Bug 144876
Summary: | kernel panic __put_unused_buffer_head | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | Karsten Hopp <karsten> |
Component: | kernel | Assignee: | Jan Glauber <jglauber> |
Status: | CLOSED WONTFIX | QA Contact: | Brian Brock <bbrock> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 3.0 | CC: | anderson, katzj, lwoodman, peterm, petrides, riel, zaitcev |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | s390x | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2007-10-19 19:09:22 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Karsten Hopp
2005-01-12 09:06:48 UTC
*** Bug 147548 has been marked as a duplicate of this bug. *** This is getting serious. Larry, Rik, I would appreciate a look by a virtual memory specialist, but please do not take this bug from me just yet (unless this happens on other platforms, too). It appears that the buffer_head.lru listhead is corrupt so the list_del(&bh->lru); in __put_unused_buffer_head() crashes. Is this reproducable and if so has it ever happened on other architectures? Larry Woodman This happened after a few days uptime with building packages in beehive, it's not reproducable with a simple command. But it has happened at least twice now, probably more often. It happened again ;-) Bug is still present in 2.4.21-27.EL: addressing exception: 0038 CPU: 7 Not tainted cramfs loop autofs4 nfs lockd sunrpc audit qeth qdio af_packet sd_mod scsi_mod ext3 jbd raid0 dasd_fba_mod dasd_eckd_mod dasd_mod Process uic (pid: 15462, task: 00000000a0abc000, ksp: 00000000a0abf818, f: 1) Krnl PSW : 0700200180000000 0000000000083994 __put_unused_buffer_head [kernel] 0x6c (2.4.21-27.EL) Krnl GPRS: 0000000000000000 1800000000000000 00000000000000b8 00000000001d2fd2 0001013f02517028 00000000004761a8 00000002b7bf4d00 00000002ab71edc0 0000000000000028 00000000829e0528 0000000000000000 00000000004761b8 0000000000000000 00000000001bf870 00000000a0abfa80 00000000a0abf9e0 Krnl ACRS: 40ddd200 28fff970 00000000 00000000 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Krnl Code: e3 10 40 08 00 24 e3 00 20 08 00 24 c0 a0 00 1f 94 08 b9 04 [<0000000000087474>] try_to_free_buffers [kernel] 0x128 (0xa0abfaf0) [<00000000000840a0>] try_to_release_page [kernel] 0x7c (0xa0abfb90) [<000000000006019e>] filemap_nopage [kernel] 0x312 (0xa0abfc30) [<0000000000056c96>] do_no_page [kernel] 0x9a (0xa0abfce0) [<0000000000057100>] handle_mm_fault [kernel] 0x13c (0xa0abfd90) [<0000000000014898>] do_page_exception [kernel] 0x214 (0xa0abfe48) [<000000000001572e>] sysc_return [kernel] 0x0 (0xa0abfef0) [<->] (0x0) Kernel panic: Fatal exception Reassigning from PeteZ to Jan. This bug is filed against RHEL 3, which is in maintenance phase. During the maintenance phase, only security errata and select mission critical bug fixes will be released for enterprise products. Since this bug does not meet that criteria, it is now being closed. For more information of the RHEL errata support policy, please visit: http://www.redhat.com/security/updates/errata/ If you feel this bug is indeed mission critical, please contact your support representative. You may be asked to provide detailed information on how this bug is affecting you. |