Bug 754894

Summary: slab: Internal list corruption detected in cache 'mm_struct'(16), slabp e000006078d00000(1733853193).
Product: Red Hat Enterprise Linux 5 Reporter: Dong Zhu <dZhu>
Component: kernelAssignee: Red Hat Kernel Manager <kernel-mgr>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Red Hat Kernel QE team <kernel-qe>
Severity: low Docs Contact:
Priority: unspecified    
Version: 5.7CC: kzhang, qcai
Target Milestone: rc   
Target Release: ---   
Hardware: ia64   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-02-16 16:41:29 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Dong Zhu 2011-11-18 05:39:59 UTC
Description of problem:
Kernel Panic with kernel-2.6.18-274.12.1.el5 when run /kernel/syscalls/scrashme/multiple(tier1) test on machine altix6.rhts.eng.bos.redhat.com.


oops:
 slab: Internal list corruption detected in cache 'mm_struct'(16), slabp e000006078d00000(1733853193). Hexdump:   
  
000: 00 01  10  00  00  00  00  00  00  02  20  00  00  00  00  00   
 010:  70  00  00  00  00  00  00  00  70  00  d0  78  60  00  00  e0   
 020:  09  80  58  67  0b  00  00 00 00 00 00  00  00  00  00  00   
 030:  fd  ff  ff  ff  fe  ff  ff  ff  0c  00  00  00  06  00  00  00   
 040: fe  ff  ff  ff  fe ff  ff  ff  0d  00 00  00 03  00 00 00   
 050:  fe  ff  ff  ff  fe  ff  ff  ff  fe  ff  ff  ff  02  00  00  00   
 060:  07  00  00  00  ff  ff  ff  ff  fe  ff  ff ff fe ff ff  ff  
kernel BUG at mm/slab.c:2856!  
 scrashme[18153]: bugcheck! 0 [1]   
 Modules linked in:  autofs4  hidp  rfcomm  l2cap  bluetooth  lockd  sunrpc  be2iscsi  ib_iser rdma_cm ib_cm  iw_cm  ib_sa  ib_mad ib_core ib_addr iscsi_tcp  bnx2i  cnic  ipv6  xfrm_nalgo  crypto_api  uio  cxgb3i  libcxgbi  cxgb3  8021q  libiscsi_tcp  libiscsi2  scsi_transport_iscsi2  scsi_transport_iscsi  vfat  fat  loop  dm_multipath  scsi_dh  wmi  power_meter  hwmon  button  parport_pc  lp  parport  pata_sil680  libata tg3  sg shpchp  ide_cd  tpm_tis  tpm  cdrom  tpm_bios  dm_raid45  dm_message  dm_region_hash  dm_mem_cache  dm_snapshot  dm_zero  dm_mirror  dm_log  dm_mod  mptsas  mptscsih mptbase  scsi_transport_sas  sd_mod  scsi_mod  ext3  jbd  uhci_hcd  ohci_hcd  ehci_hcd   
   
 Pid: 18153, CPU 2, comm:             scrashme   
psr : 00001010085a2010 ifs : 800000000000038c ip  : [<a000000100169a30>]    Not tainted (2.6.18-274.12.1.el5debug)   
 ip is at check_slabp+0x210/0x240   
 unat: 0000000000000000 pfs : 000000000000038c rsc : 0000000000000003   
 rnat: 0000000000000000 bsps: 000000000001003e pr  : 0000000000569559   
 ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f   
 csd : 0000000000000000 ssd : 0000000000000000   
 b0  : a000000100169a30 b6  : a0000001005349a0 b7  : a00000010041bf00   
 f6  : 1003e00000000000000a0 f7  : 1003e20c49ba5e353f7cf   
 f8  : 1003e00000000000004e2 f9  : 1003e000000000fa00000  
f10 : 1003e000000003b9aca00 f11 : 1003e431bde82d7b634db  
 r1  : a000000100c5c3c0 r2  : a000000100a76dc8 r3  : e00000600ca89094   
 r8  : 0000000000000021 r9  : a000000100a76df8 r10 : a000000100a76df8   
 r11 : 0000000000000000 r12 : e00000600ca8fe20 r13 : e00000600ca88000   
r14 : a000000100a76dc8 r15 : 0000000000000000 r16 : ffffffffdead4ead   
 r17 : 00000000dead4ead r18 : a00000010099ea1c r19 : a000000100a5e510   
 r20 : a0000001008a1300 r21 : a000000100a5cac0 r22 : a000000100a76dd0   
 r23 : a000000100a76dd0 r24 : 8000000300000000 r25 : 0000000000000000   
 r26 : 0fd0000000000000 r27 : 0000000000000000 r28 : 0000000000000027   
 r29 : 80000001fdc01000 r30 : 0000000000000000 r31 : 0000000000001000   
   
 Call Trace:  
 [<a000000100013b40>] show_stack+0x40/0xa0   
                                 sp=e00000600ca8f9b0 bsp=e00000600ca894e0   
  [<a000000100014470>] show_regs+0x870/0x8c0   
                                 sp=e00000600ca8fb80 bsp=e00000600ca89488   
  [<a000000100037a20>] die+0x1c0/0x2a0   
                                 sp=e00000600ca8fb80 bsp=e00000600ca89440   
  [<a000000100037b50>] die_if_kernel+0x50/0x80   
                                 sp=e00000600ca8fba0 bsp=e00000600ca89410   
  [<a000000100688630>] ia64_bad_break+0x270/0x4a0   
                                 sp=e00000600ca8fba0 bsp=e00000600ca893e0  
  [<a00000010000bfe0>] __ia64_leave_kernel+0x0/0x280   
                                 sp=e00000600ca8fc50 bsp=e00000600ca893e0   
  [<a000000100169a30>] check_slabp+0x210/0x240   
                                 sp=e00000600ca8fe20 bsp=e00000600ca89380   
  [<a00000010016fd00>] free_block+0x180/0x480   
                                 sp=e00000600ca8fe20 bsp=e00000600ca89318   
  [<a000000100170700>] __drain_alien_cache+0xc0/0x100   
                                 sp=e00000600ca8fe20 bsp=e00000600ca892d8   
  [<a00000010016f5f0>] kmem_cache_free+0x410/0x620   
                                sp=e00000600ca8fe20 bsp=e00000600ca89290  
  [<a000000100077470>] __mmdrop+0x210/0x240   
                                 sp=e00000600ca8fe30 bsp=e00000600ca89270   
  [<a000000100073710>] schedule_tail+0xd0/0x1e0   
                                 sp=e00000600ca8fe30 bsp=e00000600ca89208   
  [<a00000010000c460>] ia64_invoke_schedule_tail+0x20/0x40   
                                 sp=e00000600ca8fe30 bsp=e00000600ca891b0   
  [<a000000100169a30>] check_slabp+0x210/0x240  
                                 sp=e00000600ca8fe30 bsp=e00000600ca89160   
   <0>Kernel panic - not syncing: Fatal exception  
   <0>BUG: spinlock lockup on CPU#0, scrashme/3138, e0000060089be6e8 (Not tainted)   
   
 Call Trace:   
  [<a000000100013b40>] show_stack+0x40/0xa0   
                                 sp=e0000068f30dfa20 bsp=e0000068f30d9408   
  [<a000000100013bd0>] dump_stack+0x30/0x60   
                                 sp=e0000068f30dfbf0 bsp=e0000068f30d93e8   
  [<a0000001002ee8a0>] _raw_spin_lock+0x200/0x260   
                                 sp=e0000068f30dfbf0 bsp=e0000068f30d93b0   
  [<a000000100686b20>] _spin_lock+0x20/0x40   
                                 sp=e0000068f30dfbf0 bsp=e0000068f30d9390   
  [<a00000010016d220>] cache_alloc_refill+0x140/0x5e0   
                                 sp=e0000068f30dfbf0 bsp=e0000068f30d9338   
  [<a00000010016e750>] kmem_cache_alloc+0x190/0x220   
                                 sp=e0000068f30dfbf0 bsp=e0000068f30d9308   
  [<a000000100079340>] copy_process+0x1440/0x2920   
                                 sp=e0000068f30dfbf0 bsp=e0000068f30d9258   
  [<a00000010007a8b0>] do_fork+0x90/0x3c0   
                                 sp=e0000068f30dfbf0 bsp=e0000068f30d9208   
  [<a00000010000b6a0>] sys_clone2+0x60/0x80   
                                 sp=e0000068f30dfc20 bsp=e0000068f30d91b0   
  [<a00000010000bd70>] __ia64_trace_syscall+0xd0/0x110   
                                 sp=e0000068f30dfe30 bsp=e0000068f30d91b0   
  [<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400   
                                 sp=e0000068f30e0000 bsp=e0000068f30d91b0   


Version-Release number of selected component (if applicable):
kernel-2.6.18-274.12.1.el5

How reproducible:
1-5

Steps to Reproduce:
1.run the test /kernel/syscalls/scrashme/multiple on machine altix6.rhts.eng.bos.redhat.com
2. Watch the output

  
Actual results:
kernel panic

Expected results:
job passed and no panic


Additional info:
https://beaker.engineering.redhat.com/recipes/327217
http://beaker-archive.app.eng.bos.redhat.com/beaker-logs/2011/11/1566/156648/327217/console.log

Comment 1 RHEL Program Management 2012-01-09 14:47:15 UTC
This request was evaluated by Red Hat Product Management for inclusion in Red Hat Enterprise Linux 5.8 and Red Hat does not plan to fix this issue the currently developed update.

Contact your manager or support representative in case you need to escalate this bug.

Comment 3 RHEL Program Management 2012-10-30 06:13:57 UTC
This request was not resolved in time for the current release.
Red Hat invites you to ask your support representative to
propose this request, if still desired, for consideration in
the next release of Red Hat Enterprise Linux.