Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.

Bug 104922

Summary: oops in md_thread
Product: [Retired] Red Hat Linux Beta Reporter: Mike McLean <mikem>
Component: kernelAssignee: Dave Jones <davej>
Status: CLOSED RAWHIDE QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: beta2CC: dwmw2, pfrields, riel
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2003-09-29 01:05:06 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mike McLean 2003-09-23 16:08:50 UTC
* Severn-0.93.2-i386
* raid5 on /usr

Got the following oops.  Console was locked so I could not tell when it
happened, but it was most likely during or very shortly after the boot process.
 The machine is a Proliant DL380 G2 with a smartarray (cciss).  Will try to
replicate.

 virtual address 0000001e
*pde = 00000000
Oops: 0000
e100 floppy microcode keybdev mousedev hid input usb-ohci usbcore ext3 jbd raid5
xor cciss sd_mod scsi_mod
CPU:    1
EIP:    0060:[<c0120624>]   Not tainted
EFLAGS: 00010046

EIP is at schedule [kernel] 0x484 (2.4.22-1.2061.nptlsmp)
eax: 00000002   ebx: c040b380   ecx: c040bc90   edx: c040b818
esi: 0000008c   edi: ffffffd6   ebp: f7277fa8   esp: f7277f60
ds: 0068   es: 0068   ss: 0068
Process raid5d (pid: 20, stackpage=f7277000)
Stack: 00000000 00000000 00000000 00000000 00000000 c040b81c f7276000 000057cd
       4bdbc0d3 00000018 c040bc90 c040b818 c040b380 00000000 00000001 f7276000
       f7276000 f7279fa4 f7279fac c021c545 f7287400 f8849e8b f72c5d10 f7276000
Call Trace:   [<c021c545>] md_thread [kernel] 0x1c5 (0xf7277fac)
[<f8849e8b>] .rodata.str1.1 [raid5] 0x56 (0xf7277fb4)
[<c021c380>] md_thread [kernel] 0x0 (0xf7277fe0)
[<c01075ad>] kernel_thread_helper [kernel] 0x5 (0xf7277ff0)


Code: 8b 47 48 85 c0 0f 8e 91 00 00 00 8b 5d d8 8b 75 dc 2b 5f 40

Comment 1 Dave Jones 2003-09-23 16:19:46 UTC
what kernel version was this ?

Comment 2 Mike McLean 2003-09-23 17:31:59 UTC
from the oops: 2.4.22-1.2061.nptlsmp
i.e. kernel-smp-2.4.22-1.2061.nptl.i686.rpm

Comment 3 Mike McLean 2003-09-24 19:51:59 UTC
just got a similar trace with raid1 (same machine, Cambridge-re0924.nightly)

CPU:    1
EIP:    0060:[<c01202bd>]   Not tainted
EFLAGS: 00010082

EIP is at schedule [kernel] 0x11d (2.4.22-1.2061.nptlsmp)
eax: 00000008   ebx: 00000000   ecx: f727c02c   edx: f727c000
esi: f727c000   edi: f727c000   ebp: f727ded8   esp: f727de90
ds: 0068   es: 0068   ss: 0068
Process raid1d (pid: 19, stackpage=f727d000)
Stack: c03f9800 00000000 c037f9b8 00000000 c010bcfb f727c068 f727c000 00036511
       99a29fbc 00000023 0000000b c0129437 c040b380 00000000 00000001 c037dc00
       c405e1ac f727c000 0000000b c01298dc f727c000 f7270068 f727dfc4 f727c000
Call Trace:   [<c010bcfb>] do_IRQ [kernel] 0xfb (0xf727dea0)
[<c0129437>] exit_notify [kernel] 0xf7 (exf727debc)
[<c01298dc>] do_exit [kernel] 0x30c (0xf727dedc)
[<c010a604>] die [kernel] 0x94 (0xf727def8)
[<c011e0a4>] do_page_fault [kernel] 0x2b4 (0xf727df0c)
[<c0120769>] schedule [kernel] 0x5c9 (0xf727df5c)
[<c011ddf0>] do_page_fault [kernel] 0x0 (0xf727dfb0)
[<c0109ff0>] error_code [kernel] 0x34 (0xf727dfb8)
[<c021002b>] fbcon_setup [kernel] 0x67b (0xf727dfe0)


Code: ff 0b 8b 51 04 8b 46 2c 89 50 04 89 02 c7 41 04 00 00 00 00


Comment 4 David Woodhouse 2003-09-25 13:57:12 UTC
I see similar oopsen, and also silent lockups, lockups with just 'Unable to
handle kernel NULL pointer dereference' and oopsen with kernel threads
apparently trying to access user space. 

kernel-smp-2.4.22-1.2061.nptl.athlon.rpm, again with RAID.

Comment 5 Dave Jones 2003-09-29 01:05:06 UTC
Should be fixed as of 2075, please reopen if it reappears.


Comment 6 Dave Jones 2003-09-29 01:06:23 UTC
*** Bug 104958 has been marked as a duplicate of this bug. ***