I''m trying to use an rt-kernel as PV guest (using 2.6.31 with rt9 patch), but upon network startup I''m getting an Oops. Booting the system with network disabled works fine, so think this is specific to xennet. Should I better address that with the rt-kernel folks or does anyone have an idea whats going on? Bringing up interface eth0: ------------[ cut here ]------------ kernel BUG at arch/x86/xen/mmu.c:1362! invalid opcode: 0000 [#1] PREEMPT SMP last sysfs file: /sys/kernel/uevent_seqnum Pid: 623, comm: ifup-eth Not tainted (2.6.31-gentoo #1) EIP: 0061:[<c10045bf>] EFLAGS: 00010202 CPU: 1 EIP is at xen_write_cr3+0xff/0x110 EAX: 00000200 EBX: ec03d380 ECX: ec03d3d0 EDX: 00000001 ESI: 2c041000 EDI: ec7b8100 EBP: ecf5ac10 ESP: ec7d5d80 DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0069 preempt:00000000 Process ifup-eth (pid: 623, ti=ec7d4000 task=ecf5ac10 task.ti=ec7d4000) Stack: ec03d380 ec7b8100 c1080fe7 ecf9fdc0 ecf5ac10 ec66fb40 ecf9fdc0 ecf9fdc0 <0> ec66fb40 ecf0ba00 ecf5af10 c0000000 ec759cc0 ec759cc0 c1081442 c11b2f16 <0> ecfd3978 c11b2f1a 00000006 c10ae085 ecf9fdc0 00000080 00000002 c105c957 Call Trace: [<c1080fe7>] ? flush_old_exec+0x2f7/0x6d0 [<c1081442>] ? kernel_read+0x32/0x50 [<c10ae085>] ? load_elf_binary+0x305/0x19e0 [<c105c957>] ? __alloc_pages_nodemask+0xd7/0x550 [<c1005437>] ? xen_force_evtchn_callback+0x17/0x30 [<c1005d68>] ? check_events+0x8/0xc [<c105f5d6>] ? __lru_cache_add+0x46/0xd0 [<c1004411>] ? xen_set_pte_at+0x41/0xf0 [<c106b258>] ? handle_mm_fault+0x528/0xce0 [<c10038e6>] ? __raw_callee_save_xen_pte_val+0x6/0x8 [<c10038e6>] ? __raw_callee_save_xen_pte_val+0x6/0x8 [<c1069b1f>] ? vm_normal_page+0x2f/0xa0 [<c10680e6>] ? page_address+0xc6/0xe0 [<c106841c>] ? kmap_high+0x8c/0x470 [<c1069d78>] ? follow_page+0x1e8/0x210 [<c106bb0c>] ? __get_user_pages+0xfc/0x390 [<c1025538>] ? __wake_up+0x38/0x60 [<c108079f>] ? copy_strings+0x16f/0x190 [<c10add80>] ? load_elf_binary+0x0/0x19e0 [<c1080868>] ? search_binary_handler+0x68/0x1c0 [<c1081d20>] ? do_execve+0x2a0/0x330 [<c10067c6>] ? sys_execve+0x46/0x70 [<c10080c5>] ? syscall_call+0x7/0xb Code: 00 00 00 00 e8 e3 f3 ff ff 89 c3 81 e3 ff ff ff 7f 85 db 75 80 e9 6a ff ff ff 66 90 ff 15 9c 51 1e c1 f6 c4 02 0f 84 17 ff ff ff <0f> 0b eb fe 8d b6 00 00 00 00 8d bc 27 00 00 00 00 83 ec 14 89 EIP: [<c10045bf>] xen_write_cr3+0xff/0x110 SS:ESP 0069:ec7d5d80 ---[ end trace 0 Thanks, Christian _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel