|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] Hard lock of server - saved history from serial consolew
Ian Pratt wrote:
Routed / Proxy ARP.
vif-route assigns an IP to the appropriate vif interface.
The IP's of the VM are routed through the vif interface.
Have you iptables rules thrown in their too?
Yes, an iptable rule for each IP for bandwidth accounting. Also 4 rules
in the raw table and 4 rules in the nat table for port redirection. I
don't see how the actual iptables rules could effect the kernel though.
It's really nothing special... routing is actually less
complex than bridging IMHO.
Is this perhaps a 2.6.16 kernel bug? Are there any
dis-advantages to upgrading to 2.6.16.9 or .10-rc?
Please try .9 or .10-rc and let us know how you get on.
Easier said than done. I have 31 nodes and 2 have rebooted with this
error so far. It's especially hurtful as I just upgraded all nodes to
the changeset listed in the original message yesterday. I'll give it a
shot, but I have absolutely no idea which node will reboot next.
Ian
Thanks,
Matt
Ian Pratt wrote:
Please can you describe your networking setup. Judging by the stack
trace its non standard.
Ian
-----Original Message-----
From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Matt
Ayres
Sent: 19 April 2006 23:07
To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] Hard lock of server - saved history
from serial
consolewithin
This was a hard lock...
xen_changeset : Sun Apr 16 15:45:57 2006 +0100
9629:07408313ce33
--- TOP OF BUFFER ---
Unable to handle kernel paging request at virtual address d144a053
printing eip:
c03e5b55
09baa000 -> *pde = 00000000:ec867001
0e467000 -> *pme = 00000000:eb346067
0fb46000 -> *pte = 00000000:00000000
Oops: 0000 [#1]
SMP
Modules linked in:
CPU: 0
EIP: 0061:[<c03e5b55>] Not tainted VLI
EFLAGS: 00010282 (2.6.16-xen #4)
EIP is at ipt_do_table+0xad/0x2d0
eax: 00000002 ebx: c804ca1e ecx: c804ca1e edx: 00000000
esi: d144a000 edi: 00004000 ebp: d144d9d0 esp: c0567dd0
ds: 007b es: 007b ss: 0069
Process swapper (pid: 0, threadinfo=c0566000 task=c04e5c80)
Stack: <0>c051956c 00000000 c804ca1e 00000000 ce2f1800 cfdcb000
d144a000 0000000 0
00000001 00000000 c0567e70 80000000 c03aeb78 cfdcb000
c03e6bd0
c0567eb4
00000002 ce2f1800 cfdcb000 c0519540 00000000 c03a42f8
00000002
c0567eb4
Call Trace:
PORT HISTORY> NEXT
[<c03aeb78>] ip_forward_finish+0x0/0x36
[<c03e6bd0>] ipt_hook+0x1c/0x20
[<c03a42f8>] nf_iterate+0x2c/0x5e
[<c03aeb78>] ip_forward_finish+0x0/0x36
[<c03aeb78>] ip_forward_finish+0x0/0x36
[<c03a43f3>] nf_hook_slow+0x3c/0xc3
[<c03aeb78>] ip_forward_finish+0x0/0x36
[<c03aed4c>] ip_forward+0x19e/0x22e
[<c03aeb78>] ip_forward_finish+0x0/0x36
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|