System crashed at handle_mm_fault due to "kernel BUG at mm/memory.c:3765!" in RHEL 7.0.

Solution Verified - Updated -

Issue

  • Kernel panics with the following messages:
[1149704.975443] ------------[ cut here ]------------
[1149705.207361] kernel BUG at mm/memory.c:3765!
[1149705.418120] invalid opcode: 0000 [#1] SMP 
[1149705.624499] Modules linked in: xt_nat fuse dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag af_packet_diag netlink_diag xt_recent veth xt_CHECKSUM ebtable_nat ebtables xt_addrtype ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat bridge dm_thin_pool dm_persistent_data dm_bio_prison dm_bufio loop openvswitch vxlan ip_tunnel gre libcrc32c 8021q garp stp mrp llc ipt_REJECT nf_conntrack_ipv4 ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 nf_defrag_ipv4 xt_conntrack nf_conntrack ip6table_filter iptable_filter ip6_tables ip_tables iTCO_wdt iTCO_vendor_support binfmt_misc ipmi_devintf mgag200 acpi_cpufreq coretemp syscopyarea sysfillrect kvm_intel sysimgblt kvm i2c_algo_bit ttm drm_kms_helper drm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel i2c_core hpilo hpwdt aesni_intel lpc_ich lrw ioatdma
[1149709.071472]  gf128mul sb_edac glue_helper ipmi_si ablk_helper cryptd serio_raw pcspkr edac_core mfd_core shpchp dca ipmi_msghandler acpi_power_meter pcc_cpufreq mperf nfsd auth_rpcgss nfs_acl lockd sunrpc ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi sd_mod tg3 ata_piix crc_t10dif crct10dif_common libata ptp hpsa ntb pps_core dm_mirror dm_region_hash dm_log dm_mod [last unloaded: iptable_mangle]
[1149710.736542] CPU: 24 PID: 57147 Comm: java Tainted: G        W   --------------   3.10.0-123.13.1.el7.x86_64 #1
[1149711.229700] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 08/02/2014
[1149711.558313] task: ffff880213a46660 ti: ffff880a36b86000 task.ti: ffff880a36b86000
[1149711.929092] RIP: 0010:[<ffffffff8116ca78>]  [<ffffffff8116ca78>] handle_mm_fault+0xc78/0xd90
[1149712.346441] RSP: 0018:ffff880a36b87da0  EFLAGS: 00010246
[1149712.611886] RAX: 0000000000000100 RBX: 00000007ade020c0 RCX: ffff880a36b87fd8
[1149712.965906] RDX: ffff880213a46660 RSI: 0000000000000000 RDI: 8000000206a001e6
[1149713.320534] RBP: ffff880a36b87e20 R08: 0000000000000000 R09: 0000000000000d73
[1149713.674337] R10: 0000000000000001 R11: 0000000000000006 R12: ffff88050e9acb78
[1149714.028180] R13: ffff880fca52a510 R14: 0000000000000029 R15: ffff881f6a7b6400
[1149714.382497] FS:  00007fb5a4eee700(0000) GS:ffff88203f900000(0000) knlGS:0000000000000000
[1149714.782812] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1149715.069302] CR2: 00000000026a2000 CR3: 00000009f4a2d000 CR4: 00000000000407e0
[1149715.423586] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[1149715.777448] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[1149716.131289] Stack:
[1149716.236776]  ffff880a36b87e68 ffffffff810c0492 ffffffff810bfd68 ffff881f6a7b6400
[1149716.603408]  00000001ffffffff ffffc9001ca24a84 000000000f82fe7e 00007fb5a803c428
[1149716.969928]  00000000ffffffff 0000000000000001 000000000f82fe7e 0000000000000006
[1149717.337149] Call Trace:
[1149717.463601]  [<ffffffff810c0492>] ? futex_wake_op+0x332/0x570
[1149717.750143]  [<ffffffff810bfd68>] ? get_futex_key+0x1c8/0x2a0
[1149718.036779]  [<ffffffff815eda86>] __do_page_fault+0x156/0x540
[1149718.323453]  [<ffffffff810c2b92>] ? do_futex+0x122/0x5b0
[1149718.588862]  [<ffffffff8109fcd7>] ? update_curr+0x67/0x150
[1149718.862707]  [<ffffffff8109b836>] ? __dequeue_entity+0x26/0x40
[1149719.153351]  [<ffffffff81011872>] ? __switch_to+0x3d2/0x490
[1149719.432294]  [<ffffffff815ede8a>] do_page_fault+0x1a/0x70
[1149719.702078]  [<ffffffff815ea0c8>] page_fault+0x28/0x30
[1149719.959255] Code: e8 ae c1 ff ff 85 c0 0f 85 06 f7 ff ff 49 8b 3c 24 e9 4e f5 ff ff 4c 89 f7 e8 15 b8 03 00 4c 89 f7 e8 fd 1f fe ff e9 07 fb ff ff <0f> 0b 4c 89 e7 4c 89 5d b8 e8 9a ad ff ff 48 89 de 49 89 c7 4c 
[1149720.883608] RIP  [<ffffffff8116ca78>] handle_mm_fault+0xc78/0xd90
[1149721.187013]  RSP <ffff880a36b87da0>

Environment

  • Red Hat Enterprise Linux 7.0
  • kernel-3.10.0-123.13.1.el7.x86_64

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.