From owner-freebsd-hackers Sun Apr 21 19: 9:12 2002 Delivered-To: freebsd-hackers@freebsd.org Received: from yello.shallow.net (yello.shallow.net [203.18.243.120]) by hub.freebsd.org (Postfix) with ESMTP id B498137B405 for ; Sun, 21 Apr 2002 19:09:09 -0700 (PDT) Received: by yello.shallow.net (Postfix, from userid 1001) id 9D5D92A6D; Mon, 22 Apr 2002 12:09:02 +1000 (EST) Date: Mon, 22 Apr 2002 12:09:02 +1000 From: Joshua Goodall To: freebsd-hackers@FreeBSD.org Subject: kernel backtrace of sleeping processes Message-ID: <20020422020902.GB86692@roughtrade.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.3.28i Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG In a remote kgdb, I have struct proc * for several processes that are sleeping and I want the kernel backtraces for them. To illustrate: (kgdb) set var $p201 = allproc.lh_first->p_list.le_next->p_list.le_next (kgdb) print $p201->p_pid $12 = 201 (kgdb) print $p201->p_xxthread.td_wmesg $13 = 0xc0247174 "select" Now I want a (kernel) backtrace on this; given that I have $p201, how can I select the appropriate stack frame? (recent -current on i386) Joshua To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message