Kernel bug at mm/rmap.c, process wedged

Bug #65157 reported by Christian Hudon
6
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Won't Fix
Undecided
Unassigned

Bug Description

Binary package hint: linux-image-2.6.15-25-server

Here is the description of the bug, in the kernel's own words. I can't try with version -27 of the kernel package now, since it won't boot because of an initrd image problem. But I assume that unless this bug was already reported to you and fixed by a patch you applied to your latest kernel, it should still be present in -27...

[43535692.980000] ------------[ cut here ]------------
[43535692.980000] kernel BUG at mm/rmap.c:122!
[43535692.980000] invalid operand: 0000 [#1]
[43535692.980000] SMP
[43535692.980000] Modules linked in: nfs nfsd lockd sunrpc esp4 ppdev parport_pc lp parport ip6table_mangle autofs4 ip6table_filter ip6_tables ipt_LOG ipt_state ipt_MARK iptable_mangle iptable_nat ip_nat ip_conntrack nfnetlink iptable_filter ip_tables pppoe pppox ipv6 af_packet ppp_generic slhc deflate zlib_deflate twofish serpent aes blowfish des sha256 sha1 crypto_null af_key dm_mod tulip 8139too mii sk98lin skge xfs exportfs raid1 md_mod ide_generic ehci_hcd uhci_hcd usbcore ide_cd cdrom ide_disk via82cxxx generic sata_via sata_promise libata scsi_mod thermal processor fan capability commoncap vga16fb vgastate fbcon tileblit font bitblit softcursor
[43535692.980000] CPU: 0
[43535692.980000] EIP: 0060:[<c0164e1f>] Not tainted VLI
[43535692.980000] EFLAGS: 00010293 (2.6.15-25-server)
[43535692.980000] EIP is at __anon_vma_merge+0x2f/0x40
[43535692.980000] eax: d9f0bf80 ebx: f542eb30 ecx: d9f0bf9c edx: d977cd8c
[43535692.980000] esi: d9f0bf80 edi: cad869a8 ebp: d9f0bf80 esp: df0dbf18
[43535692.980000] ds: 007b es: 007b ss: 0068
[43535692.980000] Process munin-graph (pid: 12514, threadinfo=df0da000 task=f7feaa70)
[43535692.980000] Stack: f542eb30 c01615a5 d9f0bf80 f542eb30 b7bb4000 c31580a0 00000000 00000000
[43535692.980000] 00000000 d977cd8c 00000000 00000002 b7c29000 c31580a0 00024000 b7c4e000
[43535692.980000] c01646e9 d9f0bf80 b7c29000 b7c2a000 000b7bb6 00000000 00000000 d9f0bf80
[43535692.980000] Call Trace:
[43535692.980000] [<c01615a5>] vma_adjust+0x2c5/0x400
[43535692.980000] [<c01646e9>] do_mremap+0x409/0x480
[43535692.980000] [<c01647ad>] sys_mremap+0x4d/0x6c
[43535692.980000] [<c010335b>] sysenter_past_esp+0x54/0x75
[43535692.980000] Code: 0c 8b 44 24 08 8b 53 44 39 50 44 75 1e 8d 4b 3c 8b 53 3c 8b 41 04 89 42 04 89 10 c7 41 04 00 02 20 00 c7 43 3c 00 01 10 00 5b c3 <0f> 0b 7a 00 41 b8 31 c0 eb d8 8d b4 26 00 00 00 00 83 ec 08 89
[43535692.980000]

Revision history for this message
Gareth Fitzworthington (mapping-gp-deactivatedaccount) wrote :

This bug has had no activity for a considerable period. This is a check to see if there is still interest in investigating this bug report.

Changed in linux-source-2.6.15:
status: New → Incomplete
Revision history for this message
Andrew Ash (ash211) wrote :

Is this the same bug as bug 73982 ?

Revision history for this message
Christian Hudon (chrish) wrote :

I don't know. It doesn't look so from the oops, although they do look related (both in the VM area of the kernel).

Revision history for this message
Gareth Fitzworthington (mapping-gp-deactivatedaccount) wrote :

Does this issue occur only when nfsv4 mounts are present?

Revision history for this message
Christian Hudon (chrish) wrote : Re: [Bug 65157] Re: Kernel bug at mm/rmap.c, process wedged

When nfsv4 mounts are present? As far as I know, all the NFS mounts on
the system are nfsv3.

Revision history for this message
Launchpad Janitor (janitor) wrote : This bug is now reported against the 'linux' package

Beginning with the Hardy Heron 8.04 development cycle, all open Ubuntu kernel bugs need to be reported against the "linux" kernel package. We are automatically migrating this linux-source-2.6.15 kernel bug to the new "linux" package. We appreciate your patience and understanding as we make this transition. Also, if you would be interested in testing the upcoming Intrepid Ibex 8.10 release, it is available at http://www.ubuntu.com/testing . Please let us know your results. Thanks!

Revision history for this message
Leann Ogasawara (leannogasawara) wrote :

The Ubuntu Kernel Team is planning to move to the 2.6.27 kernel for the upcoming Intrepid Ibex 8.10 release. As a result, the kernel team would appreciate it if you could please test this newer 2.6.27 Ubuntu kernel. There are one of two ways you should be able to test:

1) If you are comfortable installing packages on your own, the linux-image-2.6.27-* package is currently available for you to install and test.

--or--

2) The upcoming Alpha5 for Intrepid Ibex 8.10 will contain this newer 2.6.27 Ubuntu kernel. Alpha5 is set to be released Thursday Sept 4. Please watch http://www.ubuntu.com/testing for Alpha5 to be announced. You should then be able to test via a LiveCD.

Please let us know immediately if this newer 2.6.27 kernel resolves the bug reported here or if the issue remains. More importantly, please open a new bug report for each new bug/regression introduced by the 2.6.27 kernel and tag the bug report with 'linux-2.6.27'. Also, please specifically note if the issue does or does not appear in the 2.6.26 kernel. Thanks again, we really appreicate your help and feedback.

Revision history for this message
Ralph Janke (txwikinger) wrote :

Unfortunately this bug report is being closed because we received no response to the last inquiry for information. However, the Intrepid Ibex 8.10 Beta release was most recently announced - http://www.ubuntu.com/testing/intrepid/beta . If you are able to confirm this is still an issue with this most recent release please feel free to reopen this report. To reopen the bug report you can click on the current status, under the Status column, and change the Status back to "New". Thanks.

Changed in linux:
status: Incomplete → Won't Fix
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.