Re: kernel BUG at arch/sparc64/mm/fault.c:413!

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




What distribution and version are you running?  I tried to dump
the code at address 0x1a368 of the /bin/sh binary running on
Ubuntu Dapper and it didn't show a code location which could
trigger this code path.

I am running Ubuntu Feisty. (probably a bit too new, I was having problems getting ldap/autofs working and thought maybe newer would be better).

The code surrounding that address is:

1a360:       01 00 00 00     nop
1a364:       9d e3 bf 90     save  %sp, -112, %sp
1a368:       40 00 70 33     call  36434 <malloc@plt>
1a36c:       90 10 00 18     mov  %i0, %o0
1a370:       80 a2 20 00     cmp  %o0, 0
1a374:       02 80 00 04     be  1a384 <_IO_stdin_used-0x8b84>
1a378:       b0 10 00 08     mov  %o0, %i0
1a37c:       81 c7 e0 08     ret


Try to print out the "fault_code", "address", and regs->tpc value
when this triggers.

I've reproduced it, here are the results (the bug is still at line 413, my debug code pushed it down a bit):


[  263.773194] VMW: fault_code=4 address=ff0cc000 regs->tpc=70131660

[  263.773220] kernel BUG at arch/sparc64/mm/fault.c:417!
[  263.773238]               \|/ ____ \|/
[  263.773244]               "@'/ .. \`@"
[  263.773250]               /_| \__/ |_\
[  263.773256]                  \__U_/
[  263.773269] sh(6396): Kernel bad sw trap 5 [#1]
[  263.773286] TSTATE: 0000000011001607 TPC: 00000000006903ec TNPC: 00000000006903f0 Y: 00000000    Not tainted
[  263.773314] TPC: <do_sparc64_fault+0x394/0x700>
[  263.773328] g0: fffff801f9e4c000 g1: 0000000000000000 g2: 0000000000000001 g3: 0000000000000000
[  263.773350] g4: fffff801fd760540 g5: fffff80003ce3fc0 g6: fffff801f9e4c000 g7: 0000000000000000
[  263.773368] o0: 000000000000003d o1: 00000000007182a0 o2: 00000000000001a1 o3: 0000000070131660
[  263.773391] o4: 4849001106491d49 o5: fffff801fb8f1060 sp: fffff801f9e4f5c1 ret_pc: 00000000006903e4
[  263.773411] RPC: <do_sparc64_fault+0x38c/0x700>
[  263.773427] l0: fffff801ffa8f9e0 l1: 0000000000000004 l2: fffff801fb8f1060 l3: 00000000ff0cc000
[  263.773447] l4: 0000000000000000 l5: fffff801fb8f10c0 l6: fffff801f9e4c000 l7: 0000000011009006
[  263.773466] i0: fffff801f9e4ff60 i1: 0000000000000033 i2: 0000000000024fd2 i3: 0000000000000003
[  263.773485] i4: 0000000000000000 i5: 0000000000000003 i6: fffff801f9e4f6a1 i7: 0000000000404d6c
[  263.773509] I7: <sparc64_realfault_common+0x18/0x20>
[  263.773521] Caller[0000000000404d6c]: sparc64_realfault_common+0x18/0x20
[  263.773542] Caller[000000000001a368]: 0x1a370
[  263.773573] Instruction DUMP: 921021a1  7ff62ae7  901222a0 <91d02005> 12480032  8208e002  8208e005  02c84066  030000c0

Let me know if you need more info,

Thanks

Vince
-
To unsubscribe from this list: send the line "unsubscribe sparclinux" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Kernel Development]     [DCCP]     [Linux ARM Development]     [Linux]     [Photo]     [Yosemite Help]     [Linux ARM Kernel]     [Linux SCSI]     [Linux x86_64]     [Linux Hams]

  Powered by Linux