WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 873] KERNEL PANIC on 2.6.18.3 on Xen v. 3.0.3

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 873] KERNEL PANIC on 2.6.18.3 on Xen v. 3.0.3
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Sun, 11 Feb 2007 10:06:27 -0800
Delivery-date: Sun, 11 Feb 2007 10:07:26 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <bug-873-3@xxxxxxxxxxxxxxxxxxxxxxxxxxx/bugzilla/>
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=873





------- Comment #1 from marcin@xxxxxxxxxx  2007-02-11 10:06 -------
Here's the message from my system (xen 3.0.3-1), in case the stack trace is
useful:

------------[ cut here ]------------
kernel BUG at drivers/xen/core/evtchn.c:481!
invalid opcode: 0000 [#1]
SMP
Modules linked in: ext2 xt_NOTRACK iptable_raw xt_tcpudp xt_physdev
iptable_filter ipt_MASQUERADE iptable_nat ip_nat ip_conntrack nfnetlink
ip_tables x_tables bridge ipv6 ext3 jbd mbcache netloop ide_generic ide_disk
psmouse i2c_piix4 serio_raw shpchp pci_hotplug pcspkr evdev i2c_core xfs
dm_mirror dm_snapshot dm_mod ide_cd cdrom sym53c8xx piix uhci_hcd usbcore
cpqarray e100 mii generic ide_core scsi_transport_spi megaraid scsi_mod
processor
CPU:    1
EIP:    0061:[<c020652a>]    Not tainted VLI
EFLAGS: 00010046   (2.6.18-3-xen-686 #1)
EIP is at retrigger+0x1f/0x35
eax: 00000000   ebx: 02080000   ecx: 0000002c   edx: fbf46000
esi: c030e820   edi: 00000119   ebp: 00000000   esp: c038feb0
ds: 007b   es: 007b   ss: 0069
Process xenwatch (pid: 11, ti=c038e000 task=c0e85000 task.ti=c038e000)
Stack: c0139a4d c030e820 00000119 c030e848 c01397a3 c08c8ac0 00000000 00000000
       c08c8ac0 c02113d0 00000000 c02117b0 c020a9cf 00000010 00000000 0000020b
       0000020a 00000000 00000000 dbb986d6 c02dd904 f4b74000 00000000 00000002
Call Trace:
 [<c0139a4d>] check_irq_resend+0x41/0x48
 [<c01397a3>] enable_irq+0x72/0x87
 [<c02113d0>] __netif_up+0xb/0x13
 [<c02117b0>] netif_map+0x247/0x26f
 [<c020a9cf>] xs_talkv+0xe3/0x128
 [<c020ad18>] xenbus_read+0x34/0x3b
 [<c020b0da>] xenbus_scanf+0x18/0x4d
 [<c0210e41>] frontend_changed+0x29f/0x4a8
 [<c020c0b8>] otherend_changed+0x74/0x79
 [<c020a852>] xenwatch_handle_callback+0x12/0x44
 [<c020b297>] xenwatch_thread+0x105/0x11b
 [<c0129ec1>] autoremove_wake_function+0x0/0x2d
 [<c020b192>] xenwatch_thread+0x0/0x11b
 [<c0129df3>] kthread+0xc2/0xef
 [<c0129d31>] kthread+0x0/0xef
 [<c0102941>] kernel_thread_helper+0x5/0xb
Code: ee 85 f6 75 96 58 5a 5b 5e 5f 5d c3 0f b7 0c 85 80 14 37 c0 8b 15 84 a9
2c c0 85 c9 74 1d 0f a3 8a 80 08 00 00 19 c0 85 c0 75 08 <0f> 0b e1 01 05 b8 2a
c0 f0 0f ab 8a 00 08 00 00 b8 01 00 00 00
EIP: [<c020652a>] retrigger+0x1f/0x35 SS:ESP 0069:c038feb0


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>