|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] Xenlinux oops and crashes with nbd, Xen no longer boots
Now fixed. You've been able to hit this more reliably than anyone
else, so I'll be interested to hear confirmation that the problem
really has now gone away.
-- Keir
>
> Okay, detangling the backtrace....
>
> Entry EIP Function Caller's return EIP
> --------- -------- -------------------
> 0xc00c1220 alloc_skb(1656,GFP_NOIO) 0xc00ddd58
> 0xc00dd4b0 tcp_sendmsg 0xc00fa9a1
> 0xc00fa960 inet_sendmsg 0xc00bde23
> 0xc00bddb0 sock_sendmsg 0xc3cad25f
> unknown nbd_xmit 0xc3cad511
> unknown nbd_send_req 0xc3cad91c
> unknown do_nbd_request 0xc008fc46
> 0xc008fbe0 generic_unplug_device 0xc000c342
> 0xc000c2e0 __run_task_queue n/a (tail call)
> 0xc00b8f20 io_schedule 0xc000c0a8
> 0xc000c050 tasklet_action 0xc000be9e
> 0xc000bdc0 do_softirq 0xc006f2c0
> 0xc006f220 do_IRQ(133,-) 0xc007395e
> 0xc00738c0 evtchn_do_upcall 0xc006dcd7
> 0xc006dca4 hypervisor_callback n/a (async callback)
>
> I see the problem. Well hidden because the key function (io_schedule)
> ends in a tail call. The problem is that we are scheduling I/O
> requests in interrupt context rather than deferring to a process
> context --- a known issue that hasn't bitten until now. I'll have to
> think about a fix.
>
> -- Keir
-------------------------------------------------------
This SF.Net email sponsored by Black Hat Briefings & Training.
Attend Black Hat Briefings & Training, Las Vegas July 24-29 -
digital self defense, top technical experts, no vendor pitches,
unmatched networking opportunities. Visit www.blackhat.com
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel
|
|
|
|
|