On Thu, 2007-09-13 at 00:13 -0500, Kumar Gala wrote:
> On Sep 12, 2007, at 11:47 PM, sivaji wrote:
> 
> >
> >
> > Hi,
> >           I have JTAG Debugger connected to the board. I was given the
> > following commands in the root path of the kernel source
> 
> If you can dump memory w/o connecting GDB, I suggest the following.
> 
> Look in your kernel build for System.map and grep for log_buf you  
> should get something like:
> 
> c040b04c d log_buf
> c043b1a4 b __log_buf
> 
> then dump the memory @ these addresses.  I can't remember which one  
> is the correct one.  You'll want to subtract c000_0000 from the  
> address to get a physical address that you can dump.  This should  
> help provide some possible insight into what's going on.

__log_buf is the actual buffer, log_buf points to the current insertion
point IIRC. It should be pretty obvious that you're looking at a dmesg
buffer though, unless there's nothing in there for some reason.

cheers

-- 
Michael Ellerman
OzLabs, IBM Australia Development Lab

wwweb: http://michael.ellerman.id.au
phone: +61 2 6212 1183 (tie line 70 21183)

We do not inherit the earth from our ancestors,
we borrow it from our children. - S.M.A.R.T Person

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
Linuxppc-dev mailing list
Linuxppc-dev@ozlabs.org
https://ozlabs.org/mailman/listinfo/linuxppc-dev

Reply via email to