* Michael Scheidell <[EMAIL PROTECTED]> [011227 14:48] wrote:
>
> same place as before:
>
> 0 fstatfs (p=0xce1bd260, uap=0xce216f80) at ../../kern/vfs_syscalls.c:684
> 684 error = VFS_STATFS(mp, sp, p);
> 680 if ((error = getvnode(p->p_fd, SCARG(uap, fd), &fp)) != 0)
> 681 return (error);
> 682 mp = ((struct vnode *)fp->f_data)->v_mount;
> 683 sp = &mp->mnt_stat;
> 684 error = VFS_STATFS(mp, sp, p);
> 685 if (error)
> 686 return (error);
> 687 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK;
> 688 if (suser_xxx(p->p_ucred, 0, 0)) {
> (kgdb) print mp
> $1 = (struct mount *) 0x28121604
> (kgdb) print sp
> $2 = (struct statfs *) 0x7
> (kgdb) print p
> $3 = (struct proc *) 0x8000
> (kgdb) print sp->f_flags
> Cannot access memory at address 0x37.
Ah, ok, I did see this before.
Can you print:
*mp, *sp, *p, *((struct vnode *)fp->f_data)
Can you tell me what filesystem this is over? Do you have
any special tunables set in your kernel? Anything you can
divulge about how this program operates?
--
-Alfred Perlstein [[EMAIL PROTECTED]]
'Instead of asking why a piece of software is using "1970s technology,"
start asking why software is ignoring 30 years of accumulated wisdom.'
Tax deductable donations for FreeBSD: http://www.freebsdfoundation.org/
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message