[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: [Fedora-xen] 2.6.31-1.2.65.xendom0.fc12.x86_64 crash on boot



Jeremy: More info about the dom0 kernel crash here..

-- Pasi

On Tue, Sep 15, 2009 at 01:25:35PM +0100, M A Young wrote:
> 
> >
> >gdb vmlinux
> >x/i ffffffff81a017f1
> 
> That should of course have been
> (gdb) x/i 0xffffffff81a017f1
> 0xffffffff81a017f1 <xen_load_gdt_boot+171>:	ud2a
> The context is
> (gdb) x/60i xen_load_gdt_boot
> 0xffffffff81a01746 <xen_load_gdt_boot>:	push   %rbp
> 0xffffffff81a01747 <xen_load_gdt_boot+1>:	mov    %rsp,%rbp
> 0xffffffff81a0174a <xen_load_gdt_boot+4>:	push   %r15
> 0xffffffff81a0174c <xen_load_gdt_boot+6>:	xor    %r15d,%r15d
> 0xffffffff81a0174f <xen_load_gdt_boot+9>:	push   %r14
> 0xffffffff81a01751 <xen_load_gdt_boot+11>:	push   %r13
> 0xffffffff81a01753 <xen_load_gdt_boot+13>:	push   %r12
> 0xffffffff81a01755 <xen_load_gdt_boot+15>:	mov    %rdi,%r12
> 0xffffffff81a01758 <xen_load_gdt_boot+18>:	push   %rbx
> 0xffffffff81a01759 <xen_load_gdt_boot+19>:	sub    $0x18,%rsp
> 0xffffffff81a0175d <xen_load_gdt_boot+23>:	movzwl (%rdi),%eax
> 0xffffffff81a01760 <xen_load_gdt_boot+26>:	mov    0x2(%rdi),%rbx
> 0xffffffff81a01764 <xen_load_gdt_boot+30>:	inc    %eax
> 0xffffffff81a01766 <xen_load_gdt_boot+32>:	mov    %eax,%r14d
> 0xffffffff81a01769 <xen_load_gdt_boot+35>:	mov    %eax,-0x34(%rbp)
> 0xffffffff81a0176c <xen_load_gdt_boot+38>:	lea    0xfff(%r14),%rax
> 0xffffffff81a01773 <xen_load_gdt_boot+45>:	shr    $0xc,%rax
> 0xffffffff81a01777 <xen_load_gdt_boot+49>:	lea    0x1e(,%rax,8),%rax
> 0xffffffff81a0177f <xen_load_gdt_boot+57>:	and    $0x7f0,%eax
> 0xffffffff81a01784 <xen_load_gdt_boot+62>:	sub    %rax,%rsp
> 0xffffffff81a01787 <xen_load_gdt_boot+65>:	lea    0xf(%rsp),%r13
> 0xffffffff81a0178c <xen_load_gdt_boot+70>:	and 
> $0xfffffffffffffff0,%r13
> 0xffffffff81a01790 <xen_load_gdt_boot+74>:	test   $0xfff,%ebx
> 0xffffffff81a01796 <xen_load_gdt_boot+80>:
>     je     0xffffffff81a01807 <xen_load_gdt_boot+193>
> 0xffffffff81a01798 <xen_load_gdt_boot+82>:	ud2a
> 0xffffffff81a0179a <xen_load_gdt_boot+84>:
>     jmp    0xffffffff81a0179a <xen_load_gdt_boot+84>
> 0xffffffff81a0179c <xen_load_gdt_boot+86>:	mov    %rbx,%rdi
> 0xffffffff81a0179f <xen_load_gdt_boot+89>:
>     callq  0xffffffff81040b6c <__phys_addr>
> 0xffffffff81a017a4 <xen_load_gdt_boot+94>:	mov    %rax,%rsi
> 0xffffffff81a017a7 <xen_load_gdt_boot+97>:	shr    $0xc,%rsi
> 0xffffffff81a017ab <xen_load_gdt_boot+101>:	mov    %rsi,%rdi
> 0xffffffff81a017ae <xen_load_gdt_boot+104>:	mov    %rsi,-0x40(%rbp)
> 0xffffffff81a017b2 <xen_load_gdt_boot+108>:
>     callq  0xffffffff8100b3ae <pfn_to_mfn>
> 0xffffffff81a017b7 <xen_load_gdt_boot+113>:	mov    -0x40(%rbp),%rsi
> 0xffffffff81a017bb <xen_load_gdt_boot+117>:	mov    %rax,%rcx
> 0xffffffff81a017be <xen_load_gdt_boot+120>:	mov 
> $0x8000000000000161,%rax
> 0xffffffff81a017c8 <xen_load_gdt_boot+130>:
>     and    -0x1e351f(%rip),%rax        # 0xffffffff8181e2b0 
> <__supported_pte_mask>
> 0xffffffff81a017cf <xen_load_gdt_boot+137>:	mov    %rsi,%rdi
> 0xffffffff81a017d2 <xen_load_gdt_boot+140>:	shl    $0xc,%rdi
> 0xffffffff81a017d6 <xen_load_gdt_boot+144>:	or     %rax,%rdi
> 0xffffffff81a017d9 <xen_load_gdt_boot+147>:	callq  *0xffffffff81798470
> 0xffffffff81a017e0 <xen_load_gdt_boot+154>:	xor    %edx,%edx
> 0xffffffff81a017e2 <xen_load_gdt_boot+156>:	mov    %rax,%rsi
> 0xffffffff81a017e5 <xen_load_gdt_boot+159>:	mov    %rbx,%rdi
> 0xffffffff81a017e8 <xen_load_gdt_boot+162>:
>     callq  0xffffffff810091c0 <hypercall_page+448>
> 0xffffffff81a017ed <xen_load_gdt_boot+167>:	test   %eax,%eax
> 0xffffffff81a017ef <xen_load_gdt_boot+169>:
>     je     0xffffffff81a017f5 <xen_load_gdt_boot+175>
> 0xffffffff81a017f1 <xen_load_gdt_boot+171>:	ud2a
> 0xffffffff81a017f3 <xen_load_gdt_boot+173>:
>     jmp    0xffffffff81a017f3 <xen_load_gdt_boot+173>
> 0xffffffff81a017f5 <xen_load_gdt_boot+175>:	movslq %r15d,%rax
> 0xffffffff81a017f8 <xen_load_gdt_boot+178>:	add    $0x1000,%rbx
> 0xffffffff81a017ff <xen_load_gdt_boot+185>:	inc    %r15d
> 0xffffffff81a01802 <xen_load_gdt_boot+188>:	mov 
> %rcx,0x0(%r13,%rax,8)
> 0xffffffff81a01807 <xen_load_gdt_boot+193>:	mov    %r14,%rax
> 0xffffffff81a0180a <xen_load_gdt_boot+196>:	add    0x2(%r12),%rax
> 0xffffffff81a0180f <xen_load_gdt_boot+201>:	cmp    %rax,%rbx
> 0xffffffff81a01812 <xen_load_gdt_boot+204>:
>     jb     0xffffffff81a0179c <xen_load_gdt_boot+86>
> 0xffffffff81a01814 <xen_load_gdt_boot+206>:	mov    -0x34(%rbp),%esi
> 0xffffffff81a01817 <xen_load_gdt_boot+209>:	mov    %r13,%rdi
> 0xffffffff81a0181a <xen_load_gdt_boot+212>:	shr    $0x3,%esi


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]