Port-sparc64 archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

User-level window trap when booting NetBSD kernel under QEMU SPARC64



Hi all,

I'm one of the QEMU SPARC/OpenBIOS maintainers and I've been spending my time over the past few weeks (and possibly longer!) working on patches so that NetBSD kernels will boot under QEMU SPARC64.

I've made some good progress recently, however I'm a still experiencing a user trap during boot which I don't understand. I've had some previous correspondence with Martin on this, but it requires a deep-level understanding as to how the SPARC64 memory management code works so I was hoping that you'd be able to provide some help with this.

So far I have a set of patches for OpenBIOS which get my 6.1.2 ISO image to boot to this point:


build@kentang:~/rel-qemu-git/bin$ ./qemu-system-sparc64 -cdrom /home/build/src/qemu/image/sparc64/NetBSD-6.1.2-sparc64.iso -bios /home/build/src/openbios/openbios-git/openbios-devel/obj-sparc64/openbios-builtin.elf.nostrip -boot d -nographic
OpenBIOS for Sparc64
Configuration device id QEMU version 1 machine id 0
kernel cmdline
CPUs: 1 x SUNW,UltraSPARC-IIi
UUID: 00000000-0000-0000-0000-000000000000
Welcome to OpenBIOS v1.1 built on May 12 2014 21:33
  Type 'help' for detailed information
Trying cdrom:f...
Not a bootable ELF image
Not a bootable a.out image

Loading FCode image...
Loaded 7478 bytes
entry point is 0x4000
NetBSD IEEE 1275 Multi-FS Bootblock
Version $NetBSD: bootblk.fth,v 1.13 2010/06/24 00:54:12 eeh Exp $
..
Jumping to entry point 0000000000100000 for type 0000000000000001...
switching to new context: entry point 0x100000 stack 0x00000000ffe8aa09
>> NetBSD/sparc64 OpenFirmware Boot, Revision 1.16
=0x8870a0
Loading netbsd: 8071888+553056+339856 [601032+393301]=0x9cd528
Unimplemented service set-symbol-lookup ([2] -- [0])

Unexpected client interface exception: -1
1 tt=30 tstate=4482000605 tpc=0x14984f4 tnpc=0x14984f8
2 tt=30 tstate=4411001503 tpc=0x1001804 tnpc=0x1001808
3 tt=c0 tstate=4482001604 tpc=0x10094f4 tnpc=0x135fbc8
Stopped in pid 0.1 (system) at  1008528:        nop
db{0}>


The problem is that I'm getting a data_access_exception on the first window fill trap executed after the kernel takes over the trap table with SUNW,set-trap-table.

Here is the gdb session showing the openfirmware() function after the NetBSD kernel has called SUNW,set-trap-table:


(gdb) disas 0x1009478, 0x10094f8
Dump of assembler code from 0x1009478 to 0x10094f8:
   0x0000000001009478:  sethi  %hi(0x1800000), %o4
   0x000000000100947c:  btst  1, %sp
   0x0000000001009480:  be  %icc, 0x10094f8
   0x0000000001009484:  ldx  [ %o4 ], %o4
   0x0000000001009488:  save  %sp, -176, %sp
   0x000000000100948c:  rdpr  %pil, %i2
   0x0000000001009490:  mov  0xf, %i3
   0x0000000001009494:  cmp  %i3, %i2
   0x0000000001009498:  movle  %icc, %i2, %i3
   0x000000000100949c:  wrpr  %g0, %i3, %pil
   0x00000000010094a0:  mov  %i0, %o0
   0x00000000010094a4:  mov  %g1, %l1
   0x00000000010094a8:  mov  %g2, %l2
   0x00000000010094ac:  mov  %g3, %l3
   0x00000000010094b0:  mov  %g4, %l4
   0x00000000010094b4:  mov  %g5, %l5
   0x00000000010094b8:  mov  %g6, %l6
   0x00000000010094bc:  mov  %g7, %l7
   0x00000000010094c0:  rdpr  %pstate, %l0
   0x00000000010094c4:  call  %i4
   0x00000000010094c8:  wrpr  6, %pstate
=> 0x00000000010094cc:  wrpr  %l0, %pstate
   0x00000000010094d0:  mov  %l1, %g1
   0x00000000010094d4:  mov  %l2, %g2
   0x00000000010094d8:  mov  %l3, %g3
   0x00000000010094dc:  mov  %l4, %g4
   0x00000000010094e0:  mov  %l5, %g5
   0x00000000010094e4:  mov  %l6, %g6
   0x00000000010094e8:  mov  %l7, %g7
   0x00000000010094ec:  wrpr  %i2, 0, %pil
   0x00000000010094f0:  ret
   0x00000000010094f4:  restore  %o0, %g0, %o0
End of assembler dump.
(gdb) info regi
g0             0x0      0
g1             0x1      1
g2             0x7e50000        132448256
g3             0x18d1c00        26024960
g4             0x1ae8000        28213248
g5             0x1000   4096
g6             0x0      0
g7             0x0      0
o0             0x0      0
o1             0x1      1
o2             0xfffffffffffffff8       -8
o3             0xffffffff00000000       -4294967296
o4             0x1c14230        29442608
o5             0x1000000        16777216
sp             0x1c054a1        0x1c054a1
o7             0x10094c4        16815300
l0             0x16     22
l1             0x1      1
l2             0x7e50000        132448256
l3             0x18d1c00        26024960
l4             0x1ae8000        28213248
l5             0x1000   4096
l6             0x0      0
l7             0x0      0
i0             0x1c05e00        29384192
i1             0x7e50000        132448256
i2             0xd      13
i3             0xf      15
i4             0xffd0fe60       4291886688
i5             0x18d1800        26023936
fp             0x1c05551        0x1c05551
i7             0x135fbc0        20315072
pc             0x10094cc        0x10094cc
npc            0x10094d0        0x10094d0
state          0x4482000604     294238815748
fsr            0x0      [ ]
fprs           0x4      [ FEF ]
y              0x0      0
cwp            0x4      4
pstate         0x6      [ IE PRIV ]
asi            0x82     130
ccr            0x44     68
(gdb)


The MMU TLB entries look like this:


QEMU 2.0.50 monitor - type 'help' for more information
(qemu) info tlb
MMU contexts: Primary: 0, Secondary: 0
DMMU dump
[00] VA: ffe00000, PA: 7f00000, 512k, priv, RW, locked, ctx 0 local
[01] VA: ffe80000, PA: 7f80000, 512k, priv, RW, locked, ctx 0 local
[02] VA: ffd00000, PA: 1fff0000000, 512k, priv, RO, locked, ctx 0 local
[03] VA: ffd80000, PA: 1fff0080000, 512k, priv, RO, locked, ctx 0 local
[04] VA: ffc80000, PA: 7e80000, 512k, priv, RW, locked, ctx 0 local
[05] VA: 4000, PA: 4000,   8k, priv, RW, unlocked, ctx 0 local
[06] VA: 6000, PA: 6000,   8k, priv, RW, unlocked, ctx 0 local
[07] VA: 8000, PA: 8000,   8k, priv, RW, unlocked, ctx 0 local
[08] VA: a000, PA: a000,   8k, priv, RW, unlocked, ctx 0 local
[09] VA: c000, PA: c000,   8k, priv, RW, unlocked, ctx 0 local
[10] VA: e000, PA: e000,   8k, priv, RW, unlocked, ctx 0 local
[11] VA: 10000, PA: 10000,   8k, priv, RW, unlocked, ctx 0 local
[12] VA: 12000, PA: 12000,   8k, priv, RW, unlocked, ctx 0 local
[13] VA: 14000, PA: 14000,   8k, priv, RW, unlocked, ctx 0 local
[14] VA: 16000, PA: 16000,   8k, priv, RW, unlocked, ctx 0 local
[15] VA: 18000, PA: 18000,   8k, priv, RW, unlocked, ctx 0 local
[16] VA: 1a000, PA: 1a000,   8k, priv, RW, unlocked, ctx 0 local
[17] VA: 100000, PA: 100000,   8k, priv, RW, unlocked, ctx 0 local
[18] VA: 102000, PA: 102000,   8k, priv, RW, unlocked, ctx 0 local
[19] VA: 104000, PA: 104000,   8k, priv, RW, unlocked, ctx 0 local
[20] VA: 106000, PA: 106000,   8k, priv, RW, unlocked, ctx 0 local
[21] VA: 108000, PA: 108000,   8k, priv, RW, unlocked, ctx 0 local
[22] VA: 10a000, PA: 10a000,   8k, priv, RW, unlocked, ctx 0 local
[23] VA: 10c000, PA: 10c000,   8k, priv, RW, unlocked, ctx 0 local
[24] VA: 10e000, PA: 10e000,   8k, priv, RW, unlocked, ctx 0 local
[25] VA: 110000, PA: 110000,   8k, priv, RW, unlocked, ctx 0 local
[26] VA: 112000, PA: 112000,   8k, priv, RW, unlocked, ctx 0 local
[27] VA: 114000, PA: 114000,   8k, priv, RW, unlocked, ctx 0 local
[28] VA: ffc7e000, PA: 7e7e000,   8k, priv, RW, unlocked, ctx 0 local
[29] VA: ffc7a000, PA: 7e7a000,   8k, priv, RW, unlocked, ctx 0 local
[30] VA: ffc7c000, PA: 7e7c000,   8k, priv, RW, unlocked, ctx 0 local
[31] VA: ffc78000, PA: 7e78000,   8k, priv, RW, unlocked, ctx 0 local
[32] VA: ffc76000, PA: 7e76000,   8k, priv, RW, unlocked, ctx 0 local
[33] VA: ffc72000, PA: 7e72000,   8k, priv, RW, unlocked, ctx 0 local
[34] VA: ffc70000, PA: 7e70000,   8k, priv, RW, unlocked, ctx 0 local
[35] VA: ffc6e000, PA: 7e6e000,   8k, priv, RW, unlocked, ctx 0 local
[36] VA: ffc64000, PA: 7e64000,   8k, priv, RW, unlocked, ctx 0 local
[37] VA: ffc66000, PA: 7e66000,   8k, priv, RW, unlocked, ctx 0 local
[38] VA: ffc68000, PA: 7e68000,   8k, priv, RW, unlocked, ctx 0 local
[39] VA: ffc6a000, PA: 7e6a000,   8k, priv, RW, unlocked, ctx 0 local
[40] VA: ffc6c000, PA: 7e6c000,   8k, priv, RW, unlocked, ctx 0 local
[41] VA: ffc62000, PA: 7e62000,   8k, priv, RW, unlocked, ctx 0 local
[42] VA: 1000000, PA: 7800000,   4M, priv, RO, locked, ctx 0 local
[43] VA: 1400000, PA: 7400000,   4M, priv, RO, locked, ctx 0 local
[44] VA: 1800000, PA: 7000000,   4M, priv, RW, locked, ctx 0 local
[45] VA: ffc60000, PA: 7e60000,   8k, priv, RW, unlocked, ctx 0 local
[46] VA: 7ffc000, PA: 7e5c000,   8k, priv, RW, unlocked, ctx 0 local
[47] VA: 7ffe000, PA: 7e5e000,   8k, priv, RW, unlocked, ctx 0 local
[48] VA: 7ffa000, PA: 7e5a000,   8k, priv, RW, unlocked, ctx 0 local
[49] VA: 1c0c000, PA: 7e40000,   8k, priv, RW, unlocked, ctx 0 local
[50] VA: 1c0e000, PA: 7e42000,   8k, priv, RW, unlocked, ctx 0 local
[51] VA: 1c10000, PA: 7e44000,   8k, priv, RW, unlocked, ctx 0 local
[52] VA: 1c12000, PA: 7e46000,   8k, priv, RW, unlocked, ctx 0 local
[53] VA: 1c14000, PA: 7e48000,   8k, priv, RW, unlocked, ctx 0 local
[54] VA: 1c16000, PA: 7e4a000,   8k, priv, RW, unlocked, ctx 0 local
[55] VA: 1c18000, PA: 7e4c000,   8k, priv, RW, unlocked, ctx 0 local
[56] VA: 1c1a000, PA: 7e4e000,   8k, priv, RW, unlocked, ctx 0 local
[57] VA: e0010000, PA: 7e40000,  64k, priv, RW, locked, ctx 0 local
[58] VA: 1c04000, PA: 14000,   8k, priv, RW, unlocked, ctx 0 local
IMMU dump
[00] VA: ffd00000, PA: 1fff0000000, 512k, priv, locked, ctx 0 local
[01] VA: ffc80000, PA: 7e80000, 512k, priv, locked, ctx 0 local
[02] VA: 100000, PA: 100000,   8k, priv, unlocked, ctx 0 local
[03] VA: 102000, PA: 102000,   8k, priv, unlocked, ctx 0 local
[04] VA: 10a000, PA: 10a000,   8k, priv, unlocked, ctx 0 local
[05] VA: 10c000, PA: 10c000,   8k, priv, unlocked, ctx 0 local
[06] VA: 110000, PA: 110000,   8k, priv, unlocked, ctx 0 local
[07] VA: 104000, PA: 104000,   8k, priv, unlocked, ctx 0 local
[08] VA: 108000, PA: 108000,   8k, priv, unlocked, ctx 0 local
[09] VA: 10e000, PA: 10e000,   8k, priv, unlocked, ctx 0 local
[10] VA: 106000, PA: 106000,   8k, priv, unlocked, ctx 0 local
[11] VA: 1000000, PA: 7800000,   4M, priv, locked, ctx 0 local
[12] VA: 1400000, PA: 7400000,   4M, priv, locked, ctx 0 local
(qemu)


As soon as I hit the restore at 0x10094f4 in gdb, I get a fill_0_normal trap which vectors to 0x1001800:


(gdb) disas 0x1001800, 0x100184c
Dump of assembler code from 0x1001800 to 0x100184c:
=> 0x0000000001001800:  wr  %g0, 0x11, %asi
   0x0000000001001804:  ldxa  [ %sp + 0x7ff ] %asi, %l0
   0x0000000001001808:  ldxa  [ %sp + 0x807 ] %asi, %l1
   0x000000000100180c:  ldxa  [ %sp + 0x80f ] %asi, %l2
   0x0000000001001810:  ldxa  [ %sp + 0x817 ] %asi, %l3
   0x0000000001001814:  ldxa  [ %sp + 0x81f ] %asi, %l4
   0x0000000001001818:  ldxa  [ %sp + 0x827 ] %asi, %l5
   0x000000000100181c:  ldxa  [ %sp + 0x82f ] %asi, %l6
   0x0000000001001820:  ldxa  [ %sp + 0x837 ] %asi, %l7
   0x0000000001001824:  ldxa  [ %sp + 0x83f ] %asi, %i0
   0x0000000001001828:  ldxa  [ %sp + 0x847 ] %asi, %i1
   0x000000000100182c:  ldxa  [ %sp + 0x84f ] %asi, %i2
   0x0000000001001830:  ldxa  [ %sp + 0x857 ] %asi, %i3
   0x0000000001001834:  ldxa  [ %sp + 0x85f ] %asi, %i4
   0x0000000001001838:  ldxa  [ %sp + 0x867 ] %asi, %i5
   0x000000000100183c:  ldxa  [ %sp + 0x86f ] %asi, %fp
   0x0000000001001840:  ldxa  [ %sp + 0x877 ] %asi, %i7
   0x0000000001001844:  restored
   0x0000000001001848:  retry
End of assembler dump.
(gdb) info regi
g0             0x0      0
g1             0x1f61ec8c2      8424179906
g2             0x1f60f8682      8423179906
g3             0xffe11df8       4292943352
g4             0x0      0
g5             0x0      0
g6             0x0      0
g7             0x0      0
o0             0x1c05e00        29384192
o1             0x7e50000        132448256
o2             0xd      13
o3             0xf      15
o4             0xffd0fe60       4291886688
o5             0x18d1800        26023936
sp             0x1c05551        0x1c05551
o7             0x135fbc0        20315072
l0             0xffffffffffe30c38       -1897416
l1             0xffe8ac38       4293438520
l2             0x17500f0        24445168
l3             0x1746c78        24407160
l4             0x1816400        25256960
l5             0x18c0800        25954304
l6             0x18c0800        25954304
l7             0x19cd570        27055472
i0             0xa      10
i1             0xffe8b0f0       4293439728
i2             0x20     32
i3             0xffd0fe60       4291886688
i4             0x17502f8        24445688
i5             0x0      0
fp             0xffe85219       0xffe85219
i7             0xffd0a988       4291864968
pc             0x1001800        0x1001800
npc            0x1001804        0x1001804
state          0x4482001503     294238819587
fsr            0x0      [ ]
fprs           0x4      [ FEF ]
y              0x0      0
cwp            0x3      3
pstate         0x15     [ AG PRIV PEF ]
asi            0x82     130
ccr            0x44     68
(gdb)


From here you can see that %sp is 0x1c05551, so the first access at %sp + 0x7ff bias = 0x1c05d50 which is mapped just before the call to SUNW,set-trap-table. But because the access is made using ASI 0x11 which is a user ASI then the fill_0_normal invokes a further data_access_exception trap, which takes roughly the following path:


-> trap 0x30, data_access_exception (0x1004600)
  -> winfault: 0x00000000010081cc
     http://nxr.netbsd.org/xref/src/sys/arch/sparc64/sparc64/locore.s#1721

     #1737 we did previously take a datafault, so go to winfixfill

  -> winfixfill: 0x000000000100822c
     http://nxr.netbsd.org/xref/src/sys/arch/sparc64/sparc64/locore.s#1756

     #1770: we are in PRIV mode, so carry on

     #1819: not at trap level 3, so invoke software trap 1 (0x101)

     Trap 0x101 invokes the panic/debugger


This shows that the 0x101 is being invoked deliberately because a kernel mapping is being accessed by a user ASI while the processor is in PSTATE.PRIV == 1 mode.

AFAICT the basic logic looks correct, so I am wondering if anyone can comment as to what should happen on real hardware? My current thoughts are that the initial fill_0_normal trap is incorrect, and instead a supervisor fill trap should be used instead but I can't quite understand how this is supposed to happen.

If anyone has any ideas as to why this is happening and/or what the intended behaviour is then I would be very interested to try and understand the memory management algorithms. And of course, when it all works then you get the warm feeling of being able to add a SPARC64 machine to your buildfarm!

If you've made it this far, then thank you for your time and I look forward to hearing from you further :)


ATB,

Mark.

P.S. Attached is the complete OpenBIOS output with CIF debugging added which is useful to trace which parts of the code are performing which memory allocations and mappings.

build@kentang:~/rel-qemu-git/bin$ ./qemu-system-sparc64 -cdrom 
/home/build/src/qemu/image/sparc64/NetBSD-6.1.2-sparc64.iso -bios 
/home/build/src/openbios/openbios-git/openbios-devel/obj-sparc64/openbios-builtin.elf.nostrip
 -boot d -nographic
OpenBIOS for Sparc64
Configuration device id QEMU version 1 machine id 0
kernel cmdline 
CPUs: 1 x SUNW,UltraSPARC-IIi
UUID: 00000000-0000-0000-0000-000000000000
Welcome to OpenBIOS v1.1 built on May 12 2014 21:33
  Type 'help' for detailed information
Trying cdrom:f...
Not a bootable ELF image
Not a bootable a.out image

Loading FCode image...
Loaded 7478 bytes
entry point is 0x4000
NetBSD IEEE 1275 Multi-FS Bootblock
Version $NetBSD: bootblk.fth,v 1.13 2010/06/24 00:54:12 eeh Exp $
..
Jumping to entry point 0000000000100000 for type 0000000000000001...
switching to new context: entry point 0x100000 stack 0x00000000ffe8aa09
finddevice("/chosen") = 0x00000000ffe1bfa8
getprop(0x00000000ffe1bfa8, "mmu", 0x0000000000113140, 4) = 4
0x00113140  ff c8 47 f0 __ __ __ __ __ __ __ __ __ __ __ __  ��G�
getprop(0x00000000ffe1bfa8, "memory", 0x000000000011313c, 4) = 4
0x0011313c  ff c8 48 b0 __ __ __ __ __ __ __ __ __ __ __ __  ��H�
finddevice("/chosen") = 0x00000000ffe1bfa8
getprop(0x00000000ffe1bfa8, "stdin", 0x0000000000113e30, 4) = 4
0x00113e30  ff c8 4b e8 __ __ __ __ __ __ __ __ __ __ __ __  ��K�
getprop(0x00000000ffe1bfa8, "stdout", 0x0000000000113e34, 4) = 4
0x00113e34  ff c8 4a 48 __ __ __ __ __ __ __ __ __ __ __ __  ��JH
>> NetBSD/sparc64 OpenFirmware Boot, Revision 1.16
getprop(0x00000000ffe1bfa8, "bootpath", 0x00000000001138f0, 128) = 40
0x001138f0  2f 70 63 69 40 31 66 65 2c 30 2f 70 63 69 2d 61  /pci@1fe,0/pci-a
0x00113900  74 61 40 35 2f 69 64 65 31 40 36 30 30 2f 63 64  ta@5/ide1@600/cd
0x00113910  72 6f 6d 40 30 3a 66 00 __ __ __ __ __ __ __ __  rom@0:f.
getprop(0x00000000ffe1bfa8, "bootargs", 0x00000000001137f0, 256) = 1
0x001137f0  00 __ __ __ __ __ __ __ __ __ __ __ __ __ __ __  .
finddevice("/boot.cfg") = 0xffffffffffffffff
finddevice("/pci@1fe,0/pci-ata@5/ide1@600/cdrom@0:f") = 0x00000000ffe305b8
getprop(0x00000000ffe305b8, "name", 0x00000000ffe8a5d8, 512) = 6
0xffe8a5d8  63 64 72 6f 6d 00 __ __ __ __ __ __ __ __ __ __  cdrom.
getprop(0x00000000ffe305b8, "device_type", 0x00000000ffe8a5d8, 512) = 6
0xffe8a5d8  62 6c 6f 63 6b 00 __ __ __ __ __ __ __ __ __ __  block.
open("/pci@1fe,0/pci-ata@5/ide1@600/cdrom@0:c") = 0x0000000000000000
open("/pci@1fe,0/pci-ata@5/ide1@600/cdrom@0") = 0x00000000ffc85af0
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000002000 0000000000002000
call-method claim ([4] -- [2])
handle_calls return: 0000000000000000 00000000ffc7e000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000002000 0000000000002000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e7e000
of_client_interface: call-method 0000000000111638 00000000ffc847f0 
ffffffffffffffff 0000000000002000 00000000ffc7e000 0000000000000000 
0000000007e7e000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000002000 0000000000004000
call-method claim ([4] -- [2])
handle_calls return: 0000000000000000 00000000ffc7a000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000002000 0000000000004000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e7a000
of_client_interface: call-method 0000000000111638 00000000ffc847f0 
ffffffffffffffff 0000000000004000 00000000ffc7a000 0000000000000000 
0000000007e7a000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000002000 0000000000002000
call-method claim ([4] -- [2])
handle_calls return: 0000000000000000 00000000ffc78000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000002000 0000000000002000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e78000
of_client_interface: call-method 0000000000111638 00000000ffc847f0 
ffffffffffffffff 0000000000002000 00000000ffc78000 0000000000000000 
0000000007e78000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000002000 0000000000002000
call-method claim ([4] -- [2])
handle_calls return: 0000000000000000 00000000ffc76000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000002000 0000000000002000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e76000
of_client_interface: call-method 0000000000111638 00000000ffc847f0 
ffffffffffffffff 0000000000002000 00000000ffc76000 0000000000000000 
0000000007e76000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000002000 0000000000004000
call-method claim ([4] -- [2])
handle_calls return: 0000000000000000 00000000ffc72000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000002000 0000000000004000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e72000
of_client_interface: call-method 0000000000111638 00000000ffc847f0 
ffffffffffffffff 0000000000004000 00000000ffc72000 0000000000000000 
0000000007e72000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000002000 0000000000002000
call-method claim ([4] -- [2])
handle_calls return: 0000000000000000 00000000ffc70000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000002000 0000000000002000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e70000
of_client_interface: call-method 0000000000111638 00000000ffc847f0 
ffffffffffffffff 0000000000002000 00000000ffc70000 0000000000000000 
0000000007e70000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000002000 0000000000002000
call-method claim ([4] -- [2])
handle_calls return: 0000000000000000 00000000ffc6e000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000002000 0000000000002000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e6e000
of_client_interface: call-method 0000000000111638 00000000ffc847f0 
ffffffffffffffff 0000000000002000 00000000ffc6e000 0000000000000000 
0000000007e6e000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
close(0x00000000ffc85af0)
service close: possible argument error (1 -1)
finddevice("netbsd") = 0xffffffffffffffff
finddevice("/pci@1fe,0/pci-ata@5/ide1@600/cdrom@0:a") = 0x00000000ffe305b8
getprop(0x00000000ffe305b8, "name", 0x00000000ffe8a528, 512) = 6
0xffe8a528  63 64 72 6f 6d 00 __ __ __ __ __ __ __ __ __ __  cdrom.
getprop(0x00000000ffe305b8, "device_type", 0x00000000ffe8a528, 512) = 6
0xffe8a528  62 6c 6f 63 6b 00 __ __ __ __ __ __ __ __ __ __  block.
open("/pci@1fe,0/pci-ata@5/ide1@600/cdrom@0:c") = 0x0000000000000000
open("/pci@1fe,0/pci-ata@5/ide1@600/cdrom@0") = 0x00000000ffc86220
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000002000 000000000000a000
call-method claim ([4] -- [2])
handle_calls return: 0000000000000000 00000000ffc64000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000002000 000000000000a000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e64000
of_client_interface: call-method 0000000000111638 00000000ffc847f0 
ffffffffffffffff 000000000000a000 00000000ffc64000 0000000000000000 
0000000007e64000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
=0x8870a0
Loading netbsd: 8071888peer(0x0000000000000000) = 0x00000000ffe1b910
child(0x00000000ffe1b910) = 0x00000000ffe1bae8
getprop(0x00000000ffe1bae8, "device_type", 0x00000000ffe8a8a8, 128) = -1
peer(0x00000000ffe1bae8) = 0x00000000ffe1bc10
getprop(0x00000000ffe1bc10, "device_type", 0x00000000ffe8a8a8, 128) = 8
0xffe8a8a8  42 6f 6f 74 52 4f 4d 00 __ __ __ __ __ __ __ __  BootROM.
peer(0x00000000ffe1bc10) = 0x00000000ffe1bec8
getprop(0x00000000ffe1bec8, "device_type", 0x00000000ffe8a8a8, 128) = -1
peer(0x00000000ffe1bec8) = 0x00000000ffe1bfa8
getprop(0x00000000ffe1bfa8, "device_type", 0x00000000ffe8a8a8, 128) = -1
peer(0x00000000ffe1bfa8) = 0x00000000ffe1c0e8
getprop(0x00000000ffe1c0e8, "device_type", 0x00000000ffe8a8a8, 128) = -1
peer(0x00000000ffe1c0e8) = 0x00000000ffe25f58
getprop(0x00000000ffe25f58, "device_type", 0x00000000ffe8a8a8, 128) = -1
peer(0x00000000ffe25f58) = 0x00000000ffe292b0
getprop(0x00000000ffe292b0, "device_type", 0x00000000ffe8a8a8, 128) = 7
0xffe8a8a8  6d 65 6d 6f 72 79 00 __ __ __ __ __ __ __ __ __  memory.
peer(0x00000000ffe292b0) = 0x00000000ffe29410
getprop(0x00000000ffe29410, "device_type", 0x00000000ffe8a8a8, 128) = -1
peer(0x00000000ffe29410) = 0x00000000ffe2b708
getprop(0x00000000ffe2b708, "device_type", 0x00000000ffe8a8a8, 128) = 4
0xffe8a8a8  70 63 69 00 __ __ __ __ __ __ __ __ __ __ __ __  pci.
peer(0x00000000ffe2b708) = 0x00000000ffe30c40
getprop(0x00000000ffe30c40, "device_type", 0x00000000ffe8a8a8, 128) = 4
0xffe8a8a8  63 70 75 00 __ __ __ __ __ __ __ __ __ __ __ __  cpu.
getprop(0x00000000ffe30c40, "upa-portid", 0x00000000ffe8a934, 4) = 4
0xffe8a934  00 00 00 00 __ __ __ __ __ __ __ __ __ __ __ __  ....
getprop(0x00000000ffe30c40, "#dtlb-entries", 0x0000000000113e14, 4) = 4
0x00113e14  00 00 00 40 __ __ __ __ __ __ __ __ __ __ __ __  ...@
getprop(0x00000000ffe30c40, "#itlb-entries", 0x0000000000113e10, 4) = 4
0x00113e10  00 00 00 40 __ __ __ __ __ __ __ __ __ __ __ __  ...@
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000002000 0000000000002000
call-method claim ([4] -- [2])
handle_calls return: 0000000000000000 00000000ffc62000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000002000 0000000000002000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e62000
of_client_interface: call-method 0000000000111638 00000000ffc847f0 
ffffffffffffffff 0000000000002000 00000000ffc62000 0000000000000000 
0000000007e62000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000400000 0000000000400000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007800000
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000000000 0000000000400000 0000000001000000
call-method claim ([5] -- [2])
handle_calls return: 0000000000000000 0000000001000000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000400000 0000000000400000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007400000
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000000000 0000000000400000 0000000001400000
call-method claim ([5] -- [2])
handle_calls return: 0000000000000000 0000000001400000
+553056of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000400000 0000000000400000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007000000
of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000000000 0000000000400000 0000000001800000
call-method claim ([5] -- [2])
handle_calls return: 0000000000000000 0000000001800000
+339856of_client_interface: call-method 0000000000111628 00000000ffc847f0 
0000000000002000 0000000000002000
call-method claim ([4] -- [2])
handle_calls return: 0000000000000000 00000000ffc60000
of_client_interface: call-method 0000000000111628 00000000ffc848b0 
0000000000002000 0000000000002000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e60000
of_client_interface: call-method 0000000000111638 00000000ffc847f0 
ffffffffffffffff 0000000000002000 00000000ffc60000 0000000000000000 
0000000007e60000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
 [601032+393301]=0x9cd528
close(0x00000000ffc86220)
service close: possible argument error (1 -1)
finddevice("/chosen") = 0x00000000ffe1bfa8
getprop(0x00000000ffe1bfa8, "stdin", 0x0000000001875f10, 4) = 4
0x01875f10  ff c8 4b e8 __ __ __ __ __ __ __ __ __ __ __ __  ��K�
getprop(0x00000000ffe1bfa8, "stdout", 0x0000000001875f14, 4) = 4
0x01875f14  ff c8 4a 48 __ __ __ __ __ __ __ __ __ __ __ __  ��JH
instance-to-package(0x00000000ffc84a48) = 0x00000000ffe2edd8
of_client_interface: set-symbol-lookup 0000000001367ae0 0000000001367ba0
Unimplemented service set-symbol-lookup ([2] -- [0])
peer(0x0000000000000000) = 0x00000000ffe1b910
getprop(0x00000000ffe1b910, "compatible", 0x00000000ffe8ac58, 32) = 6
0xffe8ac58  73 75 6e 34 75 00 __ __ __ __ __ __ __ __ __ __  sun4u.
child(0x00000000ffe1b910) = 0x00000000ffe1bae8
getprop(0x00000000ffe1bae8, "device_type", 0x00000000ffe8ac38, 32) = -1
peer(0x00000000ffe1bae8) = 0x00000000ffe1bc10
getprop(0x00000000ffe1bc10, "device_type", 0x00000000ffe8ac38, 32) = 8
0xffe8ac38  42 6f 6f 74 52 4f 4d 00 __ __ __ __ __ __ __ __  BootROM.
peer(0x00000000ffe1bc10) = 0x00000000ffe1bec8
getprop(0x00000000ffe1bec8, "device_type", 0x00000000ffe8ac38, 32) = -1
peer(0x00000000ffe1bec8) = 0x00000000ffe1bfa8
getprop(0x00000000ffe1bfa8, "device_type", 0x00000000ffe8ac38, 32) = -1
peer(0x00000000ffe1bfa8) = 0x00000000ffe1c0e8
getprop(0x00000000ffe1c0e8, "device_type", 0x00000000ffe8ac38, 32) = -1
peer(0x00000000ffe1c0e8) = 0x00000000ffe25f58
getprop(0x00000000ffe25f58, "device_type", 0x00000000ffe8ac38, 32) = -1
peer(0x00000000ffe25f58) = 0x00000000ffe292b0
getprop(0x00000000ffe292b0, "device_type", 0x00000000ffe8ac38, 32) = 7
0xffe8ac38  6d 65 6d 6f 72 79 00 __ __ __ __ __ __ __ __ __  memory.
peer(0x00000000ffe292b0) = 0x00000000ffe29410
getprop(0x00000000ffe29410, "device_type", 0x00000000ffe8ac38, 32) = -1
peer(0x00000000ffe29410) = 0x00000000ffe2b708
getprop(0x00000000ffe2b708, "device_type", 0x00000000ffe8ac38, 32) = 4
0xffe8ac38  70 63 69 00 __ __ __ __ __ __ __ __ __ __ __ __  pci.
peer(0x00000000ffe2b708) = 0x00000000ffe30c40
getprop(0x00000000ffe30c40, "device_type", 0x00000000ffe8ac38, 32) = 4
0xffe8ac38  63 70 75 00 __ __ __ __ __ __ __ __ __ __ __ __  cpu.
getproplen(0x00000000ffe30c40, "dcache-line-size") = 0x0000000000000004
getprop(0x00000000ffe30c40, "dcache-line-size", 0x00000000ffe8ab84, 4) = 4
0xffe8ab84  00 00 00 20 __ __ __ __ __ __ __ __ __ __ __ __  ... 
getproplen(0x00000000ffe30c40, "icache-line-size") = 0x0000000000000004
getprop(0x00000000ffe30c40, "icache-line-size", 0x00000000ffe8ab84, 4) = 4
0xffe8ab84  00 00 00 40 __ __ __ __ __ __ __ __ __ __ __ __  ...@
peer(0x00000000ffe30c40) = 0x0000000000000000
claim(0x0000000000000000, 16384, 8192) = 0x0000000007ffc000
claim(0x0000000000000000, 8192, 8192) = 0x0000000007ffa000
child(0x00000000ffe1b910) = 0x00000000ffe1bae8
getproplen(0x00000000ffe1bae8, "device_type") = 0xffffffffffffffff
peer(0x00000000ffe1bae8) = 0x00000000ffe1bc10
getproplen(0x00000000ffe1bc10, "device_type") = 0x0000000000000008
getprop(0x00000000ffe1bc10, "device_type", 0x00000000018afc40, 8) = 8
0x018afc40  42 6f 6f 74 52 4f 4d 00 __ __ __ __ __ __ __ __  BootROM.
peer(0x00000000ffe1bc10) = 0x00000000ffe1bec8
getproplen(0x00000000ffe1bec8, "device_type") = 0xffffffffffffffff
peer(0x00000000ffe1bec8) = 0x00000000ffe1bfa8
getproplen(0x00000000ffe1bfa8, "device_type") = 0xffffffffffffffff
peer(0x00000000ffe1bfa8) = 0x00000000ffe1c0e8
getproplen(0x00000000ffe1c0e8, "device_type") = 0xffffffffffffffff
peer(0x00000000ffe1c0e8) = 0x00000000ffe25f58
getproplen(0x00000000ffe25f58, "device_type") = 0xffffffffffffffff
peer(0x00000000ffe25f58) = 0x00000000ffe292b0
getproplen(0x00000000ffe292b0, "device_type") = 0x0000000000000007
getprop(0x00000000ffe292b0, "device_type", 0x00000000018afc40, 7) = 7
0x018afc40  6d 65 6d 6f 72 79 00 __ __ __ __ __ __ __ __ __  memory.
peer(0x00000000ffe292b0) = 0x00000000ffe29410
getproplen(0x00000000ffe29410, "device_type") = 0xffffffffffffffff
peer(0x00000000ffe29410) = 0x00000000ffe2b708
getproplen(0x00000000ffe2b708, "device_type") = 0x0000000000000004
getprop(0x00000000ffe2b708, "device_type", 0x00000000018afc40, 4) = 4
0x018afc40  70 63 69 00 __ __ __ __ __ __ __ __ __ __ __ __  pci.
peer(0x00000000ffe2b708) = 0x00000000ffe30c40
getproplen(0x00000000ffe30c40, "device_type") = 0x0000000000000004
getprop(0x00000000ffe30c40, "device_type", 0x00000000018afc40, 4) = 4
0x018afc40  63 70 75 00 __ __ __ __ __ __ __ __ __ __ __ __  cpu.
getproplen(0x00000000ffe30c40, "ecache-size") = 0x0000000000000004
getprop(0x00000000ffe30c40, "ecache-size", 0x00000000ffe8aaa4, 4) = 4
0xffe8aaa4  00 04 00 00 __ __ __ __ __ __ __ __ __ __ __ __  ....
getproplen(0x00000000ffe30c40, "ecache-associativity") = 0x0000000000000004
getprop(0x00000000ffe30c40, "ecache-associativity", 0x00000000ffe8aaa4, 4) = 4
0xffe8aaa4  00 00 00 01 __ __ __ __ __ __ __ __ __ __ __ __  ....
peer(0x00000000ffe30c40) = 0x0000000000000000
finddevice("/chosen") = 0x00000000ffe1bfa8
getprop(0x00000000ffe1bfa8, "mmu", 0x0000000001875604, 4) = 4
0x01875604  ff c8 47 f0 __ __ __ __ __ __ __ __ __ __ __ __  ��G�
of_client_interface: call-method 0000000001785870 00000000ffc847f0 
0000000000000000 0000000000008000 00000000e0006000
call-method claim ([5] -- [2])
handle_calls return: 0000000000000000 00000000e0006000
finddevice("/") = 0x00000000ffe1b910
getprop(0x00000000ffe1b910, "name", 0x00000000ffe8aa58, 80) = 22
0xffe8aa58  4f 70 65 6e 42 69 6f 73 54 65 61 6d 2c 4f 70 65  OpenBiosTeam,Ope
0xffe8aa68  6e 42 49 4f 53 00 __ __ __ __ __ __ __ __ __ __  nBIOS.
finddevice("/chosen") = 0x00000000ffe1bfa8
getprop(0x00000000ffe1bfa8, "memory", 0x0000000001875600, 4) = 4
0x01875600  ff c8 48 b0 __ __ __ __ __ __ __ __ __ __ __ __  ��H�
test("test-method") = 0
test-method(0x00000000ffc848b0, "SUNW,retain") = 
Unexpected client interface exception: -1 
Error calling client interface: fffffffffffffffe
of_client_interface: call-method 0000000001785a80 00000000ffc848b0 
0000000000002000 0000000000008000 00000000017708d8
call-method SUNW,retain ([5] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e52000
of_client_interface: call-method 00000000017aa340 00000000ffc847f0 
ffffffffffffffff 0000000000008000 00000000e0006000 0000000000000000 
0000000007e52000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
finddevice("/memory") = 0x00000000ffe292b0
getproplen(0x00000000ffe292b0, "reg") = 0x0000000000000010
getprop(0x00000000ffe292b0, "reg", 0x0000000001acf530, 16) = 16
0x01acf530  00 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00  ................
finddevice("/virtual-memory") = 0x00000000ffe29410
getproplen(0x00000000ffe29410, "translations") = 0x00000000000001f8
getprop(0x00000000ffe29410, "translations", 0x0000000001acf540, 504) = 504
0x01acf540  00 00 00 00 00 00 20 00 00 00 00 00 00 0f e0 00  ...... .......�.
0x01acf550  80 00 00 00 00 00 20 36 00 00 00 00 00 10 00 00  ...... 6........
0x01acf560  00 00 00 00 00 01 60 00 80 00 00 00 00 10 00 36  ......`........6
0x01acf570  00 00 00 00 00 11 60 00 00 00 00 00 00 6e c0 00  ......`......n�.
0x01acf580  80 00 00 00 00 11 60 36 00 00 00 00 07 ff a0 00  ......`6.....��.
0x01acf590  00 00 00 00 00 00 20 00 80 00 00 00 07 e5 a0 36  ...... ......��6
0x01acf5a0  00 00 00 00 07 ff c0 00 00 00 00 00 00 00 40 00  .....��.......@.
0x01acf5b0  80 00 00 00 07 e5 c0 36 00 00 00 00 e0 00 60 00  .....��6....�.`.
0x01acf5c0  00 00 00 00 00 00 80 00 80 00 00 00 07 e5 20 36  .............� 6
0x01acf5d0  00 00 00 00 ff c6 00 00 00 00 00 00 00 00 20 00  ....��........ .
0x01acf5e0  80 00 00 00 07 e6 00 36 00 00 00 00 ff c6 20 00  .....�.6....�� .
0x01acf5f0  00 00 00 00 00 00 20 00 80 00 00 00 07 e6 20 36  ...... ......� 6
0x01acf600  00 00 00 00 ff c6 40 00 00 00 00 00 00 00 a0 00  ....��@.......�.
0x01acf610  80 00 00 00 07 e6 40 36 00 00 00 00 ff c6 e0 00  .....�@6....���.
0x01acf620  00 00 00 00 00 00 20 00 80 00 00 00 07 e6 e0 36  ...... ......��6
0x01acf630  00 00 00 00 ff c7 00 00 00 00 00 00 00 00 20 00  ....��........ .
0x01acf640  80 00 00 00 07 e7 00 36 00 00 00 00 ff c7 20 00  .....�.6....�� .
0x01acf650  00 00 00 00 00 00 40 00 80 00 00 00 07 e7 20 36  ......@......� 6
0x01acf660  00 00 00 00 ff c7 60 00 00 00 00 00 00 00 20 00  ....��`....... .
0x01acf670  80 00 00 00 07 e7 60 36 00 00 00 00 ff c7 80 00  .....�`6....��..
0x01acf680  00 00 00 00 00 00 20 00 80 00 00 00 07 e7 80 36  ...... ......�.6
0x01acf690  00 00 00 00 ff c7 a0 00 00 00 00 00 00 00 40 00  ....�Ǡ.......@.
0x01acf6a0  80 00 00 00 07 e7 a0 36 00 00 00 00 ff c7 e0 00  .....�6....���.
0x01acf6b0  00 00 00 00 00 00 20 00 80 00 00 00 07 e7 e0 36  ...... ......��6
0x01acf6c0  00 00 00 00 ff c8 00 00 00 00 00 00 00 08 00 00  ....��..........
0x01acf6d0  80 00 00 00 07 e8 00 76 00 00 00 00 ff d0 00 00  .....�.v....��..
0x01acf6e0  00 00 00 00 00 08 00 00 80 00 01 ff f0 00 00 74  ...........��..t
0x01acf6f0  00 00 00 00 ff d8 00 00 00 00 00 00 00 08 00 00  ....��..........
0x01acf700  80 00 01 ff f0 08 00 74 00 00 00 00 ff e0 00 00  ...��..t....��..
0x01acf710  00 00 00 00 00 08 00 00 80 00 00 00 07 f0 00 76  .............�.v
0x01acf720  00 00 00 00 ff e8 00 00 00 00 00 00 00 08 00 00  ....��..........
0x01acf730  80 00 00 00 07 f8 00 76 __ __ __ __ __ __ __ __  .....�.v
of_client_interface: call-method 0000000001785870 00000000ffc848b0 
0000000000010000 0000000000010000
call-method claim ([4] -- [3])
handle_calls return: 0000000000000000 0000000000000000 0000000007e40000
finddevice("/memory") = 0x00000000ffe292b0
getproplen(0x00000000ffe292b0, "available") = 0x0000000000000040
getprop(0x00000000ffe292b0, "available", 0x0000000001acf738, 64) = --> BREAK
64
0x01acf738  00 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00  ................
0x01acf748  00 00 00 00 00 11 42 c0 00 00 00 00 06 ee bd 40  ......B�.....��@
0x01acf758  00 00 00 00 07 c0 00 00 00 00 00 00 00 24 00 00  .....�.......$..
0x01acf768  00 00 00 00 07 e5 00 00 00 00 00 00 00 00 20 00  .....�........ .
of_client_interface: call-method 00000000017aa340 00000000ffc847f0 
ffffffffffffffff 0000000000008000 00000000e0006000 0000000000000000 
0000000007e52000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 00000000017aa340 00000000ffc847f0 
ffffffffffffffff 0000000000002000 0000000001c02000 0000000000000000 
0000000000010000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 00000000017aa340 00000000ffc847f0 
ffffffffffffffff 0000000000002000 0000000001c04000 0000000000000000 
0000000000014000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 00000000017aa340 00000000ffc847f0 
ffffffffffffffff 0000000000002000 0000000001c06000 0000000000000000 
0000000000016000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 00000000017aa340 00000000ffc847f0 
ffffffffffffffff 0000000000002000 0000000001c08000 0000000000000000 
0000000000018000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 00000000017aa340 00000000ffc847f0 
ffffffffffffffff 0000000000010000 0000000001c0c000 0000000000000000 
0000000007e40000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: call-method 00000000017aa340 00000000ffc847f0 
ffffffffffffffff 0000000000010000 00000000e0010000 0000000000000000 
0000000007e40000
call-method map ([7] -- [1])
handle_calls return: 0000000000000000
of_client_interface: SUNW,set-trap-table 0000000001000000
of_client_interface return:
1 tt=30 tstate=4482000605 tpc=0x14984f4 tnpc=0x14984f8
2 tt=30 tstate=4411001503 tpc=0x1001804 tnpc=0x1001808
3 tt=c0 tstate=4482001604 tpc=0x10094f4 tnpc=0x135fbc8
Stopped in pid 0.1 (system) at  1008528:        nop
db{0}> QEMU 2.0.50 monitor - type 'help' for more information
(qemu) quit
build@kentang:~/rel-qemu-git/bin$ 


Home | Main Index | Thread Index | Old Index