From owner-freebsd-hackers@FreeBSD.ORG Fri May 23 17:43:27 2003 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1AE9137B401 for ; Fri, 23 May 2003 17:43:27 -0700 (PDT) Received: from adsl-64-161-78-226.dsl.lsan03.pacbell.net (adsl-64-161-78-226.dsl.lsan03.pacbell.net [64.161.78.226]) by mx1.FreeBSD.org (Postfix) with SMTP id 5ABFD43F3F for ; Fri, 23 May 2003 17:43:26 -0700 (PDT) (envelope-from oremanj@adsl-64-161-78-226.dsl.lsan03.pacbell.net) Received: (qmail 46856 invoked by uid 1001); 24 May 2003 00:44:33 -0000 Date: Fri, 23 May 2003 17:44:33 -0700 From: Joshua Oreman To: Mikhail Kruk Message-ID: <20030524004433.GA46783@webserver.get-linux.org> References: <20030523223751.GA41427@webserver.get-linux.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4i cc: hackers@freebsd.org Subject: Re: current crashes X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 24 May 2003 00:43:27 -0000 On Fri, May 23, 2003 at 06:47:24PM -0400 or thereabouts, Mikhail Kruk seemed to write: > > > Fatal trap 12: page fault while in kernel mode > > > fault virtual address = 0x80790ab0 > > > fault code = supervisor read, page not present > > > instruction pointer = 0x8:0xc06ea4d0 > > ^^^^^^^^^^ > > This value is important, but meaningless in its current form. > > Please see chapter 18 of the FAQ. Read it, do what it says, > > give us the symbol(s). > > The address I have there ^^^ is beyond addresses that nm -s finds in this > kernel. This is either because I screwed up the address when I copied it > from display (very likely) or because the problem happened in acpi, which > is a module, and therefore is not in /boot/kernel/kernel. Any way to > recalculate the offset into the module? Oh yeah... forgot about that :-) This is a wild guess, but... When the kernel loads, at the beginning of dmesg, it says something like: Preloaded elf module acpi.ko at 0x12345678 [if run from loader] If it's a cmdline-loaded kld, do `kldstat' and it'll tell you the load address. Now, if my intuition is correct, you should be able to subtract the value above from the load address. Do `nm -s /boot/kernel/acpi.ko' and search for this new value. But all of this is moot if you can get a crash dump :-) -- Josh