From owner-freebsd-hackers Sat Feb 8 07:49:56 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id HAA17491 for hackers-outgoing; Sat, 8 Feb 1997 07:49:56 -0800 (PST) Received: from sax.sax.de (sax.sax.de [193.175.26.33]) by freefall.freebsd.org (8.8.5/8.8.5) with SMTP id HAA17480 for ; Sat, 8 Feb 1997 07:49:53 -0800 (PST) Received: (from uucp@localhost) by sax.sax.de (8.6.12/8.6.12-s1) with UUCP id QAA29653; Sat, 8 Feb 1997 16:49:51 +0100 Received: (from j@localhost) by uriah.heep.sax.de (8.8.5/8.6.9) id QAA28166; Sat, 8 Feb 1997 16:47:55 +0100 (MET) Message-ID: Date: Sat, 8 Feb 1997 16:47:55 +0100 From: j@uriah.heep.sax.de (J Wunsch) To: freebsd-hackers@freebsd.org (FreeBSD hackers) Cc: dwhite@resnet.uoregon.edu (Doug White) Subject: Re: ASUS MB panics References: X-Mailer: Mutt 0.55-PL10 Mime-Version: 1.0 X-Phone: +49-351-2012 669 X-PGP-Fingerprint: DC 47 E6 E4 FF A6 E9 8F 93 21 E0 7D F9 12 D6 4E Reply-To: joerg_wunsch@uriah.heep.sax.de (Joerg Wunsch) In-Reply-To: ; from John-Mark Gurney on Feb 8, 1997 06:56:13 -0800 Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk As John-Mark Gurney wrote: > basicly it seems that the call to ttyclose at the end of spec_close > manages to overrun the stack... so upon return of spec_close it tries to > "return" to the previous function.. but that return value was overwriten > and so it jumps to the null pointer... A quick glance over the sources yields the clist stuff there as the most likely culprit. Maybe Bruce has some more suggestions... -- cheers, J"org joerg_wunsch@uriah.heep.sax.de -- http://www.sax.de/~joerg/ -- NIC: JW11-RIPE Never trust an operating system you don't have sources for. ;-)