Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@s32g274aevb-Dom0:~# xl create /etc/xen/domU1.cfg
- Parsing config from /etc/xen/domU1.cfg
- [ 412.213938] xenbr0: port 2(vif1.0) entered blocking state
- [ 412.219080] xenbr0: port 2(vif1.0) entered disabled state
- [ 412.224637] device vif1.0 entered promiscuous mode
- [ 412.232869] IPv6: ADDRCONF(NETDEV_UP): vif1.0: link is not ready
- root@s32g274aevb:~# (XEN) d1v0: vGICR: SGI: unhandled word write 0xffffffff to ICACTIVER0
- [ 413.123267] xen-blkback: backend/vbd/1/51712: using 1 queues, protocol 1 (arm-abi) persistent
- grants
- (XEN) grant_table.c:1745:d1v0 Expanding d1 grant table from 1 to 2 frames
- [ 413.334490] vif vif-1-0 vif1.0: Guest Rx ready
- [ 413.339592] IPv6: ADDRCONF(NETDEV_CHANGE): vif1.0: link becomes ready
- [ 413.345878] xenbr0: port 2(vif1.0) entered blocking state
- [ 413.351104] xenbr0: port 2(vif1.0) entered forwarding state
- [ 413.367873] Unable to handle kernel paging request at virtual address 000006c000020070
- [ 413.375497] Mem abort info:
- [ 413.378247] ESR = 0x96000004
- [ 413.381298] Exception class = DABT (current EL), IL = 32 bits
- [ 413.387187] SET = 0, FnV = 0
- [ 413.390237] EA = 0, S1PTW = 0
- [ 413.393347] Data abort info:
- [ 413.396206] ISV = 0, ISS = 0x00000004
- [ 413.400024] CM = 0, WnR = 0
- [ 413.402962] [000006c000020070] address between user and kernel address ranges
- [ 413.410096] Internal error: Oops: 96000004 [#1] PREEMPT SMP
- [ 413.415635] Modules linked in: xen_netback xen_blkback xen_gntalloc xen_gntdev sja1105pqrs(O) nxp
- [ 413.424493] Process vif1.0-q0-guest (pid: 1117, stack limit = 0x000000005b07b3a1)
- [ 413.431973] CPU: 1 PID: 1117 Comm: vif1.0-q0-guest Tainted: G O 4.19.59-rt24+g9d2b51c #1
- [ 413.441328] Hardware name: Freescale S32G275 (DT)
- [ 413.446018] pstate: 80000005 (Nzcv daif -PAN -UAO)
- [ 413.450806] pc : xenvif_rx_ring_slots_available+0x40/0xa0 [xen_netback]
- [ 413.457395] lr : xenvif_have_rx_work+0x14/0xa0 [xen_netback]
- [ 413.463026] sp : ffffff800a5abda0
- [ 413.466326] x29: ffffff800a5abda0 x28: 0000000000000000
- [ 413.471619] x27: ffffff800a701280 x26: ffffff8008848000
- [ 413.476915] x25: ffffff80080d7330 x24: ffffff800a701230
- [ 413.482211] x23: ffffff8008846000 x22: ffffffc05dc677c0
- [ 413.487505] x21: ffffff800a701280 x20: ffffff800a701280
- [ 413.492799] x19: ffffff800a6f5000 x18: 0000000000000000
- [ 413.498094] x17: 0000000000000000 x16: 0000000000000000
- [ 413.503390] x15: 0000000000000400 x14: 0000000000000400
- [ 413.508683] x13: 00000000000000ef x12: 0000000000000001
- [ 413.513979] x11: 0000000000000000 x10: 00000000000007d0
- [ 413.519272] x9 : ffffff800a5abc80 x8 : ffffffc05cc89330
- [ 413.524567] x7 : 0000000000000000 x6 : ffffff800a6fd000
- [ 413.529863] x5 : ffffff800a701000 x4 : 000006c00002006c
- [ 413.535156] x3 : 0000000000000000 x2 : ffffff800896d000
- [ 413.540452] x1 : ffffffc05affc700 x0 : 0000000000000000
- [ 413.545747] Call trace:
- [ 413.548189] xenvif_rx_ring_slots_available+0x40/0xa0 [xen_netback]
- [ 413.554436] xenvif_kthread_guest_rx+0xcc/0x268 [xen_netback]
- [ 413.560165] kthread+0xfc/0x128
- [ 413.563287] ret_from_fork+0x10/0x18
- [ 413.566845] Code: 39420420 913ffc63 f9613cc2 d34cac63 (79400881)
- [ 413.572920] ---[ end trace dd13b70497efa3b8 ]---
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement