[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 757] New: kernel BUG at mm/rmap.c:560!
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=757 Summary: kernel BUG at mm/rmap.c:560! Product: Xen Version: 3.0.2 Platform: Other OS/Version: Linux-2.6 Status: NEW Severity: normal Priority: P2 Component: Hypervisor AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx ReportedBy: matis@xxxxxxxx this happens only in one of 5 guest domains. it happens very often (several times a week, sometimes several times a day :( ) Guest: Eeek! page_mapcount(page) went negative! (-1) page->flags = 14 page->count = 0 page->mapping = 00000000 ------------[ cut here ]------------ kernel BUG at mm/rmap.c:560! invalid opcode: 0000 [#1] SMP Modules linked in: nfs lockd sunrpc CPU: 0 EIP: 0061:[<c0150adf>] Not tainted VLI EFLAGS: 00010286 (2.6.16-xen #1) EIP is at page_remove_rmap+0x3f/0xb0 eax: ffffffff ebx: c10c8200 ecx: c03037dc edx: 00000000 esi: df3af080 edi: 083a7000 ebp: e1feee9c esp: e02b7c7c ds: 007b es: 007b ss: 0069 Process mrtg (pid: 31394, threadinfo=e02b6000 task=dbfb6550) Stack: <0>c02d46a4 00000000 e1fee528 c0149414 c10c8200 083a7000 70c9d045 e02b6000 70c9d045 c10c8200 e0fd95c4 fffffda6 ffffffff e0fd9580 08400000 df3af080 08400000 e02b7d2c c0149697 c14c4160 d246785c df3af080 0814a000 08400000 Call Trace: [<c0149414>] zap_pte_range+0x1e4/0x380 [<c0149697>] unmap_page_range+0xe7/0x160 [<c01497fb>] unmap_vmas+0xeb/0x1e0 [<c014ec33>] exit_mmap+0x93/0x130 [<c0118528>] mmput+0x38/0xa0 [<c0168bb8>] exec_mmap+0x168/0x1f0 [<c016944b>] flush_old_exec+0x4b/0x230 [<c0168a40>] kernel_read+0x50/0x60 [<c0189d40>] load_elf_binary+0x330/0xd70 [<c015c77a>] nameidata_to_filp+0x3a/0x50 [<c0168a40>] kernel_read+0x50/0x60 [<c01698ca>] search_binary_handler+0x7a/0x1f0 [<c0188e95>] load_script+0x215/0x280 [<c0140a06>] __alloc_pages+0x56/0x300 [<c0209b36>] copy_from_user+0x46/0x90 [<c01684dd>] copy_strings+0x1dd/0x230 [<c01698ca>] search_binary_handler+0x7a/0x1f0 [<c0169bcd>] do_execve+0x18d/0x210 [<c0103b06>] sys_execve+0x46/0xa0 [<c0104f95>] syscall_call+0x7/0xb Code: c0 74 20 8b 43 08 40 78 2c 8b 43 08 40 78 1c c7 44 24 04 ff ff ff ff c7 04 24 10 00 00 00 e8 09 06 ff ff 8b 5c 24 08 83 c4 0c c3 <0f> 0b 30 02 62 46 2d c0 eb da 8b 43 08 c7 04 24 e0 51 2d c0 40 xm info: host : app1 release : 2.6.16-xen version : #1 SMP Wed Aug 30 03:46:02 CEST 2006 machine : i686 nr_cpus : 1 nr_nodes : 1 sockets_per_node : 1 cores_per_socket : 1 threads_per_core : 1 cpu_mhz : 2405 hw_caps : bfebfbff:00000000:00000000:00000180:0000041d total_memory : 2047 free_memory : 1 xen_major : 3 xen_minor : 0 xen_extra : .2-2 xen_caps : xen-3.0-x86_32 platform_params : virt_start=0xfc000000 xen_changeset : Thu Apr 13 15:18:37 2006 +0100 9617:5802713c159b cc_compiler : gcc version 3.3.5 (Debian 1:3.3.5-13) cc_compile_by : root cc_compile_domain : localdomain cc_compile_date : Wed Aug 30 01:22:36 CEST 2006 -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |