FreeBSD Bugzilla – Attachment 220115 Details for
Bug 251463
Write additional ARM registers in the gdb stub
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
Stack backtrace and registers printed by DDB
ddb_stack_backtrace.txt (text/plain), 4.29 KB, created by
Dmitry Salychev
on 2020-11-30 20:59:58 UTC
(
hide
)
Description:
Stack backtrace and registers printed by DDB
Filename:
MIME Type:
Creator:
Dmitry Salychev
Created:
2020-11-30 20:59:58 UTC
Size:
4.29 KB
patch
obsolete
>root@etherknife-debug:~ # etherswitchcfg >etherswitch0: VLAN mode: DOT1Q >port0: > pvid: 0 > flags=41<CPUPORT,INGRESS> > media: Ethernet 1000baseT <full-duplex> > status: active >port1: > pvid: 0 > flags=40<INGRESS> > media: Ethernet autoselect (100baseTX <full-duplex>) > status: active >Fatal kernel mode data abort: 'Translation Fault (L2)' on read >trapframe: 0xd10eeaf0 >FSR=00000007, FAR=0000004c, spsr=20000013 >r0 =00000000, r1 =00000002, r2 =c0661624, r3 =c0843414 >r4 =d10eed28, r5 =00000006, r6 =00000019, r7 =d1275000 >r8 =d199a000, r9 =d1adc410, r10=c0446904, r11=d10eeb90 >r12=c0877034, ssp=d10eeb80, slr=c0661664, pc =c0307b28 > >panic: Fatal abort >cpuid = 0 >time = 1606674844 >KDB: stack backtrace: >db_trace_self() at db_trace_self > pc = 0xc05913d8 lr = 0xc007aa84 (db_trace_self_wrapper+0x30) > sp = 0xd10ee8c8 fp = 0xd10ee9e0 >db_trace_self_wrapper() at db_trace_self_wrapper+0x30 > pc = 0xc007aa84 lr = 0xc02cbddc (vpanic+0x170) > sp = 0xd10ee9e8 fp = 0xd10eea08 > r4 = 0x00000100 r5 = 0xd10eea1c > r6 = 0xc07254d3 r7 = 0x00000000 >vpanic() at vpanic+0x170 > pc = 0xc02cbddc lr = 0xc02cbb8c (doadump) > sp = 0xd10eea10 fp = 0xd10eea14 > r4 = 0xd10eeaf0 r5 = 0x00000013 > r6 = 0x0000004c r7 = 0x00000007 > r8 = 0x00000007 r9 = 0xd199a000 > r10 = 0x0000004c >doadump() at doadump > pc = 0xc02cbb8c lr = 0xc05b3a80 (abort_align) > sp = 0xd10eea1c fp = 0xd10eea48 > r4 = 0x0000004c r5 = 0xd10eea14 > r6 = 0xc02cbb8c r10 = 0xd10eea1c >abort_align() at abort_align > pc = 0xc05b3a80 lr = 0xc05b3600 (abort_handler+0x330) > sp = 0xd10eea50 fp = 0xd10eeae8 > r4 = 0x00000013 r5 = 0x0000004c >abort_handler() at abort_handler+0x330 > pc = 0xc05b3600 lr = 0xc0593cf8 (exception_exit) > sp = 0xd10eeaf0 fp = 0xd10eeb90 > r4 = 0xd10eed28 r5 = 0x00000006 > r6 = 0x00000019 r7 = 0xd1275000 > r8 = 0xd199a000 r9 = 0xd1adc410 > r10 = 0xc0446904 >exception_exit() at exception_exit > pc = 0xc0593cf8 lr = 0xc0661664 (cpsw_getport+0x40) > sp = 0xd10eeb80 fp = 0xd10eeb90 > r0 = 0x00000000 r1 = 0x00000002 > r2 = 0xc0661624 r3 = 0xc0843414 > r4 = 0xd10eed28 r5 = 0x00000006 > r6 = 0x00000019 r7 = 0xd1275000 > r8 = 0xd199a000 r9 = 0xd1adc410 > r10 = 0xc0446904 r12 = 0xc0877034 >device_get_softc() at device_get_softc > pc = 0xc0307b28 lr = 0xc0661664 (cpsw_getport+0x40) > sp = 0xd10eeb80 fp = 0xd10eeb90 >cpsw_getport() at cpsw_getport+0x40 > pc = 0xc0661664 lr = 0xc008e6f0 (etherswitchioctl+0x62c) > sp = 0xd10eeb98 fp = 0xd10eebc0 > r4 = 0xd124ce80 r5 = 0xd10eed28 > r6 = 0x00000019 r7 = 0xc0843414 >etherswitchioctl() at etherswitchioctl+0x62c > pc = 0xc008e6f0 lr = 0xc01ce0fc (devfs_ioctl+0xcc) > sp = 0xd10eebc8 fp = 0xd10eebf0 > r4 = 0xd1b64be0 r5 = 0xc0446904 > r6 = 0xd10eebf8 r7 = 0xc008e0c4 > r8 = 0xd199a000 r10 = 0xc0446904 >devfs_ioctl() at devfs_ioctl+0xcc > pc = 0xc01ce0fc lr = 0xc03c6540 (vn_ioctl+0x12c) > sp = 0xd10eebf8 fp = 0xd10eecc0 > r4 = 0xd1b64be0 r5 = 0x00000019 > r6 = 0xd19c8000 r7 = 0xd1b54a00 > r8 = 0xd10eed28 r9 = 0xd1adc410 >vn_ioctl() at vn_ioctl+0x12c > pc = 0xc03c6540 lr = 0xc01ce758 (devfs_ioctl_f+0x2c) > sp = 0xd10eecc8 fp = 0xd10eece0 > r4 = 0xd199a000 r5 = 0xc03c6414 > r6 = 0x00000000 r7 = 0x00000000 > r8 = 0xd19c8000 r10 = 0xc0446904 >devfs_ioctl_f() at devfs_ioctl_f+0x2c > pc = 0xc01ce758 lr = 0xc0343688 (kern_ioctl+0x324) > sp = 0xd10eece8 fp = 0xd10eed20 > r4 = 0xc01ce72c r5 = 0xd19c8000 > r6 = 0x00000001 r10 = 0xc0446904 >kern_ioctl() at kern_ioctl+0x324 > pc = 0xc0343688 lr = 0xc0343318 (sys_ioctl+0xf8) > sp = 0xd10eed28 fp = 0xd10eedc8 > r4 = 0x00000044 r5 = 0xd199a2b0 > r6 = 0xc0446904 r7 = 0x00000000 > r8 = 0xd10eed28 r9 = 0xd199a000 > r10 = 0x40000000 >sys_ioctl() at sys_ioctl+0xf8 > pc = 0xc0343318 lr = 0xc05b2e20 (swi_handler+0x15c) > sp = 0xd10eedd0 fp = 0xd10eee40 > r4 = 0xd199a000 r5 = 0x00000001 > r6 = 0xc086cf9c r7 = 0x00000000 > r8 = 0x00000000 r9 = 0xd199a2a8 > r10 = 0xd1936388 >swi_handler() at swi_handler+0x15c > pc = 0xc05b2e20 lr = 0xc0593c88 (swi_exit) > sp = 0xd10eee48 fp = 0xbfbfec00 > r4 = 0xbfbfec28 r5 = 0xbfbfeb9c > r6 = 0x00000002 r7 = 0x00000036 > r8 = 0xbfbfe79c r9 = 0x00000000 > r10 = 0x000119ac >swi_exit() at swi_exit > pc = 0xc0593c88 lr = 0xc0593c88 (swi_exit) > sp = 0xd10eee48 fp = 0xbfbfec00 >KDB: enter: panic >[ thread pid 1249 tid 100072 ] >Stopped at kdb_enter+0x58: ldrb r15, [r15, r15, ror r15]!
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 251463
:
220079
| 220115 |
220116
|
220181
|
220356