Package: linux-image-2.6.26-1-xen-amd64 Version: 2.6.26-8 Severity: important
I can consistently make the kernel oops with the following situation: If I have a domain (either domU or dom0) that is limited on memory and I start a program that needs more memory than available as physical memory, this program will use more than 99% of CPU. Swap space is available more than enogh, but will not be used extensively. When I interrupt the program with Ctrl-C, I get the oops. Example: Domain with 128M of memory and 2G of swap. Starting e2fsck on a filesystem with 300G will trigger the effect. Swap space is used about 350k. Extending the memory of the domain to 256M will make the problem go away. Unfortunately this is not a possibility in all situations. Oct 29 09:26:28 server kernel: [40200.737611] Eeek! page_mapcount(page) went negative! (-1) Oct 29 09:26:28 server kernel: [40200.737645] page pfn = 1d Oct 29 09:26:28 server kernel: [40200.737655] page->flags = 0 Oct 29 09:26:28 server kernel: [40200.737666] page->count = 0 Oct 29 09:26:28 server kernel: [40200.737676] page->mapping = 0000000000000000 Oct 29 09:26:28 server kernel: [40200.737710] vma->vm_ops = 0x0 Oct 29 09:26:28 server kernel: [40200.737737] ------------[ cut here ]------------ Oct 29 09:26:28 server kernel: [40200.737749] kernel BUG at mm/rmap.c:669! Oct 29 09:26:28 server kernel: [40200.737760] invalid opcode: 0000 [1] SMP Oct 29 09:26:28 server kernel: [40200.737779] CPU 0 Oct 29 09:26:28 server kernel: [40200.737793] Modules linked in: openafs(P) bridge netloop video output ac battery ip6table_filter ip6_tables iptable_raw xt_comment xt_policy ipt_ULOG ipt_TTL ipt_ttl ipt_REJECT ipt_REDIRECT ipt_recent ipt_NETMAP ipt_MASQUERADE ipt_LOG ipt_ECN ipt_ecn ipt_CLUSTERIP ipt_ah ipt_addrtype nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda nf_conntrack_tftp nf_conntrack_sip nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp xt_tcpmss xt_pkttype xt_physdev xt_owner xt_NFQUEUE xt_NFLOG xt_multiport xt_MARK xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit xt_DSCP xt_dscp xt_dccp xt_conntrack xt_CONNMARK xt_connmark xt_CLASSIFY xt_tcpudp xt_state iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack iptable_mangle nfnetlink iptable_filter ip_tables x_tables dummy ipv6 loo Oct 29 09:26:28 server kernel: ide_generic serio_raw pcspkr psmouse k8temp i2c_nforce2 button i2c_core evdev ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod raid456 md_mod async_xor async_memcpy async_tx xor sd_mod ide_cd_mod cdrom ide_disk sata_nv ata_generic r8169 forcedeth amd74xx libata scsi_mod dock ide_pci_generic ide_core thermal processor fan thermal_sys Oct 29 09:26:28 server kernel: [40200.738424] Pid: 11894, comm: e2fsck Tainted: P 2.6.26-1-xen-amd64 #1 Oct 29 09:26:28 server kernel: [40200.738440] RIP: e030:[<ffffffff8027c464>] [<ffffffff8027c464>] page_remove_rmap+0xfb/0x117 Oct 29 09:26:28 server kernel: [40200.738467] RSP: e02b:ffff880008797bf8 EFLAGS: 00010246 Oct 29 09:26:28 server kernel: [40200.738479] RAX: 0000000000000000 RBX: ffff880001e6e658 RCX: 000075750000a035 Oct 29 09:26:28 server kernel: [40200.738491] RDX: ffffffffff5f7000 RSI: 0000000000000001 RDI: ffffffff805aaab0 Oct 29 09:26:28 server kernel: [40200.738504] RBP: ffff88003e208528 R08: 0000000000000023 R09: ffff880008797600 Oct 29 09:26:28 server kernel: [40200.738516] R10: 0000000000000000 R11: 000001f328e040ae R12: ffff880001e6e658 Oct 29 09:26:28 server kernel: [40200.738529] R13: ffff880008129c70 R14: ffff88003e2e0700 R15: ffff880002032108 Oct 29 09:26:28 server kernel: [40200.738544] FS: 00007f0f53e05740(0000) GS:ffffffff80539000(0000) knlGS:0000000000000000 Oct 29 09:26:28 server kernel: [40200.738561] CS: e033 DS: 0000 ES: 0000 Oct 29 09:26:28 server kernel: [40200.738572] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Oct 29 09:26:28 server kernel: [40200.738585] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Oct 29 09:26:28 server kernel: [40200.738598] Process e2fsck (pid: 11894, threadinfo ffff880008796000, task ffff880008728340) Oct 29 09:26:28 server kernel: [40200.738615] Stack: ffff880008129c58 000000000001d500 0000000002f8e000 ffffffff80273155 Oct 29 09:26:28 server kernel: [40200.738651] ffff8800087e8000 0000000000000000 ffff880008797cf8 ffffffffffffffff Oct 29 09:26:28 server kernel: [40200.738683] 0000000000000000 ffff88003e208528 ffff880008797d00 0000000000323000 Oct 29 09:26:28 server kernel: [40200.738707] Call Trace: Oct 29 09:26:28 server kernel: [40200.738736] [<ffffffff80273155>] ? unmap_vmas+0x744/0xa49 Oct 29 09:26:28 server kernel: [40200.738783] [<ffffffff80278483>] ? exit_mmap+0x7b/0xf7 Oct 29 09:26:28 server kernel: [40200.738802] [<ffffffff8022a6bd>] ? mmput+0x2c/0xc0 Oct 29 09:26:28 server kernel: [40200.738820] [<ffffffff8022fe32>] ? do_exit+0x25a/0x6ce Oct 29 09:26:28 server kernel: [40200.738844] [<ffffffff8023034c>] ? do_group_exit+0xa6/0xdc Oct 29 09:26:28 server kernel: [40200.738862] [<ffffffff80238dbd>] ? get_signal_to_deliver+0x3b1/0x40b Oct 29 09:26:28 server kernel: [40200.738884] [<ffffffff8020a907>] ? do_notify_resume+0xa0/0x832 Oct 29 09:26:28 server kernel: [40200.738898] [<ffffffff8020e7a8>] ? get_nsec_offset+0x9/0x2c Oct 29 09:26:28 server kernel: [40200.738912] [<ffffffff8020e804>] ? local_clock+0x39/0x83 Oct 29 09:26:28 server kernel: [40200.738933] [<ffffffff80222f78>] ? __dequeue_entity+0x25/0x69 Oct 29 09:26:28 server kernel: [40200.738952] [<ffffffff80222fd4>] ? set_next_entity+0x18/0x3a Oct 29 09:26:28 server kernel: [40200.738975] [<ffffffff8043449b>] ? thread_return+0x3e/0xdb Oct 29 09:26:28 server kernel: [40200.738999] [<ffffffff802181fd>] ? do_page_fault+0xb73/0xf50 Oct 29 09:26:28 server kernel: [40200.739026] [<ffffffff8020bb29>] ? retint_signal+0x57/0xae Oct 29 09:26:28 server kernel: [40200.739063] Oct 29 09:26:28 server kernel: [40200.739072] Oct 29 09:26:28 server kernel: [40200.739081] Code: 80 e8 3c 0c fd ff 48 8b 85 90 00 00 00 48 85 c0 74 19 48 8b 40 20 48 85 c0 74 10 48 8b 70 58 48 c7 c7 66 52 4b 80 e8 17 0c fd ff <0f> 0b eb fe 8b 77 18 41 58 5b 5d 83 e6 01 f7 de 83 c6 04 e9 6c Oct 29 09:26:28 server kernel: [40200.739359] RIP [<ffffffff8027c464>] page_remove_rmap+0xfb/0x117 Oct 29 09:26:28 server kernel: [40200.739376] RSP <ffff880008797bf8> Oct 29 09:26:28 server kernel: [40200.739823] ---[ end trace d7a0c0a175c102d0 ]--- Oct 29 09:26:28 server kernel: [40200.739889] Fixing recursive fault but reboot is needed! I am using xen-hypervisor-3.2-1-amd64 version 3.2.1-2. If you need more information, feel free to ask. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-1-xen-amd64 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages linux-image-2.6.26-1-xen-amd64 depends on: ii initramfs-tools 0.92l tools for generating an initramfs ii linux-modules-2.6.26-1-xen-am 2.6.26-8 Linux 2.6.26 modules on AMD64 linux-image-2.6.26-1-xen-amd64 recommends no packages. Versions of packages linux-image-2.6.26-1-xen-amd64 suggests: ii grub 0.97-47 GRand Unified Bootloader (Legacy v pn linux-doc-2.6.26 <none> (no description available) -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]