[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 757] kernel BUG at mm/rmap.c:560!



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=757


paul@xxxxxxxxxxx changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |paul@xxxxxxxxxxx




------- Comment #3 from paul@xxxxxxxxxxx  2007-10-15 17:00 -------
I don't know about Matus, but something very similar started happening to me
today.

One of 5 guest domains, was running fine for several weeks, has crashed 3 times
today.

I get this on the guest console:
------------[ cut here ]------------
kernel BUG at
/local/scratch/shand/3.1.0/pae-3.1-testing.hg/linux-2.6.18-xen/mm/rmap.c:522!
invalid opcode: 0000 [#1]
SMP 
Modules linked in: ipv6 dm_snapshot dm_mirror dm_mod 8250 serial_core
CPU:    0
EIP:    0061:[<c016e615>]    Tainted: GF     VLI
EFLAGS: 00210286   (2.6.18-xen #1) 
EIP is at page_remove_rmap+0x25/0x30
eax: ffffffff   ebx: c13d61c0   ecx: c13d61c0   edx: 00000000
esi: c13d61c0   edi: 314ea065   ebp: 00000001   esp: df9e7e50
ds: 007b   es: 007b   ss: 0069
Process rdiff (pid: 2030, ti=df9e6000 task=c17cc7a0 task.ti=df9e6000)
Stack: c0164dda 314ea065 80000000 00000000 df9e7f04 c018c531 c075c894 c14e91c0 
       00000021 00000000 c13d61c0 dfbd9084 ffffff70 00000000 de191720 dfbd9040 
       c03ef9bc c1413200 00000000 4713d917 00031e67 1e191067 00000000 08a00000 
Call Trace:
 [<c0164dda>] zap_pte_range+0x27a/0x570
 [<c018c531>] link_path_walk+0x71/0xe0
 [<c0165262>] unmap_page_range+0x192/0x2e0
 [<c0165488>] unmap_vmas+0xd8/0x1f0
 [<c016bd48>] exit_mmap+0x78/0xf0
 [<c0121c28>] mmput+0x38/0xa0
 [<c01275ba>] do_exit+0x13a/0x4a0
 [<c0127987>] do_group_exit+0x37/0xc0
 [<c0105697>] syscall_call+0x7/0xb
Code: ff ff 8d 74 26 00 89 c1 90 83 40 08 ff 0f 98 c0 84 c0 74 16 8b 41 08 40
78 11 31 d2 f6 41 10 01 89 c8 0f 94 c2 e9 0c 2d ff ff c3 <0f> 0b 0a 02 80 81 32
c0 eb e5 90 83 ec 3c 89 54 24 20 89 5c 24 
EIP: [<c016e615>] page_remove_rmap+0x25/0x30 SS:ESP 0069:df9e7e50
 <1>Fixing recursive fault but reboot is needed!
------------[ cut here ]------------
kernel BUG at
/local/scratch/shand/3.1.0/pae-3.1-testing.hg/linux-2.6.18-xen/mm/rmap.c:522!
invalid opcode: 0000 [#2]
SMP 
Modules linked in: ipv6 dm_snapshot dm_mirror dm_mod 8250 serial_core
CPU:    0
EIP:    0061:[<c016e615>]    Tainted: GF     VLI
EFLAGS: 00210286   (2.6.18-xen #1) 
EIP is at page_remove_rmap+0x25/0x30
eax: ffffffff   ebx: d9627ee8   ecx: c135a4e0   edx: 80000000
esi: 00019627   edi: 00000000   ebp: dc868e84   esp: daf89ec8
ds: 007b   es: 007b   ss: 0069
Process rdiff (pid: 6584, ti=daf88000 task=c17cc230 task.ti=daf88000)
Stack: c01673df 272d1065 80000000 090df600 00000000 daf89efc d9627ee8 dc868e84 
       c0316320 c0156f84 daf89fa4 00000002 c13ccd40 c135a4e0 087ddcd0 dad16124 
       dc868e40 272d1065 80000000 d9627ee8 087ddcd0 c0168ee7 d9627ee8 db8dc218 
Call Trace:
 [<c01673df>] do_wp_page+0x2bf/0x630
 [<c0156f84>] generic_file_read+0x94/0xc0
 [<c0168ee7>] __handle_mm_fault+0x417/0x430
 [<c013aa30>] autoremove_wake_function+0x0/0x50
 [<c0117cc6>] do_page_fault+0x196/0xa60
 [<c0195acd>] dput+0x2d/0x150
 [<c017d9e7>] __fput+0x137/0x1a0
 [<c0117b30>] do_page_fault+0x0/0xa60
 [<c0105843>] error_code+0x2b/0x30
Code: ff ff 8d 74 26 00 89 c1 90 83 40 08 ff 0f 98 c0 84 c0 74 16 8b 41 08 40
78 11 31 d2 f6 41 10 01 89 c8 0f 94 c2 e9 0c 2d ff ff c3 <0f> 0b 0a 02 80 81 32
c0 eb e5 90 83 ec 3c 89 54 24 20 89 5c 24 
EIP: [<c016e615>] page_remove_rmap+0x25/0x30 SS:ESP 0069:daf89ec8
 <3>BUG: soft lockup detected on CPU#0!
 [<c0151d6a>] softlockup_tick+0xba/0xe0
 [<c0109655>] timer_interrupt+0x4e5/0x650
 [<c011e887>] __wake_up_common+0x37/0x70
 [<c012e700>] lock_timer_base+0x20/0x50
 [<c01526a9>] handle_IRQ_event+0x59/0xa0
 [<c0152785>] __do_IRQ+0x95/0x120
 [<c010713f>] do_IRQ+0x3f/0xa0
 [<c024f435>] evtchn_do_upcall+0xb5/0x120
 [<c0105885>] hypervisor_callback+0x3d/0x45
 [<c030bcb7>] _spin_lock+0x7/0x10
 [<c0117218>] mm_unpin+0x18/0x30
 [<c0117351>] _arch_exit_mmap+0x81/0x1c0
 [<c012a437>] do_softirq+0x67/0x70
 [<c016bcea>] exit_mmap+0x1a/0xf0
 [<c013d527>] lock_hrtimer_base+0x27/0x60
 [<c0121c28>] mmput+0x38/0xa0
 [<c01275ba>] do_exit+0x13a/0x4a0
 [<c01060c5>] die+0x245/0x250
 [<c0106400>] do_invalid_op+0x0/0xa0
 [<c0106493>] do_invalid_op+0x93/0xa0
 [<c0198aef>] touch_atime+0x5f/0xb0
 [<c016e615>] page_remove_rmap+0x25/0x30
 [<c015ad30>] buffered_rmqueue+0x50/0x1e0
 [<c015b054>] get_page_from_freelist+0xc4/0x110
 [<c0105843>] error_code+0x2b/0x30
 [<c016e615>] page_remove_rmap+0x25/0x30
 [<c01673df>] do_wp_page+0x2bf/0x630
 [<c0156f84>] generic_file_read+0x94/0xc0
 [<c0168ee7>] __handle_mm_fault+0x417/0x430
 [<c013aa30>] autoremove_wake_function+0x0/0x50
 [<c0117cc6>] do_page_fault+0x196/0xa60
 [<c0195acd>] dput+0x2d/0x150
 [<c017d9e7>] __fput+0x137/0x1a0
 [<c0117b30>] do_page_fault+0x0/0xa60
 [<c0105843>] error_code+0x2b/0x30

server3:~# xm info
host                   : server3.zicasso.com
release                : 2.6.18-xen
version                : #1 SMP Fri Jun 1 15:01:20 BST 2007
machine                : i686
nr_cpus                : 1
nr_nodes               : 1
sockets_per_node       : 1
cores_per_socket       : 1
threads_per_core       : 1
cpu_mhz                : 2210
hw_caps                :
078bfbff:e3d3fbff:00000000:00000010:00000001:00000001:00000001
total_memory           : 3070
free_memory            : 0
xen_major              : 3
xen_minor              : 1
xen_extra              : .0
xen_caps               : xen-3.0-x86_32p 
xen_scheduler          : credit
xen_pagesize           : 4096
platform_params        : virt_start=0xf5800000
xen_changeset          : Fri May 18 16:59:32 2007 +0100 15042:c0b0974fb055
cc_compiler            : gcc version 3.4.4 20050314 (prerelease) (Debian
3.4.3-13)
cc_compile_by          : shand
cc_compile_domain      : localdomain
cc_compile_date        : Fri Jun  1 14:55:10 BST 2007
xend_config_format     : 4

Please let me know if there's more info I can give you.


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.