Kernel panic at __x86_indirect_thunk_rcx with [xofs] 3rd party module

Solution Unverified - Updated -

Issue

  • panic with log:
8503927.201846] xofs fatal error: Fail to get event because xofs is not active on /oraarch/EHR
[8504269.579987] xofs fatal error: Fail to get event because xofs is not active on /oraarch/EHR
[8542903.383731] general protection fault: 0000 [#1] SMP 
[8542903.383756] Modules linked in: tcp_diag udp_diag inet_diag unix_diag af_packet_diag netlink_diag iptable_filter xofs(POE) xofs_core(POE) bonding snapapi26(POE) rpcrdma sunrpc ib_isert iscsi_target_mod ib_iser libiscsi scsi_transport_iscsi ib_srpt target_core_mod ib_srp scsi_transport_srp ib_ipoib rdma_ucm ib_uverbs ib_umad rdma_cm ib_cm iw_cm ocrdma(T) ib_core iTCO_wdt iTCO_vendor_support mxm_wmi sb_edac intel_powerclamp coretemp intel_rapl iosf_mbi kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr i2c_i801 joydev dm_round_robin sg mei_me mei lpc_ich ipmi_si ipmi_devintf ipmi_msghandler wmi acpi_power_meter dm_multipath binfmt_misc ip_tables xfs libcrc32c sd_mod mgag200 lpfc drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops
[8542903.384009]  ttm crc32c_intel drm ahci libahci ixgbe nvmet_fc igb libata nvmet crc_t10dif crct10dif_generic crct10dif_pclmul nvme_fc megaraid_sas nvme_fabrics nvme_core be2net drm_panel_orientation_quirks mdio scsi_transport_fc ptp pps_core scsi_tgt dca i2c_algo_bit crct10dif_common dm_mirror dm_region_hash dm_log dm_mod [last unloaded: edd]
[8542903.384115] CPU: 9 PID: 15093 Comm: grep Kdump: loaded Tainted: P           OE  ------------ T 3.10.0-1160.80.1.el7.x86_64 #1
[8542903.384146] Hardware name: FUJITSU PRIMERGY RX2540 M2/D3289-B1, BIOS V5.0.0.11 R1.30.0 for D3289-B1x                    03/03/2022
[8542903.384178] task: ffff9517ddf58000 ti: ffff9508355a4000 task.ti: ffff9508355a4000
[8542903.384199] RIP: 0010:[<ffffffffa23adc57>]  [<ffffffffa23adc57>] __x86_indirect_thunk_rcx+0x17/0x20
[8542903.384228] RSP: 0018:ffff9508355a7c88  EFLAGS: 00010286
[8542903.384244] RAX: fffffffffffffffe RBX: ffff95185cdfe240 RCX: 8948550000441f0f
[8542903.384264] RDX: 0000000000000101 RSI: ffff95185cdfe240 RDI: ffff95105964d008
[8542903.384284] RBP: ffff9508355a7c98 R08: 00000000000000a6 R09: 0000000000000001
[8542903.384304] R10: ffff950bb3407500 R11: ffff95185cdfe240 R12: 0000000000008000
[8542903.384323] R13: ffff9508355a7db0 R14: ffff95105964d008 R15: ffff9508355a7e10
[8542903.384343] FS:  00007f4d269cc740(0000) GS:ffff951060140000(0000) knlGS:0000000000000000
[8542903.384365] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[8542903.384382] CR2: 00007f4d26226440 CR3: 0000000b6f782000 CR4: 00000000003607e0
[8542903.384401] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[8542903.384421] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[8542903.384440] Call Trace:
[8542903.384453]  [<ffffffffc07370e8>] ? xoc_lookup+0x68/0x70 [xofs_core]
[8542903.384475]  [<ffffffffa2266963>] lookup_real+0x23/0x60
[8542903.384492]  [<ffffffffa226c48a>] do_last+0xbba/0x1340
[8542903.384507]  [<ffffffffa226ccdd>] path_openat+0xcd/0x5a0
[8542903.384526]  [<ffffffffa21fa6f9>] ? do_read_fault.isra.63+0x139/0x1b0
[8542903.384544]  [<ffffffffa226ef7d>] do_filp_open+0x4d/0xc0
[8542903.384561]  [<ffffffffa227d7a7>] ? __alloc_fd+0x47/0x180
[8542903.384581]  [<ffffffffa225a774>] do_sys_open+0x124/0x220
[8542903.384597]  [<ffffffffa225a88e>] SyS_open+0x1e/0x30
[8542903.384614]  [<ffffffffa27c539a>] system_call_fastpath+0x25/0x2a
[8542903.384631] Code: f3 90 0f ae e8 eb f9 48 89 1c 24 c3 0f 1f 84 00 00 00 00 00 e9 02 00 00 00 ff e1 e8 07 00 00 00 f3 90 0f ae e8 eb f9 48 89 0c 24 <c3> 0f 1f 84 00 00 00 00 00 e9 02 00 00 00 ff e2 e8 07 00 00 00 
[8542903.384735] RIP  [<ffffffffa23adc57>] __x86_indirect_thunk_rcx+0x17/0x20
[8542903.384756]  RSP <ffff9508355a7c88>

Environment

  • Red Hat Enterprise Linux 7.9
  • xofs_core: Kernel: 3.10.0-1160 [fd core] version 18.3 build 0.7090

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content