一次wlan固件crash的bebug经历

如果你喜欢小编往期内容,关注一下小编公众号"无线技术栈",或者私信回复"802.11"获取Wi-Fi学习方法和资料,也可以和小编交流一下经验~
最近小编更新停滞了很长一段时间,主要是因为项目吃紧,连续加班鏖战,利用周末时间来和大家分享一下最近所得和经验~

本章主要来分享一例wifi固件的异常引起kernel crash的案例~
一.Kernel crash栈打印

 747 [   12.781947][  T883] icnss2_qmi: fatal: Capability resp wait failed with ret -110
 748 [   12.781986][  T883] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
 749 [   12.781991][  T883] Mem abort info:
 750 [   12.781993][  T883]   ESR = 0x0000000096000005
 751 [   12.781996][  T883]   EC = 0x25: DABT (current EL), IL = 32 bits
 752 [   12.781999][  T883]   SET = 0, FnV = 0
 753 [   12.782002][  T883]   EA = 0, S1PTW = 0
 754 [   12.782004][  T883]   FSC = 0x05: level 1 translation fault
 755 [   12.782007][  T883] Data abort info:
 756 [   12.782009][  T883]   ISV = 0, ISS = 0x00000005
 757 [   12.782012][  T883]   CM = 0, WnR = 0
 758 [   12.782015][  T883] user pgtable: 4k pages, 39-bit VAs, pgdp=00000000d0094000
 759 [   12.782018][  T883] [0000000000000004] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
 760 [   12.782454][  T883] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
 761 [   12.782486][  T883] Skip md ftrace buffer dump for: 0x1400eb0
 770 [   12.782842][  T883] CPU: 6 PID: 883 Comm: kworker/u16:6 Tainted: G S      WC OE      6.1.57-android14-11-maybe-dirty-qki-consolidate #1
 771 [   12.782846][  T883] Hardware name: Qualcomm Technologies, Inc. Peridot based on SM8635 (DT)
 772 [   12.782849][  T883] Workqueue: icnss_driver_event icnss_driver_event_work [icnss2]
 773 [   12.782885][  T883] pstate: 02400005 (nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
 774 [   12.782888][  T883] pc : qcom_smem_state_update_bits+0xc/0x5c
 775 [   12.782898][  T883] lr : icnss_driver_event_work+0x574/0x2018 [icnss2]
 776 [   12.782927][  T883] sp : ffffffc00dfabc10
 777 [   12.782928][  T883] x29: ffffffc00dfabc10 x28: 00000000ffffff92 x27: ffffff88161eaf90
 778 [   12.782932][  T883] x26: ffffff88161ea978 x25: ffffff8836239d00 x24: ffffff88161ea040
 779 [   12.782936][  T883] x23: ffffff880f2ebd40 x22: ffffff88161ea798 x21: ffffff88161ea7b8
 780 [   12.782939][  T883] x20: ffffffeb22829000 x1

猜你喜欢

转载自blog.csdn.net/qq_39107198/article/details/136587543