From owner-freebsd-hackers@FreeBSD.ORG Sun Mar 24 17:44:55 2013 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id E1831A4D for ; Sun, 24 Mar 2013 17:44:55 +0000 (UTC) (envelope-from adrian.chadd@gmail.com) Received: from mail-we0-x234.google.com (mail-we0-x234.google.com [IPv6:2a00:1450:400c:c03::234]) by mx1.freebsd.org (Postfix) with ESMTP id 852CA90A for ; Sun, 24 Mar 2013 17:44:55 +0000 (UTC) Received: by mail-we0-f180.google.com with SMTP id r5so1913634wey.25 for ; Sun, 24 Mar 2013 10:44:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=quO3C0K7bTCKK5VQaezi4SHBP/ZsnoAeNPLX6d+I/hc=; b=JT8XaRauS+wmVYTTXC5IT4ZaPRPAWK7odJrpg1v667r+C8RUErV2+ORmI2FrkNZEBJ QuSDI4q6HJYH8LqlHw4M9sdmdHnP1P9ES8kPCa8ytUZLHQCy0eQXlh0ccVti4Fm4nd/N W1Es7UbyQkHPfMF09Vhzfmr0Td9I3y0yGg/tmwPrX0RMkcWLvqm63OQK+sdY2vgK7KC2 eZkPKYNlSS2HJw20/yZSXIJtD8a6KZN2A26GBgE4IkCRtYWRbwl3hm/hP+Lq3uJxV8Tv pMLFWgtHLpNwTUJpu3DlOXnFQIwfrdPwahrxftzuAJf4lFQ7aBfyJrAOEL/LOSIcS7ii Q3sQ== MIME-Version: 1.0 X-Received: by 10.180.81.232 with SMTP id d8mr12342857wiy.25.1364147087627; Sun, 24 Mar 2013 10:44:47 -0700 (PDT) Sender: adrian.chadd@gmail.com Received: by 10.216.108.130 with HTTP; Sun, 24 Mar 2013 10:44:47 -0700 (PDT) In-Reply-To: <514F367E.8000908@gmail.com> References: <514F367E.8000908@gmail.com> Date: Sun, 24 Mar 2013 10:44:47 -0700 X-Google-Sender-Auth: wHLnwdJl54aVlimXlfe7fQ3VnYQ Message-ID: Subject: Re: Debugging kernel cores without a stack From: Adrian Chadd To: Joshua Isom Content-Type: text/plain; charset=ISO-8859-1 Cc: freebsd-hackers@freebsd.org X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 Mar 2013 17:44:55 -0000 You need to use 'bt' to see the stack trace, then 'frame X' to go into that frame. Post 'bt' output and I'll show you what you're looking for. Adrian On 24 March 2013 10:23, Joshua Isom wrote: > I have several core dumps that need debugged. All are the same problem. > The debugging problem is when I fire up kgdb, I have to backtrace even > though the kernel message buffer contains a back trace. If I try to set the > frame with "frame 0xffffff8020bddb30" I get an error "Cannot access memory > at address 0x0". All I have to debug with are these two pieces of > information. How do I get more information? > >> jri.homeunix.com dumped core - see /var/crash/vmcore.29 >> >> Sun Mar 24 10:49:52 CDT 2013 >> >> FreeBSD jri.homeunix.com 10.0-CURRENT FreeBSD 10.0-CURRENT #0 r248680M: >> Sun Mar 24 07:13:16 CDT 2013 r >> >> panic: kdb_switch: did not reenter debugger >> >> GNU gdb 6.1.1 [FreeBSD] >> Copyright 2004 Free Software Foundation, Inc. >> GDB is free software, covered by the GNU General Public License, and you >> are >> welcome to change it and/or distribute copies of it under certain >> conditions. >> Type "show copying" to see the conditions. >> There is absolutely no warranty for GDB. Type "show warranty" for >> details. >> This GDB was configured as "amd64-marcel-freebsd"... >> >> Unread portion of the kernel message buffer: >> witness_warn() at witness_warn+0x4a8/frame 0xffffff8020bdd690 >> trap_pfault() at trap_pfault+0x5a/frame 0xffffff8020bdd740 >> trap() at trap+0x659/frame 0xffffff8020bdd950 >> calltrap() at calltrap+0x8/frame 0xffffff8020bdd950 >> --- trap 0xc, rip = 0xffffffff8133519e, rsp = 0xffffff8020bdda10, rbp = >> 0xffffff8020bddb30 --- >> ath_edma_tx_processq() at ath_edma_tx_processq+0x18e/frame >> 0xffffff8020bddb30 >> taskqueue_run_locked() at taskqueue_run_locked+0xf0/frame >> 0xffffff8020bddb80 >> taskqueue_thread_loop() at taskqueue_thread_loop+0x9b/frame >> 0xffffff8020bddbb0 >> fork_exit() at fork_exit+0x84/frame 0xffffff8020bddbf0 >> fork_trampoline() at fork_trampoline+0xe/frame 0xffffff8020bddbf0 >> --- trap 0, rip = 0, rsp = 0xffffff8020bddcb0, rbp = 0 --- >> >> >> Fatal trap 12: page fault while in kernel mode >> cpuid = 0; apic id = 00 >> fault virtual address = 0x0 >> fault code = supervisor read data, page not present >> instruction pointer = 0x20:0xffffffff8133519e >> stack pointer = 0x28:0xffffff8020bdda10 >> frame pointer = 0x28:0xffffff8020bddb30 >> code segment = base 0x0, limit 0xfffff, type 0x1b >> = DPL 0, pres 1, long 1, def32 0, gran 1 >> processor eflags = interrupt enabled, resume, IOPL = 0 >> current process = 0 (ath0 taskq) >> Uptime: 2m19s >> Dumping 261 out of 1771 >> MB:..7%..13%..25%..31%..43%..56%..62%..74%..86%..92% > > >> (kgdb) list *(0xffffffff8133519e) >> 0xffffffff8133519e is in ath_edma_tx_processq >> (/root/ATH/head/sys/modules/ath/../../dev/ath/if_ath_tx_edma.c:552). >> 547 bf->bf_descid); >> 548 } >> 549 #endif >> 550 >> 551 /* This removes the buffer and decrements the >> queue depth */ >> 552 ATH_TXQ_REMOVE(txq, bf, bf_list); >> 553 if (bf->bf_state.bfs_aggr) >> 554 txq->axq_aggr_depth--; >> 555 txq->axq_fifo_depth --; >> 556 /* XXX assert FIFO depth >= 0 */ > > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org"