DOC HOME SITE MAP MAN PAGES GNU INFO SEARCH PRINT BOOK
 

NAME

btproc - Display the backtrace of a specific process

SYNOPSIS

btproc address
btslot integer

DESCRIPTION

The btproc macro takes one argument, the address of a proc struct. It displays the kernel stack backtrace of the given process.

The btslot macro displays the same information as the btproc macro, but the argument is the slot number for a process.

Typical output looks like this in operating system versions prior to 1.4:


        S> btproc D10C5E00 
        setting process context to D10C5E00
        E0004C54: 00000000(D12AFB00,11C)
        E0004C94: strwaitq+29A(D12C1C80,2,1,3,E0004CD0)
        E0004CDC: strread+123()
        E0004D28: spec_read+90()
        E0004D48: vop_read+42()
        E0004D88: rdwr+103(D10BFF00,E0004DB0,E0004E0C,1)
        E0004DC8: rw+97(E00050B0,E0004E0C,1)
        E0004DDC: read+12()
        E0004E28: systrap+2AE(E0004E34)
        E0004E34: sys_call+38()
Typical output looks like this in 1.4 and later os versions (see UnixWare man page for kdb for a detailed explanation of this new trace format):
S>btproc *curproc
setting process context to D1865000
btrace failed to resolve _etext, useing _end
 xcmn_err(3,FF004AA4).................................esp:FF004A8C ret:C101EB40
 cmn_err(3,C11ECFD8,1)................................esp:FF004A9C ret:C10D94F5
*xi_panic+25(1,FF004AF4,0,C144F038,0).................esp:FF004AB0 ret:C10D93C8
 taggedint(FF004AF4,0)................................esp:FF004AD8 ret:C10D82B0
*xintr_intr+10(20)....................................esp:FF004AE8 ret:C1012E56
INTERRUPT 32 TO cmnint+8A from 158:simple_wait+31(r0ptr:FF004AF4)
   eax:C1201CEC ebx:D188DEB4 ecx:8FDB9000 edx:D18E42E4 efl:00000293
   esi:C1201CEC edi:00000001 esp:FF004B38 ebp:FF004B44
 simple_wait(C1201CEC)................................esp:FF004B48 ret:C1071B69
 anon_getpage(D18E42E4,FF004BF0,FF004BC0,1000,D18868A0,8FDB9000,2).............
      ................................................esp:FF004B70 ret:C106EC1E
 segvn_faultpage(D18868A0,8FDB9000,B9000,D18E42E4,0,FF004C0C,D1738600).........
      ................................................esp:FF004BD4 ret:C106F232
*segvn_fault+332(D18868A0,8FDB9000,2000,2,2)..........esp:FF004C64 ret:C10727AC
 as_fault(D18015C0,8FDB9E00,400,2,2)..................esp:FF004C9C ret:C10570A5
$gt uiophysio_nobp+305()
 uiophysio(C10E7830,0,42,1,FF004DCC)..................esp:FF004CF8 ret:C10214D4
 physiock(C10E7830,0,42,1,33850,FF004DCC).............esp:FF004D28 ret:C10E78DF
*ucsdread+2F(42,FF004DCC,D19A4280)....................esp:FF004D48 ret:C117FC15
*spec_read+85(D197F304,FF004DCC,0,D19A4280)...........esp:FF004D9C ret:C10632C1
*fastrw+111(1,FF0050B0)...............................esp:FF004DEC ret:C1055519
 systrap(FF004E34)....................................esp:FF004E2C ret:C1012DC3
SYSTEM CALL read from 17:80010AFB(r0ptr:FF004E34, ss:esp: 1F:8047204)
   eax:00000003 ebx:8040C904 ecx:8FD23BBC edx:00000001 efl:00000282   ds:001F
   esi:8FD23B70 edi:8FD996F8 esp:FF004E80 ebp:08047224                es:001F

DEFINED IN

stack.k

SEE ALSO

BT, Btproc, BTproc, btslot

APPENDIX A: Alphabetic Index of Macros