[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: [Fedora-xen] Xen 3.4.1 dom0 crash on boot





gdb vmlinux
x/i ffffffff81a017f1

That should of course have been
(gdb) x/i 0xffffffff81a017f1
0xffffffff81a017f1 <xen_load_gdt_boot+171>:	ud2a
The context is
(gdb) x/60i xen_load_gdt_boot
0xffffffff81a01746 <xen_load_gdt_boot>:	push   %rbp
0xffffffff81a01747 <xen_load_gdt_boot+1>:	mov    %rsp,%rbp
0xffffffff81a0174a <xen_load_gdt_boot+4>:	push   %r15
0xffffffff81a0174c <xen_load_gdt_boot+6>:	xor    %r15d,%r15d
0xffffffff81a0174f <xen_load_gdt_boot+9>:	push   %r14
0xffffffff81a01751 <xen_load_gdt_boot+11>:	push   %r13
0xffffffff81a01753 <xen_load_gdt_boot+13>:	push   %r12
0xffffffff81a01755 <xen_load_gdt_boot+15>:	mov    %rdi,%r12
0xffffffff81a01758 <xen_load_gdt_boot+18>:	push   %rbx
0xffffffff81a01759 <xen_load_gdt_boot+19>:	sub    $0x18,%rsp
0xffffffff81a0175d <xen_load_gdt_boot+23>:	movzwl (%rdi),%eax
0xffffffff81a01760 <xen_load_gdt_boot+26>:	mov    0x2(%rdi),%rbx
0xffffffff81a01764 <xen_load_gdt_boot+30>:	inc    %eax
0xffffffff81a01766 <xen_load_gdt_boot+32>:	mov    %eax,%r14d
0xffffffff81a01769 <xen_load_gdt_boot+35>:	mov    %eax,-0x34(%rbp)
0xffffffff81a0176c <xen_load_gdt_boot+38>:	lea    0xfff(%r14),%rax
0xffffffff81a01773 <xen_load_gdt_boot+45>:	shr    $0xc,%rax
0xffffffff81a01777 <xen_load_gdt_boot+49>:	lea    0x1e(,%rax,8),%rax
0xffffffff81a0177f <xen_load_gdt_boot+57>:	and    $0x7f0,%eax
0xffffffff81a01784 <xen_load_gdt_boot+62>:	sub    %rax,%rsp
0xffffffff81a01787 <xen_load_gdt_boot+65>:	lea    0xf(%rsp),%r13
0xffffffff81a0178c <xen_load_gdt_boot+70>: and $0xfffffffffffffff0,%r13
0xffffffff81a01790 <xen_load_gdt_boot+74>:	test   $0xfff,%ebx
0xffffffff81a01796 <xen_load_gdt_boot+80>:
    je     0xffffffff81a01807 <xen_load_gdt_boot+193>
0xffffffff81a01798 <xen_load_gdt_boot+82>:	ud2a
0xffffffff81a0179a <xen_load_gdt_boot+84>:
    jmp    0xffffffff81a0179a <xen_load_gdt_boot+84>
0xffffffff81a0179c <xen_load_gdt_boot+86>:	mov    %rbx,%rdi
0xffffffff81a0179f <xen_load_gdt_boot+89>:
    callq  0xffffffff81040b6c <__phys_addr>
0xffffffff81a017a4 <xen_load_gdt_boot+94>:	mov    %rax,%rsi
0xffffffff81a017a7 <xen_load_gdt_boot+97>:	shr    $0xc,%rsi
0xffffffff81a017ab <xen_load_gdt_boot+101>:	mov    %rsi,%rdi
0xffffffff81a017ae <xen_load_gdt_boot+104>:	mov    %rsi,-0x40(%rbp)
0xffffffff81a017b2 <xen_load_gdt_boot+108>:
    callq  0xffffffff8100b3ae <pfn_to_mfn>
0xffffffff81a017b7 <xen_load_gdt_boot+113>:	mov    -0x40(%rbp),%rsi
0xffffffff81a017bb <xen_load_gdt_boot+117>:	mov    %rax,%rcx
0xffffffff81a017be <xen_load_gdt_boot+120>: mov $0x8000000000000161,%rax
0xffffffff81a017c8 <xen_load_gdt_boot+130>:
and -0x1e351f(%rip),%rax # 0xffffffff8181e2b0 <__supported_pte_mask>
0xffffffff81a017cf <xen_load_gdt_boot+137>:	mov    %rsi,%rdi
0xffffffff81a017d2 <xen_load_gdt_boot+140>:	shl    $0xc,%rdi
0xffffffff81a017d6 <xen_load_gdt_boot+144>:	or     %rax,%rdi
0xffffffff81a017d9 <xen_load_gdt_boot+147>:	callq  *0xffffffff81798470
0xffffffff81a017e0 <xen_load_gdt_boot+154>:	xor    %edx,%edx
0xffffffff81a017e2 <xen_load_gdt_boot+156>:	mov    %rax,%rsi
0xffffffff81a017e5 <xen_load_gdt_boot+159>:	mov    %rbx,%rdi
0xffffffff81a017e8 <xen_load_gdt_boot+162>:
    callq  0xffffffff810091c0 <hypercall_page+448>
0xffffffff81a017ed <xen_load_gdt_boot+167>:	test   %eax,%eax
0xffffffff81a017ef <xen_load_gdt_boot+169>:
    je     0xffffffff81a017f5 <xen_load_gdt_boot+175>
0xffffffff81a017f1 <xen_load_gdt_boot+171>:	ud2a
0xffffffff81a017f3 <xen_load_gdt_boot+173>:
    jmp    0xffffffff81a017f3 <xen_load_gdt_boot+173>
0xffffffff81a017f5 <xen_load_gdt_boot+175>:	movslq %r15d,%rax
0xffffffff81a017f8 <xen_load_gdt_boot+178>:	add    $0x1000,%rbx
0xffffffff81a017ff <xen_load_gdt_boot+185>:	inc    %r15d
0xffffffff81a01802 <xen_load_gdt_boot+188>: mov %rcx,0x0(%r13,%rax,8)
0xffffffff81a01807 <xen_load_gdt_boot+193>:	mov    %r14,%rax
0xffffffff81a0180a <xen_load_gdt_boot+196>:	add    0x2(%r12),%rax
0xffffffff81a0180f <xen_load_gdt_boot+201>:	cmp    %rax,%rbx
0xffffffff81a01812 <xen_load_gdt_boot+204>:
    jb     0xffffffff81a0179c <xen_load_gdt_boot+86>
0xffffffff81a01814 <xen_load_gdt_boot+206>:	mov    -0x34(%rbp),%esi
0xffffffff81a01817 <xen_load_gdt_boot+209>:	mov    %r13,%rdi
0xffffffff81a0181a <xen_load_gdt_boot+212>:	shr    $0x3,%esi


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]