[659] in arla-drinkers

home help back first fref pref prev next nref lref last post

Re: arla-0.22 + netbsd-current (19990301, i386, 1.3J) == crash

daemon@ATHENA.MIT.EDU (Johan Ihren)
Wed Mar 3 19:19:50 1999

From owner-arla-drinkers@stacken.kth.se Thu Mar 04 00:19:48 1999
Return-Path: <owner-arla-drinkers@stacken.kth.se>
Delivered-To: arla-drinkers-mtg@bloom-picayune.mit.edu
Received: (qmail 5483 invoked from network); 4 Mar 1999 00:19:47 -0000
Received: from unknown (HELO sundance.stacken.kth.se) (130.237.234.41)
  by bloom-picayune.mit.edu with SMTP; 4 Mar 1999 00:19:47 -0000
Received: (from majordom@localhost)
	by sundance.stacken.kth.se (8.8.8/8.8.8) id BAA02910
	for arla-drinkers-list; Thu, 4 Mar 1999 01:14:00 +0100 (MET)
Received: from wanda.pdc.kth.se (wanda.pdc.kth.se [130.237.221.56])
	by sundance.stacken.kth.se (8.8.8/8.8.8) with ESMTP id BAA02906;
	Thu, 4 Mar 1999 01:13:51 +0100 (MET)
Received: (from johani@localhost)
	by wanda.pdc.kth.se (8.8.8/8.8.7) id BAA00198;
	Thu, 4 Mar 1999 01:13:27 +0100 (CET)
Date: Thu, 4 Mar 1999 01:13:27 +0100 (CET)
Message-Id: <199903040013.BAA00198@wanda.pdc.kth.se>
From: Johan Ihren <johani@pdc.kth.se>
To: assar@stacken.kth.se
CC: arla-drinkers@stacken.kth.se
In-reply-to: <5ln21ub0ta.fsf@mg.trafford.dementia.org> (assar@stacken.kth.se)
Subject: Re: arla-0.22 + netbsd-current (19990301, i386, 1.3J) == crash
X-Emacs: 19.34
Mime-Version: 1.0 (generated by SEMI MIME-Edit 0.77)
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by sundance.stacken.kth.se id BAA02906
Sender: owner-arla-drinkers@stacken.kth.se
Precedence: bulk

>>>>> "assar" == assar  <assar@stacken.kth.se> writes:

    assar> Johan Ihren <johani@pdc.kth.se> writes:
    >> Det räcker inte med att bygga ny kärnmodul. Inte direkt
    >> förvånande eftersom Bill Studenmund just har hackat om i
    >> lock-koden för olika filsystemstyper. Inga som helst
    >> felmeddelanden, utan bara en tvärfrysning.

    assar> Do you have DDB compiled into your kernel?  Can you break
    assar> into it and do a `ps' ?

Yes.

Doing just the modload in console mode gave the following info that I
didn't see before because of X11:

uvm_fault(<addr>, 0, 0, 1) -> 1
kernel: page fault trap, code=0
Stopped in modload at _vfs_opv_init+09:         cmpl    $0,0(%edi)

Doing a ps in ddb just shows all the expected processes (including
the modload process). Is there anything in particular you are interested in?
For some strange reason I cannot just paste the complete output in ;-)

Johan


home help back first fref pref prev next nref lref last post