Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 15 May 2002 17:17:14 -0400 (EDT)
From:      John Baldwin <jhb@FreeBSD.org>
To:        Dag-Erling Smorgrav <des@ofug.org>
Cc:        alpha@freebsd.org, current@freebsd.org
Subject:   Re: loader failure
Message-ID:  <XFMail.20020515171714.jhb@FreeBSD.org>
In-Reply-To: <xzp7km5xja0.fsf@flood.ping.uio.no>

next in thread | previous in thread | raw e-mail | index | archive | help

On 15-May-2002 Dag-Erling Smorgrav wrote:
> John Baldwin <jhb@FreeBSD.org> writes:
>> The kernel overflowed it's stack.  In SRM, you can try to debug this
>> by using 'e sp' to get the stack pointer then get a stack dump and save
>> a copy of it in a log or something, reboot the machine, then use gdb's
>> list command on the kernel.debug to figure out the source:line for all
>> the kernel-text addresses in the stack dump to figure out the backtrace.
> 
> How do I get a stack trace? I can't get the 'examine' command to
> actually print anything...

It depends on which machine actually. :-/  First do 'e sp' to get the
stack pointer.  Then you want to do something like this:

e -n 100 <value of sp without any leading 0x>

if that doesn't work then try:

e -n 100 vmem:<value of sp w/o leading 0x>

This should basically do a raw memory dump.  However, see if phk's
daddr_t reversal fixes it first.

-- 

John Baldwin <jhb@FreeBSD.org>  <><  http://www.FreeBSD.org/~jhb/
"Power Users Use the Power to Serve!"  -  http://www.FreeBSD.org/

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-alpha" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?XFMail.20020515171714.jhb>