[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#503962: linux-image-2.6.26-1-xen-amd64: kernel oops after short on memory situation



Package: linux-image-2.6.26-1-xen-amd64
Version: 2.6.26-8
Severity: important

I can consistently make the kernel oops with the following situation:

If I have a domain (either domU or dom0) that is limited on memory and I start a program that needs 
more memory than available as physical memory, this program will use more than 99% of CPU. Swap space
is available more than enogh, but will not be used extensively. When I interrupt the program with Ctrl-C,
I get the oops. 
Example: Domain with 128M of memory and 2G of swap. Starting e2fsck on a filesystem with 300G will 
trigger the effect. Swap space is used about 350k. Extending the memory of the domain to 256M will 
make the problem go away. Unfortunately this is not a possibility in all situations.


Oct 29 09:26:28 server kernel: [40200.737611] Eeek! page_mapcount(page) went negative! (-1)
Oct 29 09:26:28 server kernel: [40200.737645]   page pfn = 1d
Oct 29 09:26:28 server kernel: [40200.737655]   page->flags = 0
Oct 29 09:26:28 server kernel: [40200.737666]   page->count = 0
Oct 29 09:26:28 server kernel: [40200.737676]   page->mapping = 0000000000000000
Oct 29 09:26:28 server kernel: [40200.737710]   vma->vm_ops = 0x0
Oct 29 09:26:28 server kernel: [40200.737737] ------------[ cut here ]------------
Oct 29 09:26:28 server kernel: [40200.737749] kernel BUG at mm/rmap.c:669!
Oct 29 09:26:28 server kernel: [40200.737760] invalid opcode: 0000 [1] SMP 
Oct 29 09:26:28 server kernel: [40200.737779] CPU 0 
Oct 29 09:26:28 server kernel: [40200.737793] Modules linked in: openafs(P) bridge netloop video output ac battery ip6table_filter ip6_tables iptable_raw xt_comment xt_policy ipt_ULOG ipt_TTL ipt_ttl ipt_REJECT ipt_REDIRECT ipt_recent ipt_NETMAP ipt_MASQUERADE ipt_LOG ipt_ECN ipt_ecn ipt_CLUSTERIP ipt_ah ipt_addrtype nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda nf_conntrack_tftp nf_conntrack_sip nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp xt_tcpmss xt_pkttype xt_physdev xt_owner xt_NFQUEUE xt_NFLOG xt_multiport xt_MARK xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit xt_DSCP xt_dscp xt_dccp xt_conntrack xt_CONNMARK xt_connmark xt_CLASSIFY xt_tcpudp xt_state iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack iptable_mangle nfnetlink iptable_filter ip_tables x_tables dummy ipv6 loo
Oct 29 09:26:28 server kernel:  ide_generic serio_raw pcspkr psmouse k8temp i2c_nforce2 button i2c_core evdev ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod raid456 md_mod async_xor async_memcpy async_tx xor sd_mod ide_cd_mod cdrom ide_disk sata_nv ata_generic r8169 forcedeth amd74xx libata scsi_mod dock ide_pci_generic ide_core thermal processor fan thermal_sys
Oct 29 09:26:28 server kernel: [40200.738424] Pid: 11894, comm: e2fsck Tainted: P          2.6.26-1-xen-amd64 #1
Oct 29 09:26:28 server kernel: [40200.738440] RIP: e030:[<ffffffff8027c464>]  [<ffffffff8027c464>] page_remove_rmap+0xfb/0x117
Oct 29 09:26:28 server kernel: [40200.738467] RSP: e02b:ffff880008797bf8  EFLAGS: 00010246
Oct 29 09:26:28 server kernel: [40200.738479] RAX: 0000000000000000 RBX: ffff880001e6e658 RCX: 000075750000a035
Oct 29 09:26:28 server kernel: [40200.738491] RDX: ffffffffff5f7000 RSI: 0000000000000001 RDI: ffffffff805aaab0
Oct 29 09:26:28 server kernel: [40200.738504] RBP: ffff88003e208528 R08: 0000000000000023 R09: ffff880008797600
Oct 29 09:26:28 server kernel: [40200.738516] R10: 0000000000000000 R11: 000001f328e040ae R12: ffff880001e6e658
Oct 29 09:26:28 server kernel: [40200.738529] R13: ffff880008129c70 R14: ffff88003e2e0700 R15: ffff880002032108
Oct 29 09:26:28 server kernel: [40200.738544] FS:  00007f0f53e05740(0000) GS:ffffffff80539000(0000) knlGS:0000000000000000
Oct 29 09:26:28 server kernel: [40200.738561] CS:  e033 DS: 0000 ES: 0000
Oct 29 09:26:28 server kernel: [40200.738572] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Oct 29 09:26:28 server kernel: [40200.738585] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Oct 29 09:26:28 server kernel: [40200.738598] Process e2fsck (pid: 11894, threadinfo ffff880008796000, task ffff880008728340)
Oct 29 09:26:28 server kernel: [40200.738615] Stack:  ffff880008129c58 000000000001d500 0000000002f8e000 ffffffff80273155
Oct 29 09:26:28 server kernel: [40200.738651]  ffff8800087e8000 0000000000000000 ffff880008797cf8 ffffffffffffffff
Oct 29 09:26:28 server kernel: [40200.738683]  0000000000000000 ffff88003e208528 ffff880008797d00 0000000000323000
Oct 29 09:26:28 server kernel: [40200.738707] Call Trace:
Oct 29 09:26:28 server kernel: [40200.738736]  [<ffffffff80273155>] ? unmap_vmas+0x744/0xa49
Oct 29 09:26:28 server kernel: [40200.738783]  [<ffffffff80278483>] ? exit_mmap+0x7b/0xf7
Oct 29 09:26:28 server kernel: [40200.738802]  [<ffffffff8022a6bd>] ? mmput+0x2c/0xc0
Oct 29 09:26:28 server kernel: [40200.738820]  [<ffffffff8022fe32>] ? do_exit+0x25a/0x6ce
Oct 29 09:26:28 server kernel: [40200.738844]  [<ffffffff8023034c>] ? do_group_exit+0xa6/0xdc
Oct 29 09:26:28 server kernel: [40200.738862]  [<ffffffff80238dbd>] ? get_signal_to_deliver+0x3b1/0x40b
Oct 29 09:26:28 server kernel: [40200.738884]  [<ffffffff8020a907>] ? do_notify_resume+0xa0/0x832
Oct 29 09:26:28 server kernel: [40200.738898]  [<ffffffff8020e7a8>] ? get_nsec_offset+0x9/0x2c
Oct 29 09:26:28 server kernel: [40200.738912]  [<ffffffff8020e804>] ? local_clock+0x39/0x83
Oct 29 09:26:28 server kernel: [40200.738933]  [<ffffffff80222f78>] ? __dequeue_entity+0x25/0x69
Oct 29 09:26:28 server kernel: [40200.738952]  [<ffffffff80222fd4>] ? set_next_entity+0x18/0x3a
Oct 29 09:26:28 server kernel: [40200.738975]  [<ffffffff8043449b>] ? thread_return+0x3e/0xdb
Oct 29 09:26:28 server kernel: [40200.738999]  [<ffffffff802181fd>] ? do_page_fault+0xb73/0xf50
Oct 29 09:26:28 server kernel: [40200.739026]  [<ffffffff8020bb29>] ? retint_signal+0x57/0xae
Oct 29 09:26:28 server kernel: [40200.739063] 
Oct 29 09:26:28 server kernel: [40200.739072] 
Oct 29 09:26:28 server kernel: [40200.739081] Code: 80 e8 3c 0c fd ff 48 8b 85 90 00 00 00 48 85 c0 74 19 48 8b 40 20 48 85 c0 74 10 48 8b 70 58 48 c7 c7 66 52 4b 80 e8 17 0c fd ff <0f> 0b eb fe 8b 77 18 41 58 5b 5d 83 e6 01 f7 de 83 c6 04 e9 6c 
Oct 29 09:26:28 server kernel: [40200.739359] RIP  [<ffffffff8027c464>] page_remove_rmap+0xfb/0x117
Oct 29 09:26:28 server kernel: [40200.739376]  RSP <ffff880008797bf8>
Oct 29 09:26:28 server kernel: [40200.739823] ---[ end trace d7a0c0a175c102d0 ]---
Oct 29 09:26:28 server kernel: [40200.739889] Fixing recursive fault but reboot is needed!

I am using xen-hypervisor-3.2-1-amd64 version 3.2.1-2.

If you need more information, feel free to ask.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-xen-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages linux-image-2.6.26-1-xen-amd64 depends on:
ii  initramfs-tools               0.92l      tools for generating an initramfs
ii  linux-modules-2.6.26-1-xen-am 2.6.26-8   Linux 2.6.26 modules on AMD64

linux-image-2.6.26-1-xen-amd64 recommends no packages.

Versions of packages linux-image-2.6.26-1-xen-amd64 suggests:
ii  grub                          0.97-47    GRand Unified Bootloader (Legacy v
pn  linux-doc-2.6.26              <none>     (no description available)

-- no debconf information



Reply to: