System crash/Kernel oops at task_rq_lock with backtrace in dec_count (dm-mod)
Issue
Kernel crashes/panics with a backtrace similar to this in kernel log:
BUG: unable to handle kernel paging request at 000000000020dd68
IP: [<ffffffff81055d3a>] task_rq_lock+0x4a/0xa0
PGD 418048067 PUD 416ae7067 PMD 0
Oops: 0000 [#1] SMP
last sysfs file: /sys/devices/pci0000:00/0000:00:01.2/usb1/1-1/speed
CPU 6
Modules linked in: ipt_addrtype xt_conntrack iptable_filter ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 ip_tables bridge stp llc dm_thin_poo
l dm_persistent_data dm_bufio libcrc32c nfs lockd fscache auth_rpcgss nfs_acl autofs4 sunrpc ipv6 microcode virtio_balloon virtio_net i2c_piix4 i2c_core ext4 mbcache jbd2 virti
o_blk virtio_pci virtio_ring virtio pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: mperf]
Pid: 2245, comm: loop1 Not tainted 2.6.32-358.el6.x86_64 #1 Red Hat KVM
RIP: 0010:[<ffffffff81055d3a>] [<ffffffff81055d3a>] task_rq_lock+0x4a/0xa0
RSP: 0018:ffff8804174e9d40 EFLAGS: 00010082
RAX: 000000000020dd50 RBX: 0000000000016700 RCX: ffff8804150f4560
RDX: 0000000000000282 RSI: ffff8804174e9d98 RDI: ffff880416b8e5f8
RBP: ffff8804174e9d60 R08: ffff8804150f4560 R09: 00000000ffffffff
R10: 0000000000000000 R11: 0000000000000000 R12: ffff880416b8e5f8
R13: ffff8804174e9d98 R14: 0000000000016700 R15: 000000000000000f
FS: 00007f38fd6b6700(0000) GS:ffff880028380000(0000) knlGS:00000000f77dd6c0
CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 000000000020dd68 CR3: 000000010279b000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process loop1 (pid: 2245, threadinfo ffff8804174e8000, task ffff880416acaae0)
Stack:
ffff880416b8e5f8 0000000000000000 0000000000000000 0000000000000006
<d> ffff8804174e9dd0 ffffffff81062f6c 0000000000016700 ffff880416bbcc40
<d> ffff880117f73cc0 ffff8804171e3ac0 ffff8804150f4558 0000000000000282
Call Trace:
[<ffffffff81062f6c>] try_to_wake_up+0x3c/0x3e0
[<ffffffff81063365>] wake_up_process+0x15/0x20
[<ffffffffa0009d4d>] dec_count+0x3d/0x80 [dm_mod]
[<ffffffffa000a1aa>] endio+0x4a/0x70 [dm_mod]
[<ffffffff811b920d>] bio_endio+0x1d/0x40
[<ffffffff8136d34f>] loop_thread+0xdf/0x270
[<ffffffff81096c80>] ? autoremove_wake_function+0x0/0x40
[<ffffffff8136d270>] ? loop_thread+0x0/0x270
[<ffffffff81096916>] kthread+0x96/0xa0
[<ffffffff8100c0ca>] child_rip+0xa/0x20
[<ffffffff81096880>] ? kthread+0x0/0xa0
[<ffffffff8100c0c0>] ? child_rip+0x0/0x20
Code: 00 48 c7 c3 00 67 01 00 49 89 fc 49 89 f5 9c 58 66 66 90 66 90 48 89 c2 fa 66 66 90 66 66 90 49 89 55 00 49 8b 44 24 08 49 89 de <8b> 40 18 4c 03 34 c5 c0 dd bf 81 4c 89 f7 e8 63 a2 4b 00 49 8b
RIP [<ffffffff81055d3a>] task_rq_lock+0x4a/0xa0
RSP <ffff8804174e9d40>
CR2: 000000000020dd68
Environment
- Red Hat Enterprise Linux 6.6 or earlier
- kernel earlier than 2.6.32-573.el6
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.