Dave Anderson wrote:
and looking around that "bl" target, there's the target
function
address of ".__kmalloc" a few words after it:
crash> rd -s 0xd000000000199858 20 d000000000199858:
3d82fffe398ce448 f8410028e96c0020 d000000000199868:
e84c00287d6903a6 4e80042000000000 d000000000199878: .__kmalloc
PPC64_CACHES+24336 d000000000199888: 3d82fffe398ce478
f8410028e96c0020 d000000000199898: e84c00287d6903a6
4e80042000000000 d0000000001998a8: .memset
PPC64_CACHES+24336 d0000000001998b8: 3d82fffe398ce4a8
f8410028e96c0020 d0000000001998c8: e84c00287d6903a6
4e80042000000000 d0000000001998d8: .memcpy
PPC64_CACHES+24336 d0000000001998e8: 3d82fffe398ce4d8
f8410028e96c0020 crash>
So I presume if you look at the data around 0xd000000000bd4120,
you'll most likely see ".kfree".
Ah-ha! Thanks Dave! I wondered if it was something like this and did
poke around a bit in the words following 0xd000000000bd4120 (stupidly
with dis rather than rd which was getting a bit confused and only
outputting one word at a time as I manually advanced the address..).
I didn't go quite far enough to see this:
crash> rd 0xd000000000bd4120 16
d000000000bd4120: 3d82ffff398cd3a0 f8410028e96c0020 =...9....A.(.l.
d000000000bd4130: e84c00287d6903a6 4e80042000000000 .L.(}i..N.. ....
d000000000bd4140: c0000000000ed0b4 [...]
crash> sym .kfree
c0000000000ed0b4 (T) .kfree
Thanks again.
Cheers,
Bryn.