Linux Archive

Linux Archive (http://www.linux-archive.org/)
-   Crash Utility (http://www.linux-archive.org/crash-utility/)
-   -   Linux Banner string missing. (http://www.linux-archive.org/crash-utility/430434-linux-banner-string-missing.html)

Dave Anderson 09-22-2010 03:37 PM

Linux Banner string missing.
 
----- "Feng LI" <funglee@gmail.com> wrote:

> Hey Dave and list,
>
>
> I am the guy who is try to open the 64 bit vmcore dump with 64 bit xen
> kernel and 32 bit dom0 kernel.
>
>
> Finally, I have received the dom0 kernel with symbols, and I tried to
> open the vmcore with crash (I patched with your "special patch").
>
>
> But I have a new problem, the crash utility exits with an error "could
> not read linux_banner string"
>
>
> <readmem: c034c000, KVADDR, "accessible check", 4, (ROE|Q), ffff82e4>
> addr: c034c000 paddr: 34c000 cnt: 4
> <readmem: c034c000, KVADDR, "readstring characters", 1499, (ROE|Q),
> ffff72d0>
> addr: c034c000 paddr: 34c000 cnt: 1499
> WARNING: cannot read linux_banner string
> linux_banner:
>
>
> crash32: boot/System.map-2.6.27.42-0.1.1.xs5.6.0.44.111158xen and
> vmcore-2010-09-15-19-29-03 do not match!
>
> Have you seen these error message before ? and Thanks for any help and
> suggestion.
>
>
> yours
> Kevin F LI
>
>
> ps.
> I attached the log file generated with "-d 31" option.

Looking at the attached log file, things are regressing even further
than what was shown in your original reports. This time the vmcore
is not even being recognized as a Xen-generated core dump:

...
page_size: 0
switch_stack: 0
xen_kdump_data: (unused) <== this time
num_prstatus_notes: 0
vmcoreinfo: 0
size_vmcoreinfo: 0
nt_prstatus_percpu:
...

In your older post, it at least showed some xen_kdump_data:

...
page_size: 0
switch_stack: 0
xen_kdump_data:
flags: 4 (KDUMP_MFN_LIST)
p2m_mfn: 0
cr3: 0
last_mfn_read: ffffffff
last_pmd_read: ffffffff
page: 0
accesses: 0
cache_hits: 0
p2m_frames: 0
xen_phys_start: 7db00000
xen_major_version: 3
xen_minor_version: 0
p2m_mfn_frame_list: 0
num_prstatus_notes: 4
vmcoreinfo: 0
size_vmcoreinfo: 0
nt_prstatus_percpu:
084c8e10 084c9004 084c9198 084c932c
...

That may be due to the use of a System.map file, which forces
the crash utility to take some short-cuts during initialization.
Or again, it could be a side issue of the lack of crash utility
support for 32-bit vmcores taken from 64-bit Xen hypervisors.

But since you've apparently got the debuginfo-full dom0 vmlinux
file, then there's not need to use the System.map file. What
happens when you just run: "crash -d1 vmlinux vmcore"?

Dave


--
Crash-utility mailing list
Crash-utility@redhat.com
https://www.redhat.com/mailman/listinfo/crash-utility

"LI, Feng" 09-22-2010 09:00 PM

Linux Banner string missing.
 
Dave,*
I regenerate the vmcore dump file to make sure I used the correct version of dom0 which we have unstripped kernel from critix.*
The*p2m_mfn pointer is still empty... :( I attached the output we have .. :(*
Too bad... It seems that I am going no where.*&*Thanks for your help.

YoursKevin F. Li*

P.S.
I did cat /proc/iomem before I generate the vmcore dump.

it shows
9ead4000-9fb2cfff : System RAM**9f700000-9f8dca7f : Hypervisor code and data
** *9f899ca0-9f899e93 : Crash note** *9f899e94-9f89a027 : Crash note** *9f89a088-9f89a21b : Crash note** *9f89a27c-9f89a40f : Crash note
is this information *helpful to you ?*





On Wed, Sep 22, 2010 at 11:37 AM, Dave Anderson <anderson@redhat.com> wrote:



----- "Feng LI" <funglee@gmail.com> wrote:



> Hey Dave and list,

>

>

> I am the guy who is try to open the 64 bit vmcore dump with 64 bit xen

> kernel and 32 bit dom0 kernel.

>

>

> Finally, I have received the dom0 kernel with symbols, and I tried to

> open the vmcore with crash (I patched with your "special patch").

>

>

> But I have a new problem, the crash utility exits with an error "could

> not read linux_banner string"

>

>

> <readmem: c034c000, KVADDR, "accessible check", 4, (ROE|Q), ffff82e4>

> addr: c034c000 paddr: 34c000 cnt: 4

> <readmem: c034c000, KVADDR, "readstring characters", 1499, (ROE|Q),

> ffff72d0>

> addr: c034c000 paddr: 34c000 cnt: 1499

> WARNING: cannot read linux_banner string

> linux_banner:

>

>

> crash32: boot/System.map-2.6.27.42-0.1.1.xs5.6.0.44.111158xen and

> vmcore-2010-09-15-19-29-03 do not match!

>

> Have you seen these error message before ? and Thanks for any help and

> suggestion.

>

>

> yours

> Kevin F LI

>

>

> ps.

> I attached the log file generated with "-d 31" option.



Looking at the attached log file, things are regressing even further

than what was shown in your original reports. *This time the vmcore

is not even being recognized as a Xen-generated core dump:



* * * ...

* * * * * * *page_size: 0

* * * * * switch_stack: 0

* * * * xen_kdump_data: (unused) * <== this time

* * * num_prstatus_notes: 0

* * * * * * * vmcoreinfo: 0

* * * * *size_vmcoreinfo: 0

* * * nt_prstatus_percpu:

* * * ...



In your older post, it at least showed some xen_kdump_data:



* * * *...

* * * * * * *page_size: 0

* * * * * switch_stack: 0

* * * * xen_kdump_data:

* * * * * * * * * *flags: 4 (KDUMP_MFN_LIST)

* * * * * * * * *p2m_mfn: 0

* * * * * * * * * * *cr3: 0

* * * * * *last_mfn_read: ffffffff

* * * * * *last_pmd_read: ffffffff

* * * * * * * * * * page: 0

* * * * * * * * accesses: 0

* * * * * * * cache_hits: 0

* * * * * * * p2m_frames: 0

* * * * * xen_phys_start: 7db00000

* * * *xen_major_version: 3

* * * *xen_minor_version: 0

* * * p2m_mfn_frame_list: 0

* * * num_prstatus_notes: 4

* * * * * * * vmcoreinfo: 0

* * * * *size_vmcoreinfo: 0

* * * nt_prstatus_percpu:

* * * *084c8e10 084c9004 084c9198 084c932c

* * * ...



That may be due to the use of a System.map file, which forces

the crash utility to take some short-cuts during initialization.

Or again, it could be a side issue of the lack of crash utility

support for 32-bit vmcores taken from 64-bit Xen hypervisors.



But since you've apparently got the debuginfo-full dom0 vmlinux

file, then there's not need to use the System.map file. * What

happens when you just run: "crash -d1 vmlinux vmcore"?



Dave





--

Crash-utility mailing list

Crash-utility@redhat.com

https://www.redhat.com/mailman/listinfo/crash-utility




crash32 5.0.7
Copyright (C) 2002-2010 Red Hat, Inc.
Copyright (C) 2004, 2005, 2006 IBM Corporation
Copyright (C) 1999-2006 Hewlett-Packard Co
Copyright (C) 2005, 2006 Fujitsu Limited
Copyright (C) 2006, 2007 VA Linux Systems Japan K.K.
Copyright (C) 2005 NEC Corporation
Copyright (C) 1999, 2002, 2007 Silicon Graphics, Inc.
Copyright (C) 1999, 2000, 2001, 2002 Mission Critical Linux, Inc.
This program is free software, covered by the GNU General Public License,
and you are welcome to change it and/or distribute copies of it under
certain conditions. Enter "help copying" to see the conditions.
This program has absolutely no warranty. Enter "help warranty" for details.

WARNING: machine type mismatch:
crash utility: X86
vmcore-2010-09-22-19-14-21: X86_64

vmcore_data:
flags: c0 (KDUMP_LOCAL|KDUMP_ELF64)
ndfd: 3
ofp: 70d5c0
header_size: 7464
num_pt_load_segments: 9
pt_load_segment[0]:
file_offset: 1d28
phys_start: 0
phys_end: a0000
zero_fill: 0
pt_load_segment[1]:
file_offset: a1d28
phys_start: 100000
phys_end: 2000000
zero_fill: 0
pt_load_segment[2]:
file_offset: 1fa1d28
phys_start: a000000
phys_end: 38000000
zero_fill: 0
pt_load_segment[3]:
file_offset: 2ffa1d28
phys_start: 38000000
phys_end: 7e98a000
zero_fill: 0
pt_load_segment[4]:
file_offset: 7692bd28
phys_start: 80000000
phys_end: 9e8d3000
zero_fill: 0
pt_load_segment[5]:
file_offset: 951fed28
phys_start: 9ead4000
phys_end: 9fb2d000
zero_fill: 0
pt_load_segment[6]:
file_offset: 96257d28
phys_start: 9fb52000
phys_end: 9fb84000
zero_fill: 0
pt_load_segment[7]:
file_offset: 96289d28
phys_start: 9fb92000
phys_end: 9fc00000
zero_fill: 0
pt_load_segment[8]:
file_offset: 962f7d28
phys_start: 100000000
phys_end: 260000000
zero_fill: 0
elf_header: 84c8c48
elf32: 0
notes32: 0
load32: 0
elf64: 84c8c48
notes64: 84c8c88
load64: 84c8cc0
nt_prstatus: 84c8eb8
nt_prpsinfo: 0
nt_taskstruct: 0
task_struct: 0
page_size: 0
switch_stack: 0
xen_kdump_data:
flags: 4 (KDUMP_MFN_LIST)
p2m_mfn: 0
cr3: 0
last_mfn_read: ffffffff
last_pmd_read: ffffffff
page: 0
accesses: 0
cache_hits: 0
p2m_frames: 0
xen_phys_start: 6f969
xen_major_version: 3
xen_minor_version: 0
p2m_mfn_frame_list: 0
num_prstatus_notes: 4
vmcoreinfo: 0
size_vmcoreinfo: 0
nt_prstatus_percpu:
084c8eb8 084c90ac 084c9240 084c93d4

Elf64_Ehdr:
e_ident: 177ELF
e_ident[EI_CLASS]: 2 (ELFCLASS64)
e_ident[EI_DATA]: 1 (ELFDATA2LSB)
e_ident[EI_VERSION]: 1 (EV_CURRENT)
e_ident[EI_OSABI]: 0 (ELFOSABI_SYSV)
e_ident[EI_ABIVERSION]: 0
e_type: 4 (ET_CORE)
e_machine: 62 (EM_X86_64)
e_version: 1 (EV_CURRENT)
e_entry: 0
e_phoff: 40
e_shoff: 0
e_flags: 0
e_ehsize: 40
e_phentsize: 38
e_phnum: a
e_shentsize: 0
e_shnum: 0
e_shstrndx: 0
Elf64_Phdr:
p_type: 4 (PT_NOTE)
p_offset: 624 (270)
p_vaddr: 0
p_paddr: 0
p_filesz: 6840 (1ab8)
p_memsz: 6840 (1ab8)
p_flags: 0 ()
p_align: 0
Elf64_Phdr:
p_type: 1 (PT_LOAD)
p_offset: 7464 (1d28)
p_vaddr: c0000000
p_paddr: 0
p_filesz: 655360 (a0000)
p_memsz: 655360 (a0000)
p_flags: 7 (PF_X|PF_W|PF_R)
p_align: 0
Elf64_Phdr:
p_type: 1 (PT_LOAD)
p_offset: 662824 (a1d28)
p_vaddr: c0100000
p_paddr: 100000
p_filesz: 32505856 (1f00000)
p_memsz: 32505856 (1f00000)
p_flags: 7 (PF_X|PF_W|PF_R)
p_align: 0
Elf64_Phdr:
p_type: 1 (PT_LOAD)
p_offset: 33168680 (1fa1d28)
p_vaddr: ca000000
p_paddr: a000000
p_filesz: 771751936 (2e000000)
p_memsz: 771751936 (2e000000)
p_flags: 7 (PF_X|PF_W|PF_R)
p_align: 0
Elf64_Phdr:
p_type: 1 (PT_LOAD)
p_offset: 804920616 (2ffa1d28)
p_vaddr: ffffffffffffffff
p_paddr: 38000000
p_filesz: 1184407552 (4698a000)
p_memsz: 1184407552 (4698a000)
p_flags: 7 (PF_X|PF_W|PF_R)
p_align: 0
Elf64_Phdr:
p_type: 1 (PT_LOAD)
p_offset: 1989328168 (7692bd28)
p_vaddr: ffffffffffffffff
p_paddr: 80000000
p_filesz: 512569344 (1e8d3000)
p_memsz: 512569344 (1e8d3000)
p_flags: 7 (PF_X|PF_W|PF_R)
p_align: 0
Elf64_Phdr:
p_type: 1 (PT_LOAD)
p_offset: 2501897512 (951fed28)
p_vaddr: ffffffffffffffff
p_paddr: 9ead4000
p_filesz: 17141760 (1059000)
p_memsz: 17141760 (1059000)
p_flags: 7 (PF_X|PF_W|PF_R)
p_align: 0
Elf64_Phdr:
p_type: 1 (PT_LOAD)
p_offset: 2519039272 (96257d28)
p_vaddr: ffffffffffffffff
p_paddr: 9fb52000
p_filesz: 204800 (32000)
p_memsz: 204800 (32000)
p_flags: 7 (PF_X|PF_W|PF_R)
p_align: 0
Elf64_Phdr:
p_type: 1 (PT_LOAD)
p_offset: 2519244072 (96289d28)
p_vaddr: ffffffffffffffff
p_paddr: 9fb92000
p_filesz: 450560 (6e000)
p_memsz: 450560 (6e000)
p_flags: 7 (PF_X|PF_W|PF_R)
p_align: 0
Elf64_Phdr:
p_type: 1 (PT_LOAD)
p_offset: 2519694632 (962f7d28)
p_vaddr: ffffffffffffffff
p_paddr: 100000000
p_filesz: 5905580032 (160000000)
p_memsz: 5905580032 (160000000)
p_flags: 7 (PF_X|PF_W|PF_R)
p_align: 0
Elf64_Nhdr:
n_namesz: 5 ("CORE")
n_descsz: 336
n_type: 1 (NT_PRSTATUS)
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 c0497e20 00000000
00000001 00000000 00000000 00000000
ffffffea 00000000 00000001 00000000
00000000 00000000 801e82e0 ffff828c
00000004 00000000 00000000 00000000
00000004 00000000 80299e14 ffff828c
80299cb4 ffff828c 80299d24 ffff828c
ffffffff 00000000 00000000 00000000
8010e020 ffff828c 0000e008 00000000
00000202 00000000 80287dd0 ffff828c
00000000 00000000 00000000 00000000
00000000 00000000 0000007b 00000000
0000007b 00000000 000000d8 00000000
00000000 00000000 00000000 00000000
Elf64_Nhdr:
n_namesz: 4 ("Xen")
n_descsz: 32
n_type: 1000002 (XEN_ELFNOTE_CRASH_REGS)
8005003b 00000000 08c1ac3c 00000000
5fd94000 00000002 000026f0 00000000
Elf64_Nhdr:
n_namesz: 4 ("Xen")
n_descsz: 80
n_type: 1000001 (XEN_ELFNOTE_CRASH_INFO)
00000003 00000000 00000004 00000000
9f7eb409 00000000 9f7ed168 00000000
9f7ed138 00000000 9f7eb3c5 00000000
9f7eb3e2 00000000 00000000 00000000
9f600000 00000000 0006f969 00000000
Elf64_Nhdr:
n_namesz: 5 ("CORE")
n_descsz: 336
n_type: 1 (NT_PRSTATUS)
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
8023d100 ffff828c bde4f55c 00000008
5fdf1ea8 ffff8302 8023c5b0 ffff828c
5fdd0f58 ffff8302 00000001 00000000
00000000 00000000 00000001 00000000
8023d5c0 ffff828c 12ee253a 00000023
00000004 00000000 8029a008 ffff828c
80299ea8 ffff828c 80299f18 ffff828c
5fdd0f58 ffff8302 00000000 00000000
8010e020 ffff828c 0000e008 00000000
00000002 00000000 5fdd0f20 ffff8302
00000000 00000000 00000000 00000000
00000000 00000000 0000007b 00000000
0000007b 00000000 000000d8 00000000
00000000 00000000 00000000 00000000
Elf64_Nhdr:
n_namesz: 4 ("Xen")
n_descsz: 32
n_type: 1000002 (XEN_ELFNOTE_CRASH_REGS)
8005003b 00000000 080f59f4 00000000
9f88c000 00000000 000026f0 00000000
Elf64_Nhdr:
n_namesz: 5 ("CORE")
n_descsz: 336
n_type: 1 (NT_PRSTATUS)
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
8023e100 ffff828c c63d2bcd 00000008
5fdf1ea8 ffff8302 8023c5b0 ffff828c
5fdc0f58 ffff8302 00000002 00000000
00000000 00000000 00000001 00000000
8023e5c0 ffff828c 12ee254d 00000023
00000004 00000000 8029a1fc ffff828c
8029a09c ffff828c 8029a10c ffff828c
5fdc0f58 ffff8302 00000000 00000000
8010e020 ffff828c 0000e008 00000000
00000002 00000000 5fdc0f20 ffff8302
00000000 00000000 00000000 00000000
00000000 00000000 0000007b 00000000
0000007b 00000000 000000d8 00000000
00000000 00000000 00000000 00000000
Elf64_Nhdr:
n_namesz: 4 ("Xen")
n_descsz: 32
n_type: 1000002 (XEN_ELFNOTE_CRASH_REGS)
8005003b 00000000 e7bc25b8 00000000
9f88c000 00000000 000026f0 00000000
Elf64_Nhdr:
n_namesz: 5 ("CORE")
n_descsz: 336
n_type: 1 (NT_PRSTATUS)
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000
8023f100 ffff828c c9362cea 00000008
5fdf1ea8 ffff8302 8023c5b0 ffff828c
5fdb0f58 ffff8302 00000003 00000000
00000000 00000000 00000001 00000000
8023f5c0 ffff828c 12ee257a 00000023
00000004 00000000 8029a3f0 ffff828c
8029a290 ffff828c 8029a300 ffff828c
5fdb0f58 ffff8302 00000000 00000000
8010e020 ffff828c 0000e008 00000000
00000002 00000000 5fdb0f20 ffff8302
00000000 00000000 00000000 00000000
00000000 00000000 0000007b 00000000
0000007b 00000000 000000d8 00000000
00000000 00000000 00000000 00000000
Elf64_Nhdr:
n_namesz: 4 ("Xen")
n_descsz: 32
n_type: 1000002 (XEN_ELFNOTE_CRASH_REGS)
8005003b 00000000 b77030a0 00000000
9f88c000 00000000 000026f0 00000000
Elf64_Nhdr:
n_namesz: 11 ("VMCOREINFO")
n_descsz: 1008
n_type: 0 (unused)
OSRELEASE=2.6.27.42-0.1.1.xs5.6.0.44.111158xen
PAGESIZE=4096
SYMBOL(init_uts_ns)=c0434da0
SYMBOL(node_online_map)=c0493604
SYMBOL(swapper_pg_dir)=cfa6c000
SYMBOL(_stext)=c0102000
SYMBOL(mem_map)=c0519884
SYMBOL(contig_page_data)=c044aa80
SIZE(page)=32
SIZE(pglist_data)=20096
SIZE(zone)=4992
SIZE(free_area)=44
SIZE(list_head)=8
SIZE(nodemask_t)=4
OFFSET(page.flags)=0
OFFSET(page._count)=4
OFFSET(page.mapping)=16
OFFSET(page.lru)=24
OFFSET(pglist_data.node_zones)=0
OFFSET(pglist_data.nr_zones)=20012
OFFSET(pglist_data.node_mem_map)=20016
OFFSET(pglist_data.node_start_pfn)=20024
OFFSET(pglist_data.node_spanned_pages)=20032
OFFSET(pglist_data.node_id)=20036
OFFSET(zone.free_area)=4228
OFFSET(zone.vm_stat)=4772
OFFSET(zone.spanned_pages)=4884
OFFSET(free_area.free_list)=0
OFFSET(list_head.next)=0
OFFSET(list_head.prev)=4
LENGTH(zone.free_area)=11
LENGTH(free_area.free_list)=5
NUMBER(NR_FREE_PAGES)=0
NUMBER(PG_lru)=6
NUMBER(PG_private)=12
NUMBER(PG_swapcache)=17
CONFIG_X86_PAE=y
CRASHTIME=1285175627
Elf64_Nhdr:
n_namesz: 15 ("VMCOREINFO_XEN")
n_descsz: 4068
n_type: 0 (unused)
PAGESIZE=4096
SYMBOL(domain_list)=ffff828c80294030
SYMBOL(frame_table)=ffff828c802c62b8
SYMBOL(alloc_bitmap)=ffff828c802a2c70
SYMBOL(max_page)=ffff828c802c62c0
SIZE(page_info)=32
SIZE(domain)=7936
OFFSET(page_info.count_info)=8
OFFSET(page_info._domain)=16
OFFSET(domain.domain_id)=0
OFFSET(domain.next_in_list)=80
SYMBOL(dom_xen)=ffff828c802c62d8
SYMBOL(dom_io)=ffff828c802c62e0
SYMBOL(pgd_l4)=ffff828c8028c000

cannot determine relocation value: not a live system
gdb vmlinux-sym-citrix
GNU gdb (GDB) 7.0
Copyright (C) 2009 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "i686-pc-linux-gnu"...

x86_xen_kdump_p2m_create: p2m_mfn: 0
00000000: 7fed9050 7fed904c 7fed9058 7fed9054
00000010: 7fed9060 7fed905c f00016b3 f00016b4
00000020: f000fea5 f000e987 f00016b4 f00016b4
00000030: 98400b7c f00016a7 f000ef57 f00016b4

crash32: read error: physical address: 7fed9050000 type: "xen kdump p2m mfn list page"

crash32: cannot read xen kdump p2m mfn list page

--
Crash-utility mailing list
Crash-utility@redhat.com
https://www.redhat.com/mailman/listinfo/crash-utility

Dave Anderson 09-23-2010 01:16 PM

Linux Banner string missing.
 
----- "Feng LI" <funglee@gmail.com> wrote:

> Dave,
>
> I regenerate the vmcore dump file to make sure I used the correct
> version of dom0 which we have unstripped kernel from critix.
>
> The p2m_mfn pointer is still empty... :( I attached the output we have
> .. :(
>
> Too bad... It seems that I am going no where.
> &
> Thanks for your help.

Kevin,

The p2m_mfn value still needs to be overridden on the command line, so your
latest results are not surprising. But there's one more thing you might
try. Looking at your latest debug output:

xen_kdump_data:
flags: 4 (KDUMP_MFN_LIST)
p2m_mfn: 0 <== incorrect
cr3: 0
last_mfn_read: ffffffff
last_pmd_read: ffffffff
page: 0
accesses: 0
cache_hits: 0
p2m_frames: 0
xen_phys_start: 6f969 <== incorrect

Because of the lack of support of 32-bit dom0's on 64-bit hypervisors,
the p2m_mfn and xen_phys_start values are being loaded as if the
note contained 32-bit values:

Elf64_Nhdr:
n_namesz: 4 ("Xen")
n_descsz: 80
n_type: 1000001 (XEN_ELFNOTE_CRASH_INFO)
00000003 00000000 00000004 00000000
9f7eb409 00000000 9f7ed168 00000000
9f7ed138 00000000 9f7eb3c5 00000000
9f7eb3e2 00000000 00000000 00000000
9f600000 00000000 0006f969 00000000

So in your latest dumpfile, they should be set to:

p2m_mfn: 6f969
xen_phys_start: 9f600000

And because of the bogus p2m_mfn address of 0, you get bogus mfn
values in the dump of mfns shown later on here:

x86_xen_kdump_p2m_create: p2m_mfn: 0
00000000: 7fed9050 7fed904c 7fed9058 7fed9054
00000010: 7fed9060 7fed905c f00016b3 f00016b4
00000020: f000fea5 f000e987 f00016b4 f00016b4
00000030: 98400b7c f00016a7 f000ef57 f00016b4

Those 16 values above should be mfn values.

You can override both the bogus p2m_mfn and xen_phys_start values on
the crash command line like this:

# crash --p2m_mfn 6f969 --xen_phys_start 9f60000 vmlinux vmcore

I'm guessing that you will probably still see bogus data in the list
of mfn values from x86_xen_kdump_p2m_create debug dump above, but it's
worth a shot. But if you do see the correct mfn values there, then
the correct xen_phys_start value will be required after that.

> P.S.
> I did cat /proc/iomem before I generate the vmcore dump.
>
> it shows
>
> 9ead4000-9fb2cfff : System RAM
> 9f700000-9f8dca7f : Hypervisor code and data
> 9f899ca0-9f899e93 : Crash note
> 9f899e94-9f89a027 : Crash note
> 9f89a088-9f89a21b : Crash note
> 9f89a27c-9f89a40f : Crash note
>
> is this information helpful to you ?

Not so much...

Dave


--
Crash-utility mailing list
Crash-utility@redhat.com
https://www.redhat.com/mailman/listinfo/crash-utility


All times are GMT. The time now is 09:06 AM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.