WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Backtrace in xen/next-2.6.38 when running guest

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] Backtrace in xen/next-2.6.38 when running guest
From: M A Young <m.a.young@xxxxxxxxxxxx>
Date: Wed, 2 Feb 2011 19:20:20 +0000 (GMT)
Cc: Jeremy Fitzhardinge <jeremy@xxxxxxxx>, Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Delivery-date: Wed, 02 Feb 2011 11:21:43 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Alpine 2.02 (LFD 1266 2009-07-14)
I get backtraces from the dom0 kernel when running a guest with networking (via netback) enabled such as the one below (there are some slight variations but the first two lines and most of the rest of the contents are the same).

        Michael Young

BUG: sleeping function called from invalid context at mm/page_alloc.c:2190
in_atomic(): 1, irqs_disabled(): 0, pid: 0, name: swapper
Pid: 0, comm: swapper Not tainted 2.6.38-0.rc3.git0.1.xendom0.fc15.x86_64 #1
Call Trace:
 <IRQ>  [<ffffffff81047b44>] ? __might_sleep+0xeb/0xf0
 [<ffffffff810dea22>] ? __alloc_pages_nodemask+0x98/0x772
 [<ffffffff81470426>] ? _raw_spin_lock+0xe/0x10
 [<ffffffffa02b3473>] ? ieee80211_rx_handlers+0x1773/0x17fe [mac80211]
 [<ffffffffa022c80e>] ? net_tx_build_gops+0x3e2/0x94d [xen_netback]
 [<ffffffff810066d5>] ? xen_force_evtchn_callback+0xd/0xf
 [<ffffffff81006c72>] ? check_events+0x12/0x20
 [<ffffffff81112e1c>] ? __kmalloc_node_track_caller+0xf8/0x118
 [<ffffffffa022c80e>] ? net_tx_build_gops+0x3e2/0x94d [xen_netback]
 [<ffffffff81108313>] ? alloc_pages_current+0xb6/0xd0
 [<ffffffff813b5047>] ? __alloc_skb+0x8d/0x133
 [<ffffffffa022bd1b>] ? netif_alloc_page.isra.14+0x1e/0x54 [xen_netback]
 [<ffffffffa022c93f>] ? net_tx_build_gops+0x513/0x94d [xen_netback]
 [<ffffffff8102abf9>] ? pvclock_clocksource_read+0x48/0xb7
 [<ffffffff81006a3a>] ? xen_vcpuop_set_next_event+0x51/0x63
 [<ffffffff8107a4a3>] ? clockevents_program_event+0x8e/0x90
 [<ffffffff8107b4b7>] ? tick_dev_program_event+0x36/0xf3
 [<ffffffffa022cd97>] ? net_tx_action+0x1e/0x590 [xen_netback]
 [<ffffffff8105a1ed>] ? arch_local_irq_restore+0xb/0xd
 [<ffffffff810066d5>] ? xen_force_evtchn_callback+0xd/0xf
 [<ffffffff81006c72>] ? check_events+0x12/0x20
 [<ffffffff8105a6d5>] ? tasklet_action+0x7f/0xd2
 [<ffffffff8105b090>] ? __do_softirq+0xd2/0x19d
 [<ffffffff81006c72>] ? check_events+0x12/0x20
 [<ffffffff8100aadc>] ? call_softirq+0x1c/0x30
 [<ffffffff8100c121>] ? do_softirq+0x46/0x81
 [<ffffffff8105b214>] ? irq_exit+0x49/0x8b
 [<ffffffff812a981b>] ? xen_evtchn_do_upcall+0x31/0x3e
 [<ffffffff8100ab2e>] ? xen_do_hypervisor_callback+0x1e/0x30
 <EOI>  [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
 [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
 [<ffffffff81006690>] ? xen_safe_halt+0x10/0x18
 [<ffffffff81010d46>] ? default_idle+0x4e/0x86
 [<ffffffff8100831d>] ? cpu_idle+0xa1/0xdb
 [<ffffffff81006c19>] ? xen_irq_enable_direct_end+0x0/0x7
 [<ffffffff8145a95f>] ? cpu_bringup_and_idle+0x13/0x15


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel