Date: Mon, 17 Mar 2014 20:11:02 +1030 From: "Daniel O'Connor" <doconnor@gsoft.com.au> To: FreeBSD Hackers <freebsd-hackers@freebsd.org> Subject: Extracting user stack traces from a crash dump Message-ID: <21FD6187-811C-48D9-BAC8-105F54F39989@gsoft.com.au>
next in thread | raw e-mail | index | archive | help
--Apple-Mail=_D0344F98-9DCB-40BF-97A5-61C14DE39877 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii Hi, Does anyone know of a tool that can extract userland stack traces from a = crash dump? I did some googling and the closest I can see is to use DDB, but = obviously that is only possible when I can access the console. Is it something procstat should/could be extended to do? -- Daniel O'Connor software and network engineer for Genesis Software - http://www.gsoft.com.au "The nice thing about standards is that there are so many of them to choose from." -- Andrew Tanenbaum GPG Fingerprint - 5596 B766 97C0 0E94 4347 295E E593 DC20 7B3F CE8C --Apple-Mail=_D0344F98-9DCB-40BF-97A5-61C14DE39877 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iD8DBQFTJsMu5ZPcIHs/zowRAjaMAJ9NpRcdMXddm2J9xMK2rMAK0cVEawCfXtwW od3oE/JDf5TGTKPh1J9aWkQ= =UoRI -----END PGP SIGNATURE----- --Apple-Mail=_D0344F98-9DCB-40BF-97A5-61C14DE39877--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?21FD6187-811C-48D9-BAC8-105F54F39989>