|
|
NAME
Btproc - Display a verbose stack trace of a process (1.4)
SYNOPSIS
Btproc address
BTproc address
DESCRIPTION
The Btproc command takes an argument, the address of a stack frame.
It prints out a detailed stack trace, showing stack frame
contents.
The BTproc command only traces as far back as the the entry into kernel space. Btproc will trace back into user space.
Typical output looks like this:
S> BTproc *curproc
setting process context to D1865000
FF004A48 00000001
FF004A4C FF004A88 u+A88
FF004A50 C101EEBA xcmn_err+36A
FF004A54 C11ECFD8
FF004A58 00000000
FF004A5C 00000010
FF004A60 0000003C <
FF004A64 08583B00
FF004A68 FF004AA8 u+AA8
FF004A6C C101CA36 clock+316
FF004A70 0003E538
FF004A74 00989680
FF004A78 C11C1074 one_sec
FF004A7C 00000008
FF004A80 00000002
FF004A84 00000000
FF004A88 FF004A98 u+A98
FF004A8C C101EB40 cmn_err+10
cmn_err+B: E8 10 00 00 00 call 10
cmn_err+10: 83 C4 08 addl $8,%esp
xcmn_err(3,FF004AA4).................................esp:FF004A8C ret:C101EB40
FF004A90 00000003 arg1
FF004A94 FF004AA4 arg2 u+AA4
FF004A98 000 FF004AAC <-EBP(%ebp) u+AAC
FF004A9C 004 C10D94F5 xi_panic+25
xi_panic+20: E8 3B 56 F4 FF call FFF4563B
xi_panic+25: 83 C4 0C addl $C,%esp
cmn_err(3,C11ECFD8,1)................................esp:FF004A9C ret:C10D94F5
FF004AA0 008 00000003 8(%ebp)
FF004AA4 00C C11ECFD8 C(%ebp)
FF004AA8 010 00000001 10(%ebp)
FF004AAC 000 FF004AD4 <-ESP(%ebp) u+AD4
FF004AB0 004 C10D93C8 taggedint+68
taggedint+62: FF 97 D0 12 1D C1 call *xifuncs(%edi)
taggedint+68: 83 C4 14 addl $14,%esp
*xi_panic+25(1,FF004AF4,0,C144F038,0).................esp:FF004AB0 ret:C10D93C8
FF004AB4 008 00000001 8(%esp)
( ... etc )
SYSTEM CALL read from 17:80010AFB(r0ptr:FF004E34, ss:esp: 1F:8047204)
eax:00000003 ebx:8040C904 ecx:8FD23BBC edx:00000001 efl:00000282 ds:001F
esi:8FD23B70 edi:8FD996F8 esp:FF004E80 ebp:08047224 es:001F
FF004E30 008 FF004E34 8(%ebp) u+E34
FF004E34 00000000 GS
FF004E38 00000000 FS
FF004E3C 0000001F ES
FF004E40 0000001F DS
FF004E44 8FD996F8 EDI
FF004E48 8FD23B70 ESI
FF004E4C 08047224 EBP
FF004E50 FF004E64 ESP u+E64
FF004E54 8040C904 EBX
FF004E58 00000001 EDX
FF004E5C 8FD23BBC ECX
FF004E60 00000003 EAX
FF004E64 00000000 TRAPNO
FF004E68 00000000 ERR
FF004E6C 80010AFB EIP
FF004E70 00000017 CS
FF004E74 00000282 EFL
FF004E78 08047204 UESP
FF004E7C 0000001F SS
(this is where BTproc stops, but Btproc continues)
>80010AFB()
08047204 804071FC
804071F7: E8 E8 7E FF FF call FFFF7EE8 <803FF0E4>
804071FC: 83 C4 0C addl $C,%esp
803FF0E4(5,8FDB9E00,400).............................esp:8047204 ret:804071FC
08047208 00000005
0804720C 8FDB9E00
08047210 00000400
08047214 80294FB8
08047218 00000001
0804721C 8FD247C4
08047220 8FD23B70
08047224 08047280
08047228 80283F10
80283F0B: E8 F0 53 FE FF call FFFE53F0 <80269300>
80283F10: 83 C4 0C addl $C,%esp
80269300(5,8FDB9E00,400).............................esp:8047228 ret:80283F10
(and etc.)
DEFINED IN
stack.k