X hits on this document

Powerpoint document

Using a JTAG in Linux Driver Debugging - page 37 / 48

151 views

0 shares

0 downloads

0 comments

37 / 48

04/16/2008 - Copyright © 2008 The PTR Group Inc.

CELF-2008-SVC-37

Dumping printk Buffer #2

The address of the buffer is a translated kernel address

Strip off the 0xC0000000 portion of the address to get (typically) the physical address on processors like the X86

i.e., 0xc0445980 would typically be at physical address 0x445980

You must understand your processor to do the translations correctly

Now, use the JTAG to dump that address

Raw printk output, but you can get an idea of what it was doing when it crashed

Data is still there even after reset (but not power-off)

Document info
Document views151
Page views151
Page last viewedTue Jan 17 12:22:22 UTC 2017
Pages48
Paragraphs607
Words3505

Comments