[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] xen kernel crash
On Mon, Feb 20, 2012 at 04:46:50PM -0700, jacek burghardt wrote: > I had created package for arch linux xen 4.2 unstable and 3.3.0-rc1 linus > fixes kernel. So if I issue xl destroy domu my kernel crashes. Is there any > patch that can stop those crashes. You need to give more details. Please look at http://wiki.xensource.com/xenwiki/XenParavirtOpsHelp.html > 7742.769113] xen-pciback[0000:02:00.0] IRQ line is not shared with other > domains. Turning ISR off > [ 7748.502978] irq 32: nobody cared (try booting with the "irqpoll" option) > [ 7748.503025] Pid: 0, comm: swapper/0 Not tainted 3.3.0-rc1-xen #1 > [ 7748.503059] Call Trace: > [ 7748.503080] <IRQ> [<ffffffff810cedbd>] __report_bad_irq+0x3d/0xe0 > [ 7748.503130] [<ffffffff810cf059>] note_interrupt+0x159/0x210 > [ 7748.503165] [<ffffffff810cc8a8>] handle_irq_event_percpu+0xc8/0x280 > [ 7748.503202] [<ffffffff8123c98b>] ? radix_tree_lookup+0xb/0x10 > [ 7748.503235] [<ffffffff810ccaa8>] handle_irq_event+0x48/0x70 > [ 7748.503268] [<ffffffff810cfa2a>] handle_fasteoi_irq+0x5a/0xe0 > [ 7748.503302] [<ffffffff812c5864>] __xen_evtchn_do_upcall+0x1a4/0x270 > [ 7748.503339] [<ffffffff812c72ef>] xen_evtchn_do_upcall+0x2f/0x50 > [ 7748.503374] [<ffffffff8144972e>] xen_do_hypervisor_callback+0x1e/0x30 > [ 7748.503409] <EOI> [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000 > [ 7748.503453] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000 > [ 7748.503487] [<ffffffff8100b4b0>] ? xen_safe_halt+0x10/0x20 > [ 7748.503519] [<ffffffff8101e8d3>] ? default_idle+0x53/0x280 > [ 7748.503552] [<ffffffff81014246>] ? cpu_idle+0xe6/0x120 > [ 7748.503584] [<ffffffff81422072>] ? rest_init+0x96/0xa4 > [ 7748.503615] [<ffffffff818f6c0e>] ? start_kernel+0x3cf/0x3dc > [ 7748.503648] [<ffffffff818f6346>] ? x86_64_start_reservations+0x131/0x135 > [ 7748.503684] [<ffffffff818f8a3c>] ? xen_start_kernel+0x5e0/0x5e7 > [ 7748.503717] handlers: > [ 7748.503737] [<ffffffff812d4940>] xen_pcibk_guest_interrupt > [ 7748.503773] Disabling IRQ #32 > [ 7748.652402] irq 16: nobody cared (try booting with the "irqpoll" option) > [ 7748.652445] Pid: 0, comm: swapper/0 Not tainted 3.3.0-rc1-xen #1 > [ 7748.652479] Call Trace: > [ 7748.652499] <IRQ> [<ffffffff810cedbd>] __report_bad_irq+0x3d/0xe0 > [ 7748.652545] [<ffffffff810cf059>] note_interrupt+0x159/0x210 > [ 7748.652579] [<ffffffff810cc8a8>] handle_irq_event_percpu+0xc8/0x280 > [ 7748.652616] [<ffffffff8103eae5>] ? pvclock_clocksource_read+0x55/0xf0 > [ 7748.652652] [<ffffffff810ccaa8>] handle_irq_event+0x48/0x70 > [ 7748.652684] [<ffffffff8100b8e0>] ? xen_clocksource_read+0x40/0x70 > [ 7748.652719] [<ffffffff810cfa2a>] handle_fasteoi_irq+0x5a/0xe0 > [ 7748.652754] [<ffffffff812c5864>] __xen_evtchn_do_upcall+0x1a4/0x270 > [ 7748.652791] [<ffffffff812c72ef>] xen_evtchn_do_upcall+0x2f/0x50 > [ 7748.652826] [<ffffffff8144972e>] xen_do_hypervisor_callback+0x1e/0x30 > [ 7748.652861] <EOI> [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000 > [ 7748.652903] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000 > [ 7748.652937] [<ffffffff8100b4b0>] ? xen_safe_halt+0x10/0x20 > [ 7748.652969] [<ffffffff8101e8d3>] ? default_idle+0x53/0x280 > [ 7748.653002] [<ffffffff81014246>] ? cpu_idle+0xe6/0x120 > [ 7748.653034] [<ffffffff81422072>] ? rest_init+0x96/0xa4 > [ 7748.653065] [<ffffffff818f6c0e>] ? start_kernel+0x3cf/0x3dc > [ 7748.653098] [<ffffffff818f6346>] ? x86_64_start_reservations+0x131/0x135 > [ 7748.653135] [<ffffffff818f8a3c>] ? xen_start_kernel+0x5e0/0x5e7 > [ 7748.653167] handlers: > [ 7748.653194] [<ffffffffa01d7100>] azx_interrupt > [ 7748.653226] Disabling IRQ #16 > [ 7752.782419] vif vif-6-0: 2 reading script > [ 7752.784350] xenbr0: port 3(vif6.0) entering forwarding state > [ 7752.784611] xenbr0: port 3(vif6.0) entering disabled state > [ 7790.687530] xen-pciback: vpci: 0000:02:00.0: assign to virtual slot 0 > [ 7790.817247] device vif7.0 entered promiscuous mode > [ 7790.819947] ADDRCONF(NETDEV_UP): vif7.0: link is not ready > [ 7791.198278] xen-blkback:ring-ref 8, event-channel 8, protocol 1 > (x86_64-abi) > [ 7791.234632] ADDRCONF(NETDEV_CHANGE): vif7.0: link becomes ready > [ 7791.234712] xenbr0: port 3(vif7.0) entering forwarding state > [ 7791.234747] xenbr0: port 3(vif7.0) entering forwarding state > [ 7795.090689] pciback 0000:02:00.0: enabling device (0000 -> 0002) > [ 7795.090756] xen: registering gsi 32 triggering 0 polarity 1 > [ 7795.090769] xen_map_pirq_gsi: returning irq 32 for gsi 32 > [ 7795.090807] xen: --> pirq=32 -> irq=32 (gsi=32) > [ 7795.090811] Already setup the GSI :32 > [ 7796.165112] irq 32: nobody cared (try booting with the "irqpoll" option) > [ 7796.165159] Pid: 1863, comm: kworker/0:1 Not tainted 3.3.0-rc1-xen #1 > [ 7796.165201] Call Trace: > [ 7796.165229] <IRQ> [<ffffffff810cedbd>] __report_bad_irq+0x3d/0xe0 > [ 7796.165292] [<ffffffff810cf059>] note_interrupt+0x159/0x210 > [ 7796.165335] [<ffffffff810cc8a8>] handle_irq_event_percpu+0xc8/0x280 > [ 7796.165383] [<ffffffff810749bc>] ? run_posix_cpu_timers+0x2c/0x7b0 > [ 7796.165427] [<ffffffff8123c98b>] ? radix_tree_lookup+0xb/0x10 > [ 7796.165469] [<ffffffff810ccaa8>] handle_irq_event+0x48/0x70 > [ 7796.165514] [<ffffffff810cfa2a>] handle_fasteoi_irq+0x5a/0xe0 > [ 7796.165563] [<ffffffff812c5864>] __xen_evtchn_do_upcall+0x1a4/0x270 > [ 7796.165607] [<ffffffff812c72ef>] xen_evtchn_do_upcall+0x2f/0x50 > [ 7796.165650] [<ffffffff810766a7>] ? hrtimer_interrupt+0x127/0x200 > [ 7796.165695] [<ffffffff8144972e>] xen_do_hypervisor_callback+0x1e/0x30 > [ 7796.165741] [<ffffffff8100122a>] ? hypercall_page+0x22a/0x1000 > [ 7796.165782] [<ffffffff8100122a>] ? hypercall_page+0x22a/0x1000 > [ 7796.165825] [<ffffffff8100b5ad>] ? xen_force_evtchn_callback+0xd/0x10 > [ 7796.165870] [<ffffffff8100be12>] ? check_events+0x12/0x20 > [ 7796.165893] [<ffffffff8100bdb9>] ? xen_irq_enable_direct_reloc+0x4/0x4 > [ 7796.165893] [<ffffffff81056dab>] ? __do_softirq+0x7b/0x280 > [ 7796.165893] [<ffffffff8100b903>] ? xen_clocksource_read+0x63/0x70 > [ 7796.165893] [<ffffffff8100be12>] ? check_events+0x12/0x20 > [ 7796.165893] [<ffffffff814496dc>] ? call_softirq+0x1c/0x30 > [ 7796.165893] [<ffffffff81017755>] ? do_softirq+0x65/0xa0 > [ 7796.165893] [<ffffffff810572f6>] ? irq_exit+0xa6/0xc0 > [ 7796.165893] [<ffffffff812c72f5>] ? xen_evtchn_do_upcall+0x35/0x50 > [ 7796.165893] [<ffffffff8144972e>] ? xen_do_hypervisor_callback+0x1e/0x30 > [ 7796.165893] <EOI> [<ffffffff81247f6b>] ? find_next_zero_bit+0x4b/0xe0 > [ 7796.165893] [<ffffffff81238f90>] ? ida_get_new_above+0x70/0x2f0 > [ 7796.165893] [<ffffffff81239722>] ? idr_pre_get+0x52/0x90 > [ 7796.165893] [<ffffffff8123921e>] ? ida_get_new+0xe/0x10 > [ 7796.165893] [<ffffffff811cecc5>] ? proc_register+0x55/0x200 > [ 7796.165893] [<ffffffff811cf36f>] ? proc_mkdir_mode+0x3f/0x60 > [ 7796.165893] [<ffffffff811cf3a6>] ? proc_mkdir+0x16/0x20 > [ 7796.165893] [<ffffffff810d14eb>] ? register_handler_proc+0x11b/0x140 > [ 7796.165893] [<ffffffff810ce391>] ? __setup_irq+0x431/0x550 > [ 7796.165893] [<ffffffff8115522b>] ? kmem_cache_alloc_trace+0x12b/0x150 > [ 7796.165893] [<ffffffff812d4940>] ? xen_pcibk_control_isr+0x120/0x120 > [ 7796.165893] [<ffffffff810ce59a>] ? request_threaded_irq+0xea/0x1a0 > [ 7796.165893] [<ffffffff812d4917>] ? xen_pcibk_control_isr+0xf7/0x120 > [ 7796.165893] [<ffffffff812d4daa>] ? xen_pcibk_do_op+0x26a/0x590 > [ 7796.165893] [<ffffffff812d4b40>] ? > xen_pcibk_test_and_schedule_op+0x80/0x80 > [ 7796.165893] [<ffffffff8106bdeb>] ? process_one_work+0x11b/0x4d0 > [ 7796.165893] [<ffffffff8100be12>] ? check_events+0x12/0x20 > [ 7796.165893] [<ffffffff8106c784>] ? worker_thread+0x164/0x340 > [ 7796.165893] [<ffffffff8100bdff>] ? xen_restore_fl_direct_reloc+0x4/0x4 > [ 7796.165893] [<ffffffff8106c620>] ? manage_workers.isra.25+0x220/0x220 > [ 7796.165893] [<ffffffff810717e3>] ? kthread+0x93/0xa0 > [ 7796.165893] [<ffffffff814495e4>] ? kernel_thread_helper+0x4/0x10 > [ 7796.165893] [<ffffffff814478c0>] ? retint_restore_args+0x5/0x6 > [ 7796.165893] [<ffffffff814495e0>] ? gs_change+0x13/0x13 > [ 7796.165893] handlers: > [ 7796.165893] [<ffffffff812d4940>] xen_pcibk_guest_interrupt > [ 7796.165893] Disabling IRQ #32 > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxx > http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |