Bug#503962: linux-image-2.6.26-1-xen-amd64: kernel oops after short on memory situation - Debian

This is a discussion on Bug#503962: linux-image-2.6.26-1-xen-amd64: kernel oops after short on memory situation - Debian ; Package: linux-image-2.6.26-1-xen-amd64 Version: 2.6.26-8 Severity: important I can consistently make the kernel oops with the following situation: If I have a domain (either domU or dom0) that is limited on memory and I start a program that needs more memory ...

+ Reply to Thread
Results 1 to 2 of 2

Thread: Bug#503962: linux-image-2.6.26-1-xen-amd64: kernel oops after short on memory situation

  1. Bug#503962: linux-image-2.6.26-1-xen-amd64: kernel oops after short on memory situation

    Package: linux-image-2.6.26-1-xen-amd64
    Version: 2.6.26-8
    Severity: important

    I can consistently make the kernel oops with the following situation:

    If I have a domain (either domU or dom0) that is limited on memory and I start a program that needs
    more memory than available as physical memory, this program will use more than 99% of CPU. Swap space
    is available more than enogh, but will not be used extensively. When I interrupt the program with Ctrl-C,
    I get the oops.
    Example: Domain with 128M of memory and 2G of swap. Starting e2fsck on a filesystem with 300G will
    trigger the effect. Swap space is used about 350k. Extending the memory of the domain to 256M will
    make the problem go away. Unfortunately this is not a possibility in all situations.


    Oct 29 09:26:28 server kernel: [40200.737611] Eeek! page_mapcount(page) went negative! (-1)
    Oct 29 09:26:28 server kernel: [40200.737645] page pfn = 1d
    Oct 29 09:26:28 server kernel: [40200.737655] page->flags = 0
    Oct 29 09:26:28 server kernel: [40200.737666] page->count = 0
    Oct 29 09:26:28 server kernel: [40200.737676] page->mapping = 0000000000000000
    Oct 29 09:26:28 server kernel: [40200.737710] vma->vm_ops = 0x0
    Oct 29 09:26:28 server kernel: [40200.737737] ------------[ cut here ]------------
    Oct 29 09:26:28 server kernel: [40200.737749] kernel BUG at mm/rmap.c:669!
    Oct 29 09:26:28 server kernel: [40200.737760] invalid opcode: 0000 [1] SMP
    Oct 29 09:26:28 server kernel: [40200.737779] CPU 0
    Oct 29 09:26:28 server kernel: [40200.737793] Modules linked in: openafs(P) bridge netloop video output ac battery ip6table_filter ip6_tables iptable_raw xt_comment xt_policy ipt_ULOG ipt_TTL ipt_ttl ipt_REJECT ipt_REDIRECT ipt_recent ipt_NETMAP ipt_MASQUERADE ipt_LOG ipt_ECN ipt_ecn ipt_CLUSTERIP ipt_ah ipt_addrtype nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda nf_conntrack_tftp nf_conntrack_sip nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp xt_tcpmss xt_pkttype xt_physdev xt_owner xt_NFQUEUE xt_NFLOG xt_multiport xt_MARK xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit xt_DSCP xt_dscp xt_dccp xt_conntrack xt_CONNMARK xt_connmark xt_CLASSIFY xt_tcpudp xt_state iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack iptable_mangle nfnetlink iptable_filter ip_tables x_tables dummy ipv6 loo
    Oct 29 09:26:28 server kernel: ide_generic serio_raw pcspkr psmouse k8temp i2c_nforce2 button i2c_core evdev ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod raid456 md_mod async_xor async_memcpy async_tx xor sd_mod ide_cd_mod cdrom ide_disk sata_nv ata_generic r8169 forcedeth amd74xx libata scsi_mod dock ide_pci_generic ide_core thermal processor fan thermal_sys
    Oct 29 09:26:28 server kernel: [40200.738424] Pid: 11894, comm: e2fsck Tainted: P 2.6.26-1-xen-amd64 #1
    Oct 29 09:26:28 server kernel: [40200.738440] RIP: e030:[] [] page_remove_rmap+0xfb/0x117
    Oct 29 09:26:28 server kernel: [40200.738467] RSP: e02b:ffff880008797bf8 EFLAGS: 00010246
    Oct 29 09:26:28 server kernel: [40200.738479] RAX: 0000000000000000 RBX: ffff880001e6e658 RCX: 000075750000a035
    Oct 29 09:26:28 server kernel: [40200.738491] RDX: ffffffffff5f7000 RSI: 0000000000000001 RDI: ffffffff805aaab0
    Oct 29 09:26:28 server kernel: [40200.738504] RBP: ffff88003e208528 R08: 0000000000000023 R09: ffff880008797600
    Oct 29 09:26:28 server kernel: [40200.738516] R10: 0000000000000000 R11: 000001f328e040ae R12: ffff880001e6e658
    Oct 29 09:26:28 server kernel: [40200.738529] R13: ffff880008129c70 R14: ffff88003e2e0700 R15: ffff880002032108
    Oct 29 09:26:28 server kernel: [40200.738544] FS: 00007f0f53e05740(0000) GS:ffffffff80539000(0000) knlGS:0000000000000000
    Oct 29 09:26:28 server kernel: [40200.738561] CS: e033 DS: 0000 ES: 0000
    Oct 29 09:26:28 server kernel: [40200.738572] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    Oct 29 09:26:28 server kernel: [40200.738585] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
    Oct 29 09:26:28 server kernel: [40200.738598] Process e2fsck (pid: 11894, threadinfo ffff880008796000, task ffff880008728340)
    Oct 29 09:26:28 server kernel: [40200.738615] Stack: ffff880008129c58 000000000001d500 0000000002f8e000 ffffffff80273155
    Oct 29 09:26:28 server kernel: [40200.738651] ffff8800087e8000 0000000000000000 ffff880008797cf8 ffffffffffffffff
    Oct 29 09:26:28 server kernel: [40200.738683] 0000000000000000 ffff88003e208528 ffff880008797d00 0000000000323000
    Oct 29 09:26:28 server kernel: [40200.738707] Call Trace:
    Oct 29 09:26:28 server kernel: [40200.738736] [] ? unmap_vmas+0x744/0xa49
    Oct 29 09:26:28 server kernel: [40200.738783] [] ? exit_mmap+0x7b/0xf7
    Oct 29 09:26:28 server kernel: [40200.738802] [] ? mmput+0x2c/0xc0
    Oct 29 09:26:28 server kernel: [40200.738820] [] ? do_exit+0x25a/0x6ce
    Oct 29 09:26:28 server kernel: [40200.738844] [] ? do_group_exit+0xa6/0xdc
    Oct 29 09:26:28 server kernel: [40200.738862] [] ? get_signal_to_deliver+0x3b1/0x40b
    Oct 29 09:26:28 server kernel: [40200.738884] [] ? do_notify_resume+0xa0/0x832
    Oct 29 09:26:28 server kernel: [40200.738898] [] ? get_nsec_offset+0x9/0x2c
    Oct 29 09:26:28 server kernel: [40200.738912] [] ? local_clock+0x39/0x83
    Oct 29 09:26:28 server kernel: [40200.738933] [] ? __dequeue_entity+0x25/0x69
    Oct 29 09:26:28 server kernel: [40200.738952] [] ? set_next_entity+0x18/0x3a
    Oct 29 09:26:28 server kernel: [40200.738975] [] ? thread_return+0x3e/0xdb
    Oct 29 09:26:28 server kernel: [40200.738999] [] ? do_page_fault+0xb73/0xf50
    Oct 29 09:26:28 server kernel: [40200.739026] [] ? retint_signal+0x57/0xae
    Oct 29 09:26:28 server kernel: [40200.739063]
    Oct 29 09:26:28 server kernel: [40200.739072]
    Oct 29 09:26:28 server kernel: [40200.739081] Code: 80 e8 3c 0c fd ff 48 8b 85 90 00 00 00 48 85 c0 74 19 48 8b 40 20 48 85 c0 74 10 48 8b 70 58 48 c7 c7 66 52 4b 80 e8 17 0c fd ff <0f> 0b eb fe 8b 77 18 41 58 5b 5d 83 e6 01 f7 de 83 c6 04 e9 6c
    Oct 29 09:26:28 server kernel: [40200.739359] RIP [] page_remove_rmap+0xfb/0x117
    Oct 29 09:26:28 server kernel: [40200.739376] RSP
    Oct 29 09:26:28 server kernel: [40200.739823] ---[ end trace d7a0c0a175c102d0 ]---
    Oct 29 09:26:28 server kernel: [40200.739889] Fixing recursive fault but reboot is needed!

    I am using xen-hypervisor-3.2-1-amd64 version 3.2.1-2.

    If you need more information, feel free to ask.

    -- System Information:
    Debian Release: lenny/sid
    APT prefers testing
    APT policy: (500, 'testing')
    Architecture: amd64 (x86_64)

    Kernel: Linux 2.6.26-1-xen-amd64 (SMP w/1 CPU core)
    Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
    Shell: /bin/sh linked to /bin/bash

    Versions of packages linux-image-2.6.26-1-xen-amd64 depends on:
    ii initramfs-tools 0.92l tools for generating an initramfs
    ii linux-modules-2.6.26-1-xen-am 2.6.26-8 Linux 2.6.26 modules on AMD64

    linux-image-2.6.26-1-xen-amd64 recommends no packages.

    Versions of packages linux-image-2.6.26-1-xen-amd64 suggests:
    ii grub 0.97-47 GRand Unified Bootloader (Legacy v
    pn linux-doc-2.6.26 (no description available)

    -- no debconf information



    --
    To UNSUBSCRIBE, email to debian-bugs-dist-REQUEST@lists.debian.org
    with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

  2. Bug#503962: marked as done (linux-image-2.6.26-1-xen-amd64: kernel oops after short on memory situation)


    Your message dated Sat, 08 Nov 2008 17:17:38 +0000
    with message-id
    and subject line Bug#503821: fixed in linux-2.6 2.6.26-10
    has caused the Debian Bug report #503821,
    regarding linux-image-2.6.26-1-xen-amd64: kernel oops after short on memorysituation
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system
    misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    503821: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503821
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems


+ Reply to Thread