| Summary: | slab: Internal list corruption detected in cache 'mm_struct'(16), slabp e000006078d00000(1733853193). | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 5 | Reporter: | Dong Zhu <dZhu> |
| Component: | kernel | Assignee: | Red Hat Kernel Manager <kernel-mgr> |
| Status: | CLOSED INSUFFICIENT_DATA | QA Contact: | Red Hat Kernel QE team <kernel-qe> |
| Severity: | low | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 5.7 | CC: | kzhang, qcai |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | ia64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2013-02-16 16:41:29 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
This request was evaluated by Red Hat Product Management for inclusion in Red Hat Enterprise Linux 5.8 and Red Hat does not plan to fix this issue the currently developed update. Contact your manager or support representative in case you need to escalate this bug. This request was not resolved in time for the current release. Red Hat invites you to ask your support representative to propose this request, if still desired, for consideration in the next release of Red Hat Enterprise Linux. |
Description of problem: Kernel Panic with kernel-2.6.18-274.12.1.el5 when run /kernel/syscalls/scrashme/multiple(tier1) test on machine altix6.rhts.eng.bos.redhat.com. oops: slab: Internal list corruption detected in cache 'mm_struct'(16), slabp e000006078d00000(1733853193). Hexdump: 000: 00 01 10 00 00 00 00 00 00 02 20 00 00 00 00 00 010: 70 00 00 00 00 00 00 00 70 00 d0 78 60 00 00 e0 020: 09 80 58 67 0b 00 00 00 00 00 00 00 00 00 00 00 030: fd ff ff ff fe ff ff ff 0c 00 00 00 06 00 00 00 040: fe ff ff ff fe ff ff ff 0d 00 00 00 03 00 00 00 050: fe ff ff ff fe ff ff ff fe ff ff ff 02 00 00 00 060: 07 00 00 00 ff ff ff ff fe ff ff ff fe ff ff ff kernel BUG at mm/slab.c:2856! scrashme[18153]: bugcheck! 0 [1] Modules linked in: autofs4 hidp rfcomm l2cap bluetooth lockd sunrpc be2iscsi ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp bnx2i cnic ipv6 xfrm_nalgo crypto_api uio cxgb3i libcxgbi cxgb3 8021q libiscsi_tcp libiscsi2 scsi_transport_iscsi2 scsi_transport_iscsi vfat fat loop dm_multipath scsi_dh wmi power_meter hwmon button parport_pc lp parport pata_sil680 libata tg3 sg shpchp ide_cd tpm_tis tpm cdrom tpm_bios dm_raid45 dm_message dm_region_hash dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod mptsas mptscsih mptbase scsi_transport_sas sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd Pid: 18153, CPU 2, comm: scrashme psr : 00001010085a2010 ifs : 800000000000038c ip : [<a000000100169a30>] Not tainted (2.6.18-274.12.1.el5debug) ip is at check_slabp+0x210/0x240 unat: 0000000000000000 pfs : 000000000000038c rsc : 0000000000000003 rnat: 0000000000000000 bsps: 000000000001003e pr : 0000000000569559 ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f csd : 0000000000000000 ssd : 0000000000000000 b0 : a000000100169a30 b6 : a0000001005349a0 b7 : a00000010041bf00 f6 : 1003e00000000000000a0 f7 : 1003e20c49ba5e353f7cf f8 : 1003e00000000000004e2 f9 : 1003e000000000fa00000 f10 : 1003e000000003b9aca00 f11 : 1003e431bde82d7b634db r1 : a000000100c5c3c0 r2 : a000000100a76dc8 r3 : e00000600ca89094 r8 : 0000000000000021 r9 : a000000100a76df8 r10 : a000000100a76df8 r11 : 0000000000000000 r12 : e00000600ca8fe20 r13 : e00000600ca88000 r14 : a000000100a76dc8 r15 : 0000000000000000 r16 : ffffffffdead4ead r17 : 00000000dead4ead r18 : a00000010099ea1c r19 : a000000100a5e510 r20 : a0000001008a1300 r21 : a000000100a5cac0 r22 : a000000100a76dd0 r23 : a000000100a76dd0 r24 : 8000000300000000 r25 : 0000000000000000 r26 : 0fd0000000000000 r27 : 0000000000000000 r28 : 0000000000000027 r29 : 80000001fdc01000 r30 : 0000000000000000 r31 : 0000000000001000 Call Trace: [<a000000100013b40>] show_stack+0x40/0xa0 sp=e00000600ca8f9b0 bsp=e00000600ca894e0 [<a000000100014470>] show_regs+0x870/0x8c0 sp=e00000600ca8fb80 bsp=e00000600ca89488 [<a000000100037a20>] die+0x1c0/0x2a0 sp=e00000600ca8fb80 bsp=e00000600ca89440 [<a000000100037b50>] die_if_kernel+0x50/0x80 sp=e00000600ca8fba0 bsp=e00000600ca89410 [<a000000100688630>] ia64_bad_break+0x270/0x4a0 sp=e00000600ca8fba0 bsp=e00000600ca893e0 [<a00000010000bfe0>] __ia64_leave_kernel+0x0/0x280 sp=e00000600ca8fc50 bsp=e00000600ca893e0 [<a000000100169a30>] check_slabp+0x210/0x240 sp=e00000600ca8fe20 bsp=e00000600ca89380 [<a00000010016fd00>] free_block+0x180/0x480 sp=e00000600ca8fe20 bsp=e00000600ca89318 [<a000000100170700>] __drain_alien_cache+0xc0/0x100 sp=e00000600ca8fe20 bsp=e00000600ca892d8 [<a00000010016f5f0>] kmem_cache_free+0x410/0x620 sp=e00000600ca8fe20 bsp=e00000600ca89290 [<a000000100077470>] __mmdrop+0x210/0x240 sp=e00000600ca8fe30 bsp=e00000600ca89270 [<a000000100073710>] schedule_tail+0xd0/0x1e0 sp=e00000600ca8fe30 bsp=e00000600ca89208 [<a00000010000c460>] ia64_invoke_schedule_tail+0x20/0x40 sp=e00000600ca8fe30 bsp=e00000600ca891b0 [<a000000100169a30>] check_slabp+0x210/0x240 sp=e00000600ca8fe30 bsp=e00000600ca89160 <0>Kernel panic - not syncing: Fatal exception <0>BUG: spinlock lockup on CPU#0, scrashme/3138, e0000060089be6e8 (Not tainted) Call Trace: [<a000000100013b40>] show_stack+0x40/0xa0 sp=e0000068f30dfa20 bsp=e0000068f30d9408 [<a000000100013bd0>] dump_stack+0x30/0x60 sp=e0000068f30dfbf0 bsp=e0000068f30d93e8 [<a0000001002ee8a0>] _raw_spin_lock+0x200/0x260 sp=e0000068f30dfbf0 bsp=e0000068f30d93b0 [<a000000100686b20>] _spin_lock+0x20/0x40 sp=e0000068f30dfbf0 bsp=e0000068f30d9390 [<a00000010016d220>] cache_alloc_refill+0x140/0x5e0 sp=e0000068f30dfbf0 bsp=e0000068f30d9338 [<a00000010016e750>] kmem_cache_alloc+0x190/0x220 sp=e0000068f30dfbf0 bsp=e0000068f30d9308 [<a000000100079340>] copy_process+0x1440/0x2920 sp=e0000068f30dfbf0 bsp=e0000068f30d9258 [<a00000010007a8b0>] do_fork+0x90/0x3c0 sp=e0000068f30dfbf0 bsp=e0000068f30d9208 [<a00000010000b6a0>] sys_clone2+0x60/0x80 sp=e0000068f30dfc20 bsp=e0000068f30d91b0 [<a00000010000bd70>] __ia64_trace_syscall+0xd0/0x110 sp=e0000068f30dfe30 bsp=e0000068f30d91b0 [<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400 sp=e0000068f30e0000 bsp=e0000068f30d91b0 Version-Release number of selected component (if applicable): kernel-2.6.18-274.12.1.el5 How reproducible: 1-5 Steps to Reproduce: 1.run the test /kernel/syscalls/scrashme/multiple on machine altix6.rhts.eng.bos.redhat.com 2. Watch the output Actual results: kernel panic Expected results: job passed and no panic Additional info: https://beaker.engineering.redhat.com/recipes/327217 http://beaker-archive.app.eng.bos.redhat.com/beaker-logs/2011/11/1566/156648/327217/console.log