On Mon, Feb 20, 2012 at 04:46:50PM -0700, jacek burghardt
wrote:> I had created package for arch linux xen 4.2 unstable and 3.3.0-rc1 linus
> fixes kernel. So if I issue xl destroy domu my kernel crashes. Is there any
> patch that can stop those crashes.
You need to give more details. Please look at
http://wiki.xensource.com/xenwiki/XenParavirtOpsHelp.html
> 7742.769113] xen-pciback[0000:02:00.0] IRQ line is not shared with other
> domains. Turning ISR off
> [ 7748.502978] irq 32: nobody cared (try booting with the
"irqpoll" option)
> [ 7748.503025] Pid: 0, comm: swapper/0 Not tainted 3.3.0-rc1-xen #1
> [ 7748.503059] Call Trace:
> [ 7748.503080] <IRQ> [<ffffffff810cedbd>]
__report_bad_irq+0x3d/0xe0
> [ 7748.503130] [<ffffffff810cf059>] note_interrupt+0x159/0x210
> [ 7748.503165] [<ffffffff810cc8a8>]
handle_irq_event_percpu+0xc8/0x280
> [ 7748.503202] [<ffffffff8123c98b>] ? radix_tree_lookup+0xb/0x10
> [ 7748.503235] [<ffffffff810ccaa8>] handle_irq_event+0x48/0x70
> [ 7748.503268] [<ffffffff810cfa2a>] handle_fasteoi_irq+0x5a/0xe0
> [ 7748.503302] [<ffffffff812c5864>]
__xen_evtchn_do_upcall+0x1a4/0x270
> [ 7748.503339] [<ffffffff812c72ef>] xen_evtchn_do_upcall+0x2f/0x50
> [ 7748.503374] [<ffffffff8144972e>]
xen_do_hypervisor_callback+0x1e/0x30
> [ 7748.503409] <EOI> [<ffffffff810013aa>] ?
hypercall_page+0x3aa/0x1000
> [ 7748.503453] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
> [ 7748.503487] [<ffffffff8100b4b0>] ? xen_safe_halt+0x10/0x20
> [ 7748.503519] [<ffffffff8101e8d3>] ? default_idle+0x53/0x280
> [ 7748.503552] [<ffffffff81014246>] ? cpu_idle+0xe6/0x120
> [ 7748.503584] [<ffffffff81422072>] ? rest_init+0x96/0xa4
> [ 7748.503615] [<ffffffff818f6c0e>] ? start_kernel+0x3cf/0x3dc
> [ 7748.503648] [<ffffffff818f6346>] ?
x86_64_start_reservations+0x131/0x135
> [ 7748.503684] [<ffffffff818f8a3c>] ? xen_start_kernel+0x5e0/0x5e7
> [ 7748.503717] handlers:
> [ 7748.503737] [<ffffffff812d4940>] xen_pcibk_guest_interrupt
> [ 7748.503773] Disabling IRQ #32
> [ 7748.652402] irq 16: nobody cared (try booting with the
"irqpoll" option)
> [ 7748.652445] Pid: 0, comm: swapper/0 Not tainted 3.3.0-rc1-xen #1
> [ 7748.652479] Call Trace:
> [ 7748.652499] <IRQ> [<ffffffff810cedbd>]
__report_bad_irq+0x3d/0xe0
> [ 7748.652545] [<ffffffff810cf059>] note_interrupt+0x159/0x210
> [ 7748.652579] [<ffffffff810cc8a8>]
handle_irq_event_percpu+0xc8/0x280
> [ 7748.652616] [<ffffffff8103eae5>] ?
pvclock_clocksource_read+0x55/0xf0
> [ 7748.652652] [<ffffffff810ccaa8>] handle_irq_event+0x48/0x70
> [ 7748.652684] [<ffffffff8100b8e0>] ? xen_clocksource_read+0x40/0x70
> [ 7748.652719] [<ffffffff810cfa2a>] handle_fasteoi_irq+0x5a/0xe0
> [ 7748.652754] [<ffffffff812c5864>]
__xen_evtchn_do_upcall+0x1a4/0x270
> [ 7748.652791] [<ffffffff812c72ef>] xen_evtchn_do_upcall+0x2f/0x50
> [ 7748.652826] [<ffffffff8144972e>]
xen_do_hypervisor_callback+0x1e/0x30
> [ 7748.652861] <EOI> [<ffffffff810013aa>] ?
hypercall_page+0x3aa/0x1000
> [ 7748.652903] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
> [ 7748.652937] [<ffffffff8100b4b0>] ? xen_safe_halt+0x10/0x20
> [ 7748.652969] [<ffffffff8101e8d3>] ? default_idle+0x53/0x280
> [ 7748.653002] [<ffffffff81014246>] ? cpu_idle+0xe6/0x120
> [ 7748.653034] [<ffffffff81422072>] ? rest_init+0x96/0xa4
> [ 7748.653065] [<ffffffff818f6c0e>] ? start_kernel+0x3cf/0x3dc
> [ 7748.653098] [<ffffffff818f6346>] ?
x86_64_start_reservations+0x131/0x135
> [ 7748.653135] [<ffffffff818f8a3c>] ? xen_start_kernel+0x5e0/0x5e7
> [ 7748.653167] handlers:
> [ 7748.653194] [<ffffffffa01d7100>] azx_interrupt
> [ 7748.653226] Disabling IRQ #16
> [ 7752.782419] vif vif-6-0: 2 reading script
> [ 7752.784350] xenbr0: port 3(vif6.0) entering forwarding state
> [ 7752.784611] xenbr0: port 3(vif6.0) entering disabled state
> [ 7790.687530] xen-pciback: vpci: 0000:02:00.0: assign to virtual slot 0
> [ 7790.817247] device vif7.0 entered promiscuous mode
> [ 7790.819947] ADDRCONF(NETDEV_UP): vif7.0: link is not ready
> [ 7791.198278] xen-blkback:ring-ref 8, event-channel 8, protocol 1
> (x86_64-abi)
> [ 7791.234632] ADDRCONF(NETDEV_CHANGE): vif7.0: link becomes ready
> [ 7791.234712] xenbr0: port 3(vif7.0) entering forwarding state
> [ 7791.234747] xenbr0: port 3(vif7.0) entering forwarding state
> [ 7795.090689] pciback 0000:02:00.0: enabling device (0000 -> 0002)
> [ 7795.090756] xen: registering gsi 32 triggering 0 polarity 1
> [ 7795.090769] xen_map_pirq_gsi: returning irq 32 for gsi 32
> [ 7795.090807] xen: --> pirq=32 -> irq=32 (gsi=32)
> [ 7795.090811] Already setup the GSI :32
> [ 7796.165112] irq 32: nobody cared (try booting with the
"irqpoll" option)
> [ 7796.165159] Pid: 1863, comm: kworker/0:1 Not tainted 3.3.0-rc1-xen #1
> [ 7796.165201] Call Trace:
> [ 7796.165229] <IRQ> [<ffffffff810cedbd>]
__report_bad_irq+0x3d/0xe0
> [ 7796.165292] [<ffffffff810cf059>] note_interrupt+0x159/0x210
> [ 7796.165335] [<ffffffff810cc8a8>]
handle_irq_event_percpu+0xc8/0x280
> [ 7796.165383] [<ffffffff810749bc>] ?
run_posix_cpu_timers+0x2c/0x7b0
> [ 7796.165427] [<ffffffff8123c98b>] ? radix_tree_lookup+0xb/0x10
> [ 7796.165469] [<ffffffff810ccaa8>] handle_irq_event+0x48/0x70
> [ 7796.165514] [<ffffffff810cfa2a>] handle_fasteoi_irq+0x5a/0xe0
> [ 7796.165563] [<ffffffff812c5864>]
__xen_evtchn_do_upcall+0x1a4/0x270
> [ 7796.165607] [<ffffffff812c72ef>] xen_evtchn_do_upcall+0x2f/0x50
> [ 7796.165650] [<ffffffff810766a7>] ? hrtimer_interrupt+0x127/0x200
> [ 7796.165695] [<ffffffff8144972e>]
xen_do_hypervisor_callback+0x1e/0x30
> [ 7796.165741] [<ffffffff8100122a>] ? hypercall_page+0x22a/0x1000
> [ 7796.165782] [<ffffffff8100122a>] ? hypercall_page+0x22a/0x1000
> [ 7796.165825] [<ffffffff8100b5ad>] ?
xen_force_evtchn_callback+0xd/0x10
> [ 7796.165870] [<ffffffff8100be12>] ? check_events+0x12/0x20
> [ 7796.165893] [<ffffffff8100bdb9>] ?
xen_irq_enable_direct_reloc+0x4/0x4
> [ 7796.165893] [<ffffffff81056dab>] ? __do_softirq+0x7b/0x280
> [ 7796.165893] [<ffffffff8100b903>] ? xen_clocksource_read+0x63/0x70
> [ 7796.165893] [<ffffffff8100be12>] ? check_events+0x12/0x20
> [ 7796.165893] [<ffffffff814496dc>] ? call_softirq+0x1c/0x30
> [ 7796.165893] [<ffffffff81017755>] ? do_softirq+0x65/0xa0
> [ 7796.165893] [<ffffffff810572f6>] ? irq_exit+0xa6/0xc0
> [ 7796.165893] [<ffffffff812c72f5>] ? xen_evtchn_do_upcall+0x35/0x50
> [ 7796.165893] [<ffffffff8144972e>] ?
xen_do_hypervisor_callback+0x1e/0x30
> [ 7796.165893] <EOI> [<ffffffff81247f6b>] ?
find_next_zero_bit+0x4b/0xe0
> [ 7796.165893] [<ffffffff81238f90>] ? ida_get_new_above+0x70/0x2f0
> [ 7796.165893] [<ffffffff81239722>] ? idr_pre_get+0x52/0x90
> [ 7796.165893] [<ffffffff8123921e>] ? ida_get_new+0xe/0x10
> [ 7796.165893] [<ffffffff811cecc5>] ? proc_register+0x55/0x200
> [ 7796.165893] [<ffffffff811cf36f>] ? proc_mkdir_mode+0x3f/0x60
> [ 7796.165893] [<ffffffff811cf3a6>] ? proc_mkdir+0x16/0x20
> [ 7796.165893] [<ffffffff810d14eb>] ?
register_handler_proc+0x11b/0x140
> [ 7796.165893] [<ffffffff810ce391>] ? __setup_irq+0x431/0x550
> [ 7796.165893] [<ffffffff8115522b>] ?
kmem_cache_alloc_trace+0x12b/0x150
> [ 7796.165893] [<ffffffff812d4940>] ?
xen_pcibk_control_isr+0x120/0x120
> [ 7796.165893] [<ffffffff810ce59a>] ?
request_threaded_irq+0xea/0x1a0
> [ 7796.165893] [<ffffffff812d4917>] ?
xen_pcibk_control_isr+0xf7/0x120
> [ 7796.165893] [<ffffffff812d4daa>] ? xen_pcibk_do_op+0x26a/0x590
> [ 7796.165893] [<ffffffff812d4b40>] ?
> xen_pcibk_test_and_schedule_op+0x80/0x80
> [ 7796.165893] [<ffffffff8106bdeb>] ? process_one_work+0x11b/0x4d0
> [ 7796.165893] [<ffffffff8100be12>] ? check_events+0x12/0x20
> [ 7796.165893] [<ffffffff8106c784>] ? worker_thread+0x164/0x340
> [ 7796.165893] [<ffffffff8100bdff>] ?
xen_restore_fl_direct_reloc+0x4/0x4
> [ 7796.165893] [<ffffffff8106c620>] ?
manage_workers.isra.25+0x220/0x220
> [ 7796.165893] [<ffffffff810717e3>] ? kthread+0x93/0xa0
> [ 7796.165893] [<ffffffff814495e4>] ? kernel_thread_helper+0x4/0x10
> [ 7796.165893] [<ffffffff814478c0>] ? retint_restore_args+0x5/0x6
> [ 7796.165893] [<ffffffff814495e0>] ? gs_change+0x13/0x13
> [ 7796.165893] handlers:
> [ 7796.165893] [<ffffffff812d4940>] xen_pcibk_guest_interrupt
> [ 7796.165893] Disabling IRQ #32
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xensource.com/xen-devel