[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] "xm destroy" causing x86_64 Xen to crash



I find that when I force a DomU to crash (for example by specifying an
incorrect root= option) and then do an "xm destroy" on the DomU, Xen
crashes. This happens only with SMP DomU.

This is with x86_64 Xen (changeset 6714) on a Dell PowerEdge 470 (4x
with HT) and 2GB RAM running SLES9 SP2.

Isn't smp_send_stop() happening on all VCPUS????

Aravindh


DomU Crash
----------
Please append a correct "root=" boot option
Kernel panic - not syncing: VFS: Unable to mount root fs on
unknown-block(0,0)

Xen Crash
---------
(XEN) BUG at domain.c:1058
(XEN) CPU:    0
(XEN) RIP:    e010:[<ffff83000011ba9e>]
domain_relinquish_resources+0x13e/0x360
(XEN) RFLAGS: 0000000000010292
(XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx:
0000000000003c51
(XEN) rdx: 0000000000003c51   rsi: 0000000000000001   rdi:
000000000000001a
(XEN) rbp: ffff830000fce080   rsp: ffff830000105a78   r8:
0000000000000000
(XEN) r9:  0000000000000000   r10: 0000000000003c3c   r11:
ffff830000184c7f
(XEN) r12: 0000000000000000   r13: ffff830000fce080   r14:
ffff830000105f28
(XEN) r15: ffffffffffffffea
(XEN) Xen stack trace from rsp=ffff830000105a78:
(XEN)    ffff830000fce080 0000000000000000 ffff830000fce080
0000000000000000 
(XEN)    ffff830000fea080 ffff830000109a89 0000000000073247
ffff830000fce080 
(XEN)    00000000409fc1f0 ffff8300001089d1 03fffffc20000000
00000000000001fc 
(XEN)    00000000000001fc ffff830076b31000 0001ffff00000000
00007fffc0000000 
(XEN)    0000000000076b31 ffff8300001253e1 00000000f0000000
0000000000000001 
(XEN)    0000000000000000 ffff830000105f28 ffff830000ff1080
00000000f0000000 
(XEN)    0001ffff40000001 ffff82840128bfa8 00000000f0000000
ffff830000105f28 
(XEN)    0001ffff40000000 ffff830000125d14 000000ff00000000
ffff8300098ba000 
(XEN)    0000000000000000 0000000080000003 0000000000ff1080
0000000080000002 
(XEN)    ffff82840128bfa8 ffff830000ff1080 0000000000076b31
ffff830000127225 
(XEN)    0000000000ff1080 ffff830000000000 0001ffff40000000
00000000000001ff 
(XEN)    00000000000001ff ffff830008939000 000000ff00000000
00007f8000000000 
(XEN)    0000000000008939 0000000000000002 ffff8284011ff210
ffff830000ff1080 
(XEN)    0000000000ff1080 ffff830000000000 0000000080000000
ffff830000123468 
(XEN)    ffff830073248000 0000000000000000 ffff830000ff1080
ffff8300001238df 
(XEN)    0000000080000002 0000000020000000 ffff8284011fdb18
0000000020000001 
(XEN)    0fffffff00000000 00000000e0000000 0000000080000000
ffff830000123b93 
(XEN)    ffff8284013b28f0 ffff8284011fdb18 ffff830076b31fe0
ffff830000105f28 
(XEN)    ffff830000ff1080 000ffffffffff000 ffff830000196600
00000000f0000000 
(XEN)    0000005560000001 ffff828401240b20 00000000f0000000
ffff830000105f28 
(XEN) Xen call trace:
(XEN)    [<ffff83000011ba9e>] domain_relinquish_resources+0x13e/0x360
(XEN)    [<ffff830000109a89>] domain_kill+0x49/0x110
(XEN)    [<ffff8300001089d1>] do_dom0_op+0x411/0x940
(XEN)    [<ffff8300001253e1>] alloc_page_type+0x2b1/0x890
(XEN)    [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN)    [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN)    [<ffff830000125d14>] get_page_type+0x354/0x450
(XEN)    [<ffff830000127225>] get_page_and_type_from_pagenr+0xe5/0x250
(XEN)    [<ffff830000123468>] put_page_from_l1e+0x158/0x1c0
(XEN)    [<ffff8300001238df>] free_page_type+0x26f/0x430
(XEN)    [<ffff830000123b93>] put_page_type+0xf3/0x130
(XEN)    [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN)    [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN)    [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN)    [<ffff83000013b6dc>] syscall_enter+0x5c/0x61
(XEN) BUG at domain.c:1058
(XEN) CPU:    0
(XEN) RIP:    e010:[<ffff83000011ba9e>]
domain_relinquish_resources+0x13e/0x360
(XEN) RFLAGS: 0000000000010292
(XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx:
0000000000003c51
(XEN) rdx: 0000000000003c51   rsi: 0000000000000001   rdi:
000000000000001a
(XEN) rbp: ffff830000fce080   rsp: ffff830000105a78   r8:
0000000000000000
(XEN) r9:  0000000000000000   r10: 0000000000003c3c   r11:
ffff830000184c7f
(XEN) r12: 0000000000000000   r13: ffff830000fce080   r14:
ffff830000105f28
(XEN) r15: ffffffffffffffea
(XEN) Xen stack trace from rsp=ffff830000105a78:
(XEN)    ffff830000fce080 0000000000000000 ffff830000fce080
0000000000000000 
(XEN)    ffff830000fea080 ffff830000109a89 0000000000073247
ffff830000fce080 
(XEN)    00000000409fc1f0 ffff8300001089d1 03fffffc20000000
00000000000001fc 
(XEN)    00000000000001fc ffff830076b31000 0001ffff00000000
00007fffc0000000 
(XEN)    0000000000076b31 ffff8300001253e1 00000000f0000000
0000000000000001 
(XEN)    0000000000000000 ffff830000105f28 ffff830000ff1080
00000000f0000000 
(XEN)    0001ffff40000001 ffff82840128bfa8 00000000f0000000
ffff830000105f28 
(XEN)    0001ffff40000000 ffff830000125d14 000000ff00000000
ffff8300098ba000 
(XEN)    0000000000000000 0000000080000003 0000000000ff1080
0000000080000002 
(XEN)    ffff82840128bfa8 ffff830000ff1080 0000000000076b31
ffff830000127225 
(XEN)    0000000000ff1080 ffff830000000000 0001ffff40000000
00000000000001ff 
(XEN)    00000000000001ff ffff830008939000 000000ff00000000
00007f8000000000 
(XEN)    0000000000008939 0000000000000002 ffff8284011ff210
ffff830000ff1080 
(XEN)    0000000000ff1080 ffff830000000000 0000000080000000
ffff830000123468 
(XEN)    ffff830073248000 0000000000000000 ffff830000ff1080
ffff8300001238df 
(XEN)    0000000080000002 0000000020000000 ffff8284011fdb18
0000000020000001 
(XEN)    0fffffff00000000 00000000e0000000 0000000080000000
ffff830000123b93 
(XEN)    ffff8284013b28f0 ffff8284011fdb18 ffff830076b31fe0
ffff830000105f28 
(XEN)    ffff830000ff1080 000ffffffffff000 ffff830000196600
00000000f0000000 
(XEN)    0000005560000001 ffff828401240b20 00000000f0000000
ffff830000105f28 
(XEN) Xen call trace:
(XEN)    [<ffff83000011ba9e>] domain_relinquish_resources+0x13e/0x360
(XEN)    [<ffff830000109a89>] domain_kill+0x49/0x110
(XEN)    [<ffff8300001089d1>] do_dom0_op+0x411/0x940
(XEN)    [<ffff8300001253e1>] alloc_page_type+0x2b1/0x890
(XEN)    [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN)    [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN)    [<ffff830000125d14>] get_page_type+0x354/0x450
(XEN)    [<ffff830000127225>] get_page_and_type_from_pagenr+0xe5/0x250
(XEN)    [<ffff830000123468>] put_page_from_l1e+0x158/0x1c0
(XEN)    [<ffff8300001238df>] free_page_type+0x26f/0x430
(XEN)    [<ffff830000123b93>] put_page_type+0xf3/0x130
(XEN)    [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN)    [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN)    [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN)    [<ffff83000013b6dc>] syscall_enter+0x5c/0x61
(XEN)    
(XEN) 
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) CPU0 FATAL TRAP: vector = 6 (invalid operand)
(XEN) [error_code=0000]
(XEN) ****************************************
(XEN) 
(XEN) Reboot in five seconds...

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.