http://www.linuxforum.net/forum/showflat.php?Cat=&Board=linuxK&Number=697990&page=0&view=collapsed&sb=5&o=7&fpart=

以前见到oops都是 用printk 去调试, 这次看来不行。 看到一堆汇编有点晕。

我的cpu是 mips的。


还望熟悉oops 调试信息的朋友指教, 如何 定位到 具体的c 代码呢?

我当前调试的AXFS 文件系统, 当把几乎所有的可执行文件和库 设置成XIP后 ,系统 就oops
了。

找到了几篇文章 ,似乎不能解决我的问题:我的oops信息 怎么连一个函数名称都没有啊。



href=""> net/bbs/archiver/?tid-1008573.html


href=""> p://topic.csdn.net/u/20080709/22/df880b59-c6ba-4cc1-9928-7902da46e115.html


href="">

烦请 做过的给出点详细步骤 , 谢谢了。


basic setup 4

basic setup end

FLASH PHYSADDR = 0x1c000000

axfs: checking physical address 0x1c000000 for axfs image

sbi->phys_start_addr = 469762048

axfs: start axfs_do_fill_super

into axfs_do_fill_super

sbo->magic = 0x48a0e4cd

AXFS_MAGIC = 0x48a0e4cd

axfs: doned axfs_do_fill_super

axfs: axfs image appears to be 20400 KB in size

axfs: doned axfs_check_super

sb's blocksize = 0

profile_data = c4018000

num_nodes = 7514

num_inodes = 1220

 here , just init_profile_dir_structure() 

ret of init_profile_dir_structure() = 0

ret of axfs_register_profiling_proc() = 0

ret of init_axfs_profiling() = 1

VFS: Mounted root (axfs filesystem) readonly.

Freeing unused kernel memory: 96k freed

Unable to handle kernel paging request at virtual address 000000a0, epc == 800d0f38,
ra == 8013b674

Oops in fault.c::do_page_fault, line 205:

$0 : 00000000 10008400 000003bc 0003c350 820ebcf0 82a591cc 00000000 00001000

$8 : 00000000 00000000 800d0f00 000004a8 c4014000 00000080 820ebcf0 c4012000

$16: 00001000 00000000 00000000 820ebcf0 0000000c 80247260 802c4120 0000000b

$24: 00000000 00000080                   820ea000 820ebc98 820ebd50 8013b674

Hi : 00000000

Lo : 00000080

epc   : 800d0f38    Not tainted

Status: 10008403

Cause : 00800008

PrId  : 0001906c

Process swapper (pid: 1, stackpage=820ea000)

Stack:    8013b674 00000000 820bc7a0 820ebd48 820bc820 80247260 00000000

 00000080 00000000 000001f2 00000080 00000000 820ebd88 820ebd50 c4012000

 8013b78c 820bc820 00000000 00000000 8026f984 820ebcf0 800d0f00 00000000

 00000080 820ebd88 00000000 80137d80 ffffffe9 800e0a84 80265278 80247260

 80265250 00000000 80265278 802c4120 80265250 820ebef8 00000008 00000004

 00000014 ...

Call Trace:   [<8013b674>] [<8013b78c>] [<800d0f00>]
[<80137d80>] [<800e0a84>]

 [<800ed2d8>] [<8015e7a4>] [<800edaa0>] [<800ee0d8>]
[<800a67b8>] [<800af0ac>]

 [<800f5d88>] [<800af6c4>] [<800af6c4>] [<8021a4f4>]
[<800b930c>] [<8021a4f4>]

 [<800b91b8>] [<8021c8d3>] [<800e0658>] [<800a67b8>]
[<800a67e4>] [<800a67b8>]

 [<800a68b0>] [<8021a4a8>] [<800a9694>] [<800b738c>]
[<800b91b8>] [<800a9684>]



Code: 3c088027  01024021  8d08ebfc <8d0700a0> 8dc40008  01a03021  00a73823 
00071140  00471023 

Kernel panic: Attempted to kill init!

Reply via email to