Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1)) - Debian

This is a discussion on Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1)) - Debian ; Package: linux-image-2.6.26-1-xen-amd64 Version: 2.6.26-9 Severity: grave Justification: renders package unusable I'm trying to run Xen in Lenny with the new 2.6.26-kernel as Dom0. It seems to be some problems on the amd64 architecture. After approx 10-20 hours of uptime, the ...

+ Reply to Thread
Results 1 to 11 of 11

Thread: Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1))

  1. Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1))

    Package: linux-image-2.6.26-1-xen-amd64
    Version: 2.6.26-9
    Severity: grave
    Justification: renders package unusable


    I'm trying to run Xen in Lenny with the new 2.6.26-kernel as Dom0.

    It seems to be some problems on the amd64 architecture.
    After approx 10-20 hours of uptime, the Dom0 crash (even if there is no
    DomU running) with the following error:

    [50079.669383] Eeek! page_mapcount(page) went negative! (-1)
    [50079.669383] page pfn = 5
    [50079.669383] page->flags = 0
    [50079.669383] page->count = 0
    [50079.669383] page->mapping = 0000000000000000
    [50079.669383] vma->vm_ops = 0x0
    [50079.669383] ------------[ cut here ]------------
    [50079.669383] kernel BUG at mm/rmap.c:673!
    [50079.669383] invalid opcode: 0000 [1] SMP
    [50079.669383] CPU 0
    [50079.669383] Modules linked in: xt_tcpudp xt_physdev iptable_filter ip_tables x_tables bridge netloop video output ac battery microcode firmware_class nfsd auth_rpcgss exportfs nfs lockd nfs_acl sunrpc ipv6 xfs reiserfs ext2 sha256_generic aes_x86_64 aes_generic cbc dm_crypt crypto_blkcipher raid456 async_xor async_memcpy async_tx xor loop iTCO_wdt serio_raw i2c_i801 psmouse pcspkr i2c_core rng_core container button i3000_edac edac_core shpchp pci_hotplug evdev joydev ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod raid1 md_mod ide_cd_mod cdrom ide_pci_generic usbhid hid ff_memless piix ide_core ata_piix sd_mod floppy ata_generic ehci_hcd uhci_hcd sata_sil24 e1000e libata dock 3w_9xxx scsi_mod thermal processor fan thermal_sys
    [50079.669383] Pid: 9197, comm: mutt Not tainted 2.6.26-1-xen-amd64 #1
    [50079.669383] RIP: e030:[] [] page_remove_rmap+0xfb/0x117
    [50079.669383] RSP: e02b:ffff880074601dc8 EFLAGS: 00010246
    [50079.669383] RAX: 0000000000000000 RBX: ffff880002359118 RCX: 000051510001509d
    [50079.669383] RDX: ffffffffff5f7000 RSI: 0000000000000001 RDI: ffffffff805aaab0
    [50079.669383] RBP: ffff8800746d1918 R08: 0000000000000023 R09: ffff880074601800
    [50079.669383] R10: 0000000000000000 R11: 0000014221337ed7 R12: ffff880002359118
    [50079.669383] R13: ffff880014e61320 R14: ffff88007ff34b80 R15: ffff8800027eb548
    [50079.669383] FS: 00007f2b26ff4700(0000) GS:ffffffff80539000(0000) knlGS:0000000000000000
    [50079.669383] CS: e033 DS: 0000 ES: 0000
    [50079.669383] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    [50079.669383] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
    [50079.669383] Process mutt (pid: 9197, threadinfo ffff880074600000, task ffff8800745929f0)
    [50079.669383] Stack: ffff880014e610e8 0000000000005100 0000000005e64000 ffffffff80273239
    [50079.669383] ffff88007475c000 0000000000000000 ffff880074601ec8 ffffffffffffffff
    [50079.669383] 0000000000000000 ffff8800746d1918 ffff880074601ed0 00000000003b9000
    [50079.669383] Call Trace:
    [50079.669383] [] ? unmap_vmas+0x744/0xa49
    [50079.669383] [] ? exit_mmap+0x7b/0xf7
    [50079.669383] [] ? mmput+0x2c/0xc0
    [50079.669383] [] ? do_exit+0x25a/0x6ce
    [50079.669383] [] ? do_group_exit+0xa6/0xdc
    [50079.669383] [] ? system_call+0x68/0x6d
    [50079.669383] [] ? system_call+0x0/0x6d
    [50079.669383]
    [50079.669383]
    [50079.669383] Code: 80 e8 18 0c fd ff 48 8b 85 90 00 00 00 48 85 c0 74 19 48 8b 40 20 48 85 c0 74 10 48 8b 70 58 48 c7 c7 e1 52 4b 80 e8 f3 0b fd ff <0f> 0b eb fe 8b 77 18 41 58 5b 5d 83 e6 01 f7 de 83 c6 04 e9 64
    [50079.669383] RIP [] page_remove_rmap+0xfb/0x117
    [50079.669383] RSP
    [50079.673388] ---[ end trace c445527cbda75056 ]---
    [50079.673479] Fixing recursive fault but reboot is needed!

    The same system is stable when running linux-image-2.6.26-1-amd64.
    I've also successfully ran linux-image-2.6.26-1-xen-686 using
    i386-architecture on the same hardware, so it seems to happen only in Xen-variants
    on amd64 architecture.

    I have no reliable way of forcing the error to occur. The best way I've found
    so far to get this crash is to do a couple of kernel-recompilations, but sometimes
    I can do a couple of compile-runs without crash.

    The hardware on this box is a Supermicro PDSME+-motherboard, with a E6600 Core2Duo
    and 8 Gigs of RAM (ECC)

    I've run memtest86+ for over 24 hours with no problems reported.

    I'm not sure if I should tag this as grave or critical, but I feel that it's impossible
    to run a Xen-system on AMD64 with Debian Lenny currently.


    -- System Information:
    Debian Release: lenny/sid
    APT prefers testing
    APT policy: (500, 'testing')
    Architecture: amd64 (x86_64)

    Kernel: Linux 2.6.26-1-xen-amd64 (SMP w/2 CPU cores)
    Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
    Shell: /bin/sh linked to /bin/bash

    Versions of packages linux-image-2.6.26-1-xen-amd64 depends on:
    ii initramfs-tools 0.92j tools for generating an initramfs
    ii linux-modules-2.6.26-1-xen-am 2.6.26-9 Linux 2.6.26 modules on AMD64

    linux-image-2.6.26-1-xen-amd64 recommends no packages.

    Versions of packages linux-image-2.6.26-1-xen-amd64 suggests:
    ii grub 0.97-47 GRand Unified Bootloader (Legacy v
    ii linux-doc-2.6.26 2.6.26-8 Linux kernel specific documentatio

    -- no debconf information



    --
    To UNSUBSCRIBE, email to debian-bugs-dist-REQUEST@lists.debian.org
    with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

  2. Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1))

    On Tue, Oct 28, 2008 at 11:49:16AM +0100, Lars Michael Jogback wrote:
    > It seems to be some problems on the amd64 architecture.
    > After approx 10-20 hours of uptime, the Dom0 crash (even if there is no
    > DomU running) with the following error:


    I comitted a workaround, to be exact an update for a workaround. I was
    not longer able to trigger that under load. Please test the snapshots[1]
    tomorrow (2.6.26-10~snapshot.12362 or higher).

    Bastian

    [1]: http://wiki.debian.org/DebianKernel, sid branch

    --
    Emotions are alien to me. I'm a scientist.
    -- Spock, "This Side of Paradise", stardate 3417.3



    --
    To UNSUBSCRIBE, email to debian-bugs-dist-REQUEST@lists.debian.org
    with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

  3. Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1))

    Bastian Blank écrivait (wrote) :

    > On Tue, Oct 28, 2008 at 11:49:16AM +0100, Lars Michael Jogback wrote:
    > > It seems to be some problems on the amd64 architecture.
    > > After approx 10-20 hours of uptime, the Dom0 crash (even if there is no
    > > DomU running) with the following error:

    >
    > I comitted a workaround, to be exact an update for a workaround. I was
    > not longer able to trigger that under load. Please test the snapshots[1]
    > tomorrow (2.6.26-10~snapshot.12362 or higher).


    Oct 30 15:29:21 fw kernel: [ 0.000000] Linux version
    2.6.26-1-xen-amd64 (Debian 2.6.26-10~snapshot.12361) (waldi@debian.org)
    (gcc version 4.1.3 20080623 (prerelease) (Debian 4.1.2-23+1)) #1 SMP Thu
    Oct 30 03:57:26 UTC 2008

    Oct 30 15:32:16 fw kernel: [ 281.498595] Eeek! page_mapcount(page) went negative! (-1)
    Oct 30 15:32:16 fw kernel: [ 281.498610] page pfn = 7
    Oct 30 15:32:16 fw kernel: [ 281.498612] page->flags = 868
    Oct 30 15:32:16 fw kernel: [ 281.498615] page->count = 2
    Oct 30 15:32:16 fw kernel: [ 281.498618] page->mapping =
    ffff880007bd0890
    Oct 30 15:32:16 fw kernel: [ 281.498646] vma->vm_ops = 0x0
    Oct 30 15:32:16 fw kernel: [ 281.498662] ------------[ cut here ]------------
    Oct 30 15:32:16 fw kernel: [ 281.498665] kernel BUG at mm/rmap.c:673!
    Oct 30 15:32:16 fw kernel: [ 281.498667] invalid opcode: 0000 [1] SMP
    Oct 30 15:32:16 fw kernel: [ 281.498671] CPU 0
    Oct 30 15:32:16 fw kernel: [ 281.498674] Modules linked in: tun
    ppp_deflate bsd_comp xfrm_user xfrm4_tunnel tunnel4 ipcomp esp4 aead ah4
    iptable_raw xt_comment xt_policy ipt_ULOG ipt_TTL ipt_ttl ipt_REJECT
    ipt_REDIRECT ipt_recent ipt_NETMAP ipt_MASQUERADE ipt_LOG ipt_ECN
    ipt_ecn ipt_CLUSTERIP ipt_ah ipt_addrtype nf_nat_tftp nf_nat_snmp_basic
    nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc nf_nat_h323
    nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda nf_conntrack_tftp
    nf_conntrack_sip nf_conntrack_proto_sctp nf_conntrack_pptp
    nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns
    nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp xt_tcpmss xt_pkttype
    xt_physdev xt_owner xt_NFQUEUE xt_NFLOG xt_multiport xt_MARK xt_mark
    xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit xt_DSCP
    xt_dscp xt_dccp xt_conntrack xt_CONNMARK xt_connmark xt_CLASSIFY
    xt_tcpudp xt_state iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack
    iptable_mangle nfnetlink iptable_filter ip_tables x_tables ppp_async
    crc_ccitt ppp_generic slhc ipv6 deflate
    zlib_deflate zlib_inflate ctr twofish twofish_common camellia serpent
    blowfish des_generic cbc aes_x86_64 aes_generic xcbc sha256_generic
    sha1_generic crypto_null af_key arc4 ecb crypto_blkcipher rt61pci
    crc_itu_t rt2x00pci rt2x00lib firmware_class rfkill led_class
    input_polldev mac80211 cfg80211 eeprom_93cx6 evdev joydev ext3 jbd
    mbcache dm_mirror dm_log dm_snapshot dm_mod thermal_sys

    Oct 30 15:32:16 fw kernel: [ 281.498796] Pid: 2892, comm: aptitude Not tainted 2.6.26-1-xen-amd64 #1
    Oct 30 15:32:16 fw kernel: [ 281.498799] RIP: e030:[] [] page_remove_rmap+0xfb/0x117
    Oct 30 15:32:16 fw kernel: [ 281.498807] RSP: e02b:ffff880003381bf8 EFLAGS: 00010246
    Oct 30 15:32:16 fw kernel: [ 281.498810] RAX: 0000000000000000 RBX: ffff880001d25188 RCX: 0000bdbd000025f0
    Oct 30 15:32:16 fw kernel: [ 281.498813] RDX: ffffffffff5f7000 RSI: 0000000000000001 RDI: ffffffff805aaab0
    Oct 30 15:32:16 fw kernel: [ 281.498816] RBP: ffff880006974138 R08: ffff8800063ff1f0 R09: ffff880001e92501
    Oct 30 15:32:16 fw kernel: [ 281.498819] R10: 0000000000000024 R11: 0000003000000028 R12: ffff880001d25188
    Oct 30 15:32:16 fw kernel: [ 281.498822] R13: ffff880006860a78 R14: ffff880006b9adc0 R15: ffff880001e92510
    Oct 30 15:32:16 fw kernel: [ 281.498828] FS: 00007fe2eca526f0(0000) GS:ffffffff80539000(0000) knlGS:0000000000000000
    Oct 30 15:32:16 fw kernel: [ 281.498831] CS: e033 DS: 0000 ES: 0000
    Oct 30 15:32:16 fw kernel: [ 281.498834] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    Oct 30 15:32:16 fw kernel: [ 281.498837] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
    Oct 30 15:32:16 fw kernel: [ 281.498840] Process aptitude (pid: 2892, threadinfo ffff880003380000, task ffff88000621e280)
    x Oct 30 15:32:16 fw kernel: [ 281.498843] Stack: 00000000000071000000000000007500 000000000274f000 ffffffff80273239
    Oct 30 15:32:16 fw kernel: [ 281.498849] ffff8800032100000000000000000000 ffff880003381cf8 ffffffffffffffff

    Oct 30 15:32:16 fw kernel: [ 281.498853] 0000000000000000ffff880006974138 ffff880003381d00 00000000000a2f2a
    Oct 30 15:32:16 fw kernel: [ 281.498857] Call Trace:
    Oct 30 15:32:16 fw kernel: [ 281.498870] [] ? unmap_vmas+0x744/0xa49
    Oct 30 15:32:16 fw kernel: [ 281.498910] [] ? exit_mmap+0x7b/0xf7
    Oct 30 15:32:16 fw kernel: [ 281.498921] [] ? mmput+0x2c/0xc0
    Oct 30 15:32:16 fw kernel: [ 281.498929] [] ? do_exit+0x25a/0x6ce
    Oct 30 15:32:16 fw kernel: [ 281.498944] [] ? do_group_exit+0xa6/0xdc
    Oct 30 15:32:16 fw kernel: [ 281.498953] [] ? get_signal_to_deliver+0x3b1/0x40b
    Oct 30 15:32:16 fw kernel: [ 281.498967] [] ? do_notify_resume+0xa0/0x832
    Oct 30 15:32:16 fw kernel: [ 281.498980] [] ? do_futex+0x85/0x8a4
    Oct 30 15:32:16 fw kernel: [ 281.498994] [] ? handle_mm_fault+0x56b/0xc49
    Oct 30 15:32:16 fw kernel: [ 281.499020] [] ? sys_futex+0xfe/0x11c
    Oct 30 15:32:16 fw kernel: [ 281.499034] [] ? sysret_signal+0x32/0x53
    Oct 30 15:32:16 fw kernel: [ 281.499038] [] ? ptregscall_common+0x3d/0x70
    Oct 30 15:32:16 fw kernel: [ 281.499067]
    Oct 30 15:32:16 fw kernel: [ 281.499070] Code: 80 e8 18 0c fd ff 48 8b
    85 90 00 00 00 48 85 c0 74 19 48 8b 40 20 48 85 c0 74 10 48 8b 70 58 48
    c7 c7 e1 52 4b 80 e8 f3 0b fd ff <0f> 0b eb fe 8b 77 18 41 58 5b 5d 83
    e6 01 f7 de 83 c6 04 e9 64
    Oct 30 15:32:16 fw kernel: [ 281.499108] RIP [] page_remove_rmap+0xfb/0x117
    Oct 30 15:32:16 fw kernel: [ 281.499112] RSP
    Oct 30 15:32:16 fw kernel: [ 281.499114] ---[ end trace 0f80597e847917e4]---
    Oct 30 15:32:16 fw kernel: [ 281.499117] Fixing recursive fault but reboot is needed!

    It's a domu, dom0 runs ubuntu's 2.6.24-19 on a debian/sid.
    This domu was running debian's 2.6.26, I think -9 start crash on load
    (aptitude on sid after one week without upgrade).


    --
    " Avec les machines NEDAP, le vote est TELLEMENT secret que même les
    électeurs n'ont aucune garantie que leur vote soit réellement crédité au
    compte de voix du candidat de son choix ! "
    http://ordinateurs-de-vote.org/ --- http://vao-amiens.fdn.fr/



    --
    To UNSUBSCRIBE, email to debian-bugs-dist-REQUEST@lists.debian.org
    with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

  4. Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1))

    On Thu, Oct 30, 2008 at 05:29:42PM +0100, Jean Charles Delepine wrote:
    > Bastian Blank écrivait (wrote) :
    > > Please test the snapshots[1]
    > > tomorrow (2.6.26-10~snapshot.12362 or higher).

    > Oct 30 15:29:21 fw kernel: [ 0.000000] Linux version
    > 2.6.26-1-xen-amd64 (Debian 2.6.26-10~snapshot.12361) (waldi@debian.org)
    > (gcc version 4.1.3 20080623 (prerelease) (Debian 4.1.2-23+1)) #1 SMP Thu
    > Oct 30 03:57:26 UTC 2008


    12361 < 12362!

    Bastian

    --
    Even historians fail to learn from history -- they repeat the same mistakes.
    -- John Gill, "Patterns of Force", stardate 2534.7



    --
    To UNSUBSCRIBE, email to debian-bugs-dist-REQUEST@lists.debian.org
    with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

  5. Bug#503821: Snapshot fails to solve the issue

    Hello,

    On Thu, 30 Oct 2008, Bastian Blank wrote:
    > I comitted a workaround, to be exact an update for a workaround. I was
    > not longer able to trigger that under load. Please test the snapshots[1]
    > tomorrow (2.6.26-10~snapshot.12362 or higher).


    Unfortunately, this did not work for me.

    I downloaded:

    http://kernel-archive.buildserver.ne...n/l/linux-2.6/
    linux-image-2.6.26-1-xen-amd64_2.6.26-10~snapshot.12362_amd64.deb

    It continues to give errors as documented before ... i. e.
    On Wed, 29 Oct 2008, in <20081030063729.GA25036@imsc.res.in> I wrote:
    > I tested this with the following configurations where except for the
    > kernel everthing else is from lenny (including the xen hypervisor
    > which is 3.2). The kernels are the stock kernels from Debian.
    >
    > dom0 kernel domU kernel result
    > 2.6.18-6-xen-amd64 2.6.18-6-xen-amd64 no crash
    > 2.6.26-1-xen-amd64 2.6.26-1-xen-amd64 crash for domU and dom0
    > 2.6.18-6-xen-amd64 2.6.26-1-xen-amd64 crash for domU
    > 2.6.26-1-xen-amd64 2.6.18-6-xen-amd64 crash for dom0


    The "crash" signifies a kernel oops when running the test program
    given by Lars in Message-Id: <20081029124456.GA5626@cleopatra.jogback.se>
    on this list.

    Regards,

    Kapil.
    --


    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.4.9 (GNU/Linux)

    iEYEARECAAYFAkkKrYQACgkQSR+P2lQW5bhPEQCfXDsRoLeDJb DmWmnZ2/Uy7G2o
    7CEAnREA82710TOsqjzabkL4JP396r+Z
    =wPVy
    -----END PGP SIGNATURE-----


  6. Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1))

    * Bastian Blank [2008-10-30 10:50:03]:

    > I comitted a workaround, to be exact an update for a workaround. I was
    > not longer able to trigger that under load. Please test the snapshots[1]
    > tomorrow (2.6.26-10~snapshot.12362 or higher).


    Now I've tested the workaround, and I'm sorry to say that it doesn't help.

    [ 0.000000] Linux version 2.6.26-1-xen-amd64 (Debian 2.6.26-10~snapshot.12362) (waldi@debian.org) (gcc version 4.1.3 20080623 (prerelease) (Debian 4.1.2-23+1)) #1 SMP Fri Oct 31 03:53:45 UTC 2008

    [ 200.424526] Eeek! page_mapcount(page) went negative! (-1)
    [ 200.424637] page pfn = 4
    [ 200.424937] page->flags = 0
    [ 200.424937] page->count = 0
    [ 200.424937] page->mapping = 0000000000000000
    [ 200.424937] vma->vm_ops = 0x0
    [ 200.424937] ------------[ cut here ]------------
    [ 200.424937] kernel BUG at mm/rmap.c:673!
    [ 200.424937] invalid opcode: 0000 [1] SMP
    [ 200.425856] CPU 0
    [ 200.425856] Modules linked in: bridge netloop video output ac battery microcode firmware_class nfsd auth_rpcgss exportfs nfs lockd nfs_acl sunrpc ipv6 xfs reiserfs ext2 sha256_generic aes_x86_64 aes_generic cbc dm_crypt crypto_blkcipher raid456 async_xor async_memcpy async_tx xor loop iTCO_wdt serio_raw pcspkr i2c_i801 psmouse rng_core i2c_core container shpchp pci_hotplug button i3000_edac edac_core evdev joydev ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod raid1 md_mod ide_cd_mod cdrom ide_pci_generic usbhid hid ff_memless piix ata_piix ide_core sd_mod floppy ata_generic ehci_hcd uhci_hcd sata_sil24 libata 3w_9xxx dock e1000e scsi_mod thermal processor fan thermal_sys
    [ 200.429852] Pid: 6332, comm: a.out Not tainted 2.6.26-1-xen-amd64 #1
    [ 200.429852] RIP: e030:[] [] page_remove_rmap+0xfb/0x117
    [ 200.429852] RSP: e02b:ffff880071aabdc8 EFLAGS: 00010246
    [ 200.429852] RAX: 0000000000000000 RBX: ffff88000235a0e0 RCX: ffffffff80501fc8
    [ 200.429852] RDX: ffffffffff5f7000 RSI: 0000000000000001 RDI: ffffffff80501fc0
    [ 200.429852] RBP: ffff880071a577c8 R08: ffffffff80501fb0 R09: ffff880001b48f08
    [ 200.429852] R10: ffff880071aaba58 R11: 0000000000015382 R12: ffff88000235a0e0
    [ 200.429852] R13: ffff880000c010d8 R14: ffff88007d426840 R15: ffff880002384048
    [ 200.429852] FS: 00007f41ff3e36e0(0000) GS:ffffffff80539000(0000) knlGS:0000000000000000
    [ 200.429852] CS: e033 DS: 0000 ES: 0000
    [ 200.429852] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    [ 200.429852] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
    [ 200.429852] Process a.out (pid: 6332, threadinfo ffff880071aaa000, task ffff880071ad8500)
    [ 200.429852] Stack: ffff8800717f08d0 0000000000004800 000000322061b000 ffffffff80273239
    [ 200.429852] 0000000000000206 0000000000000000 ffff880071aabec8 ffffffffffffffff
    [ 200.429852] 0000000000000000 ffff880071a577c8 ffff880071aabed0 000000000003628e
    [ 200.429852] Call Trace:
    [ 200.429852] [] ? unmap_vmas+0x744/0xa49
    [ 200.429852] [] ? exit_mmap+0x7b/0xf7
    [ 200.429852] [] ? mmput+0x2c/0xc0
    [ 200.429852] [] ? do_exit+0x25a/0x6ce
    [ 200.429852] [] ? do_group_exit+0xa6/0xdc
    [ 200.429852] [] ? system_call+0x68/0x6d
    [ 200.429852] [] ? system_call+0x0/0x6d
    [ 200.429852]
    [ 200.429852]
    [ 200.429852] Code: 80 e8 18 0c fd ff 48 8b 85 90 00 00 00 48 85 c0 74 19 48 8b 40 20 48 85 c0 74 10 48 8b 70 58 48 c7 c7 e1 52 4b 80 e8 f3 0b fd ff <0f> 0b eb fe 8b 77 18 41 58 5b 5d 83 e6 01 f7 de 83 c6 04 e9 64
    [ 200.429852] RIP [] page_remove_rmap+0xfb/0x117
    [ 200.429852] RSP
    [ 200.439529] ---[ end trace 10482cbe68c8d062 ]---
    [ 200.439619] Fixing recursive fault but reboot is needed!

    My ugly testprogram crashed directly on this one aswell.

    Best Regards,
    /LM



    --
    To UNSUBSCRIBE, email to debian-bugs-dist-REQUEST@lists.debian.org
    with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

  7. Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1))

    On Fri, Oct 31, 2008 at 08:49:42AM +0100, Lars Michael Jogback wrote:
    > * Bastian Blank [2008-10-30 10:50:03]:
    > > I comitted a workaround, to be exact an update for a workaround. I was
    > > not longer able to trigger that under load. Please test the snapshots[1]
    > > tomorrow (2.6.26-10~snapshot.12362 or higher).

    > Now I've tested the workaround, and I'm sorry to say that it doesn't help.


    Okay, so I have no further possibilities except removing the kernel.

    Bastian

    --
    .... bacteriological warfare ... hard to believe we were once foolish
    enough to play around with that.
    -- McCoy, "The Omega Glory", stardate unknown



    --
    To UNSUBSCRIBE, email to debian-bugs-dist-REQUEST@lists.debian.org
    with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

  8. Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1))

    * Bastian Blank [2008-10-31 12:47:34]:

    > On Fri, Oct 31, 2008 at 08:49:42AM +0100, Lars Michael Jogback wrote:
    > > * Bastian Blank [2008-10-30 10:50:03]:
    > > > I comitted a workaround, to be exact an update for a workaround. I was
    > > > not longer able to trigger that under load. Please test the snapshots[1]
    > > > tomorrow (2.6.26-10~snapshot.12362 or higher).

    > > Now I've tested the workaround, and I'm sorry to say that it doesn't help.

    >
    > Okay, so I have no further possibilities except removing the kernel.
    >


    Do you know if there is someplace to download the OpenSUSE-kernel to test
    and see if the error is present in that too? If it is, there might be more
    kernel-hackers that have idea's on what the problem might be?

    Best Regards,
    /LM




    --
    To UNSUBSCRIBE, email to debian-bugs-dist-REQUEST@lists.debian.org
    with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

  9. Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1))

    On Fri, Oct 31, 2008 at 12:54:14PM +0100, Lars Michael Jogback wrote:
    > * Bastian Blank [2008-10-31 12:47:34]:
    > > Okay, so I have no further possibilities except removing the kernel.

    > Do you know if there is someplace to download the OpenSUSE-kernel to test
    > and see if the error is present in that too?


    The SuSE kernels can be found at
    http://ftp.suse.com/pub/projects/ker...d/HEAD/x86_64/. But as the
    next SLES will ship .27, they don't really care.

    Bastian

    --
    Pain is a thing of the mind. The mind can be controlled.
    -- Spock, "Operation -- Annihilate!" stardate 3287.2



    --
    To UNSUBSCRIBE, email to debian-bugs-dist-REQUEST@lists.debian.org
    with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

  10. Bug#503821: linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1))

    Bastian Blank wrote:
    > On Fri, Oct 31, 2008 at 12:54:14PM +0100, Lars Michael Jogback wrote:
    >> * Bastian Blank [2008-10-31 12:47:34]:
    >>> Okay, so I have no further possibilities except removing the kernel.

    >> Do you know if there is someplace to download the OpenSUSE-kernel to test
    >> and see if the error is present in that too?

    >
    > The SuSE kernels can be found at
    > http://ftp.suse.com/pub/projects/ker...d/HEAD/x86_64/. But as the
    > next SLES will ship .27, they don't really care.


    A related bugreport I found when searching for this error two weeks ago
    is an ubuntu bug report in launchpad. [1] It has a syslog-excerpt
    attachted [2] showing the use of kernel 2.6.27. (kernel BUG at [..]
    linux-2.6.27/mm/rmap.c:662)

    There's also [3] on ubuntuforums, reported about 16 hours ago, same
    kernel, same error etc...

    So I guess whatever is broken, it's in our 2.6.27 as well.

    Hans van Kranenburg

    [1] https://bugs.launchpad.net/ubuntu/+s...ux/+bug/252977
    [2] http://launchpadlibrarian.net/175731...2009-09-12.txt
    [3] http://ubuntuforums.org/showthread.php?t=964133



    --
    To UNSUBSCRIBE, email to debian-bugs-dist-REQUEST@lists.debian.org
    with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

  11. Bug#503821: marked as done (linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1)))


    Your message dated Sat, 08 Nov 2008 17:17:38 +0000
    with message-id
    and subject line Bug#503821: fixed in linux-2.6 2.6.26-10
    has caused the Debian Bug report #503821,
    regarding linux-image-2.6.26-1-xen-amd64: Kernel crash in Dom0 (Eeek! page_mapcount(page) went negative! (-1))
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system
    misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    503821: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503821
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems


+ Reply to Thread