RHEL6: The system crashes with a message "kernel BUG at arch/x86/mm/tlb.c:62!"

Solution Verified - Updated -

Issue

  • The system crashes with a message "kernel BUG at arch/x86/mm/tlb.c:62!"
  • The following message observed in kernel ring buffer at the time of the crash:
kernel BUG at arch/x86/mm/tlb.c:62!
invalid opcode: 0000 [#1] SMP 
last sysfs file: /sys/module/ipv6/initstate
CPU 1 
Modules linked in: clpka(U) clpkhb(U) nfs lockd fscache(T) nfs_acl auth_rpcgss sunrpc ipv6 dm_mirror dm_region_hash dm_log uinput microcode xen_netfront ext4 mbcache jbd2 xen_blkfront dm_mod [last unloaded: scsi_wait_scan]

Modules linked in: clpka(U) clpkhb(U) nfs lockd fscache(T) nfs_acl auth_rpcgss sunrpc ipv6 dm_mirror dm_region_hash dm_log uinput microcode xen_netfront ext4 mbcache jbd2 xen_blkfront dm_mod [last unloaded: scsi_wait_scan]
Pid: 22625, comm: khelper Tainted: G        W  ---------------- T 2.6.32-131.0.15.el6.x86_64 #1 
RIP: e030:[<ffffffff8104683f>]  [<ffffffff8104683f>] leave_mm+0x3f/0x50
RSP: e02b:ffff880028070e28  EFLAGS: 00010046
RAX: 0000000000000001 RBX: ffff880051cd3a98 RCX: ffff8802f214c040
RDX: dead000000100100 RSI: 0000000000000000 RDI: 0000000000000001
RBP: ffff880028070e28 R08: ffff880051cd3a98 R09: 0000000000000009
R10: 0000000000013010 R11: ffff880028078020 R12: ffff8800196679c0
R13: 0000000000000001 R14: 0000000000000009 R15: 0000000000000100
FS:  00002b5eac425600(0000) GS:ffff88002806d000(0000) knlGS:0000000000000000
CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00000000019cc7c0 CR3: 00000000ca3b3000 CR4: 0000000000002660
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process khelper (pid: 22625, threadinfo ffff8800ee596000, task ffff88005fadeb00)
Stack:
 ffff880028070e48 ffffffff81005545 ffff880051cd3a98 ffff880028070e58
<0> ffff880028070e88 ffffffff810a463d ffff880028070e58 ffff880028070e58
<0> ffff880028070e88 ffff8802f2177cc0 0000000000000000 0000000000000000
Call Trace:
 <IRQ> 
 [<ffffffff81005545>] drop_other_mm_ref+0x85/0x90
 [<ffffffff810a463d>] generic_smp_call_function_single_interrupt+0x9d/0x110
 [<ffffffff810084c3>] xen_call_function_single_interrupt+0x13/0x30
 [<ffffffff810d6940>] handle_IRQ_event+0x60/0x170
 [<ffffffff812f3a43>] ? unmask_evtchn+0x23/0xb0
 [<ffffffff810d8f32>] handle_percpu_irq+0x42/0x80
 [<ffffffff812f382b>] __xen_evtchn_do_upcall+0x1db/0x200
 [<ffffffff812f3dcf>] xen_evtchn_do_upcall+0x2f/0x50
 [<ffffffff8100c31e>] xen_do_hypervisor_callback+0x1e/0x30
 <EOI> 
 [<ffffffff81178afd>] ? flush_old_exec+0x3cd/0x600
 [<ffffffff811c6b3d>] ? load_elf_binary+0x3ad/0x1b10
 [<ffffffff81133221>] ? follow_page+0x321/0x460
 [<ffffffff811384cf>] ? __get_user_pages+0x10f/0x420
 [<ffffffff811c3abc>] ? load_misc_binary+0xac/0x3e0
 [<ffffffff8117a0ab>] ? search_binary_handler+0x10b/0x350
 [<ffffffff8117b239>] ? do_execve+0x239/0x310
 [<ffffffff8126e96a>] ? strncpy_from_user+0x4a/0x90
 [<ffffffff810095da>] ? sys_execve+0x4a/0x80
 [<ffffffff8100c248>] ? kernel_execve+0x68/0xd0
 [<ffffffff81087159>] ? ____call_usermodehelper+0x129/0x140
 [<ffffffff81086f90>] ? __call_usermodehelper+0x0/0xa0
 [<ffffffff8100c1ca>] ? child_rip+0xa/0x20
 [<ffffffff81086f90>] ? __call_usermodehelper+0x0/0xa0
 [<ffffffff8100b393>] ? int_ret_from_sys_call+0x7/0x1b
 [<ffffffff8100bb1d>] ? retint_restore_args+0x5/0x6
 [<ffffffff8100c1c0>] ? child_rip+0x0/0x20
Code: 74 29 65 48 8b 04 25 40 5f 01 00 f0 0f b3 b8 c8 02 00 00 48 c7 c7 00 50 a2 81 e8 fd f4 ff ff 48 89 c7 e8 75 fa fb ff 66 90 c9 c3 <0f> 0b eb fe 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 
RIP  [<ffffffff8104683f>] leave_mm+0x3f/0x50
 RSP <ffff880028070e28>

Environment

  • Red Hat Enterprise Linux 6.1 (kernel-2.6.32-131.0.15.el6)
  • Xen

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content