[RHEL 7] kernel BUG at fs/block_dev.c:1363!

Solution In Progress - Updated -

Issue

  • Server crashes with panic string "kernel BUG at fs/block_dev.c:1363!"
[6578730.234207] kernel BUG at fs/block_dev.c:1363!
[6578730.234422] invalid opcode: 0000 [#1] SMP 
[6578730.234628] Modules linked in: bridge stp llc dsa_filter(POE) iTCO_wdt iTCO_vendor_support mxm_wmi sb_edac intel_powerclamp coretemp intel_rapl iosf_mbi kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr sg joydev lpc_ich ipmi_si ipmi_devintf ipmi_msghandler wmi acpi_power_meter binfmt_misc nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c dm_service_time sd_mod crc_t10dif crct10dif_generic be2iscsi bnx2i mgag200 cnic i2c_algo_bit drm_kms_helper uio cxgb3i cxgb3 syscopyarea sysfillrect sysimgblt fb_sys_fops ttm mdio libcxgbi drm libcxgb crct10dif_pclmul crct10dif_common crc32c_intel enic drm_panel_orientation_quirks dm_multipath dm_mirror dm_region_hash dm_log dm_mod iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi
[6578730.236399]  iscsi_ibft iscsi_boot_sysfs
[6578730.236738] CPU: 9 PID: 11722 Comm: blkid Kdump: loaded Tainted: P           OE  ------------   3.10.0-1160.24.1.el7.x86_64 #1
[6578730.237482] Hardware name: Cisco Systems Inc UCSB-B200-M4/UCSB-B200-M4, BIOS B200M4.4.0.2a.0.1016181019 10/16/2018
[6578730.237897] task: ffff8aa986a52100 ti: ffff8ab1f13f0000 task.ti: ffff8ab1f13f0000
[6578730.238333] RIP: 0010:[<ffffffff8c69008f>]  [<ffffffff8c69008f>] blkdev_get+0x29f/0x380
[6578730.238771] RSP: 0018:ffff8ab1f13f3bb8  EFLAGS: 00010282
[6578730.239277] RAX: ffffffffc01fa9b5 RBX: ffff8ab83166a700 RCX: ffff8ab1f13f3fd8
[6578730.239782] RDX: 0000000000000001 RSI: 0000000000000246 RDI: ffffffff8d008d00
[6578730.240258] RBP: ffff8ab1f13f3c30 R08: 0000000000000002 R09: 0000000000000001
[6578730.240770] R10: 0000000000000000 R11: 0000000000000005 R12: ffff8ac0fe82b0c0
[6578730.241258] R13: 0000000000000000 R14: ffff8ab72638ca00 R15: ffff8ab83166a718
[6578730.241752] FS:  00007f37171bd780(0000) GS:ffff8ac0ff240000(0000) knlGS:0000000000000000
[6578730.242252] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[6578730.242762] CR2: 00007f37171cc000 CR3: 00000002d206c000 CR4: 00000000003607e0
[6578730.243325] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[6578730.243877] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[6578730.244432] Call Trace:
[6578730.244984]  [<ffffffff8c69021b>] blkdev_open+0x5b/0x80
[6578730.245551]  [<ffffffff8c64b522>] do_dentry_open+0x1e2/0x2d0
[6578730.246141]  [<ffffffff8c708a82>] ? security_inode_permission+0x22/0x30
[6578730.246707]  [<ffffffff8c6901c0>] ? blkdev_get_by_dev+0x50/0x50
[6578730.247279]  [<ffffffff8c64b6aa>] vfs_open+0x5a/0xb0
[6578730.247876]  [<ffffffff8c659e03>] ? may_open+0xa3/0x120
[6578730.248442]  [<ffffffff8c65dce6>] do_last+0x1f6/0x1340
[6578730.248998]  [<ffffffff8c65eefd>] path_openat+0xcd/0x5a0
[6578730.249578]  [<ffffffff8c661022>] ? user_path_at_empty+0x72/0xc0
[6578730.250177]  [<ffffffff8c64a9aa>] ? __check_object_size+0x1ca/0x250
[6578730.250766]  [<ffffffff8c66114d>] do_filp_open+0x4d/0xb0
[6578730.251361]  [<ffffffff8c66f247>] ? __alloc_fd+0x47/0x170
[6578730.251939]  [<ffffffff8c64cc94>] do_sys_open+0x124/0x220
[6578730.252526]  [<ffffffff8c64cdae>] SyS_open+0x1e/0x20
[6578730.253119]  [<ffffffff8cb95f92>] system_call_fastpath+0x25/0x2a
[6578730.253723] Code: 4c 89 ff 48 89 45 98 e8 80 70 4f 00 48 c7 c7 00 8d 00 8d e8 44 b7 4f 00 45 85 ed 75 46 48 8b 43 58 49 39 c6 74 26 48 85 c0 74 09 <0f> 0b 0f 1f 80 00 00 00 00 48 3b 5b 78 74 12 49 8b 44 24 58 48 
[6578730.255077] RIP  [<ffffffff8c69008f>] blkdev_get+0x29f/0x380
[6578730.255742]  RSP <ffff8ab1f13f3bb8>

Environment

  • Red Hat Enterprise Linux 7

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content