|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] "xm destroy" causing x86_64 Xen to crash
To: |
"xen-devel" <xen-devel@xxxxxxxxxxxxxxxxxxx> |
Subject: |
[Xen-devel] "xm destroy" causing x86_64 Xen to crash |
From: |
"Puthiyaparambil, Aravindh" <aravindh.puthiyaparambil@xxxxxxxxxx> |
Date: |
Sat, 10 Sep 2005 00:29:35 -0400 |
Cc: |
"Koren, Bradley J" <Bradley.Koren@xxxxxxxxxx>, "Subrahmanian, Raj" <raj.subrahmanian@xxxxxxxxxx>, "Vessey, Bruce A" <Bruce.Vessey@xxxxxxxxxx> |
Delivery-date: |
Sat, 10 Sep 2005 04:27:29 +0000 |
Envelope-to: |
www-data@xxxxxxxxxxxxxxxxxxx |
List-help: |
<mailto:xen-devel-request@lists.xensource.com?subject=help> |
List-id: |
Xen developer discussion <xen-devel.lists.xensource.com> |
List-post: |
<mailto:xen-devel@lists.xensource.com> |
List-subscribe: |
<http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe> |
List-unsubscribe: |
<http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe> |
Sender: |
xen-devel-bounces@xxxxxxxxxxxxxxxxxxx |
Thread-index: |
AcW1wD+Us+81azQ/QECfAVb8C4DteQ== |
Thread-topic: |
"xm destroy" causing x86_64 Xen to crash |
I find that when I force a DomU to crash (for example by specifying an
incorrect root= option) and then do an "xm destroy" on the DomU, Xen
crashes. This happens only with SMP DomU.
This is with x86_64 Xen (changeset 6714) on a Dell PowerEdge 470 (4x
with HT) and 2GB RAM running SLES9 SP2.
Isn't smp_send_stop() happening on all VCPUS????
Aravindh
DomU Crash
----------
Please append a correct "root=" boot option
Kernel panic - not syncing: VFS: Unable to mount root fs on
unknown-block(0,0)
Xen Crash
---------
(XEN) BUG at domain.c:1058
(XEN) CPU: 0
(XEN) RIP: e010:[<ffff83000011ba9e>]
domain_relinquish_resources+0x13e/0x360
(XEN) RFLAGS: 0000000000010292
(XEN) rax: 0000000000000000 rbx: 0000000000000000 rcx:
0000000000003c51
(XEN) rdx: 0000000000003c51 rsi: 0000000000000001 rdi:
000000000000001a
(XEN) rbp: ffff830000fce080 rsp: ffff830000105a78 r8:
0000000000000000
(XEN) r9: 0000000000000000 r10: 0000000000003c3c r11:
ffff830000184c7f
(XEN) r12: 0000000000000000 r13: ffff830000fce080 r14:
ffff830000105f28
(XEN) r15: ffffffffffffffea
(XEN) Xen stack trace from rsp=ffff830000105a78:
(XEN) ffff830000fce080 0000000000000000 ffff830000fce080
0000000000000000
(XEN) ffff830000fea080 ffff830000109a89 0000000000073247
ffff830000fce080
(XEN) 00000000409fc1f0 ffff8300001089d1 03fffffc20000000
00000000000001fc
(XEN) 00000000000001fc ffff830076b31000 0001ffff00000000
00007fffc0000000
(XEN) 0000000000076b31 ffff8300001253e1 00000000f0000000
0000000000000001
(XEN) 0000000000000000 ffff830000105f28 ffff830000ff1080
00000000f0000000
(XEN) 0001ffff40000001 ffff82840128bfa8 00000000f0000000
ffff830000105f28
(XEN) 0001ffff40000000 ffff830000125d14 000000ff00000000
ffff8300098ba000
(XEN) 0000000000000000 0000000080000003 0000000000ff1080
0000000080000002
(XEN) ffff82840128bfa8 ffff830000ff1080 0000000000076b31
ffff830000127225
(XEN) 0000000000ff1080 ffff830000000000 0001ffff40000000
00000000000001ff
(XEN) 00000000000001ff ffff830008939000 000000ff00000000
00007f8000000000
(XEN) 0000000000008939 0000000000000002 ffff8284011ff210
ffff830000ff1080
(XEN) 0000000000ff1080 ffff830000000000 0000000080000000
ffff830000123468
(XEN) ffff830073248000 0000000000000000 ffff830000ff1080
ffff8300001238df
(XEN) 0000000080000002 0000000020000000 ffff8284011fdb18
0000000020000001
(XEN) 0fffffff00000000 00000000e0000000 0000000080000000
ffff830000123b93
(XEN) ffff8284013b28f0 ffff8284011fdb18 ffff830076b31fe0
ffff830000105f28
(XEN) ffff830000ff1080 000ffffffffff000 ffff830000196600
00000000f0000000
(XEN) 0000005560000001 ffff828401240b20 00000000f0000000
ffff830000105f28
(XEN) Xen call trace:
(XEN) [<ffff83000011ba9e>] domain_relinquish_resources+0x13e/0x360
(XEN) [<ffff830000109a89>] domain_kill+0x49/0x110
(XEN) [<ffff8300001089d1>] do_dom0_op+0x411/0x940
(XEN) [<ffff8300001253e1>] alloc_page_type+0x2b1/0x890
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000125d14>] get_page_type+0x354/0x450
(XEN) [<ffff830000127225>] get_page_and_type_from_pagenr+0xe5/0x250
(XEN) [<ffff830000123468>] put_page_from_l1e+0x158/0x1c0
(XEN) [<ffff8300001238df>] free_page_type+0x26f/0x430
(XEN) [<ffff830000123b93>] put_page_type+0xf3/0x130
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff83000013b6dc>] syscall_enter+0x5c/0x61
(XEN) BUG at domain.c:1058
(XEN) CPU: 0
(XEN) RIP: e010:[<ffff83000011ba9e>]
domain_relinquish_resources+0x13e/0x360
(XEN) RFLAGS: 0000000000010292
(XEN) rax: 0000000000000000 rbx: 0000000000000000 rcx:
0000000000003c51
(XEN) rdx: 0000000000003c51 rsi: 0000000000000001 rdi:
000000000000001a
(XEN) rbp: ffff830000fce080 rsp: ffff830000105a78 r8:
0000000000000000
(XEN) r9: 0000000000000000 r10: 0000000000003c3c r11:
ffff830000184c7f
(XEN) r12: 0000000000000000 r13: ffff830000fce080 r14:
ffff830000105f28
(XEN) r15: ffffffffffffffea
(XEN) Xen stack trace from rsp=ffff830000105a78:
(XEN) ffff830000fce080 0000000000000000 ffff830000fce080
0000000000000000
(XEN) ffff830000fea080 ffff830000109a89 0000000000073247
ffff830000fce080
(XEN) 00000000409fc1f0 ffff8300001089d1 03fffffc20000000
00000000000001fc
(XEN) 00000000000001fc ffff830076b31000 0001ffff00000000
00007fffc0000000
(XEN) 0000000000076b31 ffff8300001253e1 00000000f0000000
0000000000000001
(XEN) 0000000000000000 ffff830000105f28 ffff830000ff1080
00000000f0000000
(XEN) 0001ffff40000001 ffff82840128bfa8 00000000f0000000
ffff830000105f28
(XEN) 0001ffff40000000 ffff830000125d14 000000ff00000000
ffff8300098ba000
(XEN) 0000000000000000 0000000080000003 0000000000ff1080
0000000080000002
(XEN) ffff82840128bfa8 ffff830000ff1080 0000000000076b31
ffff830000127225
(XEN) 0000000000ff1080 ffff830000000000 0001ffff40000000
00000000000001ff
(XEN) 00000000000001ff ffff830008939000 000000ff00000000
00007f8000000000
(XEN) 0000000000008939 0000000000000002 ffff8284011ff210
ffff830000ff1080
(XEN) 0000000000ff1080 ffff830000000000 0000000080000000
ffff830000123468
(XEN) ffff830073248000 0000000000000000 ffff830000ff1080
ffff8300001238df
(XEN) 0000000080000002 0000000020000000 ffff8284011fdb18
0000000020000001
(XEN) 0fffffff00000000 00000000e0000000 0000000080000000
ffff830000123b93
(XEN) ffff8284013b28f0 ffff8284011fdb18 ffff830076b31fe0
ffff830000105f28
(XEN) ffff830000ff1080 000ffffffffff000 ffff830000196600
00000000f0000000
(XEN) 0000005560000001 ffff828401240b20 00000000f0000000
ffff830000105f28
(XEN) Xen call trace:
(XEN) [<ffff83000011ba9e>] domain_relinquish_resources+0x13e/0x360
(XEN) [<ffff830000109a89>] domain_kill+0x49/0x110
(XEN) [<ffff8300001089d1>] do_dom0_op+0x411/0x940
(XEN) [<ffff8300001253e1>] alloc_page_type+0x2b1/0x890
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000125d14>] get_page_type+0x354/0x450
(XEN) [<ffff830000127225>] get_page_and_type_from_pagenr+0xe5/0x250
(XEN) [<ffff830000123468>] put_page_from_l1e+0x158/0x1c0
(XEN) [<ffff8300001238df>] free_page_type+0x26f/0x430
(XEN) [<ffff830000123b93>] put_page_type+0xf3/0x130
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff83000013b6dc>] syscall_enter+0x5c/0x61
(XEN)
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) CPU0 FATAL TRAP: vector = 6 (invalid operand)
(XEN) [error_code=0000]
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-devel] "xm destroy" causing x86_64 Xen to crash,
Puthiyaparambil, Aravindh <=
|
|
|
|
|