|
|
The kernel debuggers are powerful tools with many capabilities. The following list gives some interesting sequences.
kdb>> 1000 db_nlines w kdb>> udi_dma_buf_map "stack\n\ kdb>> q\nn\ kdb>> " b kdb >> q
kdb>> sysdump 0 vcallNote that this works only if there is a single breakpoint set in the kernel that is being tested.
kdb>> uprocp r 9 0 sigtoproc 3 vcall
kdb>> ps # Locate the target "proc ** in column 2 (PP) kdb>> <pp> <signal> 0 sigtoproc 3 vcall