On 15-May-2002 Dag-Erling Smorgrav wrote: > John Baldwin <[EMAIL PROTECTED]> writes: >> The kernel overflowed it's stack. In SRM, you can try to debug this >> by using 'e sp' to get the stack pointer then get a stack dump and save >> a copy of it in a log or something, reboot the machine, then use gdb's >> list command on the kernel.debug to figure out the source:line for all >> the kernel-text addresses in the stack dump to figure out the backtrace. > > How do I get a stack trace? I can't get the 'examine' command to > actually print anything...
It depends on which machine actually. :-/ First do 'e sp' to get the stack pointer. Then you want to do something like this: e -n 100 <value of sp without any leading 0x> if that doesn't work then try: e -n 100 vmem:<value of sp w/o leading 0x> This should basically do a raw memory dump. However, see if phk's daddr_t reversal fixes it first. -- John Baldwin <[EMAIL PROTECTED]> <>< http://www.FreeBSD.org/~jhb/ "Power Users Use the Power to Serve!" - http://www.FreeBSD.org/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message