Server panics with message "kernel BUG at fs/ext4/mballoc.c:1706!"

Solution Verified - Updated -

Issue

  • Server panics with the following messages:
    (Line number and addresses will vary based on kernel release).
kernel BUG at fs/ext4/mballoc.c:1706!
invalid opcode: 0000 [#1] SMP 
last sysfs file: /sys/devices/pci0000:00/0000:00:08.0/0000:31:00.0/0000:32:04.0/0000:34:00.1/irq
CPU 9 
Modules linked in: ipv6 ltddnr(U) ltdmemchk(U) ltdmce(U) ltdrdev(U) ltdrint(U) ltdpatch(U) ltd(U) ltdlsd(U) vhost_net macvtap macvlan tun kvm_intel kvm uinput microcode i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support sg igb(U) dca ext4 mbcache jbd2 sddlmfdrv(P)(U) sddlmadrv(P)(U) sd_mod crc_t10dif pata_acpi ata_generic ata_piix hfcldd(U) scsi_transport_fc scsi_tgt hfcldd_conf(U) dm_mod hraslog_post(U) hraslog(U) hraslog_link(U) [last unloaded: ltddnr]
Pid: 8454, comm: flush-253:35 Tainted: P           ----------------   2.6.32-131.0.15.el6.x86_64 #1 BladeSymphony E57E2 
RIP: 0010:[<ffffffffa02507a9>]  [<ffffffffa02507a9>] ext4_mb_simple_scan_group+0x129/0x140 [ext4]
RSP: 0018:ffff8802547ab660  EFLAGS: 00010246
RAX: 0000000000004000 RBX: ffff8801e7c941c0 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000000000000
RBP: ffff8802547ab6b0 R08: ffff880253cbb800 R09: 0000000000004000
R10: ffff88026bf00000 R11: ffff8801ce6aaf88 R12: ffff8802547ab700
R13: ffff880269fc7800 R14: 0000000000000001 R15: 0000000000004000
FS:  0000000000000000(0000) GS:ffff88002f840000(0000) knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 00007f50ba27e000 CR3: 0000000258cd8000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process flush-253:35 (pid: 8454, threadinfo ffff8802547aa000, task ffff880267a780c0)
Stack:
 0000000000000000 ffff880200000000 0000006300001000 0000400000000000
<0> ffff8802547ab6b0 ffff8801e7c941c0 0000000000000031 ffff880269fc7800
<0> 0000000000000000 0000000000000050 ffff8802547ab770 ffffffffa0255d55
Call Trace:
 [<ffffffffa0255d55>] ext4_mb_regular_allocator+0x535/0x550 [ext4]
 [<ffffffffa02560fd>] ext4_mb_new_blocks+0x38d/0x560 [ext4]
 [<ffffffffa024973e>] ? ext4_ext_find_extent+0x2be/0x320 [ext4]
 [<ffffffffa024c814>] ext4_ext_get_blocks+0x1104/0x19a0 [ext4]
 [<ffffffff8124951f>] ? submit_bio+0x8f/0x120
 [<ffffffffa022a935>] ext4_get_blocks+0xf5/0x2a0 [ext4]
 [<ffffffff81123375>] ? pagevec_lookup_tag+0x25/0x40
 [<ffffffffa022b8fc>] mpage_da_map_blocks+0xac/0x450 [ext4]
 [<ffffffffa01f7a0e>] ? jbd2_journal_stop+0x1fe/0x2e0 [jbd2]
 [<ffffffffa01f8405>] ? jbd2_journal_start+0xb5/0x100 [jbd2]
 [<ffffffffa022c537>] ext4_da_writepages+0x2f7/0x660 [ext4]
 [<ffffffff81122521>] do_writepages+0x21/0x40
 [<ffffffff8119bbbd>] writeback_single_inode+0xdd/0x2c0
 [<ffffffff8119bfbe>] writeback_sb_inodes+0xce/0x180
 [<ffffffff8119c11b>] writeback_inodes_wb+0xab/0x1b0
 [<ffffffff8119c4bb>] wb_writeback+0x29b/0x3f0
 [<ffffffff814db337>] ? thread_return+0x4e/0x777
 [<ffffffff8107a202>] ? del_timer_sync+0x22/0x30
 [<ffffffff8119c7a9>] wb_do_writeback+0x199/0x240
 [<ffffffff8119c8b3>] bdi_writeback_task+0x63/0x1b0
 [<ffffffff8108e027>] ? bit_waitqueue+0x17/0xd0
 [<ffffffff81130b90>] ? bdi_start_fn+0x0/0x100
 [<ffffffff81130c16>] bdi_start_fn+0x86/0x100
 [<ffffffff81130b90>] ? bdi_start_fn+0x0/0x100
 [<ffffffff8108ddf6>] kthread+0x96/0xa0
 [<ffffffff8100c1ca>] child_rip+0xa/0x20
 [<ffffffff8108dd60>] ? kthread+0x0/0xa0
 [<ffffffff8100c1c0>] ? child_rip+0x0/0x20
Code: 85 90 02 00 00 44 8b 90 bc 02 00 00 45 85 d2 74 07 f0 ff 80 fc 02 00 00 48 83 c4 28 5b 41 5c 41 5d 41 5e 41 5f c9 c3 0f 0b eb fe <0f> 0b eb fe 0f 0b 90 eb fd 0f 0b eb fe 66 2e 0f 1f 84 00 00 00 
RIP  [<ffffffffa02507a9>] ext4_mb_simple_scan_group+0x129/0x140 [ext4]
 RSP <ffff8802547ab660>

Environment

  • Red Hat Enterprise Linux 6
  • kernel-2.6.32-131.0.15.el6
  • kernel-2.6.32-431.40.1.el6
  • kernel-2.6.32-642.6.2.el6
  • kernel-2.6.32-754.15.3.el6

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content