svn commit: r319722 - in head: sys/cam/ctl sys/dev/iscsi sys/kern sys/netgraph sys/netgraph/bluetooth/socket sys/netinet sys/ofed/drivers/infiniband/core sys/ofed/drivers/infiniband/ulp/sdp sys/rpc...

Mark Millard markmi at dsl-only.net
Thu Jun 15 23:08:01 UTC 2017


FYI: in the current memory layout my -r317820
variant has been up for 3 days 17+ hours.
(Various extra checks for panicking on
some observed failures earlier but no
HACKISH_EXTRA_CODE.)

I think the wrong code was looked up. . .

The code you reported having the failure:

>    5a5a18:       38 7c 00 10     addi    r3,r28,16
>    5a5a1c:       4b f1 c4 61     bl      4c1e7c <__mtx_unlock_sleep>
>    5a5a20:       7f 63 db 78     mr      r3,r27
> ->5a5a24:       4b ff f5 9d     bl      5a4fc0 <solisten_wakeup>
>    5a5a28:       48 00 04 80     b       5a5ea8 <soisconnected+0x6a0>
>    5a5a2c:       7c 45 13 78     mr      r5,r2
>    5a5a30:       39 20 00 04     li      r9,4


The trap you reported in the picture
(notes added):

> exception = 0x700 (program)
> srr0 = 0x6064a90 (the address were execution was attempted)
> srr1 = 0x89032
> lr   = 0x5a500c (early inside solisten_wakeup)
> curthread = 0x6c

So:

0x5a4fc0 (solisten_wakeup)
0x5a500c (lr being early inside solisten_wakeup?)

What about the code around 0x5a5a24
could possibly jump to 0x6064a90 ?

How about around 0x5a500c that is 
closer to where the processor was
executing?

I usually have to look at what the
backtrace reports and see if a call
was made (bl) there and look at what
was called. Powerpc backtraces can
miss a layer of subroutine that is
active.



===
Mark Millard
markmi at dsl-only.net



More information about the svn-src-head mailing list