|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] xennet and rt-kernel oops
I'm trying to use an rt-kernel as PV guest (using 2.6.31 with rt9
patch), but upon network startup I'm getting an Oops.
Booting the system with network disabled works fine, so think this is
specific to xennet. Should I better address that with the rt-kernel
folks or does anyone have an idea whats going on?
Bringing up interface eth0: ------------[ cut here ]------------
kernel BUG at arch/x86/xen/mmu.c:1362!
invalid opcode: 0000 [#1] PREEMPT SMP
last sysfs file: /sys/kernel/uevent_seqnum
Pid: 623, comm: ifup-eth Not tainted (2.6.31-gentoo #1)
EIP: 0061:[<c10045bf>] EFLAGS: 00010202 CPU: 1
EIP is at xen_write_cr3+0xff/0x110
EAX: 00000200 EBX: ec03d380 ECX: ec03d3d0 EDX: 00000001
ESI: 2c041000 EDI: ec7b8100 EBP: ecf5ac10 ESP: ec7d5d80
DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0069 preempt:00000000
Process ifup-eth (pid: 623, ti=ec7d4000 task=ecf5ac10 task.ti=ec7d4000)
Stack:
ec03d380 ec7b8100 c1080fe7 ecf9fdc0 ecf5ac10 ec66fb40 ecf9fdc0 ecf9fdc0
<0> ec66fb40 ecf0ba00 ecf5af10 c0000000 ec759cc0 ec759cc0 c1081442 c11b2f16
<0> ecfd3978 c11b2f1a 00000006 c10ae085 ecf9fdc0 00000080 00000002 c105c957
Call Trace:
[<c1080fe7>] ? flush_old_exec+0x2f7/0x6d0
[<c1081442>] ? kernel_read+0x32/0x50
[<c10ae085>] ? load_elf_binary+0x305/0x19e0
[<c105c957>] ? __alloc_pages_nodemask+0xd7/0x550
[<c1005437>] ? xen_force_evtchn_callback+0x17/0x30
[<c1005d68>] ? check_events+0x8/0xc
[<c105f5d6>] ? __lru_cache_add+0x46/0xd0
[<c1004411>] ? xen_set_pte_at+0x41/0xf0
[<c106b258>] ? handle_mm_fault+0x528/0xce0
[<c10038e6>] ? __raw_callee_save_xen_pte_val+0x6/0x8
[<c10038e6>] ? __raw_callee_save_xen_pte_val+0x6/0x8
[<c1069b1f>] ? vm_normal_page+0x2f/0xa0
[<c10680e6>] ? page_address+0xc6/0xe0
[<c106841c>] ? kmap_high+0x8c/0x470
[<c1069d78>] ? follow_page+0x1e8/0x210
[<c106bb0c>] ? __get_user_pages+0xfc/0x390
[<c1025538>] ? __wake_up+0x38/0x60
[<c108079f>] ? copy_strings+0x16f/0x190
[<c10add80>] ? load_elf_binary+0x0/0x19e0
[<c1080868>] ? search_binary_handler+0x68/0x1c0
[<c1081d20>] ? do_execve+0x2a0/0x330
[<c10067c6>] ? sys_execve+0x46/0x70
[<c10080c5>] ? syscall_call+0x7/0xb
Code: 00 00 00 00 e8 e3 f3 ff ff 89 c3 81 e3 ff ff ff 7f 85 db 75 80 e9
6a ff ff
ff 66 90 ff 15 9c 51 1e c1 f6 c4 02 0f 84 17 ff ff ff <0f> 0b eb fe 8d
b6 00 00
00 00 8d bc 27 00 00 00 00 83 ec 14 89
EIP: [<c10045bf>] xen_write_cr3+0xff/0x110 SS:ESP 0069:ec7d5d80
---[ end trace 0
Thanks,
Christian
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-devel] xennet and rt-kernel oops,
Christian Tramnitz <=
|
|
|
|
|