|
|
NAME
btproc - Display the backtrace of a specific process
SYNOPSIS
btproc address
btslot integer
DESCRIPTION
The btproc macro takes one argument, the address
of a proc struct. It displays the kernel stack
backtrace of the given process.
The btslot macro displays the same information as the btproc macro, but the argument is the slot number for a process.
Typical output looks like this in operating system versions prior to 1.4:
S> btproc D10C5E00 setting process context to D10C5E00 E0004C54: 00000000(D12AFB00,11C) E0004C94: strwaitq+29A(D12C1C80,2,1,3,E0004CD0) E0004CDC: strread+123() E0004D28: spec_read+90() E0004D48: vop_read+42() E0004D88: rdwr+103(D10BFF00,E0004DB0,E0004E0C,1) E0004DC8: rw+97(E00050B0,E0004E0C,1) E0004DDC: read+12() E0004E28: systrap+2AE(E0004E34) E0004E34: sys_call+38()Typical output looks like this in 1.4 and later os versions (see UnixWare man page for kdb for a detailed explanation of this new trace format):
S>btproc *curproc setting process context to D1865000 btrace failed to resolve _etext, useing _end xcmn_err(3,FF004AA4).................................esp:FF004A8C ret:C101EB40 cmn_err(3,C11ECFD8,1)................................esp:FF004A9C ret:C10D94F5 *xi_panic+25(1,FF004AF4,0,C144F038,0).................esp:FF004AB0 ret:C10D93C8 taggedint(FF004AF4,0)................................esp:FF004AD8 ret:C10D82B0 *xintr_intr+10(20)....................................esp:FF004AE8 ret:C1012E56 INTERRUPT 32 TO cmnint+8A from 158:simple_wait+31(r0ptr:FF004AF4) eax:C1201CEC ebx:D188DEB4 ecx:8FDB9000 edx:D18E42E4 efl:00000293 esi:C1201CEC edi:00000001 esp:FF004B38 ebp:FF004B44 simple_wait(C1201CEC)................................esp:FF004B48 ret:C1071B69 anon_getpage(D18E42E4,FF004BF0,FF004BC0,1000,D18868A0,8FDB9000,2)............. ................................................esp:FF004B70 ret:C106EC1E segvn_faultpage(D18868A0,8FDB9000,B9000,D18E42E4,0,FF004C0C,D1738600)......... ................................................esp:FF004BD4 ret:C106F232 *segvn_fault+332(D18868A0,8FDB9000,2000,2,2)..........esp:FF004C64 ret:C10727AC as_fault(D18015C0,8FDB9E00,400,2,2)..................esp:FF004C9C ret:C10570A5 $gt uiophysio_nobp+305() uiophysio(C10E7830,0,42,1,FF004DCC)..................esp:FF004CF8 ret:C10214D4 physiock(C10E7830,0,42,1,33850,FF004DCC).............esp:FF004D28 ret:C10E78DF *ucsdread+2F(42,FF004DCC,D19A4280)....................esp:FF004D48 ret:C117FC15 *spec_read+85(D197F304,FF004DCC,0,D19A4280)...........esp:FF004D9C ret:C10632C1 *fastrw+111(1,FF0050B0)...............................esp:FF004DEC ret:C1055519 systrap(FF004E34)....................................esp:FF004E2C ret:C1012DC3 SYSTEM CALL read from 17:80010AFB(r0ptr:FF004E34, ss:esp: 1F:8047204) eax:00000003 ebx:8040C904 ecx:8FD23BBC edx:00000001 efl:00000282 ds:001F esi:8FD23B70 edi:8FD996F8 esp:FF004E80 ebp:08047224 es:001F