On Thursday, 2 December 1999 at 22:32:44 -0500, David Gilbert wrote:
> I can grep through the vmcore.x file and find the offset of the string
> I put on the stack by
>
> strings -t x <vmcore.9 | grep dgilbert_
>
> ... but how do I associate that back with an address inside gdb -k?
With utmost difficult.
> My problem is that vinum (or something related to it) is trashing
> the stack and trying to return to 0x0 is panic'ing the kernel (of
> course).
>
> ... now... bt in gdb -k on this shows the series of trap calls and
> ends with frame 5 as:
>
> #5 0x0 in ?? ()
I think I probably should take a look at this. I don't know what I'll
find, but there are a number of possibilities. I don't think that
mapping the physical memory image to the virtual memory address is one
of them. What might help is searching the area round frame 5 for a
likely looking ebp value which would point further back down the
stack. You can also help it, of course, by setting a static variable,
say "dgilbert_last_stack" to the ebp value every time you enter a
function. You don't need any other information; the backtrace will
take you straight back. Use the 'btr' command (in
/usr/src/sys/modules/vinum/.gdbinit.kernel).
You'll get faster response from me if you copy me on messages like
this; I read them eventually (usually), but I read messages sent
directly to me sooner.
Greg
--
Finger [EMAIL PROTECTED] for PGP public key
See complete headers for address and phone numbers
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message