[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [XEN] ARM64: Panic when dumping domain info



Hello!

I see following Panic on CPU 0: when 'q' is pressed to dump domain
info on Pine64/ARM64 machine.

Any pointers on how It should be debugged.

(XEN) 'h' pressed -> showing installed handlers
(XEN)  key '%' (ascii '25') => trap to xendbg
(XEN)  key '*' (ascii '2a') => print all diagnostics
(XEN)  key '0' (ascii '30') => dump Dom0 registers
(XEN)  key 'A' (ascii '41') => toggle alternative key handling
(XEN)  key 'H' (ascii '48') => dump heap info
(XEN)  key 'R' (ascii '52') => reboot machine
(XEN)  key 'a' (ascii '61') => dump timer queues
(XEN)  key 'd' (ascii '64') => dump registers
(XEN)  key 'e' (ascii '65') => dump evtchn info
(XEN)  key 'g' (ascii '67') => print grant table usage
(XEN)  key 'h' (ascii '68') => show this message
(XEN)  key 'm' (ascii '6d') => memory info
(XEN)  key 'q' (ascii '71') => dump domain (and guest debug) info
(XEN)  key 'r' (ascii '72') => dump run queues
(XEN)  key 't' (ascii '74') => display multi-cpu clock info
(XEN)  key 'w' (ascii '77') => synchronously dump console ring buffer (dmesg)
(XEN) 'q' pressed -> dumping domain info (now=0x34:1FBDABA5)
(XEN) Assertion '!in_irq() && local_irq_is_enabled()' failed at softirq.c:57
(XEN) ----[ Xen-4.8.0-rc  arm64  debug=y   Not tainted ]----
(XEN) CPU:    0
(XEN) PC:     000000000022cec8 process_pending_softirqs+0x34/0x48
(XEN) LR:     0000000000214e64
(XEN) SP:     000080007ff17ae0
(XEN) CPSR:   80000349 MODE:64-bit EL2h (Hypervisor, handler)
(XEN)      X0: 0000000000000001  X1: 0000000000000000  X2: 0000000000000000
(XEN)      X3: 0000000000000000  X4: 0000000000000010  X5: 0000000000000000
(XEN)      X6: 0000000000000004  X7: 0000000000000008  X8: 0000000000000000
(XEN)      X9: 0000000000000010 X10: 000080007ff17858 X11: 0000000000000031
(XEN)     X12: 0000000000000008 X13: 0000000000266ec0 X14: 0000000000000030
(XEN)     X15: 0000000000000000 X16: ffff0000081bc0c4 X17: 0000ffffac419440
(XEN)     X18: 0000000000000000 X19: 0000000000000071 X20: 00000000002c8cf8
(XEN)     X21: 000080007ff2d000 X22: 0000000000000071 X23: 000080007ff17d60
(XEN)     X24: 000080007ff17d60 X25: 0000000000000002 X26: 0000000040000000
(XEN)     X27: 00000000002c8cf0 X28: 00000000002773d8  FP: 000080007ff17ae0
(XEN)
(XEN)   VTCR_EL2: 80023558
(XEN)  VTTBR_EL2: 00010000bff7e000
(XEN)
(XEN)  SCTLR_EL2: 30cd183d
(XEN)    HCR_EL2: 000000008038663f
(XEN)  TTBR0_EL2: 00000000bfef6000
(XEN)
(XEN)    ESR_EL2: f2000001
(XEN)  HPFAR_EL2: 000000000001c810
(XEN)    FAR_EL2: ffff000008000f00
(XEN)
(XEN) Xen stack trace from sp=000080007ff17ae0:
(XEN)    000080007ff17b40 0000000000214e64 000080007fff9250 0000000000000340
(XEN)    000000000030b9c8 0000000000306000 000000000000005c 00000000ffffffc8
(XEN)    0000000000000000 0000000000000000 000080007ff17bd0 000000000022ac10
(XEN)    000080007ff17bc0 0000000000215834 0000000000000071 000080007ff17d60
(XEN)    0000000000000340 0000000000000071 000080007ff17d60 000080007ff17d60
(XEN)    0000000000000002 0000000040000000 00000000c0000000 0000000000000001
(XEN)    0000000000277518 0000000000277488 0000000000277428 0000000000277400
(XEN)    000080007ff17be0 000000000023fddc 00000000002825f0 000080007ff17d60
(XEN)    000080007ff17bf0 000000000024075c 000080007ff17c20 0000000000241a40
(XEN)    00000000002825f0 0000000000282668 0000000000000340 00000000002406b0
(XEN)    000080007ff17c70 0000000000241378 00000000002d0698 0000000000000061
(XEN)    0000000000000002 0000000000000005 00000000002825f0 0000000000000005
(XEN)    00000000002825f0 710080007ff17d60 000080007ff17cb0 000000000024d210
(XEN)    00000000002d06d8 00000000002d2100 0000000000000020 000080007ff17d60
(XEN)    00000000002d2124 00000000002d2100 000080007ff17d00 0000000000249e60
(XEN)    0000000000000020 00000000002d2000 000080007ff17d60 0000000000000000
(XEN)    0000000060000349 0000000000000004 0000000000306000 0000000000306448
(XEN)    000080007ff17d40 00000000002575e8 000080007ff17d60 00000000002cbf00
(XEN)    000080007ff17e70 0000000000245f5c 0000000060000349 00000000002575dc
(XEN)    000080007ff17e70 000000000025d240 000000000030cd18 0000000000306448
(XEN)    0000000000000000 0000000000000000 0000000000306448 000000000030b930
(XEN)    0000000000000000 00000000016e3600 000000346f117d91 000080007fff9458
(XEN)    000080007ff1f2e0 000080007ff17d60 0000000000000850 0000000000000001
(XEN)    0000000000000001 0000000000000000 0000000000000000 0000000000000015
(XEN)    ffff0000081bc0c4 0000ffffac419440 0000000000000000 000000000030cd18
(XEN)    00000000002cbf00 000000000030cd18 000000000030ba80 000000000030cd18
(XEN)    0000000000000004 0000000000306000 0000000040000000 00000000c0000000
(XEN)    0000000000000001 000080007ff17e70 0000000000245f64 000080007ff17e70
(XEN)    0000000000245f5c 0000000060000349 000080007ff17ea0 0000000000252b88
(XEN)    0000000000282000 0000000000282d00 0000000000306448 0000000000000080
(XEN)    000000000027f080 0000000000294784 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) Xen call trace:
(XEN)    [<000000000022cec8>] process_pending_softirqs+0x34/0x48 (PC)
(XEN)    [<0000000000214e64>] keyhandler.c#dump_domains+0xac/0x43c (LR)
(XEN)    [<0000000000214e64>] keyhandler.c#dump_domains+0xac/0x43c
(XEN)    [<0000000000215834>] handle_keypress+0xbc/0xe8
(XEN)    [<000000000023fddc>] console.c#__serial_rx+0x44/0x90
(XEN)    [<000000000024075c>] console.c#serial_rx+0xac/0xbc
(XEN)    [<0000000000241a40>] serial_rx_interrupt+0xb0/0xd4
(XEN)    [<0000000000241378>] ns16550.c#ns16550_interrupt+0x70/0x94
(XEN)    [<000000000024d210>] do_IRQ+0x17c/0x1f8
(XEN)    [<0000000000249e60>] gic_interrupt+0x50/0xec
(XEN)    [<00000000002575e8>] do_trap_irq+0x20/0x2c
(XEN)    [<000000000025d240>] entry.o#hyp_irq+0x5c/0x60
(XEN)    [<0000000000252b88>] setup.c#init_done+0x10/0x18
(XEN)    [<0000000000294784>] 0000000000294784
(XEN)
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) Assertion '!in_irq() && local_irq_is_enabled()' failed at softirq.c:57
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.