Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751628AbWEORql (ORCPT ); Mon, 15 May 2006 13:46:41 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751625AbWEORqj (ORCPT ); Mon, 15 May 2006 13:46:39 -0400 Received: from mail.unixshell.com ([207.210.106.37]:61877 "EHLO mail.unixshell.com") by vger.kernel.org with ESMTP id S965021AbWEORqf (ORCPT ); Mon, 15 May 2006 13:46:35 -0400 Message-ID: <4468BE70.7030802@tektonic.net> Date: Mon, 15 May 2006 13:46:24 -0400 From: Matt Ayres Organization: TekTonic User-Agent: Thunderbird 1.5.0.2 (Windows/20060308) MIME-Version: 1.0 To: Linux Kernel Mailing List Subject: Panic in ipt_do_table with 2.6.16.13-xen Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4351 Lines: 116 I have been noticing this same problem dozens of times and have finally caught a full trace. I have run it through ksymoops, but there is no /proc/ksyms. Is there a better method for getting information out of the Code line than using ksymoops in 2.6 kernels? The kernel is for Xen, but it does not appear to be related to Xen. ksymoops run: # ksymoops -m System.map -k /proc/kallsyms *pde = 00000001:aeead001 00e1f000 -> *pme = 00000000:eb2ef067 0faef000 -> *pte = 00000000:00000000 Oops: 0000 [#1] CPU: 0 EIP: 0061:[] Not tainted VLI Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010286 (2.6.16.13-xen #1) eax: 00000002 ebx: cfcc6020 ecx: cfcc6020 edx: 00000000 esi: d1320000 edi: 00004000 ebp: d1324a00 esp: c0517d8c ds: 007b es: 007b ss: 0069 Stack: <0>c04d056c 00000000 cfcc6020 00000000 cffa8000 c7f4fc00 d1320000 0000000 00000001 00000000 c0517e2c 80000000 c03acc04 c7f4fc00 c03da724 c0517e70 00000002 cffa8000 c7f4fc00 c04d0540 00000000 c03a2e50 00000002 c0517e70 Call Trace: [] ip_forward_finish+0x0/0x36 [] ipt_hook+0x1c/0x20 [] nf_iterate+0x2c/0x5e [] ip_forward_finish+0x0/0x36 [] ip_forward_finish+0x0/0x36 [] nf_hook_slow+0x3c/0xc3 [] ip_forward_finish+0x0/0x36 [] ip_forward+0x19e/0x22e [] ip_forward_finish+0x0/0x36 [] ip_rcv+0x40e/0x48f [] netif_receive_skb+0x255/0x294 [] tg3_poll+0x532/0x76c [] net_rx_action+0xaa/0x17c [] __do_softirq+0x73/0xf0 [] do_softirq+0x40/0x64 [] do_IRQ+0x1f/0x25 [] evtchn_do_upcall+0x60/0x96 [] hypervisor_callback+0x2c/0x34 [] xen_idle+0x5e/0x7d [] cpu_idle+0xbc/0xd5 [] start_kernel+0x344/0x34b Code: 89 44 24 18 89 c6 8b 44 24 40 8b 6c 24 18 03 74 83 0c 03 6c 83 20 c7 44 24 >>EIP; c03d96a9 <===== >>esp; c0517d8c Trace; c03acc04 Trace; c03da724 Trace; c03a2e50 Trace; c03acc04 Trace; c03acc04 Trace; c03a2f4b Trace; c03acc04 Trace; c03acdd8 Trace; c03acc04 Trace; c03abcf7 Trace; c037dcb5 Trace; c02e82e6 Trace; c037bd82 Trace; c011ea17 <__do_softirq+73/f0> Trace; c011ead4 Trace; c010606b Trace; c02fc87f Trace; c0104a2c Trace; c010342e Trace; c0103509 Trace; c05184e0 Code; c03d96a9 00000000 <_EIP>: Code; c03d96a9 <===== 0: 89 44 24 18 mov %eax,0x18(%esp) <===== Code; c03d96ad 4: 89 c6 mov %eax,%esi Code; c03d96af 6: 8b 44 24 40 mov 0x40(%esp),%eax Code; c03d96b3 a: 8b 6c 24 18 mov 0x18(%esp),%ebp Code; c03d96b7 e: 03 74 83 0c add 0xc(%ebx,%eax,4),%esi Code; c03d96bb 12: 03 6c 83 20 add 0x20(%ebx,%eax,4),%ebp Code; c03d96bf 16: c7 44 24 00 00 00 00 movl $0x0,0x0(%esp) Code; c03d96c6 1d: 00 1 warning issued. Results may not be reliable. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/