How to contitnule this kind of kernel debug
How to contitnule this kind of kernel debug
- Subject: How to contitnule this kind of kernel debug
- From: searockcliff <email@hidden>
- Date: Wed, 7 Jan 2009 16:27:24 +0800 (CST)
Hi All,
I meet one kernel panic.
When I begin to debug the kernel, I cannot get the back trace.
All the backtrace in panic log is about panic handling, except the 0x0 instruction :
0x85666a18 : 0x0 (0xe 0xe9660048 0xefd10010 0xd8330010)
I find one application's kernel_stack is wrong too.
task vm_map ipc_space #acts pid proc command
0x0e58e770 0x0e5d1b40 0x0dc611cc 3 2528 0x0dfc7750 TESTAPP
thread processor pri state wait_queue wait_event
0x0e5964f0 0x7c361000 31 R
kernel_stack=0x85664000
stacktop=0x00000000
stackbottom=0xfffffff0
Could anybody give some hint about how to continue my kernel debug?
Thanks a lot!
Mon Jan 5 16:50:55 2009
panic(cpu 0 caller 0x001A8CEC): Kernel trap at 0x00000000, type 14=page fault, registers:
CR0: 0x8001003b, CR2: 0x7c794000, CR3: 0x00f3b000, CR4: 0x00000660
EAX: 0x00000000, EBX: 0x0042ec54, ECX: 0x00000000, EDX: 0x0dd09b00
CR2: 0x00000000, EBP: 0x00000000, ESI: 0x00000144, EDI: 0xffff0000
EFL: 0x00010212, EIP: 0x00000000, CS: 0x00000008, DS: 0x8f900010
Error code: 0x00000010
Backtrace (CPU 0), Frame : Return Address (4 potential args on stack)
0x856668d8 : 0x12b0fa (0x459234 0x8566690c 0x133243 0x0)
0x85666928 : 0x1a8cec (0x4627a0 0x0 0xe 0x461f50)
0x85666a08 : 0x19eed5 (0x85666a20 0x75fdcf03 0x0 0x0)
0x85666a18 : 0x0 (0xe 0xe9660048 0xefd10010 0xd8330010)
Backtrace terminated-invalid frame pointer 0
BSD process name corresponding to current thread: SntlKeysSrvrmac
Mac OS version:
9F33
Kernel version:
Darwin Kernel Version 9.5.0: Wed Sep 3 11:29:43 PDT 2008; root:xnu-1228.7.58~1/RELEASE_I386
System model name: MacPro3,1 (Mac-F42C88C8)
sh-3.2# gdb mach_kernel
GNU gdb 6.3.50-20050815 (Apple version gdb-768) (Tue Oct 2 04:07:49 UTC 2007)
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for details.
This GDB was configured as "i386-apple-darwin"...
(gdb) source kgmacros
Loading Kernel GDB Macros package. Type "help kgm" for more info.
(gdb) add-symbol-file xxx"? (y or n) y
Reading symbols from xxx...done.
(gdb) target remote-kdp
(gdb) attach 172.20.18.120
Connected.
(gdb) c
Continuing.
Program received signal SIGTRAP, Trace/breakpoint trap.
0x00000000 in ?? ()
(gdb) bt
#0 0x00000000 in ?? ()
Cannot access memory at address 0x4
(gdb) paniclog
(gdb) showcurrentstacks
task vm_map ipc_space #acts pid proc command
0x0e590354 0x0e547960 0x0dc61730 25 2568 0x0e571280 vmware-vmx
thread processor pri state wait_queue wait_event
0x10269b58 0x0053b0c0 41 IRW 0x0053d7e0 0xe006740
kernel_stack=0x85630000
stacktop=0x85633d38
0x85633d38 0x135708 <processor_idle+148>
0x85633d88 0x135f10 <thread_select+1432>
0x85633df8 0x136a1c <thread_block_reason+135>
0x85633e38 0x136a9d <thread_block_parameter+32>
0x85633e58 0x36b74c <kevent_scan+389>
0x85633eb8 0x36baa3 <kevent+784>
0x85633f78 0x3ddd6e <unix_syscall+572>
0x85633fc8 0x19f3b3 <lo_unix_scall+227>
stackbottom=0x85633fc8
task vm_map ipc_space #acts pid proc command
0x0e590354 0x0e547960 0x0dc61730 25 2568 0x0e571280 vmware-vmx
thread processor pri state wait_queue wait_event
0x102693c8 0x7c34a000 31 IRW 0x0053d7d0 0xe006440
kernel_stack=0x85684000
stacktop=0x85687d38
0x85687d38 0x135708 <processor_idle+148>
0x85687d88 0x135f10 <thread_select+1432>
0x85687df8 0x136a1c <thread_block_reason+135>
0x85687e38 0x136a9d <thread_block_parameter+32>
0x85687e58 0x36b74c <kevent_scan+389>
0x85687eb8 0x36baa3 <kevent+784>
0x85687f78 0x3ddd6e <unix_syscall+572>
0x85687fc8 0x19f3b3 <lo_unix_scall+227>
stackbottom=0x85687fc8
task vm_map ipc_space #acts pid proc command
0x0e58e770 0x0e5d1b40 0x0dc611cc 3 2528 0x0dfc7750 TESTAPP
thread processor pri state wait_queue wait_event
0x0e5964f0 0x7c361000 31 R
kernel_stack=0x85664000
stacktop=0x00000000
stackbottom=0xfffffff0
task vm_map ipc_space #acts pid proc command
0x0dcb7e18 0x01149f78 0x0dc62ee8 65 0 0x00551160 kernel_task
thread processor pri state wait_queue wait_event
0x0ddb3000 0x7c372000 94 IURW 0x0051f578 0x0
reserved_stack=0x85094000
kernel_stack=0x8566c000
stacktop=0x8566fe58
0x8566fe58 0x135708 <processor_idle+148>
0x8566fea8 0x135f10 <thread_select+1432>
0x8566ff18 0x136a1c <thread_block_reason+135>
0x8566ff58 0x136ac0 <thread_block+33>
0x8566ff78 0x13ebef <_call_thread_continue+453>
0x8566ffc8 0x19eccc <call_continuation+28>
stackbottom=0x8566ffc8
task vm_map ipc_space #acts pid proc command
0x0dcb7e18 0x01149f78 0x0dc62ee8 65 0 0x00551160 kernel_task
thread processor pri state wait_queue wait_event
0x0e748000 0x84fbb000 94 IURW 0x0051f578 0x0
reserved_stack=0x762c8000
kernel_stack=0x852bc000
stacktop=0x852bfe58
0x852bfe58 0x135708 <processor_idle+148>
0x852bfea8 0x135f10 <thread_select+1432>
0x852bff18 0x136a1c <thread_block_reason+135>
0x852bff58 0x136ac0 <thread_block+33>
0x852bff78 0x13ebef <_call_thread_continue+453>
0x852bffc8 0x19eccc <call_continuation+28>
stackbottom=0x852bffc8
task vm_map ipc_space #acts pid proc command
0x0e591234 0x011494b0 0x0dc61a10 15 2551 0x0e570de0 App2
thread processor pri state wait_queue wait_event
0x0ee883c8 0x7c389000 46 IRW 0x10043040 0x5519d4 <selwait> "select"
kernel_stack=0x852c4000
stacktop=0x852c7c58
0x852c7c58 0x135708 <processor_idle+148>
0x852c7ca8 0x135f10 <thread_select+1432>
0x852c7d18 0x136a1c <thread_block_reason+135>
0x852c7d58 0x136ac0 <thread_block+33>
0x852c7d78 0x3807ac <_sleep+632>
0x852c7dd8 0x38d899 <selprocess+1654>
0x852c7ed8 0x38e0cc <select_nocancel+1450>
0x852c7f78 0x3ddd6e <unix_syscall+572>
0x852c7fc8 0x19f3b3 <lo_unix_scall+227>
stackbottom=0x852c7fc8
task vm_map ipc_space #acts pid proc command
0x0dcb7e18 0x01149f78 0x0dc62ee8 65 0 0x00551160 kernel_task
thread processor pri state wait_queue wait_event
0x0de8f8b8 0x84feb000 94 IURW 0x0051f578 0x0
reserved_stack=0x8509c000
kernel_stack=0x88888000
stacktop=0x8888be58
0x8888be58 0x135708 <processor_idle+148>
0x8888bea8 0x135f10 <thread_select+1432>
0x8888bf18 0x136a1c <thread_block_reason+135>
0x8888bf58 0x136ac0 <thread_block+33>
0x8888bf78 0x13ebef <_call_thread_continue+453>
0x8888bfc8 0x19eccc <call_continuation+28>
stackbottom=0x8888bfc8
task vm_map ipc_space #acts pid proc command
0x0dcb7e18 0x01149f78 0x0dc62ee8 65 0 0x00551160 kernel_task
thread processor pri state wait_queue wait_event
0x0dcc94f0 0x8501b000 81 IURW 0x0053d990 0xde5a85c
reserved_stack=0x8511c000
kernel_stack=0x8f878000
stacktop=0x8f87be78
0x8f87be78 0x135708 <processor_idle+148>
0x8f87bec8 0x135f10 <thread_select+1432>
0x8f87bf38 0x136a1c <thread_block_reason+135>
0x8f87bf78 0x136a9d <thread_block_parameter+32>
0x8f87bf98 0x41f809 <IOWorkLoop::threadMain()+191>
0x8f87bfc8 0x19eccc <call_continuation+28>
stackbottom=0x8f87bfc8
(gdb) info registers
eax 0x0 0
ecx 0x0 0
edx 0xdd09b00 231774976
ebx 0x42ec54 4385876
esp 0x85666ab0 0x85666ab0
ebp 0x0 0x0
esi 0x144 324
edi 0xffff0000 -65536
eip 0x0 0
eflags 0x10212 66066
cs 0x8 8
ss 0x10 16
ds 0x8f900010 -1886388208
es 0xd8330010 -667746288
fs 0xefd10010 -271515632
gs 0xe9660048 -379191224
(gdb) paniclog
(gdb) bt
#0 0x00000000 in ?? ()
Cannot access memory at address 0x4
(gdb) x/i 0x85664000
0x85664000: add %al,(êx)
(gdb) x/x 0x8b5664000
0xb5664000: Cannot access memory at address 0xb5664000
(gdb) x/i 0x856628d8
0x856628d8: Cannot access memory at address 0x856628d8
(gdb) x/i 0x856668d8
0x856668d8: shlb $0x85,(%esi)
(gdb) frame 0
#0 0x00000000 in ?? ()
(gdb) frame 1
kdp_reply_wait: unexpected sequence number for reply (expected 61, got 60)
Cannot access memory at address 0x4
(gdb) q
The program is running. Exit anyway? (y or n) y
Disconnected.
sh-3.2#
[广告] 出åè¦è¶â€œå°â€ï¼Œå¿«æ¥ä¸Šä¼ å®è´ç…§ç‰‡èµ¢å¤§å¥–å§ï¼
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Darwin-kernel mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden