From owner-freebsd-hackers@FreeBSD.ORG Sun Mar 24 20:32:48 2013 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 530E19ED; Sun, 24 Mar 2013 20:32:48 +0000 (UTC) (envelope-from jrisom@gmail.com) Received: from mail-ia0-x234.google.com (mail-ia0-x234.google.com [IPv6:2607:f8b0:4001:c02::234]) by mx1.freebsd.org (Postfix) with ESMTP id 1DDA42F1; Sun, 24 Mar 2013 20:32:48 +0000 (UTC) Received: by mail-ia0-f180.google.com with SMTP id f27so4880725iae.25 for ; Sun, 24 Mar 2013 13:32:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=q8zvWyPqjcQGDcVG10bV1atJyZ7tq1PSagFI/6X0DhM=; b=KL1PzS0CNbmdI7zoUTdo7a30/XzdXYX6EBxgXsPlPrwZy3o1yxWSGcCPbEr+JN0Z/v loivcpRQmriBs0miDgl0RLVPFFIjk8WdTCRkbrRU5pELGRM2vGN7wLqeabZ9pGfBeFsE MdspCNswRnrU9l3GtMHrZQ8IHPCXGUj/kGfxHpW8a7ZDJ3hAfVnEQzAsvUvk2mKq51U2 6Sl+QkZpOoOlh7B45SNDCfopD4IXWkdSMwKej2l1oQ4zrg+PQ4wMro0q3MJD5eZGEjsE FBxI/coDqZh9z8QAJCLD91pTMpEGfQnqzZz+9WR8DH55Gf5SWJNN9gbY6OncyH7ANtJB xvPw== X-Received: by 10.42.58.67 with SMTP id g3mr5291259ich.56.1364157167583; Sun, 24 Mar 2013 13:32:47 -0700 (PDT) Received: from [192.168.1.44] (c-98-212-197-211.hsd1.il.comcast.net. [98.212.197.211]) by mx.google.com with ESMTPS id wn10sm17019639igb.2.2013.03.24.13.32.46 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sun, 24 Mar 2013 13:32:46 -0700 (PDT) Message-ID: <514F62E9.8020100@gmail.com> Date: Sun, 24 Mar 2013 15:32:41 -0500 From: Joshua Isom User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64; rv:17.0) Gecko/20130215 Thunderbird/17.0.3 MIME-Version: 1.0 To: Adrian Chadd Subject: Re: Debugging kernel cores without a stack References: <514F367E.8000908@gmail.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-hackers@freebsd.org X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 Mar 2013 20:32:48 -0000 Backtrace gives me an error. The only backtrace I'm given is from the kernel message while it's crashing. After it's crashed I'm getting nothing. [jri:~] root# kgdb -q /boot/kernel/kernel /var/crash/vmcore.30 Reading symbols from /boot/kernel/zfs.ko...Reading symbols from /boot/kernel/zfs.ko.symbols...done. done. Loaded symbols for /boot/kernel/zfs.ko Reading symbols from /boot/kernel/opensolaris.ko...Reading symbols from /boot/kernel/opensolaris.ko.symbols...done. done. Loaded symbols for /boot/kernel/opensolaris.ko Reading symbols from /boot/kernel/geom_mirror.ko...Reading symbols from /boot/kernel/geom_mirror.ko.symbols...done. done. Loaded symbols for /boot/kernel/geom_mirror.ko Reading symbols from /boot/kernel/if_ath.ko...Reading symbols from /boot/kernel/if_ath.ko.symbols...done. done. Loaded symbols for /boot/kernel/if_ath.ko Reading symbols from /boot/kernel/amdtemp.ko...Reading symbols from /boot/kernel/amdtemp.ko.symbols...done. done. Loaded symbols for /boot/kernel/amdtemp.ko Reading symbols from /boot/kernel/if_ath_pci.ko...Reading symbols from /boot/kernel/if_ath_pci.ko.symbols...done. done. Loaded symbols for /boot/kernel/if_ath_pci.ko Reading symbols from /boot/kernel/ums.ko...Reading symbols from /boot/kernel/ums.ko.symbols...done. done. Loaded symbols for /boot/kernel/ums.ko Reading symbols from /boot/kernel/ulpt.ko...Reading symbols from /boot/kernel/ulpt.ko.symbols...done. done. Loaded symbols for /boot/kernel/ulpt.ko Reading symbols from /boot/kernel/uhid.ko...Reading symbols from /boot/kernel/uhid.ko.symbols...done. done. Loaded symbols for /boot/kernel/uhid.ko Reading symbols from /boot/kernel/ipfw.ko...Reading symbols from /boot/kernel/ipfw.ko.symbols...done. done. Loaded symbols for /boot/kernel/ipfw.ko Reading symbols from /boot/kernel/nullfs.ko...Reading symbols from /boot/kernel/nullfs.ko.symbols...done. done. Loaded symbols for /boot/kernel/nullfs.ko kgdb: kvm_read: invalid address (0x354541500000000) #0 0x0000000000000000 in ?? () (kgdb) backtrace #0 0x0000000000000000 in ?? () Cannot access memory at address 0x0 (kgdb) On 3/24/2013 12:44 PM, Adrian Chadd wrote: > You need to use 'bt' to see the stack trace, then 'frame X' to go into > that frame. > > Post 'bt' output and I'll show you what you're looking for. > > > > > Adrian >