Date: Wed, 15 May 2002 17:17:14 -0400 (EDT) From: John Baldwin <jhb@FreeBSD.org> To: Dag-Erling Smorgrav <des@ofug.org> Cc: alpha@freebsd.org, current@freebsd.org Subject: Re: loader failure Message-ID: <XFMail.20020515171714.jhb@FreeBSD.org> In-Reply-To: <xzp7km5xja0.fsf@flood.ping.uio.no>
next in thread | previous in thread | raw e-mail | index | archive | help
On 15-May-2002 Dag-Erling Smorgrav wrote: > John Baldwin <jhb@FreeBSD.org> writes: >> The kernel overflowed it's stack. In SRM, you can try to debug this >> by using 'e sp' to get the stack pointer then get a stack dump and save >> a copy of it in a log or something, reboot the machine, then use gdb's >> list command on the kernel.debug to figure out the source:line for all >> the kernel-text addresses in the stack dump to figure out the backtrace. > > How do I get a stack trace? I can't get the 'examine' command to > actually print anything... It depends on which machine actually. :-/ First do 'e sp' to get the stack pointer. Then you want to do something like this: e -n 100 <value of sp without any leading 0x> if that doesn't work then try: e -n 100 vmem:<value of sp w/o leading 0x> This should basically do a raw memory dump. However, see if phk's daddr_t reversal fixes it first. -- John Baldwin <jhb@FreeBSD.org> <>< http://www.FreeBSD.org/~jhb/ "Power Users Use the Power to Serve!" - http://www.FreeBSD.org/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-alpha" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?XFMail.20020515171714.jhb>