[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] pvops dom0 work roadmap



On Wed, 19 Aug 2009, Jeremy Fitzhardinge wrote:

On 08/19/09 08:27, M A Young wrote:
On Tue, 18 Aug 2009, Jeremy Fitzhardinge wrote:

   * make sure rebase/master is fairly functional and somewhat stable
   * rename rebase/* to xen/*
   * use it as the baseline dom0 and domU kernel in xen-unstable

I have had problems booting rebase/master on i686 for some time now.
The most recent crash looks different, and might be a STACKPROTECTOR
issue (which I just turned back on). The log ends

What happens before then?  What stage is it at?

The previous problem gets a bit further, then reboots (in earlier builds I think it hung) after (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen)
(XEN) Freed 116kB init memory.
mapping kernel into physical memory
Xen: setup ISA identity maps
about to get started...
(XEN) ioapic_guest_write: apic=0, pin=0, old_irq=0, new_irq=-1
(XEN) ioapic_guest_write: old_entry=000009f0, new_entry=00010900
(XEN) ioapic_guest_write: Attempt to remove IO-APIC pin of in-use IRQ!
(XEN) ioapic_guest_write: apic=0, pin=4, old_irq=4, new_irq=-1
(XEN) ioapic_guest_write: old_entry=000009f1, new_entry=00010900
(XEN) ioapic_guest_write: Attempt to remove IO-APIC pin of in-use IRQ!


(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch
input to Xen)
(XEN) Freed 116kB init memory.
(XEN) d0:v0: unhandled page fault (ec=0000)
(XEN) Pagetable walk from 00000014:
(XEN)  L3[0x000] = 000000001bc03001 00001c03
(XEN)  L2[0x000] = 0000000000000000 ffffffff
(XEN) domain_crash_sync called from entry.S (ff1b1cbe)
(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
(XEN) ----[ Xen-3.4.1  x86_32p  debug=n  Not tainted ]----
(XEN) CPU:    0
(XEN) EIP:    e019:[<c0aaa9d0>]

What does this correspond to?

(gdb) x/i 0xc0aaa9d0
0xc0aaa9d0 <xen_init_irq_ops+23>: mov    %gs:0x14,%eax
the context is
0xc0aaa9b9 <xen_init_irq_ops>:    push   %ebp
0xc0aaa9ba <xen_init_irq_ops+1>:  mov    $0x7,%ecx
0xc0aaa9bf <xen_init_irq_ops+6>:  mov    %esp,%ebp
0xc0aaa9c1 <xen_init_irq_ops+8>:  push   %edi
0xc0aaa9c2 <xen_init_irq_ops+9>:  mov    $0xc0a147b8,%edi
0xc0aaa9c7 <xen_init_irq_ops+14>: push   %esi
0xc0aaa9c8 <xen_init_irq_ops+15>: mov    $0xc0ae739c,%esi
0xc0aaa9cd <xen_init_irq_ops+20>: sub    $0x4,%esp
0xc0aaa9d0 <xen_init_irq_ops+23>: mov    %gs:0x14,%eax
0xc0aaa9d6 <xen_init_irq_ops+29>: mov    %eax,-0xc(%ebp)
0xc0aaa9d9 <xen_init_irq_ops+32>: xor    %eax,%eax
0xc0aaa9db <xen_init_irq_ops+34>: rep movsl %ds:(%esi),%es:(%edi)
0xc0aaa9dd <xen_init_irq_ops+36>: mov    -0xc(%ebp),%eax
0xc0aaa9e0 <xen_init_irq_ops+39>: xor    %gs:0x14,%eax
0xc0aaa9e7 <xen_init_irq_ops+46>: je     0xc0aaa9ee <xen_init_irq_ops+53>

        Michael Young

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.