Jeremy: More info about the dom0 kernel crash here..
-- Pasi
On Tue, Sep 15, 2009 at 01:25:35PM +0100, M A Young wrote:
>
> >
> >gdb vmlinux
> >x/i ffffffff81a017f1
>
> That should of course have been
> (gdb) x/i 0xffffffff81a017f1
> 0xffffffff81a017f1 <xen_load_gdt_boot+171>: ud2a
> The context is
> (gdb) x/60i xen_load_gdt_boot
> 0xffffffff81a01746 <xen_load_gdt_boot>: push %rbp
> 0xffffffff81a01747 <xen_load_gdt_boot+1>: mov %rsp,%rbp
> 0xffffffff81a0174a <xen_load_gdt_boot+4>: push %r15
> 0xffffffff81a0174c <xen_load_gdt_boot+6>: xor %r15d,%r15d
> 0xffffffff81a0174f <xen_load_gdt_boot+9>: push %r14
> 0xffffffff81a01751 <xen_load_gdt_boot+11>: push %r13
> 0xffffffff81a01753 <xen_load_gdt_boot+13>: push %r12
> 0xffffffff81a01755 <xen_load_gdt_boot+15>: mov %rdi,%r12
> 0xffffffff81a01758 <xen_load_gdt_boot+18>: push %rbx
> 0xffffffff81a01759 <xen_load_gdt_boot+19>: sub $0x18,%rsp
> 0xffffffff81a0175d <xen_load_gdt_boot+23>: movzwl (%rdi),%eax
> 0xffffffff81a01760 <xen_load_gdt_boot+26>: mov 0x2(%rdi),%rbx
> 0xffffffff81a01764 <xen_load_gdt_boot+30>: inc %eax
> 0xffffffff81a01766 <xen_load_gdt_boot+32>: mov %eax,%r14d
> 0xffffffff81a01769 <xen_load_gdt_boot+35>: mov %eax,-0x34(%rbp)
> 0xffffffff81a0176c <xen_load_gdt_boot+38>: lea 0xfff(%r14),%rax
> 0xffffffff81a01773 <xen_load_gdt_boot+45>: shr $0xc,%rax
> 0xffffffff81a01777 <xen_load_gdt_boot+49>: lea 0x1e(,%rax,8),%rax
> 0xffffffff81a0177f <xen_load_gdt_boot+57>: and $0x7f0,%eax
> 0xffffffff81a01784 <xen_load_gdt_boot+62>: sub %rax,%rsp
> 0xffffffff81a01787 <xen_load_gdt_boot+65>: lea 0xf(%rsp),%r13
> 0xffffffff81a0178c <xen_load_gdt_boot+70>: and
> $0xfffffffffffffff0,%r13
> 0xffffffff81a01790 <xen_load_gdt_boot+74>: test $0xfff,%ebx
> 0xffffffff81a01796 <xen_load_gdt_boot+80>:
> je 0xffffffff81a01807 <xen_load_gdt_boot+193>
> 0xffffffff81a01798 <xen_load_gdt_boot+82>: ud2a
> 0xffffffff81a0179a <xen_load_gdt_boot+84>:
> jmp 0xffffffff81a0179a <xen_load_gdt_boot+84>
> 0xffffffff81a0179c <xen_load_gdt_boot+86>: mov %rbx,%rdi
> 0xffffffff81a0179f <xen_load_gdt_boot+89>:
> callq 0xffffffff81040b6c <__phys_addr>
> 0xffffffff81a017a4 <xen_load_gdt_boot+94>: mov %rax,%rsi
> 0xffffffff81a017a7 <xen_load_gdt_boot+97>: shr $0xc,%rsi
> 0xffffffff81a017ab <xen_load_gdt_boot+101>: mov %rsi,%rdi
> 0xffffffff81a017ae <xen_load_gdt_boot+104>: mov %rsi,-0x40(%rbp)
> 0xffffffff81a017b2 <xen_load_gdt_boot+108>:
> callq 0xffffffff8100b3ae <pfn_to_mfn>
> 0xffffffff81a017b7 <xen_load_gdt_boot+113>: mov -0x40(%rbp),%rsi
> 0xffffffff81a017bb <xen_load_gdt_boot+117>: mov %rax,%rcx
> 0xffffffff81a017be <xen_load_gdt_boot+120>: mov
> $0x8000000000000161,%rax
> 0xffffffff81a017c8 <xen_load_gdt_boot+130>:
> and -0x1e351f(%rip),%rax # 0xffffffff8181e2b0
> <__supported_pte_mask>
> 0xffffffff81a017cf <xen_load_gdt_boot+137>: mov %rsi,%rdi
> 0xffffffff81a017d2 <xen_load_gdt_boot+140>: shl $0xc,%rdi
> 0xffffffff81a017d6 <xen_load_gdt_boot+144>: or %rax,%rdi
> 0xffffffff81a017d9 <xen_load_gdt_boot+147>: callq *0xffffffff81798470
> 0xffffffff81a017e0 <xen_load_gdt_boot+154>: xor %edx,%edx
> 0xffffffff81a017e2 <xen_load_gdt_boot+156>: mov %rax,%rsi
> 0xffffffff81a017e5 <xen_load_gdt_boot+159>: mov %rbx,%rdi
> 0xffffffff81a017e8 <xen_load_gdt_boot+162>:
> callq 0xffffffff810091c0 <hypercall_page+448>
> 0xffffffff81a017ed <xen_load_gdt_boot+167>: test %eax,%eax
> 0xffffffff81a017ef <xen_load_gdt_boot+169>:
> je 0xffffffff81a017f5 <xen_load_gdt_boot+175>
> 0xffffffff81a017f1 <xen_load_gdt_boot+171>: ud2a
> 0xffffffff81a017f3 <xen_load_gdt_boot+173>:
> jmp 0xffffffff81a017f3 <xen_load_gdt_boot+173>
> 0xffffffff81a017f5 <xen_load_gdt_boot+175>: movslq %r15d,%rax
> 0xffffffff81a017f8 <xen_load_gdt_boot+178>: add $0x1000,%rbx
> 0xffffffff81a017ff <xen_load_gdt_boot+185>: inc %r15d
> 0xffffffff81a01802 <xen_load_gdt_boot+188>: mov
> %rcx,0x0(%r13,%rax,8)
> 0xffffffff81a01807 <xen_load_gdt_boot+193>: mov %r14,%rax
> 0xffffffff81a0180a <xen_load_gdt_boot+196>: add 0x2(%r12),%rax
> 0xffffffff81a0180f <xen_load_gdt_boot+201>: cmp %rax,%rbx
> 0xffffffff81a01812 <xen_load_gdt_boot+204>:
> jb 0xffffffff81a0179c <xen_load_gdt_boot+86>
> 0xffffffff81a01814 <xen_load_gdt_boot+206>: mov -0x34(%rbp),%esi
> 0xffffffff81a01817 <xen_load_gdt_boot+209>: mov %r13,%rdi
> 0xffffffff81a0181a <xen_load_gdt_boot+212>: shr $0x3,%esi
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|