Hi, I am getting a kernel panic which I am not able to debug. The pc itself is getting polluted.. I have added the trace of the panic at the end of the email.
This is a snippet from the object dump of the kernel code. fffffc00005d51e8: 00 00 69 a7 ldq t12,0(s0) fffffc00005d51ec: 00 40 5b 6b jsr ra,(t12),fffffc00005d51f0 <dev_queue_xmit+0x100> fffffc00005d51f0: 2a 00 ba 27 ldah gp,42(ra) The panic is when ra = fffffc00005d51f0. Therefore the jsr should have jumped to the address in t12 which is 0000000002969588. t12 gets loaded from s0 in the previous step. I was unable to trace back the memory address content, is there a way to do it? The last function in the trace is given in the following link: http://lxr.free-electrons.com/source/net/core/neighbour.c?v=2.6.28#L1187 Could someone suggest how I go about debugging this kernel panic? Thanks in advance.. Thanks, Pritha Trace of the panic: Unable to handle kernel paging request at virtual address 0000000002969588 CPU 1 bf_queue_check(796): Oops -1 pc = [<0000000002969588>] ra = [<fffffc00005d51f0>] ps = 0000 Not tainted pc is at 0x2969588 ra is at dev_queue_xmit+0x100/0x660 v0 = 0000000000000000 t0 = 00000000000005ea t1 = 0000000000000210 t2 = 0000000000000640 t3 = fffffc003d673800 t4 = 0000000000000000 t5 = 0000000000000200 t6 = 0000000000000200 t7 = fffffc003e1fc000 s0 = fffffc003f7e5b80 s1 = fffffc003f7e5bdc s2 = fffffc003d6621c0 s3 = fffffc003f3d7800 s4 = fffffc003f3d7800 s5 = 0000000000000008 s6 = fffffc003f3d7800 a0 = fffffc003d6621c0 a1 = fffffc003f7e5b80 a2 = fffffc00005ea234 a3 = fffffc003e55b004 a4 = 0000000000000000 a5 = 00000000000005dc t8 = 0000000000000000 t9 = fffffc003d673816 t10= fffffc003e55b008 t11= 000000000000000e pv = 0000000002969588 at = 0000000000000020 gp = fffffc0000873c60 sp = fffffc003e1ffc88 Trace: [<fffffc00005dcd90>] neigh_resolve_output+0x140/0x3a0 [<fffffc00006050e0>] ip_finish_output+0x350/0x3e0 [<fffffc0000358cc0>] kthread+0x0/0xc0 [<fffffc00005c8ee4>] pskb_expand_head+0x74/0x240 [<fffffc00005ff92c>] ip_forward+0x37c/0x590 [<fffffc0000358cc0>] kthread+0x0/0xc0 [<fffffc00005fdd2c>] ip_rcv+0x4bc/0x890 [<fffffc0000358cc0>] kthread+0x0/0xc0 [<fffffc0000358d30>] kthread+0x70/0xc0 [<fffffc00003110c8>] kernel_thread+0x28/0x90 [<fffffc0000340124>] put_fs_struct+0x74/0x90 [<fffffc0000341394>] do_group_exit+0x54/0xf0 [<fffffc0000341448>] sys_exit_group+0x18/0x30 [<fffffc0000310cf4>] entSys+0xa4/0xc0
_______________________________________________ gem5-users mailing list gem5-users@gem5.org http://m5sim.org/cgi-bin/mailman/listinfo/gem5-users