Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 104922
Summary: | oops in md_thread | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux Beta | Reporter: | Mike McLean <mikem> |
Component: | kernel | Assignee: | Dave Jones <davej> |
Status: | CLOSED RAWHIDE | QA Contact: | Brian Brock <bbrock> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | beta2 | CC: | dwmw2, pfrields, riel |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2003-09-29 01:05:06 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Mike McLean
2003-09-23 16:08:50 UTC
what kernel version was this ? from the oops: 2.4.22-1.2061.nptlsmp i.e. kernel-smp-2.4.22-1.2061.nptl.i686.rpm just got a similar trace with raid1 (same machine, Cambridge-re0924.nightly) CPU: 1 EIP: 0060:[<c01202bd>] Not tainted EFLAGS: 00010082 EIP is at schedule [kernel] 0x11d (2.4.22-1.2061.nptlsmp) eax: 00000008 ebx: 00000000 ecx: f727c02c edx: f727c000 esi: f727c000 edi: f727c000 ebp: f727ded8 esp: f727de90 ds: 0068 es: 0068 ss: 0068 Process raid1d (pid: 19, stackpage=f727d000) Stack: c03f9800 00000000 c037f9b8 00000000 c010bcfb f727c068 f727c000 00036511 99a29fbc 00000023 0000000b c0129437 c040b380 00000000 00000001 c037dc00 c405e1ac f727c000 0000000b c01298dc f727c000 f7270068 f727dfc4 f727c000 Call Trace: [<c010bcfb>] do_IRQ [kernel] 0xfb (0xf727dea0) [<c0129437>] exit_notify [kernel] 0xf7 (exf727debc) [<c01298dc>] do_exit [kernel] 0x30c (0xf727dedc) [<c010a604>] die [kernel] 0x94 (0xf727def8) [<c011e0a4>] do_page_fault [kernel] 0x2b4 (0xf727df0c) [<c0120769>] schedule [kernel] 0x5c9 (0xf727df5c) [<c011ddf0>] do_page_fault [kernel] 0x0 (0xf727dfb0) [<c0109ff0>] error_code [kernel] 0x34 (0xf727dfb8) [<c021002b>] fbcon_setup [kernel] 0x67b (0xf727dfe0) Code: ff 0b 8b 51 04 8b 46 2c 89 50 04 89 02 c7 41 04 00 00 00 00 I see similar oopsen, and also silent lockups, lockups with just 'Unable to handle kernel NULL pointer dereference' and oopsen with kernel threads apparently trying to access user space. kernel-smp-2.4.22-1.2061.nptl.athlon.rpm, again with RAID. Should be fixed as of 2075, please reopen if it reappears. *** Bug 104958 has been marked as a duplicate of this bug. *** |