From owner-freebsd-hackers Sun Apr 21 19:47:39 2002 Delivered-To: freebsd-hackers@freebsd.org Received: from fledge.watson.org (fledge.watson.org [204.156.12.50]) by hub.freebsd.org (Postfix) with ESMTP id 1C82E37B400 for ; Sun, 21 Apr 2002 19:47:35 -0700 (PDT) Received: from fledge.watson.org (fledge.pr.watson.org [192.0.2.3]) by fledge.watson.org (8.11.6/8.11.6) with SMTP id g3M2lKw09906; Sun, 21 Apr 2002 22:47:20 -0400 (EDT) (envelope-from robert@fledge.watson.org) Date: Sun, 21 Apr 2002 22:47:19 -0400 (EDT) From: Robert Watson X-Sender: robert@fledge.watson.org To: Joshua Goodall Cc: freebsd-hackers@FreeBSD.org Subject: Re: kernel backtrace of sleeping processes In-Reply-To: <20020422020902.GB86692@roughtrade.net> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG On Mon, 22 Apr 2002, Joshua Goodall wrote: > In a remote kgdb, I have struct proc * for several processes that > are sleeping and I want the kernel backtraces for them. To illustrate: > > (kgdb) set var $p201 = allproc.lh_first->p_list.le_next->p_list.le_next > (kgdb) print $p201->p_pid > $12 = 201 > (kgdb) print $p201->p_xxthread.td_wmesg > $13 = 0xc0247174 "select" > > Now I want a (kernel) backtrace on this; given that I have $p201, > how can I select the appropriate stack frame? > > (recent -current on i386) In recent -CURRENT, you can just use trace or trace I have to say that since that since this feature was introduced, life has become a *lot* easier :-). Robert N M Watson FreeBSD Core Team, TrustedBSD Project robert@fledge.watson.org NAI Labs, Safeport Network Services To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message