WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 304] New: oops with 4k kernel stack

http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=304

           Summary: oops with 4k kernel stack
           Product: Xen
           Version: unstable
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: major
          Priority: P2
         Component: Guest-OS
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: tedkaz@xxxxxxxxxxxxx


changeset:   7268:2144de6eabcc
tag:         tip
user:        kaf24@xxxxxxxxxxxxxxxxxxxx
date:        Sat Oct  8 14:19:27 2005 +0100
summary:     Make libxenstore thread-safe. It also spawns an internal

Dom0 is a UP Dell Precision 330, P1.7 running CentOS 4.1.

Registering block device major 8
register_blkdev: cannot get major 8 for sd
xen_blk: can't get major 8 with name sd
Unable to handle kernel NULL pointer dereference at virtual address 00000008
 printing eip:
c0234a4d
*pde = ma 00000000 pa 55555000
Oops: 0002 [#1]
Modules linked in:
CPU:    0
EIP:    0061:[<c0234a4d>]    Not tainted VLI
EFLAGS: 00010286   (2.6.12-xenU)
EIP is at xlbd_get_major_info+0x2f/0xb7
eax: 00000000   ebx: 00000001   ecx: 000009b6   edx: 00000000
esi: c11f2a80   edi: 00000001   ebp: 00000200   esp: c03cce9c
ds: 007b   es: 007b   ss: 0069
Process kxbwatch (pid: 6, threadinfo=c03cc000 task=c03b70a0)
Stack: 00000008 00000001 0000000a 00000801 c0234bbd 00000801 c11f2ae4 c0157cef
       c11f2ae4 c11e110c 00000200 00000801 c11f2a80 00000001 00000200 c0234daf
       00000001 00c00000 00000000 00000801 00000000 00000200 c0044000 00000000
Call Trace:
 [<c0234bbd>] xlvbd_alloc_gendisk+0x25/0x1a4
 [<c0157cef>] bdget+0xdc/0xe1
 [<c0234daf>] xlvbd_add+0x73/0x87
 [<c0234220>] watch_for_status+0xbe/0x11b
 [<c02324a8>] watch_thread+0x104/0x180
 [<c0129f15>] autoremove_wake_function+0x0/0x4b
 [<c0129f15>] autoremove_wake_function+0x0/0x4b
 [<c02323a4>] watch_thread+0x0/0x180
 [<c0129adc>] kthread+0x90/0xba
 [<c0129a4c>] kthread+0x0/0xba
 [<c010690d>] kernel_thread_helper+0x5/0xb
Code: 8b 44 24 14 89 c1 0f b6 d8 c1 f9 08 8d 51 fd 83 fa 58 77 07 ff 24 95 28 d8
 2a c0 ba 13 00 00 00 8b 04 95 80 f9 35 c0 85 c0 74 09 <83> 40 08 01 83 c4 0c 5b
 c3 89 54 24 08 89 5c 24 04 89 0c 24 e8

-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-bugs] [Bug 304] New: oops with 4k kernel stack, bugzilla-daemon <=