WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Re: [Fedora-xen] 2.6.31-1.2.65.xendom0.fc12.x86_64 crash on

Jeremy: More info about the dom0 kernel crash here..

-- Pasi

On Tue, Sep 15, 2009 at 01:25:35PM +0100, M A Young wrote:
> 
> >
> >gdb vmlinux
> >x/i ffffffff81a017f1
> 
> That should of course have been
> (gdb) x/i 0xffffffff81a017f1
> 0xffffffff81a017f1 <xen_load_gdt_boot+171>:   ud2a
> The context is
> (gdb) x/60i xen_load_gdt_boot
> 0xffffffff81a01746 <xen_load_gdt_boot>:       push   %rbp
> 0xffffffff81a01747 <xen_load_gdt_boot+1>:     mov    %rsp,%rbp
> 0xffffffff81a0174a <xen_load_gdt_boot+4>:     push   %r15
> 0xffffffff81a0174c <xen_load_gdt_boot+6>:     xor    %r15d,%r15d
> 0xffffffff81a0174f <xen_load_gdt_boot+9>:     push   %r14
> 0xffffffff81a01751 <xen_load_gdt_boot+11>:    push   %r13
> 0xffffffff81a01753 <xen_load_gdt_boot+13>:    push   %r12
> 0xffffffff81a01755 <xen_load_gdt_boot+15>:    mov    %rdi,%r12
> 0xffffffff81a01758 <xen_load_gdt_boot+18>:    push   %rbx
> 0xffffffff81a01759 <xen_load_gdt_boot+19>:    sub    $0x18,%rsp
> 0xffffffff81a0175d <xen_load_gdt_boot+23>:    movzwl (%rdi),%eax
> 0xffffffff81a01760 <xen_load_gdt_boot+26>:    mov    0x2(%rdi),%rbx
> 0xffffffff81a01764 <xen_load_gdt_boot+30>:    inc    %eax
> 0xffffffff81a01766 <xen_load_gdt_boot+32>:    mov    %eax,%r14d
> 0xffffffff81a01769 <xen_load_gdt_boot+35>:    mov    %eax,-0x34(%rbp)
> 0xffffffff81a0176c <xen_load_gdt_boot+38>:    lea    0xfff(%r14),%rax
> 0xffffffff81a01773 <xen_load_gdt_boot+45>:    shr    $0xc,%rax
> 0xffffffff81a01777 <xen_load_gdt_boot+49>:    lea    0x1e(,%rax,8),%rax
> 0xffffffff81a0177f <xen_load_gdt_boot+57>:    and    $0x7f0,%eax
> 0xffffffff81a01784 <xen_load_gdt_boot+62>:    sub    %rax,%rsp
> 0xffffffff81a01787 <xen_load_gdt_boot+65>:    lea    0xf(%rsp),%r13
> 0xffffffff81a0178c <xen_load_gdt_boot+70>:    and 
> $0xfffffffffffffff0,%r13
> 0xffffffff81a01790 <xen_load_gdt_boot+74>:    test   $0xfff,%ebx
> 0xffffffff81a01796 <xen_load_gdt_boot+80>:
>     je     0xffffffff81a01807 <xen_load_gdt_boot+193>
> 0xffffffff81a01798 <xen_load_gdt_boot+82>:    ud2a
> 0xffffffff81a0179a <xen_load_gdt_boot+84>:
>     jmp    0xffffffff81a0179a <xen_load_gdt_boot+84>
> 0xffffffff81a0179c <xen_load_gdt_boot+86>:    mov    %rbx,%rdi
> 0xffffffff81a0179f <xen_load_gdt_boot+89>:
>     callq  0xffffffff81040b6c <__phys_addr>
> 0xffffffff81a017a4 <xen_load_gdt_boot+94>:    mov    %rax,%rsi
> 0xffffffff81a017a7 <xen_load_gdt_boot+97>:    shr    $0xc,%rsi
> 0xffffffff81a017ab <xen_load_gdt_boot+101>:   mov    %rsi,%rdi
> 0xffffffff81a017ae <xen_load_gdt_boot+104>:   mov    %rsi,-0x40(%rbp)
> 0xffffffff81a017b2 <xen_load_gdt_boot+108>:
>     callq  0xffffffff8100b3ae <pfn_to_mfn>
> 0xffffffff81a017b7 <xen_load_gdt_boot+113>:   mov    -0x40(%rbp),%rsi
> 0xffffffff81a017bb <xen_load_gdt_boot+117>:   mov    %rax,%rcx
> 0xffffffff81a017be <xen_load_gdt_boot+120>:   mov 
> $0x8000000000000161,%rax
> 0xffffffff81a017c8 <xen_load_gdt_boot+130>:
>     and    -0x1e351f(%rip),%rax        # 0xffffffff8181e2b0 
> <__supported_pte_mask>
> 0xffffffff81a017cf <xen_load_gdt_boot+137>:   mov    %rsi,%rdi
> 0xffffffff81a017d2 <xen_load_gdt_boot+140>:   shl    $0xc,%rdi
> 0xffffffff81a017d6 <xen_load_gdt_boot+144>:   or     %rax,%rdi
> 0xffffffff81a017d9 <xen_load_gdt_boot+147>:   callq  *0xffffffff81798470
> 0xffffffff81a017e0 <xen_load_gdt_boot+154>:   xor    %edx,%edx
> 0xffffffff81a017e2 <xen_load_gdt_boot+156>:   mov    %rax,%rsi
> 0xffffffff81a017e5 <xen_load_gdt_boot+159>:   mov    %rbx,%rdi
> 0xffffffff81a017e8 <xen_load_gdt_boot+162>:
>     callq  0xffffffff810091c0 <hypercall_page+448>
> 0xffffffff81a017ed <xen_load_gdt_boot+167>:   test   %eax,%eax
> 0xffffffff81a017ef <xen_load_gdt_boot+169>:
>     je     0xffffffff81a017f5 <xen_load_gdt_boot+175>
> 0xffffffff81a017f1 <xen_load_gdt_boot+171>:   ud2a
> 0xffffffff81a017f3 <xen_load_gdt_boot+173>:
>     jmp    0xffffffff81a017f3 <xen_load_gdt_boot+173>
> 0xffffffff81a017f5 <xen_load_gdt_boot+175>:   movslq %r15d,%rax
> 0xffffffff81a017f8 <xen_load_gdt_boot+178>:   add    $0x1000,%rbx
> 0xffffffff81a017ff <xen_load_gdt_boot+185>:   inc    %r15d
> 0xffffffff81a01802 <xen_load_gdt_boot+188>:   mov 
> %rcx,0x0(%r13,%rax,8)
> 0xffffffff81a01807 <xen_load_gdt_boot+193>:   mov    %r14,%rax
> 0xffffffff81a0180a <xen_load_gdt_boot+196>:   add    0x2(%r12),%rax
> 0xffffffff81a0180f <xen_load_gdt_boot+201>:   cmp    %rax,%rbx
> 0xffffffff81a01812 <xen_load_gdt_boot+204>:
>     jb     0xffffffff81a0179c <xen_load_gdt_boot+86>
> 0xffffffff81a01814 <xen_load_gdt_boot+206>:   mov    -0x34(%rbp),%esi
> 0xffffffff81a01817 <xen_load_gdt_boot+209>:   mov    %r13,%rdi
> 0xffffffff81a0181a <xen_load_gdt_boot+212>:   shr    $0x3,%esi

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel