Kernel tainted with WARNING at `RIP: 0010:__acpi_nfit_scrub+0x303/0x320 [nfit]`

Solution In Progress - Updated -

Issue

  • Kernel tainted with WARNING at drivers/acpi/nfit/core.c:3238 __acpi_nfit_scrub+0x303/0x320 [nfit]
[  632.988108] ------------[ cut here ]------------
[  632.988112] nd_region region0: scrub start while range 2 active

[  632.988191] WARNING: CPU: 41 PID: 6745 at drivers/acpi/nfit/core.c:3238 __acpi_nfit_scrub+0x303/0x320 [nfit]   ------------->> 

[  632.988221] Modules linked in: nfnetlink bridge stp llc rpcrdma rdma_cm iw_cm ib_cm ib_core nfsd nfs_acl snd_seq_dummy snd_hrtimer snd_seq snd_seq_device s
nd_timer snd soundcore rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs qrtr rfkill sunrpc vfat fat intel_rapl_msr intel_rapl_comm
on i10nm_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm ipmi_ssif irqbypass rapl iTCO_wdt intel_cstate iTCO_vendor_support dcdbas dell_smbios dax_pmem_compat joydev intel_uncore device_dax mei_me isst_if_mmio acpi_ipmi isst_if_mbox_pci pcspkr dell_wmi_descriptor isst_if_common wmi_bmof i2c_i801 dax_pmem_core ipmi_si mei nd_pmem ipmi_devintf intel_pmt i2c_smbus nd_btt ipmi_msghandler acpi_power_meter xfs libcrc32c sd_mod t10_pi sg mgag200 drm_kms_helper crct10dif_pclmul crc32_pclmul crc32c_intel syscopyarea sysfillrect sysimgblt fb_sys_fops cec drm ghash_clmulni_intel ahci libahci tg3 megaraid_sas libata i2c_algo_bit wmi nfit libnvdimm dm_mirror dm_region_hash
[  632.988298]  dm_log dm_mod fuse
[  632.988304] CPU: 41 PID: 6745 Comm: kworker/u320:2 Not tainted 5.14.0-70.el9.x86_64 #1
[  632.988308] Hardware name: Dell Inc. PowerEdge R650/03G79V, BIOS 1.5.5 02/10/2022
[  632.988310] Workqueue: nfit acpi_nfit_scrub [nfit]
[  632.988317] RIP: 0010:__acpi_nfit_scrub+0x303/0x320 [nfit]
[  632.988323] Code: 01 4d 85 ed 75 03 4c 8b 28 48 89 c7 4c 89 04 24 e8 62 b8 06 e4 44 89 f9 4c 89 ea 48 c7 c7 00 ef 42 c0 48 89 c6 e8 70 a0 3f e4 <0f> 0b 4c 8b 04 24 e9 09 fe ff ff e8 cd 5a 44 e4 66 66 2e 0f 1f 84
[  632.988325] RSP: 0018:ff5defbbcf34fe00 EFLAGS: 00010286
[  632.988328] RAX: 0000000000000000 RBX: ff14300409132f28 RCX: 0000000000000027
[  632.988330] RDX: ff14308a7ed17cc8 RSI: 0000000000000001 RDI: ff14308a7ed17cc0
[  632.988331] RBP: ff1430040ebf7028 R08: 0000000000000000 R09: ff5defbbcf34fc40
[  632.988333] R10: ff5defbbcf34fc38 R11: ff14308b7fda2fe8 R12: ff1430040ebf70f8
[  632.988334] R13: ff14300409131dc0 R14: 0000000000000000 R15: 0000000000000002
[  632.988336] FS:  0000000000000000(0000) GS:ff14308a7ed00000(0000) knlGS:0000000000000000
[  632.988338] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  632.988339] CR2: 00007f4d1e868294 CR3: 00000078bee10005 CR4: 0000000000771ee0
[  632.988341] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  632.988342] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  632.988343] PKRU: 55555554
[  632.988345] Call Trace:
[  632.988351]  ? acpi_nfit_query_poison+0x6f/0x180 [nfit]
[  632.988358]  acpi_nfit_scrub+0x34/0x90 [nfit]
[  632.988363]  process_one_work+0x1e5/0x3c0
[  632.988371]  worker_thread+0x50/0x3b0
[  632.988374]  ? rescuer_thread+0x370/0x370
[  632.988376]  kthread+0x146/0x170
[  632.988381]  ? set_kthread_struct+0x40/0x40
[  632.988386]  ret_from_fork+0x1f/0x30
[  632.988396] ---[ end trace d3082d91d825cc98 ]---

Environment

  • Red Hat Enterprise Linux 9 Beta (RHEL)
    • NVDIMM

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content