* Michael Scheidell <[EMAIL PROTECTED]> [011227 14:48] wrote:
> 
> same place as before:
> 
> 0  fstatfs (p=0xce1bd260, uap=0xce216f80) at ../../kern/vfs_syscalls.c:684
> 684             error = VFS_STATFS(mp, sp, p);
> 680             if ((error = getvnode(p->p_fd, SCARG(uap, fd), &fp)) != 0)
> 681                     return (error);
> 682             mp = ((struct vnode *)fp->f_data)->v_mount;
> 683             sp = &mp->mnt_stat;
> 684             error = VFS_STATFS(mp, sp, p);
> 685             if (error)
> 686                     return (error);
> 687             sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK;
> 688             if (suser_xxx(p->p_ucred, 0, 0)) {
> (kgdb) print mp
> $1 = (struct mount *) 0x28121604
> (kgdb) print sp
> $2 = (struct statfs *) 0x7
> (kgdb) print p
> $3 = (struct proc *) 0x8000
> (kgdb) print sp->f_flags
> Cannot access memory at address 0x37.

Ah, ok, I did see this before.

Can you print:
*mp, *sp, *p, *((struct vnode *)fp->f_data)

Can you tell me what filesystem this is over?  Do you have
any special tunables set in your kernel?  Anything you can
divulge about how this program operates?

-- 
-Alfred Perlstein [[EMAIL PROTECTED]]
'Instead of asking why a piece of software is using "1970s technology,"
 start asking why software is ignoring 30 years of accumulated wisdom.'
Tax deductable donations for FreeBSD: http://www.freebsdfoundation.org/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to