System crashed after general protection fault with instruction pointer at do_lookup+0x52/0x230.
Issue
- System crashed with following panic message:
general protection fault: 0000 [#1] SMP
last sysfs file: /sys/devices/system/cpu/cpu32/cache/index1/shared_cpu_map
CPU 10
..
Pid: 11751, comm: irqbalance Tainted: G B W --------------- 2.6.32-279.22.1.el6.x86_64 #1 Dell Inc. PowerEdge R820/0YWR73
RIP: 0010:[<ffffffff811848b2>] [<ffffffff811848b2>] do_lookup+0x52/0x230
RSP: 0018:ffff8810545fbc48 EFLAGS: 00010286
RAX: f7ffffff81623ac0 RBX: ffff8810545fbe28 RCX: 0000000000000000
RDX: ffff881051889bc0 RSI: ffff881051889c66 RDI: ffff88305885d012
RBP: ffff8810545fbc98 R08: 0000000000000000 R09: ffff883056cf15c0
R10: 0000000000000000 R11: 0000000000000246 R12: ffff8810545fbd18
R13: ffff8810545fbd08 R14: ffff884059659e80 R15: 0000000000000105
FS: 00007ff356145720(0000) GS:ffff8820b8840000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff356155000 CR3: 0000001050ccc000 CR4: 00000000000406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
...
Process irqbalance (pid: 11751, threadinfo ffff8810545fa000, task ffff8810558f8040)
..
Call Trace:
[<ffffffff8104338c>] ? __do_page_fault+0x1ec/0x480
[<ffffffff81184d9d>] __link_path_walk+0x20d/0x1030
[<ffffffff81185e4a>] path_walk+0x6a/0xe0
[<ffffffff8118601b>] do_path_lookup+0x5b/0xa0
[<ffffffff81177c90>] ? get_empty_filp+0xa0/0x180
[<ffffffff81186f4b>] do_filp_open+0xfb/0xd60
[<ffffffff81144401>] ? unlink_anon_vmas+0x71/0xd0
[<ffffffff81268cf1>] ? cpumask_any_but+0x31/0x50
[<ffffffff81140780>] ? unmap_region+0x110/0x130
[<ffffffff81193532>] ? alloc_fd+0x92/0x160
[<ffffffff81173c79>] do_sys_open+0x69/0x140
[<ffffffff81173d61>] sys_openat+0x11/0x20
[<ffffffff8100b072>] system_call_fastpath+0x16/0x1b
Environment
- Red Hat Enterprise Linux 6
- kernel-2.6.32-279.22.1.el6
- Dell PowerEdge R820
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.