Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 23 Jan 1999 11:06:43 -0800 (PST)
From:      Matthew Dillon <dillon@apollo.backplane.com>
To:        Doug Rabson <dfr@nlsystems.com>
Cc:        Peter Wemm <peter@netplex.com.au>, current@FreeBSD.ORG
Subject:   Re: panic: found dirty cache page 0xf046f1c0 
Message-ID:  <199901231906.LAA48145@apollo.backplane.com>
References:   <Pine.BSF.4.01.9901231746480.59627-100000@herring.nlsystems.com>

next in thread | previous in thread | raw e-mail | index | archive | help

:I made it happen again by doing the same installworld but this time I
:caught it in the debugger.  I'll leave the machine up for a while in case
:someone has some idea of how to debug it.  The stacktrace looks like this:
:
:#0  Debugger () at ../../alpha/alpha/db_interface.c:260
:#1  0xfffffc000036c2c0 in panic () at ../../kern/kern_shutdown.c:444
:#2  0xfffffc00004942fc in vm_page_alloc () at ../../vm/vm_page.c:1041
:#3  0xfffffc00003a1b54 in allocbuf () at ../../kern/vfs_bio.c:1791

    The panic message should be printing the address of the vm_page_t that
    it caught.

    From the debugger, dump that vm_page_t with 'print'.

    print *0xADDRESS

    Do about 8 print's bumping the address by 4 ( in hex ) for each.

    It would be even better if we could figure out the contents and type
    of the underlying object.

					-Matt
					Matthew Dillon 
					<dillon@backplane.com>

:--
:Doug Rabson				Mail:  dfr@nlsystems.com
:Nonlinear Systems Ltd.			Phone: +44 181 442 9037


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199901231906.LAA48145>