Kernel panics at inet6addr_event() of 'ib_core'

Solution Verified - Updated -

Issue

  • Kernel panic with below message from the logs.
:[505367.952168] BUG: unable to handle kernel NULL pointer dereference at 00000000000001c4
:[505367.952197] IP: [<ffffffffc07538b2>] inet6addr_event+0x32/0x60 [ib_core]
:[505367.952234] PGD 8000017d767c3067 PUD 1783838f067 PMD 0 
:[505367.952253] Oops: 0000 [#1] SMP 
:[505367.952268] Modules linked in: 8021q garp mrp stp llc nfsv3 rpcsec_gss_krb5 nfsv4 dns_resolver nfs fscache tracedev(OE) ib_ucm(OE) ib_cm(OE) ib_uverbs(OE) ib_umad(OE) ib_core(OE) mlx_compat(OE) ipt_REJECT nf_reject_ipv4 nf_conntrack_ipv4 nf_defrag_ipv4 xt_comment xt_multiport xt_conntrack nf_conntrack libcrc32c iptable_filter dcdbas iTCO_wdt iTCO_vendor_support mxm_wmi sb_edac edac_core intel_powerclamp coretemp intel_rapl iosf_mbi kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr joydev mei_me sg mei lpc_ich shpchp acpi_power_meter wmi binfmt_misc nfsd nfs_acl lockd grace auth_rpcgss sunrpc ip_tables ext4 mbcache jbd2 sd_mod crc_t10dif crct10dif_generic mgag200 drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm
:[505367.954315]  crct10dif_pclmul ixgbe crct10dif_common crc32c_intel mlx4_core igb ahci libahci libata megaraid_sas mdio ptp i2c_algo_bit i2c_core pps_core devlink dca dm_mirror dm_region_hash dm_log dm_mod [last unloaded: mmfslinux]
:[505367.956241] CPU: 39 PID: 48773 Comm: ip Tainted: G           OE  ------------   3.10.0-693.17.1.el7.x86_64 #1
:[505367.956918] Hardware name: Dell Inc. PowerEdge R630/02C2CP, BIOS 2.6.0 10/26/2017
:[505367.957601] task: ffff8976cab63f40 ti: ffff897d68698000 task.ti: ffff897d68698000
:[505367.958290] RIP: 0010:[<ffffffffc07538b2>]  [<ffffffffc07538b2>] inet6addr_event+0x32/0x60 [ib_core]
:[505367.958999] RSP: 0018:ffff897d6869b490  EFLAGS: 00010286
:[505367.959708] RAX: ffff88bd46f681c0 RBX: 00000000ffffffff RCX: 00000000ffffffff
:[505367.960431] RDX: 0000000000000000 RSI: 0000000000000002 RDI: ffffffffc0772eb0
:[505367.961156] RBP: ffff897d6869b4b0 R08: 0000000000000000 R09: 00000000000080fe
:[505367.961884] R10: e8ea38feff966e26 R11: 0000000000004c10 R12: 0000000000000000
:[505367.962616] R13: 0000000000000002 R14: ffff88bd7bd5c600 R15: 0000000000000000
:[505367.963356] FS:  00007fd73569a740(0000) GS:ffff897d7e2c0000(0000) knlGS:0000000000000000
:[505367.964103] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
:[505367.964855] CR2: 00000000000001c4 CR3: 00000178e8e0e000 CR4: 00000000003607e0
:[505367.965609] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
:[505367.966357] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
:[505367.967097] Call Trace:
:[505367.967840]  [<ffffffff816b3d0c>] notifier_call_chain+0x4c/0x70
:[505367.968588]  [<ffffffff816b3d6a>] atomic_notifier_call_chain+0x1a/0x20
:[505367.969342]  [<ffffffff8167e03b>] inet6addr_notifier_call_chain+0x1b/0x20
:[505367.970093]  [<ffffffff8164db4b>] addrconf_ifdown+0x22b/0x3e0
:[505367.970837]  [<ffffffff8164eae2>] addrconf_notify+0x1d2/0xa90
:[505367.971576]  [<ffffffff816ade8e>] ? _raw_spin_unlock_bh+0x1e/0x20
:[505367.972297]  [<ffffffff816b3d0c>] notifier_call_chain+0x4c/0x70
:[505367.973002]  [<ffffffff810b8656>] raw_notifier_call_chain+0x16/0x20
:[505367.973714]  [<ffffffff8158506d>] call_netdevice_notifiers_info+0x4d/0x80
:[505367.974420]  [<ffffffff8158d0ba>] __dev_notify_flags+0x8a/0xe0
:[505367.975120]  [<ffffffff8158d8f2>] dev_change_flags+0x52/0x60
:[505367.975813]  [<ffffffff8159e206>] do_setlink+0x366/0xe20
:[505367.976502]  [<ffffffff8118e39a>] ? get_page_from_freelist+0x4fa/0x9e0
:[505367.977204]  [<ffffffff815a093c>] rtnl_newlink+0x50c/0x850
:[505367.977900]  [<ffffffff815a0523>] ? rtnl_newlink+0xf3/0x850
:[505367.978594]  [<ffffffff816b3b15>] ? do_page_fault+0x35/0x90
:[505367.979292]  [<ffffffff812b3da8>] ? security_capable+0x18/0x20
:[505367.979987]  [<ffffffff81096869>] ? ns_capable+0x29/0x50
:[505367.980674]  [<ffffffff8159bbf4>] rtnetlink_rcv_msg+0xa4/0x270
:[505367.981355]  [<ffffffff811e41d8>] ? __kmalloc_node_track_caller+0x58/0x290
:[505367.982033]  [<ffffffff812b405e>] ? security_inode_alloc+0x1e/0x20
:[505367.982708]  [<ffffffff815bcd10>] ? __netlink_lookup+0xc0/0x110
:[505367.983379]  [<ffffffff8159bb50>] ? rtnetlink_rcv+0x30/0x30
:[505367.984034]  [<ffffffff815bf969>] netlink_rcv_skb+0xa9/0xc0
:[505367.984667]  [<ffffffff8159bb48>] rtnetlink_rcv+0x28/0x30
:[505367.985282]  [<ffffffff815bf052>] netlink_unicast+0xf2/0x1b0
:[505367.985880]  [<ffffffff815bf42f>] netlink_sendmsg+0x31f/0x6a0
:[505367.986458]  [<ffffffff81248e4e>] ? fsnotify_destroy_marks+0x6e/0x90
:[505367.987022]  [<ffffffff8156c580>] sock_sendmsg+0xb0/0xf0
:[505367.987567]  [<ffffffff81278c42>] ? proc_lookup_de+0xb2/0xc0
:[505367.988093]  [<ffffffff8156ce29>] ___sys_sendmsg+0x3a9/0x3c0
:[505367.988601]  [<ffffffff811f4f52>] ? __mem_cgroup_commit_charge+0xe2/0x2f0
:[505367.989102]  [<ffffffff811be478>] ? page_add_new_anon_rmap+0xb8/0x170
:[505367.989591]  [<ffffffff811b4178>] ? handle_mm_fault+0x858/0xfa0
:[505367.990073]  [<ffffffff8121a914>] ? dentry_kill+0x154/0x1b0
:[505367.990542]  [<ffffffff8156d5f1>] __sys_sendmsg+0x51/0x90
:[505367.990999]  [<ffffffff8156d642>] SyS_sendmsg+0x12/0x20
:[505367.991449]  [<ffffffff816b89fd>] system_call_fastpath+0x16/0x1b
:[505367.991897] Code: 0a 00 00 00 48 89 e5 48 83 ec 20 4c 8b 0a 66 89 44 24 04 4c 8b 52 08 48 8b 82 c8 00 00 00 4c 89 4c 24 0c 4c 89 54 24 14 48 8b 10 <66> 83 ba c4 01 00 00 01 74 04 31 c0 c9 c3 48 89 f7 48 8d 74 24 
:[505367.992892] RIP  [<ffffffffc07538b2>] inet6addr_event+0x32/0x60 [ib_core]
:[505367.993382]  RSP <ffff897d6869b490>
:[505367.993857] CR2: 00000000000001c4

Environment

  • Red Hat Enterprise Linux 7
  • Unsigned (U) ib_core kernel module.

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content