Server panics with message "kernel BUG at fs/ext4/mballoc.c:1706!"
Issue
- Server panics with the following messages:
(Line number and addresses will vary based on kernel release).
kernel BUG at fs/ext4/mballoc.c:1706!
invalid opcode: 0000 [#1] SMP
last sysfs file: /sys/devices/pci0000:00/0000:00:08.0/0000:31:00.0/0000:32:04.0/0000:34:00.1/irq
CPU 9
Modules linked in: ipv6 ltddnr(U) ltdmemchk(U) ltdmce(U) ltdrdev(U) ltdrint(U) ltdpatch(U) ltd(U) ltdlsd(U) vhost_net macvtap macvlan tun kvm_intel kvm uinput microcode i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support sg igb(U) dca ext4 mbcache jbd2 sddlmfdrv(P)(U) sddlmadrv(P)(U) sd_mod crc_t10dif pata_acpi ata_generic ata_piix hfcldd(U) scsi_transport_fc scsi_tgt hfcldd_conf(U) dm_mod hraslog_post(U) hraslog(U) hraslog_link(U) [last unloaded: ltddnr]
Pid: 8454, comm: flush-253:35 Tainted: P ---------------- 2.6.32-131.0.15.el6.x86_64 #1 BladeSymphony E57E2
RIP: 0010:[<ffffffffa02507a9>] [<ffffffffa02507a9>] ext4_mb_simple_scan_group+0x129/0x140 [ext4]
RSP: 0018:ffff8802547ab660 EFLAGS: 00010246
RAX: 0000000000004000 RBX: ffff8801e7c941c0 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000000000000
RBP: ffff8802547ab6b0 R08: ffff880253cbb800 R09: 0000000000004000
R10: ffff88026bf00000 R11: ffff8801ce6aaf88 R12: ffff8802547ab700
R13: ffff880269fc7800 R14: 0000000000000001 R15: 0000000000004000
FS: 0000000000000000(0000) GS:ffff88002f840000(0000) knlGS:0000000000000000
CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 00007f50ba27e000 CR3: 0000000258cd8000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process flush-253:35 (pid: 8454, threadinfo ffff8802547aa000, task ffff880267a780c0)
Stack:
0000000000000000 ffff880200000000 0000006300001000 0000400000000000
<0> ffff8802547ab6b0 ffff8801e7c941c0 0000000000000031 ffff880269fc7800
<0> 0000000000000000 0000000000000050 ffff8802547ab770 ffffffffa0255d55
Call Trace:
[<ffffffffa0255d55>] ext4_mb_regular_allocator+0x535/0x550 [ext4]
[<ffffffffa02560fd>] ext4_mb_new_blocks+0x38d/0x560 [ext4]
[<ffffffffa024973e>] ? ext4_ext_find_extent+0x2be/0x320 [ext4]
[<ffffffffa024c814>] ext4_ext_get_blocks+0x1104/0x19a0 [ext4]
[<ffffffff8124951f>] ? submit_bio+0x8f/0x120
[<ffffffffa022a935>] ext4_get_blocks+0xf5/0x2a0 [ext4]
[<ffffffff81123375>] ? pagevec_lookup_tag+0x25/0x40
[<ffffffffa022b8fc>] mpage_da_map_blocks+0xac/0x450 [ext4]
[<ffffffffa01f7a0e>] ? jbd2_journal_stop+0x1fe/0x2e0 [jbd2]
[<ffffffffa01f8405>] ? jbd2_journal_start+0xb5/0x100 [jbd2]
[<ffffffffa022c537>] ext4_da_writepages+0x2f7/0x660 [ext4]
[<ffffffff81122521>] do_writepages+0x21/0x40
[<ffffffff8119bbbd>] writeback_single_inode+0xdd/0x2c0
[<ffffffff8119bfbe>] writeback_sb_inodes+0xce/0x180
[<ffffffff8119c11b>] writeback_inodes_wb+0xab/0x1b0
[<ffffffff8119c4bb>] wb_writeback+0x29b/0x3f0
[<ffffffff814db337>] ? thread_return+0x4e/0x777
[<ffffffff8107a202>] ? del_timer_sync+0x22/0x30
[<ffffffff8119c7a9>] wb_do_writeback+0x199/0x240
[<ffffffff8119c8b3>] bdi_writeback_task+0x63/0x1b0
[<ffffffff8108e027>] ? bit_waitqueue+0x17/0xd0
[<ffffffff81130b90>] ? bdi_start_fn+0x0/0x100
[<ffffffff81130c16>] bdi_start_fn+0x86/0x100
[<ffffffff81130b90>] ? bdi_start_fn+0x0/0x100
[<ffffffff8108ddf6>] kthread+0x96/0xa0
[<ffffffff8100c1ca>] child_rip+0xa/0x20
[<ffffffff8108dd60>] ? kthread+0x0/0xa0
[<ffffffff8100c1c0>] ? child_rip+0x0/0x20
Code: 85 90 02 00 00 44 8b 90 bc 02 00 00 45 85 d2 74 07 f0 ff 80 fc 02 00 00 48 83 c4 28 5b 41 5c 41 5d 41 5e 41 5f c9 c3 0f 0b eb fe <0f> 0b eb fe 0f 0b 90 eb fd 0f 0b eb fe 66 2e 0f 1f 84 00 00 00
RIP [<ffffffffa02507a9>] ext4_mb_simple_scan_group+0x129/0x140 [ext4]
RSP <ffff8802547ab660>
Environment
- Red Hat Enterprise Linux 6
- kernel-2.6.32-131.0.15.el6
- kernel-2.6.32-431.40.1.el6
- kernel-2.6.32-642.6.2.el6
- kernel-2.6.32-754.15.3.el6
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.