From owner-freebsd-current Thu Oct 10 14:41:27 1996 Return-Path: owner-current Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id OAA18167 for current-outgoing; Thu, 10 Oct 1996 14:41:27 -0700 (PDT) Received: from alpha.xerox.com (alpha.Xerox.COM [13.1.64.93]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id OAA18157; Thu, 10 Oct 1996 14:41:11 -0700 (PDT) Received: from crevenia.parc.xerox.com ([13.2.116.11]) by alpha.xerox.com with SMTP id <15484(5)>; Thu, 10 Oct 1996 14:40:34 PDT Received: by crevenia.parc.xerox.com id <177476>; Thu, 10 Oct 1996 14:40:23 -0700 From: Bill Fenner To: fenner@parc.xerox.com, karl@mcs.net Subject: Re: Crash in -current (from the current SNAP) Cc: current@freebsd.org, hackers@freebsd.org Message-Id: <96Oct10.144023pdt.177476@crevenia.parc.xerox.com> Date: Thu, 10 Oct 1996 14:40:12 PDT Sender: owner-current@freebsd.org X-Loop: FreeBSD.org Precedence: bulk >(kgdb) >(kgdb) select-frame 14 >(kgdb) print ip_protox[ip->ip_p] >$1 = 2 '\002' > >That's "INET", if I'm reading the headers correctly. No, it's "TCP" (ip_protox[] is an offset into the inetsw[], and inetsw[2] is TCP). >(kgdb) print inetsw[ip_protox[ip->ip_p]].pr_input >$2 = (void (*)()) 0xf01477ec Looks fine. Perhaps the trap didn't actually happen in ip_input? Try "select-frame 12" and then "frame frame->tf_ebp frame->tf_eip", which should tell you where the crash really happened. Bill