[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 757] New: kernel BUG at mm/rmap.c:560!



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=757

           Summary: kernel BUG at mm/rmap.c:560!
           Product: Xen
           Version: 3.0.2
          Platform: Other
        OS/Version: Linux-2.6
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: matis@xxxxxxxx


this happens only in one of 5 guest domains.
it happens very often (several times a week, sometimes several times a day :( )

Guest:
Eeek! page_mapcount(page) went negative! (-1)
  page->flags = 14
  page->count = 0
  page->mapping = 00000000
------------[ cut here ]------------
kernel BUG at mm/rmap.c:560!
invalid opcode: 0000 [#1]
SMP
Modules linked in: nfs lockd sunrpc
CPU:    0
EIP:    0061:[<c0150adf>]    Not tainted VLI
EFLAGS: 00010286   (2.6.16-xen #1)
EIP is at page_remove_rmap+0x3f/0xb0
eax: ffffffff   ebx: c10c8200   ecx: c03037dc   edx: 00000000
esi: df3af080   edi: 083a7000   ebp: e1feee9c   esp: e02b7c7c
ds: 007b   es: 007b   ss: 0069
Process mrtg (pid: 31394, threadinfo=e02b6000 task=dbfb6550)
Stack: <0>c02d46a4 00000000 e1fee528 c0149414 c10c8200 083a7000 70c9d045
e02b6000
       70c9d045 c10c8200 e0fd95c4 fffffda6 ffffffff e0fd9580 08400000 df3af080
       08400000 e02b7d2c c0149697 c14c4160 d246785c df3af080 0814a000 08400000
Call Trace:
 [<c0149414>] zap_pte_range+0x1e4/0x380
 [<c0149697>] unmap_page_range+0xe7/0x160
 [<c01497fb>] unmap_vmas+0xeb/0x1e0
 [<c014ec33>] exit_mmap+0x93/0x130
 [<c0118528>] mmput+0x38/0xa0
 [<c0168bb8>] exec_mmap+0x168/0x1f0
 [<c016944b>] flush_old_exec+0x4b/0x230
 [<c0168a40>] kernel_read+0x50/0x60
 [<c0189d40>] load_elf_binary+0x330/0xd70
 [<c015c77a>] nameidata_to_filp+0x3a/0x50
 [<c0168a40>] kernel_read+0x50/0x60
 [<c01698ca>] search_binary_handler+0x7a/0x1f0
 [<c0188e95>] load_script+0x215/0x280
 [<c0140a06>] __alloc_pages+0x56/0x300
 [<c0209b36>] copy_from_user+0x46/0x90
 [<c01684dd>] copy_strings+0x1dd/0x230
 [<c01698ca>] search_binary_handler+0x7a/0x1f0
 [<c0169bcd>] do_execve+0x18d/0x210
 [<c0103b06>] sys_execve+0x46/0xa0
 [<c0104f95>] syscall_call+0x7/0xb
Code: c0 74 20 8b 43 08 40 78 2c 8b 43 08 40 78 1c c7 44 24 04 ff ff ff ff c7
04 24 10 00 00 00 e8 09 06 ff ff 8b 5c 24 08 83 c4 0c c3 <0f> 0b 30 02 62 46 2d
c0 eb da 8b 43
 08 c7 04 24 e0 51 2d c0 40

xm info:
host                   : app1
release                : 2.6.16-xen
version                : #1 SMP Wed Aug 30 03:46:02 CEST 2006
machine                : i686
nr_cpus                : 1
nr_nodes               : 1
sockets_per_node       : 1
cores_per_socket       : 1
threads_per_core       : 1
cpu_mhz                : 2405
hw_caps                : bfebfbff:00000000:00000000:00000180:0000041d
total_memory           : 2047
free_memory            : 1
xen_major              : 3
xen_minor              : 0
xen_extra              : .2-2
xen_caps               : xen-3.0-x86_32
platform_params        : virt_start=0xfc000000
xen_changeset          : Thu Apr 13 15:18:37 2006 +0100 9617:5802713c159b
cc_compiler            : gcc version 3.3.5 (Debian 1:3.3.5-13)
cc_compile_by          : root
cc_compile_domain      : localdomain
cc_compile_date        : Wed Aug 30 01:22:36 CEST 2006


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.