X hits on this document

Powerpoint document

Using a JTAG in Linux Driver Debugging - page 37 / 48

124 views

0 shares

0 downloads

0 comments

37 / 48

04/16/2008 - Copyright © 2008 The PTR Group Inc.

CELF-2008-SVC-37

Dumping printk Buffer #2

The address of the buffer is a translated kernel address

Strip off the 0xC0000000 portion of the address to get (typically) the physical address on processors like the X86

i.e., 0xc0445980 would typically be at physical address 0x445980

You must understand your processor to do the translations correctly

Now, use the JTAG to dump that address

Raw printk output, but you can get an idea of what it was doing when it crashed

Data is still there even after reset (but not power-off)

Document info
Document views124
Page views124
Page last viewedThu Dec 08 14:45:10 UTC 2016
Pages48
Paragraphs607
Words3505

Comments