[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Re: [Fedora-xen] 2.6.31-1.2.65.xendom0.fc12.x86_64 crash on boot



Jeremy: More info about the dom0 kernel crash here..

-- Pasi

On Tue, Sep 15, 2009 at 01:25:35PM +0100, M A Young wrote:
> 
> >
> >gdb vmlinux
> >x/i ffffffff81a017f1
> 
> That should of course have been
> (gdb) x/i 0xffffffff81a017f1
> 0xffffffff81a017f1 <xen_load_gdt_boot+171>:   ud2a
> The context is
> (gdb) x/60i xen_load_gdt_boot
> 0xffffffff81a01746 <xen_load_gdt_boot>:       push   %rbp
> 0xffffffff81a01747 <xen_load_gdt_boot+1>:     mov    %rsp,%rbp
> 0xffffffff81a0174a <xen_load_gdt_boot+4>:     push   %r15
> 0xffffffff81a0174c <xen_load_gdt_boot+6>:     xor    %r15d,%r15d
> 0xffffffff81a0174f <xen_load_gdt_boot+9>:     push   %r14
> 0xffffffff81a01751 <xen_load_gdt_boot+11>:    push   %r13
> 0xffffffff81a01753 <xen_load_gdt_boot+13>:    push   %r12
> 0xffffffff81a01755 <xen_load_gdt_boot+15>:    mov    %rdi,%r12
> 0xffffffff81a01758 <xen_load_gdt_boot+18>:    push   %rbx
> 0xffffffff81a01759 <xen_load_gdt_boot+19>:    sub    $0x18,%rsp
> 0xffffffff81a0175d <xen_load_gdt_boot+23>:    movzwl (%rdi),%eax
> 0xffffffff81a01760 <xen_load_gdt_boot+26>:    mov    0x2(%rdi),%rbx
> 0xffffffff81a01764 <xen_load_gdt_boot+30>:    inc    %eax
> 0xffffffff81a01766 <xen_load_gdt_boot+32>:    mov    %eax,%r14d
> 0xffffffff81a01769 <xen_load_gdt_boot+35>:    mov    %eax,-0x34(%rbp)
> 0xffffffff81a0176c <xen_load_gdt_boot+38>:    lea    0xfff(%r14),%rax
> 0xffffffff81a01773 <xen_load_gdt_boot+45>:    shr    $0xc,%rax
> 0xffffffff81a01777 <xen_load_gdt_boot+49>:    lea    0x1e(,%rax,8),%rax
> 0xffffffff81a0177f <xen_load_gdt_boot+57>:    and    $0x7f0,%eax
> 0xffffffff81a01784 <xen_load_gdt_boot+62>:    sub    %rax,%rsp
> 0xffffffff81a01787 <xen_load_gdt_boot+65>:    lea    0xf(%rsp),%r13
> 0xffffffff81a0178c <xen_load_gdt_boot+70>:    and 
> $0xfffffffffffffff0,%r13
> 0xffffffff81a01790 <xen_load_gdt_boot+74>:    test   $0xfff,%ebx
> 0xffffffff81a01796 <xen_load_gdt_boot+80>:
>     je     0xffffffff81a01807 <xen_load_gdt_boot+193>
> 0xffffffff81a01798 <xen_load_gdt_boot+82>:    ud2a
> 0xffffffff81a0179a <xen_load_gdt_boot+84>:
>     jmp    0xffffffff81a0179a <xen_load_gdt_boot+84>
> 0xffffffff81a0179c <xen_load_gdt_boot+86>:    mov    %rbx,%rdi
> 0xffffffff81a0179f <xen_load_gdt_boot+89>:
>     callq  0xffffffff81040b6c <__phys_addr>
> 0xffffffff81a017a4 <xen_load_gdt_boot+94>:    mov    %rax,%rsi
> 0xffffffff81a017a7 <xen_load_gdt_boot+97>:    shr    $0xc,%rsi
> 0xffffffff81a017ab <xen_load_gdt_boot+101>:   mov    %rsi,%rdi
> 0xffffffff81a017ae <xen_load_gdt_boot+104>:   mov    %rsi,-0x40(%rbp)
> 0xffffffff81a017b2 <xen_load_gdt_boot+108>:
>     callq  0xffffffff8100b3ae <pfn_to_mfn>
> 0xffffffff81a017b7 <xen_load_gdt_boot+113>:   mov    -0x40(%rbp),%rsi
> 0xffffffff81a017bb <xen_load_gdt_boot+117>:   mov    %rax,%rcx
> 0xffffffff81a017be <xen_load_gdt_boot+120>:   mov 
> $0x8000000000000161,%rax
> 0xffffffff81a017c8 <xen_load_gdt_boot+130>:
>     and    -0x1e351f(%rip),%rax        # 0xffffffff8181e2b0 
> <__supported_pte_mask>
> 0xffffffff81a017cf <xen_load_gdt_boot+137>:   mov    %rsi,%rdi
> 0xffffffff81a017d2 <xen_load_gdt_boot+140>:   shl    $0xc,%rdi
> 0xffffffff81a017d6 <xen_load_gdt_boot+144>:   or     %rax,%rdi
> 0xffffffff81a017d9 <xen_load_gdt_boot+147>:   callq  *0xffffffff81798470
> 0xffffffff81a017e0 <xen_load_gdt_boot+154>:   xor    %edx,%edx
> 0xffffffff81a017e2 <xen_load_gdt_boot+156>:   mov    %rax,%rsi
> 0xffffffff81a017e5 <xen_load_gdt_boot+159>:   mov    %rbx,%rdi
> 0xffffffff81a017e8 <xen_load_gdt_boot+162>:
>     callq  0xffffffff810091c0 <hypercall_page+448>
> 0xffffffff81a017ed <xen_load_gdt_boot+167>:   test   %eax,%eax
> 0xffffffff81a017ef <xen_load_gdt_boot+169>:
>     je     0xffffffff81a017f5 <xen_load_gdt_boot+175>
> 0xffffffff81a017f1 <xen_load_gdt_boot+171>:   ud2a
> 0xffffffff81a017f3 <xen_load_gdt_boot+173>:
>     jmp    0xffffffff81a017f3 <xen_load_gdt_boot+173>
> 0xffffffff81a017f5 <xen_load_gdt_boot+175>:   movslq %r15d,%rax
> 0xffffffff81a017f8 <xen_load_gdt_boot+178>:   add    $0x1000,%rbx
> 0xffffffff81a017ff <xen_load_gdt_boot+185>:   inc    %r15d
> 0xffffffff81a01802 <xen_load_gdt_boot+188>:   mov 
> %rcx,0x0(%r13,%rax,8)
> 0xffffffff81a01807 <xen_load_gdt_boot+193>:   mov    %r14,%rax
> 0xffffffff81a0180a <xen_load_gdt_boot+196>:   add    0x2(%r12),%rax
> 0xffffffff81a0180f <xen_load_gdt_boot+201>:   cmp    %rax,%rbx
> 0xffffffff81a01812 <xen_load_gdt_boot+204>:
>     jb     0xffffffff81a0179c <xen_load_gdt_boot+86>
> 0xffffffff81a01814 <xen_load_gdt_boot+206>:   mov    -0x34(%rbp),%esi
> 0xffffffff81a01817 <xen_load_gdt_boot+209>:   mov    %r13,%rdi
> 0xffffffff81a0181a <xen_load_gdt_boot+212>:   shr    $0x3,%esi

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.