[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] arm32 crash on domain destroy



Julien,

I'm seeing this which I thought you had fixed last week, did I fail to
apply a patch or is this something new?

        (XEN) Assertion 'slot >= 0 && slot < DOMHEAP_ENTRIES' failed, line 334, 
file mm.c
        (XEN) Xen BUG at mm.c:334
        (XEN) CPU2: Unexpected Trap: Undefined Instruction
        (XEN) ----[ Xen-4.4-rc2  arm32  debug=y  Not tainted ]----
        (XEN) CPU:    2
        (XEN) PC:     0023fb54 __bug+0x28/0x44
        (XEN) CPSR:   2000015a MODE:Hypervisor
        (XEN)      R0: 002646dc R1: 00000003 R2: 3fd2bd80 R3: 00000fff
        (XEN)      R4: 00261a0c R5: 0000014e R6: 00000c00 R7: 00000000
        (XEN)      R8: 4007f080 R9: c4176000 R10:00000000 R11:7ffcfd64 
R12:00000004
        (XEN) HYP: SP: 7ffcfd5c LR: 0023fb54
        (XEN) 
        (XEN)   VTCR_EL2: 80002558
        (XEN)  VTTBR_EL2: 00010002f9ffc000
        (XEN) 
        (XEN)  SCTLR_EL2: 30cd187f
        (XEN)    HCR_EL2: 0000000000282835
        (XEN)  TTBR0_EL2: 00000000be010000
        (XEN) 
        (XEN)    ESR_EL2: 00000000
        (XEN)  HPFAR_EL2: 0000000000fff110
        (XEN)      HDFAR: e0800f00
        (XEN)      HIFAR: 00000000
        (XEN) 
        (XEN) Xen stack trace from sp=7ffcfd5c:
        (XEN)    00000000 7ffcfd74 0024810c 40075000 1001b000 7ffcfd84 0020b48c 
40075000
        (XEN)    4007f000 7ffcfd94 0020b4e0 4002dff0 40075000 7ffcfda4 0020c04c 
4007f000
        (XEN)    00000000 7ffcfdc4 0020b334 00000000 c000e73c 4007f000 b6fb3004 
7ffcff58
        (XEN)    00000005 7ffcfddc 00208290 00000001 c000e73c 4007f000 b6fb3004 
7ffcfeec
        (XEN)    00206368 00020002 00000000 00020100 00000000 00000000 00000000 
00000000
        (XEN)    00000000 00000000 00000000 000be076 00000000 7b1eaf48 00000002 
00000001
        (XEN)    00000000 00000000 997b032a fd48d390 9406888f 40725f67 00000000 
00000002
        (XEN)    00000009 00050001 00035890 becdb884 b6fbe4a9 b6f16a98 b6fcd2c8 
00000005
        (XEN)    b6ec3258 becdb854 00035030 ffffffff 0003589c 00037a60 00000005 
b6d63000
        (XEN)    00000000 b6d634c0 b6f39000 0005f780 00035890 becdb8c4 b6fbe4a9 
00000000
        (XEN)    00000001 00000005 00000000 becdb874 b6f16a98 00000001 000355e0 
0003c198
        (XEN)    00035030 00000001 0003589c 7ffcff58 c000e73c 00000ea1 ddb3be40 
7ffcff58
        (XEN)    00000005 c4176000 00000000 7ffcff54 0024d280 b6d634c0 0022c8c4 
0022c6b8
        (XEN)    00000002 002ae000 002b1ff0 002e7614 400218d8 00000000 00000013 
fff11b00
        (XEN)    00000001 becdb5f0 ddb3be40 00305000 00000005 c4176000 b6d634c0 
becdb790
        (XEN)    ddb3be40 00305000 00000005 c4176000 00000000 7ffcff58 0024fa70 
b6fb3004
        (XEN)    00000001 b6de4f50 0005f338 b6d634c0 becdb790 ddb3be40 00305000 
00000005
        (XEN)    c4176000 00000000 becdb77c 00000024 ffffffff b6f2c708 c000e73c 
60000013
        (XEN)    00000000 becdb778 c07e1380 c0012540 c4177e9c c025b570 c07e138c 
c0012680
        (XEN)    c07e1398 c0012720 00000000 00000000 00000000 00000000 00000000 
00000000
        (XEN) Xen call trace:
        (XEN)    [<0023fb54>] __bug+0x28/0x44 (PC)
        (XEN)    [<0023fb54>] __bug+0x28/0x44 (LR)
        (XEN)    [<0024810c>] domain_page_map_to_mfn+0x50/0xb4
        (XEN)    [<0020b48c>] unmap_guest_page+0x20/0x54
        (XEN)    [<0020b4e0>] cleanup_control_block+0x20/0x34
        (XEN)    [<0020c04c>] evtchn_fifo_destroy+0x2c/0x6c
        (XEN)    [<0020b334>] evtchn_destroy+0x1a8/0x1b0
        (XEN)    [<00208290>] domain_kill+0x60/0x128
        (XEN)    [<00206368>] do_domctl+0xa6c/0x10ec
        (XEN)    [<0024d280>] do_trap_hypervisor+0xad8/0xd78
        (XEN)    [<0024fa70>] return_from_trap+0/0x4
        


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.