|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] Backtrace in xen/next-2.6.38 when running guest
I get backtraces from the dom0 kernel when running a guest with networking
(via netback) enabled such as the one below (there are some slight
variations but the first two lines and most of the rest of the contents
are the same).
Michael Young
BUG: sleeping function called from invalid context at mm/page_alloc.c:2190
in_atomic(): 1, irqs_disabled(): 0, pid: 0, name: swapper
Pid: 0, comm: swapper Not tainted 2.6.38-0.rc3.git0.1.xendom0.fc15.x86_64
#1
Call Trace:
<IRQ> [<ffffffff81047b44>] ? __might_sleep+0xeb/0xf0
[<ffffffff810dea22>] ? __alloc_pages_nodemask+0x98/0x772
[<ffffffff81470426>] ? _raw_spin_lock+0xe/0x10
[<ffffffffa02b3473>] ? ieee80211_rx_handlers+0x1773/0x17fe [mac80211]
[<ffffffffa022c80e>] ? net_tx_build_gops+0x3e2/0x94d [xen_netback]
[<ffffffff810066d5>] ? xen_force_evtchn_callback+0xd/0xf
[<ffffffff81006c72>] ? check_events+0x12/0x20
[<ffffffff81112e1c>] ? __kmalloc_node_track_caller+0xf8/0x118
[<ffffffffa022c80e>] ? net_tx_build_gops+0x3e2/0x94d [xen_netback]
[<ffffffff81108313>] ? alloc_pages_current+0xb6/0xd0
[<ffffffff813b5047>] ? __alloc_skb+0x8d/0x133
[<ffffffffa022bd1b>] ? netif_alloc_page.isra.14+0x1e/0x54 [xen_netback]
[<ffffffffa022c93f>] ? net_tx_build_gops+0x513/0x94d [xen_netback]
[<ffffffff8102abf9>] ? pvclock_clocksource_read+0x48/0xb7
[<ffffffff81006a3a>] ? xen_vcpuop_set_next_event+0x51/0x63
[<ffffffff8107a4a3>] ? clockevents_program_event+0x8e/0x90
[<ffffffff8107b4b7>] ? tick_dev_program_event+0x36/0xf3
[<ffffffffa022cd97>] ? net_tx_action+0x1e/0x590 [xen_netback]
[<ffffffff8105a1ed>] ? arch_local_irq_restore+0xb/0xd
[<ffffffff810066d5>] ? xen_force_evtchn_callback+0xd/0xf
[<ffffffff81006c72>] ? check_events+0x12/0x20
[<ffffffff8105a6d5>] ? tasklet_action+0x7f/0xd2
[<ffffffff8105b090>] ? __do_softirq+0xd2/0x19d
[<ffffffff81006c72>] ? check_events+0x12/0x20
[<ffffffff8100aadc>] ? call_softirq+0x1c/0x30
[<ffffffff8100c121>] ? do_softirq+0x46/0x81
[<ffffffff8105b214>] ? irq_exit+0x49/0x8b
[<ffffffff812a981b>] ? xen_evtchn_do_upcall+0x31/0x3e
[<ffffffff8100ab2e>] ? xen_do_hypervisor_callback+0x1e/0x30
<EOI> [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
[<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
[<ffffffff81006690>] ? xen_safe_halt+0x10/0x18
[<ffffffff81010d46>] ? default_idle+0x4e/0x86
[<ffffffff8100831d>] ? cpu_idle+0xa1/0xdb
[<ffffffff81006c19>] ? xen_irq_enable_direct_end+0x0/0x7
[<ffffffff8145a95f>] ? cpu_bringup_and_idle+0x13/0x15
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-devel] Backtrace in xen/next-2.6.38 when running guest,
M A Young <=
|
|
|
|
|