Hi Keil,
The assemble of ec_bind_virq_to_irq() are different between the points
where the kernel hasn't yet started running and where the panic
happens. I set a write watch point for the changed place, but nothing
happens before panic. I posted my debug processes below for your
information.
I removed two cmn_err() lines in ec_bind_virq_to_irq() which I added
for debugging. So the offset is different from the last post.
krtld: Unused kernel arguments: `xen_processor_pmbits=0'.
Loading kmdb...
Welcome to kmdb
kmdb: unable to determine terminal type: assuming `vt100'
Loaded modules: [ unix krtld genunix ]
[0]> ec_bind_virq_to_irq+0x90::dis
ec_bind_virq_to_irq+0x90: sti
ec_bind_virq_to_irq+0x91: movq %r13,%rdi
ec_bind_virq_to_irq+0x94: call +0x16d37 <mutex_exit>
ec_bind_virq_to_irq+0x99:
movswl 0xfffffffffbc46ac0(%r12),%eax <virq_info+0x200>
<< this line of code corrupt before panic
ec_bind_virq_to_irq+0xa2: popq %r14
ec_bind_virq_to_irq+0xa4: popq %r13
ec_bind_virq_to_irq+0xa6: popq %r12
ec_bind_virq_to_irq+0xa8: popq %rbx
ec_bind_virq_to_irq+0xa9: leave
ec_bind_virq_to_irq+0xaa: ret
ec_bind_virq_to_irq+0xab: leaq +0x110296(%rip),%rdi
<0xfffffffffb956fd8>
[0]> ec_bind_virq_to_irq+0x90::wp -w -L 8
[0]> ec_bind_virq_to_irq+0x98::wp -w -L 8
[0]> ec_bind_virq_to_irq+0xa0::wp -w -L 2
[0]> $b
ID S TA HT LM Description Action
----- - -- -- -- ---------------------------------------- ----------------------
[ 1 ] + 0 0 stop on write of [ec_bind_virq_to_irq+0x -
[ 2 ] + 0 0 stop on write of [ec_bind_virq_to_irq+0x -
[ 3 ] + 0 0 stop on write of [ec_bind_virq_to_irq+0x -
[0]> :c
WARNING: Cannot extract revision on this hypervisor version:
v-unstable-xvm, unexpected version format
v3.3-unstable-xvm chgset 'Tue Oct 14 12:54:19 2008 +0800 17779:88ed7e891155'
SunOS Release 5.11 Version onnv-98 64-bit
Copyright 1983-2008 Sun Microsystems, Inc. All rights reserved.
Use is subject to license terms.
DEBUG enabled
panic[cpu0]/thread=fffffffffbc736e0: BAD TRAP: type=e (#pf Page fault)
rp=fffffffffbca6090 addr=d occurred in module "unix" due to a NULL
pointer dereference
#pf Page fault
Bad kernel fault at addr=0xd
pid=0, pc=0xfffffffffb846d29, sp=0xfffffffffbca6180, eflags=0x10246
cr0: 8005003b<pg,wp,ne,et,ts,mp,pe> cr4: 2620<vmxe,xmme,fxsr,pae>
cr2: d
rdi: 286 rsi: 0 rdx: fffffffe
rcx: 1 r8: 0 r9: 40000
rax: d rbx: 0 rbp: fffffffffbca61c0
r10: fffffffffbc74ab0 r11: ffffff012fe59000 r12: 0
r13: fffffffffbcb6dc0 r14: 1 r15: ffffff0135a8d580
fsb: 200000000 gsb: fffffffffbc74ab0 ds: 0
es: 0 fs: 0 gs: 0
trp: e err: 2 rip: fffffffffb846d29
cs: e030 rfl: 10246 rsp: fffffffffbca6180
ss: e02b
cpu address timestamp type vc handler pc
0 fffffffffbc20f18 6afbf91146 trap e #pf ec_bind_virq_to_irq+99
0 fffffffffbc20d90 6afb5cd249 intr 104 cbe_fire inflate_fast+112
0 fffffffffbc20c08 6afb155e6b intr 13 uhci_intr HYPERVISOR_sched_op+29
0 fffffffffbc20a80 6afb02521b intr 13 uhci_intr HYPERVISOR_sched_op+29
0 fffffffffbc208f8 6afaeef1e9 intr 13 uhci_intr HYPERVISOR_sched_op+29
0 fffffffffbc20770 6afad1750e intr 13 uhci_intr HYPERVISOR_sched_op+29
0 fffffffffbc205e8 6afab239db intr 13 uhci_intr HYPERVISOR_sched_op+29
0 fffffffffbc20460 6afa8da042 intr 13 uhci_intr HYPERVISOR_sched_op+29
0 fffffffffbc202d8 6afa725ad3 intr 13 uhci_intr copy_pattern+1f
0 fffffffffbc20150 6afa618a15 intr 13 uhci_intr HYPERVISOR_sched_op+29
fffffffffbca5f50 unix:die+d2 ()
fffffffffbca6080 unix:trap+162f ()
fffffffffbca6090 unix:cmntrap+24d ()
fffffffffbca61c0 unix:ec_bind_virq_to_irq+99 ()
fffffffffbca61f0 xpv_psm:xen_psm_cpu_start+4b ()
fffffffffbca6210 unix:mach_cpu_start+4a ()
fffffffffbca6270 unix:start_cpu+5e ()
fffffffffbca62b0 unix:start_other_cpus+db ()
fffffffffbca62f0 genunix:main+2bf ()
fffffffffbca6300 unix:_locore_start+80 ()
panic: entering debugger (no dump device, continue to reboot)
Loaded modules: [ scsi_vhci neti xpv_psm zfs uhci hook ip usba specfs sctp arp
xpv_uppc ]
kmdb: target stopped at:
kmdb_enter+0xb: movq %rax,%rdi
[0]> ec_bind_virq_to_irq+0x90::dis
ec_bind_virq_to_irq+0x90: sti
ec_bind_virq_to_irq+0x91: movq %r13,%rdi
ec_bind_virq_to_irq+0x94: call +0x16d37 <mutex_exit>
ec_bind_virq_to_irq+0x99: addb %al,(%rax)
<< assemble after corrupt
ec_bind_virq_to_irq+0x9b: addb %al,(%rax)
ec_bind_virq_to_irq+0x9d: addb %al,(%rax)
ec_bind_virq_to_irq+0x9f: addb %al,(%rax)
ec_bind_virq_to_irq+0xa1: sti
ec_bind_virq_to_irq+0xa2: popq %r14
ec_bind_virq_to_irq+0xa4: popq %r13
ec_bind_virq_to_irq+0xa6: popq %r12
[0]> ::dis
ec_bind_virq_to_irq+0xa8: popq %rbx
ec_bind_virq_to_irq+0xa9: leave
ec_bind_virq_to_irq+0xaa: ret
ec_bind_virq_to_irq+0xab: leaq +0x110296(%rip),%rdi
<0xfffffffffb956fd8>
[0]>
End of debugging information.
Thanks,
-Baolu
On Wed, Oct 15, 2008 at 5:13 PM, Juergen Keil <[EMAIL PROTECTED]> wrote:
>> This panic happened between line 729 and 730. The disassemble of this code
>> is:
>>
>> [0]> ec_bind_virq_to_irq::dis
>> ec_bind_virq_to_irq+0x95: call -0x97a <alloc_irq>
>> ec_bind_virq_to_irq+0x9a:
>> movw %ax,0xfffffffffbc46ac0(%r12) <virq_info+0x200>
>> ec_bind_virq_to_irq+0xa3: movq %r13,%rdi
>> ec_bind_virq_to_irq+0xa6: call +0x16d35 <mutex_exit>
>> ec_bind_virq_to_irq+0xab: addb %al,(%rax)
>> ec_bind_virq_to_irq+0xad: addb %al,(%rax)
>> ec_bind_virq_to_irq+0xaf: addb %al,(%rax)
>> ec_bind_virq_to_irq+0xb1: addb %al,(%rax)
>> ec_bind_virq_to_irq+0xb3: sti
>> ec_bind_virq_to_irq+0xb4: popq %r14
>> ec_bind_virq_to_irq+0xb6: popq %r13
>> ec_bind_virq_to_irq+0xb8: popq %r12
>> ec_bind_virq_to_irq+0xba: popq %rbx
>> ec_bind_virq_to_irq+0xbb: leave
>> ec_bind_virq_to_irq+0xbc: ret
>
>
> The code starting at ec_bind_virq_to_irq+0xab looks corrupted.
>
> Seems as if someone stored a 64-bit "0" to that location, corrupting
> the original code.
>
>
> When you boot the dom0 kernel with options "-kd" and disassemble
> ec_bind_virq_to_irq+0xab (before the kernel starts running),
> does the code look different?
>
> In case it's already corrupted before the kernel starts running:
> try to check the dom0 kernel binary /platform/i86xpv/kernel/amd64/unix
> with "dis -F ec_bind_virq_to_irq /platform/i86xpv/kernel/amd64/unix",
> check if ec_bind_virq_to_irq+0xab contains reasonble code there.
>
>
> If case the corruption happens at kernel runtime, it might be possble
> to find the source of the corruption using kmdb and a write watchpoint:
>
> ec_bind_virq_to_irq+0xab::wp -w -L 8
>
>
>
_______________________________________________
xen-discuss mailing list
[email protected]