Amazon EC2 guests panic with kernel BUG at fs/buffer.c:3065 on Red Hat Enterprise Linux 6
Issue
- Multiple machines panic with the following backtrace printed to console:
kernel BUG at fs/buffer.c:3065!
invalid opcode: 0000 [#1] SMP
last sysfs file: /sys/devices/system/cpu/online
CPU 0
Modules linked in: autofs4 sunrpc ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 microcode xen_netfront ext4 mbcache jbd2 xen_blkfront dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
Pid: 10830, comm: updatedb Not tainted 2.6.32-358.14.1.el6.x86_64 #1
RIP: e030:[<ffffffff811b4d92>] [<ffffffff811b4d92>] submit_bh+0x132/0x150
RSP: e02b:ffff8803b7cbd9d8 EFLAGS: 00010246
RAX: 0000000000000005 RBX: ffff8803b863ec28 RCX: 0000000000000017
RDX: 0000000000000000 RSI: ffff8803b863ec28 RDI: 00000000000004c1
RBP: ffff8803b7cbd9f8 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 00000000ffffffff R12: 00000000000004c1
R13: ffffffff81c07360 R14: ffff8803b863ec28 R15: ffff8803b4079400
FS: 00007fedce965700(0000) GS:ffff88002804f000(0000) knlGS:0000000000000000
CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00007fedce971000 CR3: 000000023950e000 CR4: 0000000000002660
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process updatedb (pid: 10830, threadinfo ffff8803b7cbc000, task ffff880004598080)
Stack:
ffff8803b7cbda08 ffff8803b863ec28 00000000000004c1 ffffffff81c07360
<d> ffff8803b7cbda18 ffffffff811b7073 00000000003cfff5 ffff8803b4cddc00
<d> ffff8803b7cbda28 ffffffff811b7123 ffff8803b7cbda78 ffffffffa0084018
Call Trace:
[<ffffffff811b7073>] __sync_dirty_buffer+0x53/0xf0
[<ffffffff811b7123>] sync_dirty_buffer+0x13/0x20
[<ffffffffa0084018>] ext4_commit_super+0x158/0x1e0 [ext4]
[<ffffffffa00845d2>] ext4_handle_error+0x72/0xd0 [ext4]
[<ffffffffa00849c2>] __ext4_error+0x82/0x90 [ext4]
[<ffffffff81096d00>] ? wake_bit_function+0x0/0x50
[<ffffffffa0075a32>] ext4_find_entry+0x3b2/0x490 [ext4]
[<ffffffff81007c8f>] ? xen_restore_fl_direct_end+0x0/0x1
[<ffffffffa0075b5d>] ext4_lookup+0x4d/0x140 [ext4]
[<ffffffff811905a5>] do_lookup+0x1a5/0x230
[<ffffffff810074fd>] ? xen_force_evtchn_callback+0xd/0x10
[<ffffffff81190d64>] __link_path_walk+0x734/0x1030
[<ffffffff81007c8f>] ? xen_restore_fl_direct_end+0x0/0x1
[<ffffffff810074fd>] ? xen_force_evtchn_callback+0xd/0x10
[<ffffffff811918ea>] path_walk+0x6a/0xe0
[<ffffffff81191abb>] do_path_lookup+0x5b/0xa0
[<ffffffff81192747>] user_path_at+0x57/0xa0
[<ffffffff81007c8f>] ? xen_restore_fl_direct_end+0x0/0x1
[<ffffffff81168b84>] ? kmem_cache_free+0xc4/0x2b0
[<ffffffff812775b5>] ? _atomic_dec_and_lock+0x55/0x80
[<ffffffff81186914>] ? cp_new_stat+0xe4/0x100
[<ffffffff81186b3c>] vfs_fstatat+0x3c/0x80
[<ffffffff81186bee>] vfs_lstat+0x1e/0x20
[<ffffffff81186c14>] sys_newlstat+0x24/0x50
[<ffffffff810dc867>] ? audit_syscall_entry+0x1d7/0x200
[<ffffffff810dc5b5>] ? __audit_syscall_exit+0x265/0x290
[<ffffffff8100b072>] system_call_fastpath+0x16/0x1b
Code: e3 a1 e8 e2 46 00 00 48 83 c4 08 89 d8 5b 41 5c 41 5d c9 c3 0f 0b eb fe 0f 0b eb fe 0f 0b 66 66 2e 0f 1f 84 00 00 00 00 00 eb f3 <0f> 0b eb fe 0f 0b 0f 1f 84 00 00 00 00 00 eb f6 66 66 66 66 66
RIP [<ffffffff811b4d92>] submit_bh+0x132/0x150
RSP <ffff8803b7cbd9d8>
---[ end trace bc1a21bd95ea2e68 ]---
Kernel panic - not syncing: Fatal exception
Environment
- Red Hat Enterprise Linux 6
- kernel 2.6.32-358.14.1.el6
- Amazon EC2
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.