RHEL6: The system crashes with a message "kernel BUG at arch/x86/mm/tlb.c:62!"
Issue
- The system crashes with a message "kernel BUG at arch/x86/mm/tlb.c:62!"
- The following message observed in kernel ring buffer at the time of the crash:
kernel BUG at arch/x86/mm/tlb.c:62!
invalid opcode: 0000 [#1] SMP
last sysfs file: /sys/module/ipv6/initstate
CPU 1
Modules linked in: clpka(U) clpkhb(U) nfs lockd fscache(T) nfs_acl auth_rpcgss sunrpc ipv6 dm_mirror dm_region_hash dm_log uinput microcode xen_netfront ext4 mbcache jbd2 xen_blkfront dm_mod [last unloaded: scsi_wait_scan]
Modules linked in: clpka(U) clpkhb(U) nfs lockd fscache(T) nfs_acl auth_rpcgss sunrpc ipv6 dm_mirror dm_region_hash dm_log uinput microcode xen_netfront ext4 mbcache jbd2 xen_blkfront dm_mod [last unloaded: scsi_wait_scan]
Pid: 22625, comm: khelper Tainted: G W ---------------- T 2.6.32-131.0.15.el6.x86_64 #1
RIP: e030:[<ffffffff8104683f>] [<ffffffff8104683f>] leave_mm+0x3f/0x50
RSP: e02b:ffff880028070e28 EFLAGS: 00010046
RAX: 0000000000000001 RBX: ffff880051cd3a98 RCX: ffff8802f214c040
RDX: dead000000100100 RSI: 0000000000000000 RDI: 0000000000000001
RBP: ffff880028070e28 R08: ffff880051cd3a98 R09: 0000000000000009
R10: 0000000000013010 R11: ffff880028078020 R12: ffff8800196679c0
R13: 0000000000000001 R14: 0000000000000009 R15: 0000000000000100
FS: 00002b5eac425600(0000) GS:ffff88002806d000(0000) knlGS:0000000000000000
CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00000000019cc7c0 CR3: 00000000ca3b3000 CR4: 0000000000002660
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process khelper (pid: 22625, threadinfo ffff8800ee596000, task ffff88005fadeb00)
Stack:
ffff880028070e48 ffffffff81005545 ffff880051cd3a98 ffff880028070e58
<0> ffff880028070e88 ffffffff810a463d ffff880028070e58 ffff880028070e58
<0> ffff880028070e88 ffff8802f2177cc0 0000000000000000 0000000000000000
Call Trace:
<IRQ>
[<ffffffff81005545>] drop_other_mm_ref+0x85/0x90
[<ffffffff810a463d>] generic_smp_call_function_single_interrupt+0x9d/0x110
[<ffffffff810084c3>] xen_call_function_single_interrupt+0x13/0x30
[<ffffffff810d6940>] handle_IRQ_event+0x60/0x170
[<ffffffff812f3a43>] ? unmask_evtchn+0x23/0xb0
[<ffffffff810d8f32>] handle_percpu_irq+0x42/0x80
[<ffffffff812f382b>] __xen_evtchn_do_upcall+0x1db/0x200
[<ffffffff812f3dcf>] xen_evtchn_do_upcall+0x2f/0x50
[<ffffffff8100c31e>] xen_do_hypervisor_callback+0x1e/0x30
<EOI>
[<ffffffff81178afd>] ? flush_old_exec+0x3cd/0x600
[<ffffffff811c6b3d>] ? load_elf_binary+0x3ad/0x1b10
[<ffffffff81133221>] ? follow_page+0x321/0x460
[<ffffffff811384cf>] ? __get_user_pages+0x10f/0x420
[<ffffffff811c3abc>] ? load_misc_binary+0xac/0x3e0
[<ffffffff8117a0ab>] ? search_binary_handler+0x10b/0x350
[<ffffffff8117b239>] ? do_execve+0x239/0x310
[<ffffffff8126e96a>] ? strncpy_from_user+0x4a/0x90
[<ffffffff810095da>] ? sys_execve+0x4a/0x80
[<ffffffff8100c248>] ? kernel_execve+0x68/0xd0
[<ffffffff81087159>] ? ____call_usermodehelper+0x129/0x140
[<ffffffff81086f90>] ? __call_usermodehelper+0x0/0xa0
[<ffffffff8100c1ca>] ? child_rip+0xa/0x20
[<ffffffff81086f90>] ? __call_usermodehelper+0x0/0xa0
[<ffffffff8100b393>] ? int_ret_from_sys_call+0x7/0x1b
[<ffffffff8100bb1d>] ? retint_restore_args+0x5/0x6
[<ffffffff8100c1c0>] ? child_rip+0x0/0x20
Code: 74 29 65 48 8b 04 25 40 5f 01 00 f0 0f b3 b8 c8 02 00 00 48 c7 c7 00 50 a2 81 e8 fd f4 ff ff 48 89 c7 e8 75 fa fb ff 66 90 c9 c3 <0f> 0b eb fe 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5
RIP [<ffffffff8104683f>] leave_mm+0x3f/0x50
RSP <ffff880028070e28>
Environment
- Red Hat Enterprise Linux 6.1 (kernel-2.6.32-131.0.15.el6)
- Xen
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.