*BSD News Article 94919


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.carno.net.au!harbinger.cc.monash.edu.au!munnari.OZ.AU!news.ecn.uoknor.edu!feed1.news.erols.com!howland.erols.net!newsxfer3.itd.umich.edu!news.eecs.umich.edu!life.eecs.umich.edu!not-for-mail
From: pmchen@life.eecs.umich.edu (Peter M. Chen)
Newsgroups: comp.unix.bsd.freebsd.misc
Subject: DDB question
Date: 1 May 1997 19:52:23 GMT
Organization: University of Michigan EECS
Lines: 24
Message-ID: <5kas9n$l36$1@news.eecs.umich.edu>
NNTP-Posting-Host: life.eecs.umich.edu
X-Newsreader: TIN [UNIX 1.3 950824BETA PL0]
Xref: euryale.cc.adfa.oz.au comp.unix.bsd.freebsd.misc:40121


I'm using DDB to help me debug some kernel code, and I got the following
trace.  Any suggestions for figuring out what line of C code corresponds to
"_ffs_write+0x473"?  Is there some sort of disassembler?

Pete

-------------------------------------------------------------------------------
db> t
_Debugger(f0116b08) at _Debugger+0x35
_panic(f01b5397,f52a0000,f288aa00,f52a0000,f02d5000) at _panic+0x5a
_vm_fault(f26bfe80,f52a0000,3,0,0) at _vm_fault+0x72
_trap_pfault(efbffcf4,0,1000,f000,f52a0000) at _trap_pfault+0xcc
_trap(10,10,f52a0000,f000,efbffdec) at _trap+0x2ab
calltrap() at calltrap+0x15
--- trap 0xc, eip = 0xf01d4d17, esp = 0xefbffd30, ebp = 0xefbffdec ---
fastmove_loop(1000,1000) at fastmove_loop+0x17
_i586_copyin(f52a0000,1000,efbfff34,f487a89c,f28aa480) at _i586_copyin+0x3a
_ffs_write(efbffee8,f022e490,1000,efbfff94,0) at _ffs_write+0x473
_vn_write(f28a9200,efbfff34,f26bf880,f022e490,f288aa00) at _vn_write+0x93
_write(f288aa00,efbfff94,efbfff84,8075060,2e000) at _write+0x97
_syscall(27,27,0,2e000,efbfd498) at _syscall+0x183
_Xsyscall() at _Xsyscall+0x35
--- syscall 0x4, eip = 0x8068721, esp = 0xefbfd458, ebp = 0xefbfd498 ---