Hi,

I am getting a kernel panic which I am not able to debug. The pc itself is
getting polluted.. I have added the trace of the panic at the end of the
email.

This is a snippet from the object dump of the kernel code.
fffffc00005d51e8:       00 00 69 a7     ldq     t12,0(s0)
fffffc00005d51ec:       00 40 5b 6b     jsr     ra,(t12),fffffc00005d51f0
<dev_queue_xmit+0x100>
fffffc00005d51f0:       2a 00 ba 27     ldah    gp,42(ra)

The panic is when ra = fffffc00005d51f0. Therefore the jsr should have
jumped to the address in t12 which is 0000000002969588. t12 gets loaded
from s0 in the previous step. I was unable to trace back the memory address
content, is there a way to do it? The last function in the trace is given
in the following link:
http://lxr.free-electrons.com/source/net/core/neighbour.c?v=2.6.28#L1187

Could someone suggest how I go about debugging this kernel panic? Thanks in
advance..

Thanks,
Pritha

Trace of the panic:

Unable to handle kernel paging request at virtual address 0000000002969588
CPU 1 bf_queue_check(796): Oops -1
pc = [<0000000002969588>]  ra = [<fffffc00005d51f0>]  ps = 0000    Not
tainted
pc is at 0x2969588
ra is at dev_queue_xmit+0x100/0x660
v0 = 0000000000000000  t0 = 00000000000005ea  t1 = 0000000000000210
t2 = 0000000000000640  t3 = fffffc003d673800  t4 = 0000000000000000
t5 = 0000000000000200  t6 = 0000000000000200  t7 = fffffc003e1fc000
s0 = fffffc003f7e5b80  s1 = fffffc003f7e5bdc  s2 = fffffc003d6621c0
s3 = fffffc003f3d7800  s4 = fffffc003f3d7800  s5 = 0000000000000008
s6 = fffffc003f3d7800
a0 = fffffc003d6621c0  a1 = fffffc003f7e5b80  a2 = fffffc00005ea234
a3 = fffffc003e55b004  a4 = 0000000000000000  a5 = 00000000000005dc
t8 = 0000000000000000  t9 = fffffc003d673816  t10= fffffc003e55b008
t11= 000000000000000e  pv = 0000000002969588  at = 0000000000000020
gp = fffffc0000873c60  sp = fffffc003e1ffc88
Trace:
[<fffffc00005dcd90>] neigh_resolve_output+0x140/0x3a0
[<fffffc00006050e0>] ip_finish_output+0x350/0x3e0
[<fffffc0000358cc0>] kthread+0x0/0xc0
[<fffffc00005c8ee4>] pskb_expand_head+0x74/0x240
[<fffffc00005ff92c>] ip_forward+0x37c/0x590
[<fffffc0000358cc0>] kthread+0x0/0xc0
[<fffffc00005fdd2c>] ip_rcv+0x4bc/0x890
[<fffffc0000358cc0>] kthread+0x0/0xc0
[<fffffc0000358d30>] kthread+0x70/0xc0
[<fffffc00003110c8>] kernel_thread+0x28/0x90
[<fffffc0000340124>] put_fs_struct+0x74/0x90
[<fffffc0000341394>] do_group_exit+0x54/0xf0
[<fffffc0000341448>] sys_exit_group+0x18/0x30
[<fffffc0000310cf4>] entSys+0xa4/0xc0
_______________________________________________
gem5-users mailing list
gem5-users@gem5.org
http://m5sim.org/cgi-bin/mailman/listinfo/gem5-users

Reply via email to