On Fri, Aug 04, 2006 at 03:04:18PM -0400, Rob Logan wrote:
> thanks for the SVM trick for a dump device, the 4th time this
> happened I got a good core, but how do I find the process
> that's making the failing syscall32?  (or I can put the core
> someplace semi public)

::cpuinfo -v

will give you the threads running on all of the processors.  One of them
will be the panicking thread.

CHeers,
- jonathan

> % mdb -k 2
> Loading modules: [ unix krtld genunix specfs cpu.AuthenticAMD.15 uppc 
> pcplusmp ufs ip sctp usba lofs zfs random sppp
> ptm md fcip fctl cpc ]
> > ::status
> debugging crash dump vmcore.2 (64-bit) from keith
> operating system: 5.11 opensol-20060717 (i86pc)
> panic message: assertion failed: total_size == 0, file: 
> ../../common/syscall/sendfile.c, line: 738
> dump content: kernel pages only
> > ::msgbuf
> 
> panic[cpu1]/thread=ffffffff88736740:
> assertion failed: total_size == 0, file: ../../common/syscall/sendfile.c, 
> line: 738
> 
> fffffe8001085a00 genunix:assfail+83 ()
> fffffe8001085b60 genunix:sendvec_small_chunk+8ff ()
> fffffe8001085eb0 genunix:sendfilev+348 ()
> fffffe8001085f00 unix:sys_syscall32+1ff ()
> 
> syncing file systems...
>  1
>  done
> dumping to /dev/md/dsk/d1, offset 426246144, content: kernel
> > ffffffff88736740::walk thread|::findstack -v
> mdb: failed to read thread at 100000000: no mapping for address
> mdb: thread fffffeafdd9ea3d0 isn't in memory
> > *panic_thread::findstack -v
> stack pointer for thread ffffffff88736740: fffffe80010858c0
>   fffffe80010859b0 panic+0x9e()
>   fffffe8001085a00 assfail+0x83(fffffffffbb8e298, fffffffffbb8e310, 2e2)
>   fffffe8001085b60 sendvec_small_chunk+0x8ff(ffffffff9193a4c0, 
>   fffffe8001085bb8, fffffe8001085cc0, 5, 951, 5a8, fffffe8001085bb0)
>   fffffe8001085eb0 sendfilev+0x348(0, b, 829af48, 15, 8045708)
>   fffffe8001085f00 sys_syscall32+0x1ff()
> > ::ps
> S    PID   PPID   PGID    SID    UID      FLAGS             ADDR NAME
> R      0      0      0      0      0 0x00000001 fffffffffbc25c40 sched
> R      3      0      0      0      0 0x00020001 ffffffff859b03d0 fsflush
> R      2      0      0      0      0 0x00020001 ffffffff859ac3d0 pageout
> R      1      0      0      0      0 0x42004000 ffffffff859aa3d0 init
> R 124681      1 124681 124681      0 0x42000000 fffffe96739de3d0 devfsadm
> R 124460      1 124460 124460      0 0x42000000 fffffe96572b93d0 mdmonitord
> R 100545      1 100545 100545      0 0x42000000 fffffe811b5ab3d0 fmd
> R 100321      1 100004 100004      0 0x42004000 ffffffffa2cee3d0 pingd
> R 100319      1 100319 100319      0 0x42010000 ffffffffa29e83d0 sophie
> R 100311      1 100311 100311      0 0x42000000 ffffffff970fd3d0 httpd
> R 157169 100311 100311 100311  60001 0x52000000 fffffeaff54963d0 httpd
> R 157160 100311 100311 100311  60001 0x52000000 fffffeafebaab3d0 httpd
> R 157158 100311 100311 100311  60001 0x52000000 fffffeafead073d0 httpd
> R 157157 100311 100311 100311  60001 0x52000000 fffffeafe90ab3d0 httpd
> R 157156 100311 100311 100311  60001 0x52000000 fffffeafdd9ea3d0 httpd
> R 157154 100311 100311 100311  60001 0x52000000 fffffeafdcd613d0 httpd
> R 157153 100311 100311 100311  60001 0x52000000 fffffeafdc7913d0 httpd
> R 156962 100311 100311 100311  60001 0x52000000 fffffeafc1abe3d0 httpd
> R 156959 100311 100311 100311  60001 0x52000000 fffffeafb25bb3d0 httpd
> R 156958 100311 100311 100311  60001 0x52000000 fffffeafb25b53d0 httpd
> R 156952 100311 100311 100311  60001 0x52000000 fffffeafaf07e3d0 httpd
> R 156951 100311 100311 100311  60001 0x52000000 fffffeafae8c23d0 httpd
> R 156949 100311 100311 100311  60001 0x52000000 fffffeaf9e7bd3d0 httpd
> R 156760 100311 100311 100311  60001 0x52000000 fffffeaf8e1623d0 httpd
> R 156746 100311 100311 100311  60001 0x52000000 fffffeaf88fe13d0 httpd
> R 156744 100311 100311 100311  60001 0x52000000 fffffeaf88e973d0 httpd
> R 156727 100311 100311 100311  60001 0x52000000 fffffeaf6dfb63d0 httpd
> R 156062 100311 100311 100311  60001 0x52000000 fffffeaee36b93d0 httpd
> R 100298      1 100298 100298      0 0x42000000 ffffffff90bd53d0 named
> R 100296      1 100296 100296      0 0x42000000 ffffffff9004b3d0 rsync
> R 100294      1 100294 100294      0 0x42000000 ffffffff8fa1e3d0 sshd
> R 124166 100294 100294 100294      0 0x42010000 fffffe95ac5553d0 sshd
> R 124169 124166 100294 100294    100 0x52010000 fffffe95acf3f3d0 sshd
> R 124171 124169 124171 124171    100 0x42014000 fffffe95ad9123d0 tcsh
> R 124180 124171 124180 124171      0 0x42004000 fffffe95b080e3d0 sh
> R 100281      1 100004 100004      0 0x42004000 ffffffff8d53c3d0 intrd
> R 100266      1 100266 100266      0 0x52000000 ffffffff8ce793d0 CGServer
> R 134885 100266 100266 100266      0 0x52006000 fffffe9e999883d0 cgpav
> R 157170 134885 100266 100266      0 0x52000000 fffffeaff8b603d0 cgpav
> R 133182 100266 100266 100266      0 0x52006000 fffffe9c5f5b73d0 
> CGPSpamCatcher
> R 100293 100266 100266 100266      0 0x52006000 ffffffff8d9f33d0 aspell
> R 100292 100266 100266 100266      0 0x52006000 ffffffff8d9c93d0 pollustop
> R 100234      1 100234 100234      0 0x42000000 ffffffff8c7f73d0 syslogd
> R 100211      1 100211 100211      0 0x42000000 ffffffff8c16e3d0 automountd
> R 100207      1 100207 100207      0 0x42000000 ffffffff8be893d0 inetd
> R 124469 100207 100207 100207      0 0x42004000 fffffe96586383d0 rpc.metad
> R 100191      1 100191 100191      0 0x42000000 ffffffff8bcbe3d0 utmpd
> R 100179      1 100179 100179      1 0x42000000 ffffffff8b7a43d0 rpcbind
> R 100178      1 100178 100178      0 0x42010000 ffffffff8b7533d0 cron
> R 100106      1 100106 100106      1 0x42000000 ffffffff8a8243d0 kcfd
> R 100104      1 100104 100104      0 0x42000000 ffffffff8a4c13d0 nscd
> R 100103      1 100103 100103      0 0x42000000 ffffffff8a49e3d0 picld
> R 100099      1 100099 100099      0 0x42000000 ffffffff8a3f13d0 syseventd
> R 100006      1 100006 100006      0 0x42000000 ffffffff861733d0 svc.configd
> R 100004      1 100004 100004      0 0x42000000 ffffffff860d43d0 svc.startd
> R 100190 100004 100190 100190      0 0x42004000 ffffffff8bc243d0 ttymon
> R 100185 100004 100185 100185      0 0x42014000 ffffffff8bae43d0 sac
> R 100201 100185 100185 100185      0 0x42014000 ffffffff8bdf43d0 ttymon
> >
> 
> root at keith[2:44pm]/var/crash/focal % fmadm faulty -a
>    STATE RESOURCE / UUID
> -------- 
> ----------------------------------------------------------------------
> 
> 
> _______________________________________________
> mdb-discuss mailing list
> mdb-discuss at opensolaris.org

-- 
Jonathan Adams, Solaris Kernel Development

Reply via email to