[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] xen kernel crash



On Mon, Feb 20, 2012 at 04:46:50PM -0700, jacek burghardt wrote:
> I had created package for arch linux xen 4.2 unstable and 3.3.0-rc1 linus
> fixes kernel. So if I issue xl destroy domu my kernel crashes. Is there any
> patch that can stop those crashes.

You need to give more details. Please look at
http://wiki.xensource.com/xenwiki/XenParavirtOpsHelp.html

>  7742.769113] xen-pciback[0000:02:00.0] IRQ line is not shared with other
> domains. Turning ISR off
> [ 7748.502978] irq 32: nobody cared (try booting with the "irqpoll" option)
> [ 7748.503025] Pid: 0, comm: swapper/0 Not tainted 3.3.0-rc1-xen #1
> [ 7748.503059] Call Trace:
> [ 7748.503080]  <IRQ>  [<ffffffff810cedbd>] __report_bad_irq+0x3d/0xe0
> [ 7748.503130]  [<ffffffff810cf059>] note_interrupt+0x159/0x210
> [ 7748.503165]  [<ffffffff810cc8a8>] handle_irq_event_percpu+0xc8/0x280
> [ 7748.503202]  [<ffffffff8123c98b>] ? radix_tree_lookup+0xb/0x10
> [ 7748.503235]  [<ffffffff810ccaa8>] handle_irq_event+0x48/0x70
> [ 7748.503268]  [<ffffffff810cfa2a>] handle_fasteoi_irq+0x5a/0xe0
> [ 7748.503302]  [<ffffffff812c5864>] __xen_evtchn_do_upcall+0x1a4/0x270
> [ 7748.503339]  [<ffffffff812c72ef>] xen_evtchn_do_upcall+0x2f/0x50
> [ 7748.503374]  [<ffffffff8144972e>] xen_do_hypervisor_callback+0x1e/0x30
> [ 7748.503409]  <EOI>  [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
> [ 7748.503453]  [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
> [ 7748.503487]  [<ffffffff8100b4b0>] ? xen_safe_halt+0x10/0x20
> [ 7748.503519]  [<ffffffff8101e8d3>] ? default_idle+0x53/0x280
> [ 7748.503552]  [<ffffffff81014246>] ? cpu_idle+0xe6/0x120
> [ 7748.503584]  [<ffffffff81422072>] ? rest_init+0x96/0xa4
> [ 7748.503615]  [<ffffffff818f6c0e>] ? start_kernel+0x3cf/0x3dc
> [ 7748.503648]  [<ffffffff818f6346>] ? x86_64_start_reservations+0x131/0x135
> [ 7748.503684]  [<ffffffff818f8a3c>] ? xen_start_kernel+0x5e0/0x5e7
> [ 7748.503717] handlers:
> [ 7748.503737] [<ffffffff812d4940>] xen_pcibk_guest_interrupt
> [ 7748.503773] Disabling IRQ #32
> [ 7748.652402] irq 16: nobody cared (try booting with the "irqpoll" option)
> [ 7748.652445] Pid: 0, comm: swapper/0 Not tainted 3.3.0-rc1-xen #1
> [ 7748.652479] Call Trace:
> [ 7748.652499]  <IRQ>  [<ffffffff810cedbd>] __report_bad_irq+0x3d/0xe0
> [ 7748.652545]  [<ffffffff810cf059>] note_interrupt+0x159/0x210
> [ 7748.652579]  [<ffffffff810cc8a8>] handle_irq_event_percpu+0xc8/0x280
> [ 7748.652616]  [<ffffffff8103eae5>] ? pvclock_clocksource_read+0x55/0xf0
> [ 7748.652652]  [<ffffffff810ccaa8>] handle_irq_event+0x48/0x70
> [ 7748.652684]  [<ffffffff8100b8e0>] ? xen_clocksource_read+0x40/0x70
> [ 7748.652719]  [<ffffffff810cfa2a>] handle_fasteoi_irq+0x5a/0xe0
> [ 7748.652754]  [<ffffffff812c5864>] __xen_evtchn_do_upcall+0x1a4/0x270
> [ 7748.652791]  [<ffffffff812c72ef>] xen_evtchn_do_upcall+0x2f/0x50
> [ 7748.652826]  [<ffffffff8144972e>] xen_do_hypervisor_callback+0x1e/0x30
> [ 7748.652861]  <EOI>  [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
> [ 7748.652903]  [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
> [ 7748.652937]  [<ffffffff8100b4b0>] ? xen_safe_halt+0x10/0x20
> [ 7748.652969]  [<ffffffff8101e8d3>] ? default_idle+0x53/0x280
> [ 7748.653002]  [<ffffffff81014246>] ? cpu_idle+0xe6/0x120
> [ 7748.653034]  [<ffffffff81422072>] ? rest_init+0x96/0xa4
> [ 7748.653065]  [<ffffffff818f6c0e>] ? start_kernel+0x3cf/0x3dc
> [ 7748.653098]  [<ffffffff818f6346>] ? x86_64_start_reservations+0x131/0x135
> [ 7748.653135]  [<ffffffff818f8a3c>] ? xen_start_kernel+0x5e0/0x5e7
> [ 7748.653167] handlers:
> [ 7748.653194] [<ffffffffa01d7100>] azx_interrupt
> [ 7748.653226] Disabling IRQ #16
> [ 7752.782419] vif vif-6-0: 2 reading script
> [ 7752.784350] xenbr0: port 3(vif6.0) entering forwarding state
> [ 7752.784611] xenbr0: port 3(vif6.0) entering disabled state
> [ 7790.687530] xen-pciback: vpci: 0000:02:00.0: assign to virtual slot 0
> [ 7790.817247] device vif7.0 entered promiscuous mode
> [ 7790.819947] ADDRCONF(NETDEV_UP): vif7.0: link is not ready
> [ 7791.198278] xen-blkback:ring-ref 8, event-channel 8, protocol 1
> (x86_64-abi)
> [ 7791.234632] ADDRCONF(NETDEV_CHANGE): vif7.0: link becomes ready
> [ 7791.234712] xenbr0: port 3(vif7.0) entering forwarding state
> [ 7791.234747] xenbr0: port 3(vif7.0) entering forwarding state
> [ 7795.090689] pciback 0000:02:00.0: enabling device (0000 -> 0002)
> [ 7795.090756] xen: registering gsi 32 triggering 0 polarity 1
> [ 7795.090769] xen_map_pirq_gsi: returning irq 32 for gsi 32
> [ 7795.090807] xen: --> pirq=32 -> irq=32 (gsi=32)
> [ 7795.090811] Already setup the GSI :32
> [ 7796.165112] irq 32: nobody cared (try booting with the "irqpoll" option)
> [ 7796.165159] Pid: 1863, comm: kworker/0:1 Not tainted 3.3.0-rc1-xen #1
> [ 7796.165201] Call Trace:
> [ 7796.165229]  <IRQ>  [<ffffffff810cedbd>] __report_bad_irq+0x3d/0xe0
> [ 7796.165292]  [<ffffffff810cf059>] note_interrupt+0x159/0x210
> [ 7796.165335]  [<ffffffff810cc8a8>] handle_irq_event_percpu+0xc8/0x280
> [ 7796.165383]  [<ffffffff810749bc>] ? run_posix_cpu_timers+0x2c/0x7b0
> [ 7796.165427]  [<ffffffff8123c98b>] ? radix_tree_lookup+0xb/0x10
> [ 7796.165469]  [<ffffffff810ccaa8>] handle_irq_event+0x48/0x70
> [ 7796.165514]  [<ffffffff810cfa2a>] handle_fasteoi_irq+0x5a/0xe0
> [ 7796.165563]  [<ffffffff812c5864>] __xen_evtchn_do_upcall+0x1a4/0x270
> [ 7796.165607]  [<ffffffff812c72ef>] xen_evtchn_do_upcall+0x2f/0x50
> [ 7796.165650]  [<ffffffff810766a7>] ? hrtimer_interrupt+0x127/0x200
> [ 7796.165695]  [<ffffffff8144972e>] xen_do_hypervisor_callback+0x1e/0x30
> [ 7796.165741]  [<ffffffff8100122a>] ? hypercall_page+0x22a/0x1000
> [ 7796.165782]  [<ffffffff8100122a>] ? hypercall_page+0x22a/0x1000
> [ 7796.165825]  [<ffffffff8100b5ad>] ? xen_force_evtchn_callback+0xd/0x10
> [ 7796.165870]  [<ffffffff8100be12>] ? check_events+0x12/0x20
> [ 7796.165893]  [<ffffffff8100bdb9>] ? xen_irq_enable_direct_reloc+0x4/0x4
> [ 7796.165893]  [<ffffffff81056dab>] ? __do_softirq+0x7b/0x280
> [ 7796.165893]  [<ffffffff8100b903>] ? xen_clocksource_read+0x63/0x70
> [ 7796.165893]  [<ffffffff8100be12>] ? check_events+0x12/0x20
> [ 7796.165893]  [<ffffffff814496dc>] ? call_softirq+0x1c/0x30
> [ 7796.165893]  [<ffffffff81017755>] ? do_softirq+0x65/0xa0
> [ 7796.165893]  [<ffffffff810572f6>] ? irq_exit+0xa6/0xc0
> [ 7796.165893]  [<ffffffff812c72f5>] ? xen_evtchn_do_upcall+0x35/0x50
> [ 7796.165893]  [<ffffffff8144972e>] ? xen_do_hypervisor_callback+0x1e/0x30
> [ 7796.165893]  <EOI>  [<ffffffff81247f6b>] ? find_next_zero_bit+0x4b/0xe0
> [ 7796.165893]  [<ffffffff81238f90>] ? ida_get_new_above+0x70/0x2f0
> [ 7796.165893]  [<ffffffff81239722>] ? idr_pre_get+0x52/0x90
> [ 7796.165893]  [<ffffffff8123921e>] ? ida_get_new+0xe/0x10
> [ 7796.165893]  [<ffffffff811cecc5>] ? proc_register+0x55/0x200
> [ 7796.165893]  [<ffffffff811cf36f>] ? proc_mkdir_mode+0x3f/0x60
> [ 7796.165893]  [<ffffffff811cf3a6>] ? proc_mkdir+0x16/0x20
> [ 7796.165893]  [<ffffffff810d14eb>] ? register_handler_proc+0x11b/0x140
> [ 7796.165893]  [<ffffffff810ce391>] ? __setup_irq+0x431/0x550
> [ 7796.165893]  [<ffffffff8115522b>] ? kmem_cache_alloc_trace+0x12b/0x150
> [ 7796.165893]  [<ffffffff812d4940>] ? xen_pcibk_control_isr+0x120/0x120
> [ 7796.165893]  [<ffffffff810ce59a>] ? request_threaded_irq+0xea/0x1a0
> [ 7796.165893]  [<ffffffff812d4917>] ? xen_pcibk_control_isr+0xf7/0x120
> [ 7796.165893]  [<ffffffff812d4daa>] ? xen_pcibk_do_op+0x26a/0x590
> [ 7796.165893]  [<ffffffff812d4b40>] ?
> xen_pcibk_test_and_schedule_op+0x80/0x80
> [ 7796.165893]  [<ffffffff8106bdeb>] ? process_one_work+0x11b/0x4d0
> [ 7796.165893]  [<ffffffff8100be12>] ? check_events+0x12/0x20
> [ 7796.165893]  [<ffffffff8106c784>] ? worker_thread+0x164/0x340
> [ 7796.165893]  [<ffffffff8100bdff>] ? xen_restore_fl_direct_reloc+0x4/0x4
> [ 7796.165893]  [<ffffffff8106c620>] ? manage_workers.isra.25+0x220/0x220
> [ 7796.165893]  [<ffffffff810717e3>] ? kthread+0x93/0xa0
> [ 7796.165893]  [<ffffffff814495e4>] ? kernel_thread_helper+0x4/0x10
> [ 7796.165893]  [<ffffffff814478c0>] ? retint_restore_args+0x5/0x6
> [ 7796.165893]  [<ffffffff814495e0>] ? gs_change+0x13/0x13
> [ 7796.165893] handlers:
> [ 7796.165893] [<ffffffff812d4940>] xen_pcibk_guest_interrupt
> [ 7796.165893] Disabling IRQ #32

> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.