2 # This file contains a few gdb macros (user defined commands) to extract
3 # useful information from kernel crashdump (kdump) like stack traces of
4 # all the processes or a particular process and trapinfo.
6 # These macros can be used by copying this file in .gdbinit (put in home
7 # directory or current directory) or by invoking gdb command with
8 # --command=<command-file-name> option
11 # Alexander Nyberg <alexn@telia.com>
12 # V Srivatsa <vatsa@in.ibm.com>
13 # Maneesh Soni <maneesh@in.ibm.com>
17 set $tasks_off=((size_t)&((struct task_struct *)0)->tasks)
18 set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next)
19 set $init_t=&init_task
20 set $next_t=(((char *)($init_t->tasks).next) - $tasks_off)
21 set var $stacksize = sizeof(union thread_union)
22 while ($next_t != $init_t)
23 set $next_t=(struct task_struct *)$next_t
24 printf "\npid %d; comm %s:\n", $next_t.pid, $next_t.comm
25 printf "===================\n"
26 set var $stackp = $next_t.thread.sp
27 set var $stack_top = ($stackp & ~($stacksize - 1)) + $stacksize
29 while ($stackp < $stack_top)
30 if (*($stackp) > _stext && *($stackp) < _sinittext)
31 info symbol *($stackp)
35 set $next_th=(((char *)$next_t->thread_group.next) - $pid_off)
36 while ($next_th != $next_t)
37 set $next_th=(struct task_struct *)$next_th
38 printf "\npid %d; comm %s:\n", $next_t.pid, $next_t.comm
39 printf "===================\n"
40 set var $stackp = $next_t.thread.sp
41 set var $stack_top = ($stackp & ~($stacksize - 1)) + stacksize
43 while ($stackp < $stack_top)
44 if (*($stackp) > _stext && *($stackp) < _sinittext)
45 info symbol *($stackp)
49 set $next_th=(((char *)$next_th->thread_group.next) - $pid_off)
51 set $next_t=(char *)($next_t->tasks.next) - $tasks_off
55 dump all thread stack traces on a kernel compiled with !CONFIG_FRAME_POINTER
59 set var $pid_task = $arg0
61 printf "\npid %d; comm %s:\n", $pid_task.pid, $pid_task.comm
62 printf "task struct: "
64 printf "===================\n"
65 set var $stackp = $pid_task.thread.sp
66 set var $stacksize = sizeof(union thread_union)
67 set var $stack_top = ($stackp & ~($stacksize - 1)) + $stacksize
68 set var $stack_bot = ($stackp & ~($stacksize - 1))
70 set $stackp = *((unsigned long *) $stackp)
71 while (($stackp < $stack_top) && ($stackp > $stack_bot))
72 set var $addr = *(((unsigned long *) $stackp) + 1)
74 set $stackp = *((unsigned long *) $stackp)
77 document btthreadstack
78 dump a thread stack using the given task structure pointer
83 set $tasks_off=((size_t)&((struct task_struct *)0)->tasks)
84 set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next)
85 set $init_t=&init_task
86 set $next_t=(((char *)($init_t->tasks).next) - $tasks_off)
87 while ($next_t != $init_t)
88 set $next_t=(struct task_struct *)$next_t
91 set $next_th=(((char *)$next_t->thread_group.next) - $pid_off)
92 while ($next_th != $next_t)
93 set $next_th=(struct task_struct *)$next_th
94 btthreadstack $next_th
95 set $next_th=(((char *)$next_th->thread_group.next) - $pid_off)
97 set $next_t=(char *)($next_t->tasks.next) - $tasks_off
101 dump all thread stack traces on a kernel compiled with CONFIG_FRAME_POINTER
106 set $tasks_off=((size_t)&((struct task_struct *)0)->tasks)
107 set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next)
108 set $init_t=&init_task
109 set $next_t=(((char *)($init_t->tasks).next) - $tasks_off)
110 set var $pid_task = 0
112 while ($next_t != $init_t)
113 set $next_t=(struct task_struct *)$next_t
115 if ($next_t.pid == $pid)
116 set $pid_task = $next_t
119 set $next_th=(((char *)$next_t->thread_group.next) - $pid_off)
120 while ($next_th != $next_t)
121 set $next_th=(struct task_struct *)$next_th
122 if ($next_th.pid == $pid)
123 set $pid_task = $next_th
125 set $next_th=(((char *)$next_th->thread_group.next) - $pid_off)
127 set $next_t=(char *)($next_t->tasks.next) - $tasks_off
130 btthreadstack $pid_task
139 set $tasks_off=((size_t)&((struct task_struct *)0)->tasks)
140 set $pid_off=((size_t)&((struct task_struct *)0)->thread_group.next)
141 set $init_t=&init_task
142 set $next_t=(((char *)($init_t->tasks).next) - $tasks_off)
143 set var $pid_task = 0
145 while ($next_t != $init_t)
146 set $next_t=(struct task_struct *)$next_t
148 if ($next_t.pid == $pid)
149 set $pid_task = $next_t
152 set $next_th=(((char *)$next_t->thread_group.next) - $pid_off)
153 while ($next_th != $next_t)
154 set $next_th=(struct task_struct *)$next_th
155 if ($next_th.pid == $pid)
156 set $pid_task = $next_th
158 set $next_th=(((char *)$next_th->thread_group.next) - $pid_off)
160 set $next_t=(char *)($next_t->tasks.next) - $tasks_off
163 printf "Trapno %ld, cr2 0x%lx, error_code %ld\n", $pid_task.thread.trap_no, \
164 $pid_task.thread.cr2, $pid_task.thread.error_code
168 Run info threads and lookup pid of thread #1
169 'trapinfo <pid>' will tell you by which trap & possibly
170 address the kernel panicked.
176 set $prev_flags = $arg1
180 set $msg = ((struct printk_log *) (log_buf + $idx))
183 set $log = log_buf + $idx + sizeof(*$msg)
185 # prev & LOG_CONT && !(msg->flags & LOG_PREIX)
186 if (($prev_flags & 8) && !($msg->flags & 4))
190 # msg->flags & LOG_CONT
192 # (prev & LOG_CONT && !(prev & LOG_NEWLINE))
193 if (($prev_flags & 8) && !($prev_flags & 2))
196 # (!(msg->flags & LOG_NEWLINE))
197 if (!($msg->flags & 2))
203 printf "[%5lu.%06lu] ", $msg->ts_nsec / 1000000000, $msg->ts_nsec % 1000000000
205 if ($msg->text_len != 0)
206 eval "printf \"%%%d.%ds\", $log", $msg->text_len, $msg->text_len
211 if ($msg->dict_len > 0)
212 set $dict = $log + $msg->text_len
215 while ($idx < $msg->dict_len)
225 if ($c < ' ' || $c >= 127 || $c == '\\')
236 document dump_log_idx
237 Dump a single log given its index in the log buffer. The first
238 parameter is the index into log_buf, the second is optional and
239 specified the previous log buffer's flags, used for properly
240 formatting continued lines.
244 set $i = log_first_idx
245 set $end_idx = log_first_idx
249 set $msg = ((struct printk_log *) (log_buf + $i))
253 dump_log_idx $i $prev_flags
254 set $i = $i + $msg->len
255 set $prev_flags = $msg->flags
263 print the kernel ring buffer