|
|
NAME
Btproc - Display a verbose stack trace of a process (1.4)
SYNOPSIS
Btproc address
BTproc address
DESCRIPTION
The Btproc command takes an argument, the address of a stack frame.
It prints out a detailed stack trace, showing stack frame
contents.
The BTproc command only traces as far back as the the entry into kernel space. Btproc will trace back into user space.
Typical output looks like this:
S> BTproc *curproc setting process context to D1865000 FF004A48 00000001 FF004A4C FF004A88 u+A88 FF004A50 C101EEBA xcmn_err+36A FF004A54 C11ECFD8 FF004A58 00000000 FF004A5C 00000010 FF004A60 0000003C < FF004A64 08583B00 FF004A68 FF004AA8 u+AA8 FF004A6C C101CA36 clock+316 FF004A70 0003E538 FF004A74 00989680 FF004A78 C11C1074 one_sec FF004A7C 00000008 FF004A80 00000002 FF004A84 00000000 FF004A88 FF004A98 u+A98 FF004A8C C101EB40 cmn_err+10 cmn_err+B: E8 10 00 00 00 call 10cmn_err+10: 83 C4 08 addl $8,%esp xcmn_err(3,FF004AA4).................................esp:FF004A8C ret:C101EB40 FF004A90 00000003 arg1 FF004A94 FF004AA4 arg2 u+AA4 FF004A98 000 FF004AAC <-EBP(%ebp) u+AAC FF004A9C 004 C10D94F5 xi_panic+25 xi_panic+20: E8 3B 56 F4 FF call FFF4563B xi_panic+25: 83 C4 0C addl $C,%esp cmn_err(3,C11ECFD8,1)................................esp:FF004A9C ret:C10D94F5 FF004AA0 008 00000003 8(%ebp) FF004AA4 00C C11ECFD8 C(%ebp) FF004AA8 010 00000001 10(%ebp) FF004AAC 000 FF004AD4 <-ESP(%ebp) u+AD4 FF004AB0 004 C10D93C8 taggedint+68 taggedint+62: FF 97 D0 12 1D C1 call *xifuncs(%edi) taggedint+68: 83 C4 14 addl $14,%esp *xi_panic+25(1,FF004AF4,0,C144F038,0).................esp:FF004AB0 ret:C10D93C8 FF004AB4 008 00000001 8(%esp) ( ... etc ) SYSTEM CALL read from 17:80010AFB(r0ptr:FF004E34, ss:esp: 1F:8047204) eax:00000003 ebx:8040C904 ecx:8FD23BBC edx:00000001 efl:00000282 ds:001F esi:8FD23B70 edi:8FD996F8 esp:FF004E80 ebp:08047224 es:001F FF004E30 008 FF004E34 8(%ebp) u+E34 FF004E34 00000000 GS FF004E38 00000000 FS FF004E3C 0000001F ES FF004E40 0000001F DS FF004E44 8FD996F8 EDI FF004E48 8FD23B70 ESI FF004E4C 08047224 EBP FF004E50 FF004E64 ESP u+E64 FF004E54 8040C904 EBX FF004E58 00000001 EDX FF004E5C 8FD23BBC ECX FF004E60 00000003 EAX FF004E64 00000000 TRAPNO FF004E68 00000000 ERR FF004E6C 80010AFB EIP FF004E70 00000017 CS FF004E74 00000282 EFL FF004E78 08047204 UESP FF004E7C 0000001F SS (this is where BTproc stops, but Btproc continues)
>80010AFB() 08047204 804071FC 804071F7: E8 E8 7E FF FF call FFFF7EE8 <803FF0E4> 804071FC: 83 C4 0C addl $C,%esp 803FF0E4(5,8FDB9E00,400).............................esp:8047204 ret:804071FC 08047208 00000005 0804720C 8FDB9E00 08047210 00000400 08047214 80294FB8 08047218 00000001 0804721C 8FD247C4 08047220 8FD23B70 08047224 08047280 08047228 80283F10 80283F0B: E8 F0 53 FE FF call FFFE53F0 <80269300> 80283F10: 83 C4 0C addl $C,%esp 80269300(5,8FDB9E00,400).............................esp:8047228 ret:80283F10
(and etc.)
DEFINED IN
stack.k