[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] gdbserver-xen frustration on x86_64



Keir Fraser writes:
 > I'm afraid the simple answer is that gdbserver-xen spends a lot of the time
 > broken in one way or another because none of the core developers use it or
 > test it. In this case it looks like guest memory can't be accessed for some
 > reason -- do you get similar messages if you try to use
 > tools/xentrace/xenctx binary on this VM? It looks like it might not be too
 > hard to fix this particular issue, since it's rather un-subtle. :-)

Thank you for the suggestion.

I have not used tools/xentrace/xenctx before, but it looks as if it is working
okay. I append its output below, followed by the corresponding output from
xengdb (using gdbserver-xen). I tried xenctx on its own, then I attached
gdbserver-xen to the VM, and used both together, so they should produce the same
stack trace.

What further diagnostic information would be useful ?

Tim


trb@elysium ~ OK sudo /usr/lib/xen/bin/xenctx --stack-trace -f -s 
/xen/boot/System.map-2.6.18-pmm 4
rip: ffffffff802063aa hypercall_page+0x3aa
rsp: ffffffff806c9f10
rax: 00000000   rbx: 00000000   rcx: ffffffff802063aa   rdx: deadbeef
rsi: deadbeef   rdi: deadbeef   rbp: ffffffff806c9f48
 r8: 00000011    r9: ffffffff8071fe58   r10: 100031311  r11: 00000246
r12: 00000000   r13: 00000000   r14: 00000000   r15: 00000000
 cs: 0000e033    ds: 00000000    fs: 00000000    gs: 00000000

Stack:
 0000000000000000 000121efe71d8a36 ffffffff8020e8c3 000121efe71d8a36
 0000000000000000 ffffffff806c9f48 ffffffff806ff004 ffffffff806c9f58
 ffffffff80209455 ffffffff806c9f78 ffffffff80208cba 0000000000000000
 0000000000000800 ffffffff806c9f88 ffffffff802073b6 ffffffff806c9fa8

Code:
00 00 00 00 00 00 00 00 00 00 00 51 41 53 b8 1d 00 00 00 0f 05 <41> 5b 59 c3 00 
00 00 00 00 00 00 

Stack Trace:
* [<ffffffff802063aa>] hypercall_page+0x3aa <--
|   0000000000000000   
|   000121efe71d8a36   
|   ffffffff8020e8c3   
|   000121efe71d8a36   
|   0000000000000000   
|   ffffffff806c9f48   
|   ffffffff806ff004   
|-- ffffffff806c9f58
| [<ffffffff80209455>] xen_idle+0x75
|-- ffffffff806c9f78
| [<ffffffff80208cba>] cpu_idle+0x5a
|   0000000000000000   
|   0000000000000800   
|-- ffffffff806c9f88
| [<ffffffff802073b6>] rest_init+0x26
|-- ffffffff806c9fa8
| [<ffffffff806d28d5>] start_kernel+0x275
|   0000000000000000   
|   ffffffff8070c180   
|-- ffffffff806c9fe8
| [<ffffffff806d220d>] __init_begin+0x20d
|   ffff800000000000   
|   ffff804000000000   
|   00000007ffffffff   
|   0000000000000000   
|   0000000000000000   
|   0000000000000000   
|-- 0000000000000000
trb@elysium ~ OK 


trb@elysium ~ OK sudo gdbserver-xen 127.0.0.1:9999 --attach 4
Attached; pid = 4
Listening on port 9999
Remote debugging from host 127.0.0.1

trb@elysium /usr/local/src/linux-2.6.18-xen-pmm OK xengdb 
/xen/boot/vmlinux-syms-2.6.18-pmm
GNU gdb 6.2.1
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "x86_64-unknown-linux-gnu"...Using host libthread_db 
library "/lib/libthread_db.so.1".

(gdb) set architecture i386:x86-64:intel
The target architecture is assumed to be i386:x86-64:intel
(gdb) target remote 127.0.0.1:9999
Remote debugging using 127.0.0.1:9999
[New Thread 0]
[Switching to Thread 0]
0xffffffff802063aa in hypercall_page ()
(gdb) bt
#0  0xffffffff802063aa in hypercall_page ()
Cannot access memory at address 0xffffffff806c9f20
(gdb) 

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.