Port-xen archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: recent dom0 kernels reboot on loading?
On Fri, Aug 31, 2007 at 04:02:27PM +0300, Mikolaj Golub wrote:
>
> May be this will be helpful for resolving the issue.... Booting xen kernel
> with serial console and DOM0 with vga, I get at serial console:
>
> (XEN) Xen is relinquishing VGA console.
> (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to
> Xen).
> (XEN) traps.c:390:d0 Unhandled general protection fault fault/trap [#13] in
> domain 0 on VCPU 0 [ec=0000]
> (XEN) domain_crash_sync called from entry.S (ff16a0fd)
> (XEN) Domain 0 (vcpu#0) crashed on cpu#0:
> (XEN) ----[ Xen-3.1.0 x86_32 debug=y Not tainted ]----
> (XEN) CPU: 0
> (XEN) EIP: e019:[<c04d4f84>]
> (XEN) EFLAGS: 00000246 CONTEXT: guest
> (XEN) eax: c0964264 ebx: 000003cf ecx: 00000001 edx: c0964264
> (XEN) esi: 00000000 edi: c0964260 ebp: c0a66b0c esp: c0a66ad0
> (XEN) cr0: 8005003b cr4: 000006d0 cr3: 1ea63000 cr2: 00000000
> (XEN) ds: e021 es: e021 fs: 0000 gs: 0000 ss: e021 cs: e019
> (XEN) Guest stack trace from esp=c0a66ad0:
Next would be to find where 0xc04d4f84 is in the kernel. The easiest is to
build a kernel with makeoptions DEBUG="-g",
reboot with it a see what the EIP is when it crash. Then use
gdb on netbsd.gdb to get the source info:
list *0xc04d4f84 (or whatever EIP is when the debug kernel crash).
--
Manuel Bouyer <bouyer%antioche.eu.org@localhost>
NetBSD: 26 ans d'experience feront toujours la difference
--
Home |
Main Index |
Thread Index |
Old Index