> On May 13, 2019, at 11:13 AM, Michael van Elst <mlel...@serpens.de> wrote:
> 
> There is a backtrace command, like (the 0t means 'decimal number'):
> 
> bt/t 0t$PID

Thanks.  Here is the output:

crash> bt/t 0t4904
trace: pid 4904 lid 1 at 0xffff801202736b20
sleepq_block() at sleepq_block+0x97
turnstile_block() at turnstile_block+0x24f
mutex_vector_enter() at mutex_vector_enter+0x34a
dk_open() at dk_open+0x45
spec_open() at spec_open+0x276
VOP_OPEN() at VOP_OPEN+0x4c
vn_open() at vn_open+0x1ed
do_open() at do_open+0x112
do_sys_openat() at do_sys_openat+0x68
sys_open() at sys_open+0x24
syscall() at syscall+0x1ec
--- syscall (number 5) ---
7365dce3e2ca:

Now I suppose the next step is to wade through the source to figure out what is 
happening?

Cheers,
Brook

Reply via email to