System crash/Kernel oops at task_rq_lock with backtrace in dec_count (dm-mod)

Solution Unverified - Updated -

Issue

Kernel crashes/panics with a backtrace similar to this in kernel log:

BUG: unable to handle kernel paging request at 000000000020dd68
IP: [<ffffffff81055d3a>] task_rq_lock+0x4a/0xa0
PGD 418048067 PUD 416ae7067 PMD 0 
Oops: 0000 [#1] SMP 
last sysfs file: /sys/devices/pci0000:00/0000:00:01.2/usb1/1-1/speed
CPU 6 
Modules linked in: ipt_addrtype xt_conntrack iptable_filter ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 ip_tables bridge stp llc dm_thin_poo
l dm_persistent_data dm_bufio libcrc32c nfs lockd fscache auth_rpcgss nfs_acl autofs4 sunrpc ipv6 microcode virtio_balloon virtio_net i2c_piix4 i2c_core ext4 mbcache jbd2 virti
o_blk virtio_pci virtio_ring virtio pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: mperf]

Pid: 2245, comm: loop1 Not tainted 2.6.32-358.el6.x86_64 #1 Red Hat KVM
RIP: 0010:[<ffffffff81055d3a>]  [<ffffffff81055d3a>] task_rq_lock+0x4a/0xa0
RSP: 0018:ffff8804174e9d40  EFLAGS: 00010082
RAX: 000000000020dd50 RBX: 0000000000016700 RCX: ffff8804150f4560
RDX: 0000000000000282 RSI: ffff8804174e9d98 RDI: ffff880416b8e5f8
RBP: ffff8804174e9d60 R08: ffff8804150f4560 R09: 00000000ffffffff
R10: 0000000000000000 R11: 0000000000000000 R12: ffff880416b8e5f8
R13: ffff8804174e9d98 R14: 0000000000016700 R15: 000000000000000f
FS:  00007f38fd6b6700(0000) GS:ffff880028380000(0000) knlGS:00000000f77dd6c0
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 000000000020dd68 CR3: 000000010279b000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process loop1 (pid: 2245, threadinfo ffff8804174e8000, task ffff880416acaae0)
Stack:
 ffff880416b8e5f8 0000000000000000 0000000000000000 0000000000000006
<d> ffff8804174e9dd0 ffffffff81062f6c 0000000000016700 ffff880416bbcc40
<d> ffff880117f73cc0 ffff8804171e3ac0 ffff8804150f4558 0000000000000282
Call Trace:
 [<ffffffff81062f6c>] try_to_wake_up+0x3c/0x3e0
 [<ffffffff81063365>] wake_up_process+0x15/0x20
 [<ffffffffa0009d4d>] dec_count+0x3d/0x80 [dm_mod]
 [<ffffffffa000a1aa>] endio+0x4a/0x70 [dm_mod]
 [<ffffffff811b920d>] bio_endio+0x1d/0x40
 [<ffffffff8136d34f>] loop_thread+0xdf/0x270
 [<ffffffff81096c80>] ? autoremove_wake_function+0x0/0x40
 [<ffffffff8136d270>] ? loop_thread+0x0/0x270
 [<ffffffff81096916>] kthread+0x96/0xa0
 [<ffffffff8100c0ca>] child_rip+0xa/0x20
 [<ffffffff81096880>] ? kthread+0x0/0xa0
 [<ffffffff8100c0c0>] ? child_rip+0x0/0x20
Code: 00 48 c7 c3 00 67 01 00 49 89 fc 49 89 f5 9c 58 66 66 90 66 90 48 89 c2 fa 66 66 90 66 66 90 49 89 55 00 49 8b 44 24 08 49 89 de <8b> 40 18 4c 03 34 c5 c0 dd bf 81 4c 89 f7 e8 63 a2 4b 00 49 8b 
RIP  [<ffffffff81055d3a>] task_rq_lock+0x4a/0xa0
 RSP <ffff8804174e9d40>
CR2: 000000000020dd68

Environment

  • Red Hat Enterprise Linux 6.6 or earlier
  • kernel earlier than 2.6.32-573.el6

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content