Core was generated by `xenstored --pid-file=/var/run/xenstored.pid'. Program terminated with signal 11, Segmentation fault. #0 0x00007fcbf066088d in _IO_vfprintf_internal (s=0x7fff46ac3010, format=, ap=0x7fff46ac3170) at vfprintf.c:1617 1617 if (spec == L_('\0')) #0 0x00007fcbf066088d in _IO_vfprintf_internal (s=0x7fff46ac3010, format=, ap=0x7fff46ac3170) at vfprintf.c:1617 len = string_malloced = step0_jumps = {0, -3068, -5107, -5018, -4926, -4839, -4738, -4548, -4282, -4101, -3155, -3242, -2981, -8386, -2886, -2839, -1173, -190, -2154, -2064, -918, -3856, -418, -1031, -959, -8289, -672, -5189, -8386, -4637} space = 0 is_short = 0 use_outdigits = 0 step1_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, -4101, -3155, -3242, -2981, -8386, -2886, -2839, -1173, -190, -2154, -2064, -918, -3856, -418, -1031, -959, -8289, -672, -5189, -8386, 0} group = 0 prec = step2_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -3155, -3242, -2981, -8386, -2886, -2839, -1173, -190, -2154, -2064, -918, -3856, -418, -1031, -959, -8289, -672, -5189, -8386, 0} string = 0x1f
left = 0 is_long_double = 0 width = step3a_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -3337, 0, 0, 0, -2886, -2839, -1173, -190, -2154, 0, 0, 0, 0, -1031, 0, 0, 0, 0, 0, 0} alt = 0 showsign = 0 is_long = 0 is_char = 0 pad = step3b_jumps = {0 , -2981, 0, 0, -2886, -2839, -1173, -190, -2154, -2064, -918, -3856, -418, -1031, -959, -8289, -672, 0, 0, 0} step4_jumps = {0 , -2886, -2839, -1173, -190, -2154, -2064, -918, -3856, -418, -1031, -959, -8289, -672, 0, 0, 0} is_negative = base = 0 the_arg = {pa_wchar = 1185690064 L'\320', pa_int = 1185690064, pa_long_int = 140734379078096, pa_long_long_int = 140734379078096, pa_u_int = 1185690064, pa_u_long_int = 140734379078096, pa_u_long_long_int = 140734379078096, pa_double = 6.9532021891286316e-310, pa_long_double = , pa_string = 0x7fff46ac31d0 "\020", pa_wstring = 0x7fff46ac31d0 L"\020\060\x46ac32b0\x7fff\x46ac31f0\x7fff\x63626100\x67666564\x17aaf20", pa_pointer = 0x7fff46ac31d0, pa_user = 0x7fff46ac31d0} spec = _buffer = {__routine = 0x2f646e656b636162, __arg = 0x36372f392f646276, __canceltype = 1919299384, __prev = 0x264692d646e} _avail = 0 thousands_sep = 0x0 grouping = 0xffffffffffffffff
done = 2 f = 0x40d4a7 "s" lead_str_end = 0x40d4a6 "*s" work_buffer = "\377\377\377\377\071ual-device\000s/\254F\377\177\000\000\b/\254F\377\177\000\000\000\000\000\000\000\000\000\000\275\346@", '\000' , "\002", '\000' , "\031\344@", '\000' , "\002\000\000\000vbd/9/768/frontend\002\000\000\000\036", '\000' , "\t\000\000\000\001\000\000\000/local/domain/9/device/vbd/768\200\000\000\000\000\000\000\000l\000\000\000&\000\000\000@\000\000\000`\003\035\275\231\031\001&/local/domain/0/backend/vbd/9/768/"... workstart = 0x0 workend = 0x7fff46ac2ec8 "omain/0/backend/vbd/9/768/frontend-id\002" ap_save = {{gp_offset = 16, fp_offset = 48, overflow_arg_area = 0x7fff46ac32b0, reg_save_area = 0x7fff46ac31f0}} nspecs_done = save_errno = 2 readonly_format = 0 args_malloced = 0x0 jump_table = "\001\000\000\004\000\016\000\006\000\000\a\002\000\003\t\000\005\b\b\b\b\b\b\b\b\b\000\000\000\000\000\000\000\032\000\031\000\023\023\023\000\035\000\000\f\000\000\000\000\000\000\025\000\000\000\000\022\000\r\000\000\000\000\000\000\032\000\024\017\023\023\023\n\017\034\000\v\030\027\021\026\f\000\025\033\020\000\000\022\000\r" __PRETTY_FUNCTION__ = "_IO_vfprintf_internal" #1 0x00007fcbf0682732 in _IO_vsnprintf (string=0x7fff46ac318f "", maxlen=, format=0x40d4a4 "%.*s", args=0x7fff46ac3170) at vsnprintf.c:120 sf = {f = {_sbf = {_f = {_flags = -72515583, _IO_read_ptr = 0x7fff46ac3100 " \257z\001", _IO_read_end = 0x7fff46ac3140 "\320\061\254F\377\177", _IO_read_base = 0x7fff46ac3100 " \257z\001", _IO_write_base = 0x7fff46ac3100 " \257z\001", _IO_write_ptr = 0x7fff46ac3100 " \257z\001", _IO_write_end = 0x7fff46ac3100 " \257z\001", _IO_buf_base = 0x7fff46ac3100 " \257z\001", _IO_buf_end = 0x7fff46ac3140 "\320\061\254F\377\177", _IO_save_base = 0x0, _IO_backup_base = 0x0, _IO_save_end = 0x0, _markers = 0x0, _chain = 0x0, _fileno = 1185690112, _flags2 = 0, _old_offset = 285996, _cur_column = 0, _vtable_offset = 0 '\000', _shortbuf = "", _lock = 0x0, _offset = 140734379077808, _codecvt = 0x40a921, _wide_data = 0x7fff46ac3200, _freeres_list = 0x0, _freeres_buf = 0x7fff46ac3120, _freeres_size = 4241500, _mode = -1, _unused2 = "\t\000\000\000\020\061\254F\377\177\000\000\335\023\000\000\000\000\000"}, vtable = 0x7fcbf0975fc0}, _s = {_allocate_buffer = 0, _free_buffer = 0x409598 }}, overflow_buf = " \257z\001\000\000\000\000%", '\000' "\313, \177\000\000\034P\000\000\000\000\000\000\002\000\000\000\000\000\000\000\034P\000\000\000\000\000\000\001", '\000' } ret = 0 #2 0x000000000040855b in talloc_vasprintf (t=0x17aaf20, fmt=0x40d4a4 "%.*s", ap=0x7fff46ac31d0) at talloc.c:1104 len = ret = 0x0 ap2 = {{gp_offset = 24, fp_offset = 48, overflow_arg_area = 0x7fff46ac32b0, reg_save_area = 0x7fff46ac31f0}} c = 0 '\000' #3 0x0000000000408666 in talloc_asprintf (t=0x1f, fmt=0xffffe938
) at talloc.c:1129 ap = {{gp_offset = 16, fp_offset = 48, overflow_arg_area = 0x7fff46ac32b0, reg_save_area = 0x7fff46ac31f0}} ret = 0x0 #4 0x0000000000403a38 in ask_parents (conn=0x177a1f0, name=0x17aaf20 "/local/domain/0/backend/vif/1/0/accel", perm=XS_PERM_READ) at xenstored_core.c:492 node = 0x7fff46ac3370 #5 errno_from_parents (conn=0x177a1f0, name=0x17aaf20 "/local/domain/0/backend/vif/1/0/accel", perm=XS_PERM_READ) at xenstored_core.c:516 No locals. #6 get_node (conn=0x177a1f0, name=0x17aaf20 "/local/domain/0/backend/vif/1/0/accel", perm=XS_PERM_READ) at xenstored_core.c:543 node = #7 0x000000000040481d in do_read (conn=0x177a1f0) at xenstored_core.c:744 node = #8 process_message (conn=0x177a1f0) at xenstored_core.c:1178 trans = #9 consider_message (conn=0x177a1f0) at xenstored_core.c:1261 No locals. #10 handle_input (conn=0x177a1f0) at xenstored_core.c:1308 bytes = in = #11 0x0000000000405170 in main (argc=, argv=) at xenstored_core.c:1964 next = 0x177a1f0 opt = 24621840 sock = 0x177a0c0 ro_sock = 0x177a120 max = addr = {sun_family = 1, sun_path = "/var/run/xenstored/socket_ro\000\000\000\000\000\000\000\000\000\000\350j\373\360\313\177\000\000\001\000\000\000\377\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\313\177\000\000(!\374\360\313\177\000\000\340[a\360\313\177\000\000\377\262\360\000\000\000\000\000\277\000\000\000\000\000\000\000\036\065\254F\377\177"} inset = {__fds_bits = {4096, 0 }} outset = {__fds_bits = {0 }} dofork = outputpid = no_domain_init = pidfile = evtchn_fd = 11 timeout = 0x0