Amazon EC2 guests panic with kernel BUG at fs/buffer.c:3065 on Red Hat Enterprise Linux 6

Solution Verified - Updated -

Issue

  • Multiple machines panic with the following backtrace printed to console:
kernel BUG at fs/buffer.c:3065!
invalid opcode: 0000 [#1] SMP 
last sysfs file: /sys/devices/system/cpu/online
CPU 0 
Modules linked in: autofs4 sunrpc ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 microcode xen_netfront ext4 mbcache jbd2 xen_blkfront dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]

Pid: 10830, comm: updatedb Not tainted 2.6.32-358.14.1.el6.x86_64 #1  
RIP: e030:[<ffffffff811b4d92>]  [<ffffffff811b4d92>] submit_bh+0x132/0x150
RSP: e02b:ffff8803b7cbd9d8  EFLAGS: 00010246
RAX: 0000000000000005 RBX: ffff8803b863ec28 RCX: 0000000000000017
RDX: 0000000000000000 RSI: ffff8803b863ec28 RDI: 00000000000004c1
RBP: ffff8803b7cbd9f8 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 00000000ffffffff R12: 00000000000004c1
R13: ffffffff81c07360 R14: ffff8803b863ec28 R15: ffff8803b4079400
FS:  00007fedce965700(0000) GS:ffff88002804f000(0000) knlGS:0000000000000000
CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00007fedce971000 CR3: 000000023950e000 CR4: 0000000000002660
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process updatedb (pid: 10830, threadinfo ffff8803b7cbc000, task ffff880004598080)
Stack:
 ffff8803b7cbda08 ffff8803b863ec28 00000000000004c1 ffffffff81c07360
<d> ffff8803b7cbda18 ffffffff811b7073 00000000003cfff5 ffff8803b4cddc00
<d> ffff8803b7cbda28 ffffffff811b7123 ffff8803b7cbda78 ffffffffa0084018
Call Trace:
 [<ffffffff811b7073>] __sync_dirty_buffer+0x53/0xf0
 [<ffffffff811b7123>] sync_dirty_buffer+0x13/0x20
 [<ffffffffa0084018>] ext4_commit_super+0x158/0x1e0 [ext4]
 [<ffffffffa00845d2>] ext4_handle_error+0x72/0xd0 [ext4]
 [<ffffffffa00849c2>] __ext4_error+0x82/0x90 [ext4]
 [<ffffffff81096d00>] ? wake_bit_function+0x0/0x50
 [<ffffffffa0075a32>] ext4_find_entry+0x3b2/0x490 [ext4]
 [<ffffffff81007c8f>] ? xen_restore_fl_direct_end+0x0/0x1
 [<ffffffffa0075b5d>] ext4_lookup+0x4d/0x140 [ext4]
 [<ffffffff811905a5>] do_lookup+0x1a5/0x230
 [<ffffffff810074fd>] ? xen_force_evtchn_callback+0xd/0x10
 [<ffffffff81190d64>] __link_path_walk+0x734/0x1030
 [<ffffffff81007c8f>] ? xen_restore_fl_direct_end+0x0/0x1
 [<ffffffff810074fd>] ? xen_force_evtchn_callback+0xd/0x10
 [<ffffffff811918ea>] path_walk+0x6a/0xe0
 [<ffffffff81191abb>] do_path_lookup+0x5b/0xa0
 [<ffffffff81192747>] user_path_at+0x57/0xa0
 [<ffffffff81007c8f>] ? xen_restore_fl_direct_end+0x0/0x1
 [<ffffffff81168b84>] ? kmem_cache_free+0xc4/0x2b0
 [<ffffffff812775b5>] ? _atomic_dec_and_lock+0x55/0x80
 [<ffffffff81186914>] ? cp_new_stat+0xe4/0x100
 [<ffffffff81186b3c>] vfs_fstatat+0x3c/0x80
 [<ffffffff81186bee>] vfs_lstat+0x1e/0x20
 [<ffffffff81186c14>] sys_newlstat+0x24/0x50
 [<ffffffff810dc867>] ? audit_syscall_entry+0x1d7/0x200
 [<ffffffff810dc5b5>] ? __audit_syscall_exit+0x265/0x290
 [<ffffffff8100b072>] system_call_fastpath+0x16/0x1b
Code: e3 a1 e8 e2 46 00 00 48 83 c4 08 89 d8 5b 41 5c 41 5d c9 c3 0f 0b eb fe 0f 0b eb fe 0f 0b 66 66 2e 0f 1f 84 00 00 00 00 00 eb f3 <0f> 0b eb fe 0f 0b 0f 1f 84 00 00 00 00 00 eb f6 66 66 66 66 66 
RIP  [<ffffffff811b4d92>] submit_bh+0x132/0x150
 RSP <ffff8803b7cbd9d8>
---[ end trace bc1a21bd95ea2e68 ]---
Kernel panic - not syncing: Fatal exception

Environment

  • Red Hat Enterprise Linux 6
    • kernel 2.6.32-358.14.1.el6
  • Amazon EC2

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content