>] __wake_up_common+0x31/0x90
    <4> RSP <ffff881064e81c30>
    <4>CR2: 0000000000000000
    

    The module detail is below

        165 filename:       /lib/modules/2.6.32-358.el6.x86_64/extra/mic.ko
        166 license:        GPL
        167 build_scmver:   1ab32182c425963ae220d391c8471bd9c43b3f47
        168 build_ondate:   2013-11-16 15:50:12 -0800
        169 build_bywhom:   root@yocto-182-67
        170 build_number:   0
        171 license:        GPL
        172 license:        GPL
        173 srcversion:     95E3FFE5DEF70BACBF9B16B
        174 depends:        
        175 vermagic:       2.6.32-358.el6.x86_64 SMP mod_unload modversions 
    

Environment

  • Red Hat Enterprise Linux
  • 3rd party mic kernel module

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content