[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Re: [Fedora-xen] 2.6.31-1.2.65.xendom0.fc12.x86_64 crash on boot
Jeremy: More info about the dom0 kernel crash here.. -- Pasi On Tue, Sep 15, 2009 at 01:25:35PM +0100, M A Young wrote: > > > > >gdb vmlinux > >x/i ffffffff81a017f1 > > That should of course have been > (gdb) x/i 0xffffffff81a017f1 > 0xffffffff81a017f1 <xen_load_gdt_boot+171>: ud2a > The context is > (gdb) x/60i xen_load_gdt_boot > 0xffffffff81a01746 <xen_load_gdt_boot>: push %rbp > 0xffffffff81a01747 <xen_load_gdt_boot+1>: mov %rsp,%rbp > 0xffffffff81a0174a <xen_load_gdt_boot+4>: push %r15 > 0xffffffff81a0174c <xen_load_gdt_boot+6>: xor %r15d,%r15d > 0xffffffff81a0174f <xen_load_gdt_boot+9>: push %r14 > 0xffffffff81a01751 <xen_load_gdt_boot+11>: push %r13 > 0xffffffff81a01753 <xen_load_gdt_boot+13>: push %r12 > 0xffffffff81a01755 <xen_load_gdt_boot+15>: mov %rdi,%r12 > 0xffffffff81a01758 <xen_load_gdt_boot+18>: push %rbx > 0xffffffff81a01759 <xen_load_gdt_boot+19>: sub $0x18,%rsp > 0xffffffff81a0175d <xen_load_gdt_boot+23>: movzwl (%rdi),%eax > 0xffffffff81a01760 <xen_load_gdt_boot+26>: mov 0x2(%rdi),%rbx > 0xffffffff81a01764 <xen_load_gdt_boot+30>: inc %eax > 0xffffffff81a01766 <xen_load_gdt_boot+32>: mov %eax,%r14d > 0xffffffff81a01769 <xen_load_gdt_boot+35>: mov %eax,-0x34(%rbp) > 0xffffffff81a0176c <xen_load_gdt_boot+38>: lea 0xfff(%r14),%rax > 0xffffffff81a01773 <xen_load_gdt_boot+45>: shr $0xc,%rax > 0xffffffff81a01777 <xen_load_gdt_boot+49>: lea 0x1e(,%rax,8),%rax > 0xffffffff81a0177f <xen_load_gdt_boot+57>: and $0x7f0,%eax > 0xffffffff81a01784 <xen_load_gdt_boot+62>: sub %rax,%rsp > 0xffffffff81a01787 <xen_load_gdt_boot+65>: lea 0xf(%rsp),%r13 > 0xffffffff81a0178c <xen_load_gdt_boot+70>: and > $0xfffffffffffffff0,%r13 > 0xffffffff81a01790 <xen_load_gdt_boot+74>: test $0xfff,%ebx > 0xffffffff81a01796 <xen_load_gdt_boot+80>: > je 0xffffffff81a01807 <xen_load_gdt_boot+193> > 0xffffffff81a01798 <xen_load_gdt_boot+82>: ud2a > 0xffffffff81a0179a <xen_load_gdt_boot+84>: > jmp 0xffffffff81a0179a <xen_load_gdt_boot+84> > 0xffffffff81a0179c <xen_load_gdt_boot+86>: mov %rbx,%rdi > 0xffffffff81a0179f <xen_load_gdt_boot+89>: > callq 0xffffffff81040b6c <__phys_addr> > 0xffffffff81a017a4 <xen_load_gdt_boot+94>: mov %rax,%rsi > 0xffffffff81a017a7 <xen_load_gdt_boot+97>: shr $0xc,%rsi > 0xffffffff81a017ab <xen_load_gdt_boot+101>: mov %rsi,%rdi > 0xffffffff81a017ae <xen_load_gdt_boot+104>: mov %rsi,-0x40(%rbp) > 0xffffffff81a017b2 <xen_load_gdt_boot+108>: > callq 0xffffffff8100b3ae <pfn_to_mfn> > 0xffffffff81a017b7 <xen_load_gdt_boot+113>: mov -0x40(%rbp),%rsi > 0xffffffff81a017bb <xen_load_gdt_boot+117>: mov %rax,%rcx > 0xffffffff81a017be <xen_load_gdt_boot+120>: mov > $0x8000000000000161,%rax > 0xffffffff81a017c8 <xen_load_gdt_boot+130>: > and -0x1e351f(%rip),%rax # 0xffffffff8181e2b0 > <__supported_pte_mask> > 0xffffffff81a017cf <xen_load_gdt_boot+137>: mov %rsi,%rdi > 0xffffffff81a017d2 <xen_load_gdt_boot+140>: shl $0xc,%rdi > 0xffffffff81a017d6 <xen_load_gdt_boot+144>: or %rax,%rdi > 0xffffffff81a017d9 <xen_load_gdt_boot+147>: callq *0xffffffff81798470 > 0xffffffff81a017e0 <xen_load_gdt_boot+154>: xor %edx,%edx > 0xffffffff81a017e2 <xen_load_gdt_boot+156>: mov %rax,%rsi > 0xffffffff81a017e5 <xen_load_gdt_boot+159>: mov %rbx,%rdi > 0xffffffff81a017e8 <xen_load_gdt_boot+162>: > callq 0xffffffff810091c0 <hypercall_page+448> > 0xffffffff81a017ed <xen_load_gdt_boot+167>: test %eax,%eax > 0xffffffff81a017ef <xen_load_gdt_boot+169>: > je 0xffffffff81a017f5 <xen_load_gdt_boot+175> > 0xffffffff81a017f1 <xen_load_gdt_boot+171>: ud2a > 0xffffffff81a017f3 <xen_load_gdt_boot+173>: > jmp 0xffffffff81a017f3 <xen_load_gdt_boot+173> > 0xffffffff81a017f5 <xen_load_gdt_boot+175>: movslq %r15d,%rax > 0xffffffff81a017f8 <xen_load_gdt_boot+178>: add $0x1000,%rbx > 0xffffffff81a017ff <xen_load_gdt_boot+185>: inc %r15d > 0xffffffff81a01802 <xen_load_gdt_boot+188>: mov > %rcx,0x0(%r13,%rax,8) > 0xffffffff81a01807 <xen_load_gdt_boot+193>: mov %r14,%rax > 0xffffffff81a0180a <xen_load_gdt_boot+196>: add 0x2(%r12),%rax > 0xffffffff81a0180f <xen_load_gdt_boot+201>: cmp %rax,%rbx > 0xffffffff81a01812 <xen_load_gdt_boot+204>: > jb 0xffffffff81a0179c <xen_load_gdt_boot+86> > 0xffffffff81a01814 <xen_load_gdt_boot+206>: mov -0x34(%rbp),%esi > 0xffffffff81a01817 <xen_load_gdt_boot+209>: mov %r13,%rdi > 0xffffffff81a0181a <xen_load_gdt_boot+212>: shr $0x3,%esi _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |