On 06/15/2011 12:56 AM, Shashidhara Shamaiah wrote: > Hi, > > > > I was investigating a 64 bit linux kernel dump . I have following doubts > regarding usage of crash. > > > > 1) I wanted to access the intermediate kernel stack frames. To know the > status of the frame and the point of failure. > > When I tried to access a stack frame I get an error message "crash: > prohibited gdb command: frame". Can you please let me know if there is > any other way of accessing the kernel stack frames using > crash. > Try 'bt -f' Try also 'help bt' to discover other nice parameters as well. > > 2) When I run bt in crash, I get a stack trace. Another person from a > different team reported a slightly different stack trace to mine. Below > are the stack traces. The register contents are quite different between > the two > > > > My stack trace > > PID: 13366 TASK: ffff88031b60d580 CPU: 1 COMMAND: "telnet" > > #0 [ffff88031ce759d0] machine_kexec at ffffffff81024486 > > #1 [ffff88031ce75a40] crash_kexec at ffffffff8107e230 > > #2 [ffff88031ce75b20] oops_end at ffffffff8100fa38 > > #3 [ffff88031ce75b50] no_context at ffffffff8102d801 > > #4 [ffff88031ce75ba0] __bad_area_nosemaphore at ffffffff8102d9c9 > > #5 [ffff88031ce75c70] bad_area at ffffffff8102da41 > > #6 [ffff88031ce75ca0] do_page_fault at ffffffff8102dd19 > > #7 [ffff88031ce75cf0] page_fault at ffffffff812d7425 > > #8 [ffff88031ce75d78] n_tty_read at ffffffff811f03b3 > > #9 [ffff88031ce75ec0] tty_read at ffffffff811ebf7e > > #10 [ffff88031ce75f10] vfs_read at ffffffff810ebcc8 > > #11 [ffff88031ce75f40] sys_read at ffffffff810ebe48 > > #12 [ffff88031ce75f80] system_call_fastpath at ffffffff8100bbc2 > > RIP: 00007ffff716b9e0 RSP: 00007fffffffdfc0 RFLAGS: 00010212 > > RAX: 0000000000000000 RBX: ffffffff8100bbc2 RCX: 0000000000000000 > > RDX: 0000000000001ff6 RSI: 000000000061c02a RDI: 0000000000000000 > > RBP: 0000000000001ff6 R8: 0000000000000000 R9: 0000000000000000 > > R10: 0000000000616680 R11: 0000000000000246 R12: 0000000000000000 > > R13: 0000000000000001 R14: 000000000061c02a R15: 00000000006178a0 > > ORIG_RAX: 0000000000000000 CS: 0033 SS: 002b > > > > > > Reported stack trace > > PID: 13366 TASK: ffff88031b60d580 CPU: 1 COMMAND: "telnet" > > #0 [ffff88031ce759d0] machine_kexec at ffffffff81024486 > > #1 [ffff88031ce75a40] crash_kexec at ffffffff8107e230 > > #2 [ffff88031ce75ad8] n_tty_read at ffffffff811f03b3 > > #3 [ffff88031ce75b20] oops_end at ffffffff8100fa38 > > #4 [ffff88031ce75b50] no_context at ffffffff8102d801 > > #5 [ffff88031ce75ba0] __bad_area_nosemaphore at ffffffff8102d9c9 > > #6 [ffff88031ce75c20] native_sched_clock at ffffffff810120aa > > #7 [ffff88031ce75c70] bad_area at ffffffff8102da41 > > #8 [ffff88031ce75ca0] do_page_fault at ffffffff8102dd19 > > #9 [ffff88031ce75cf0] page_fault at ffffffff812d7425 > > [exception RIP: n_tty_read+1420] > > RIP: ffffffff811f03b3 RSP: ffff88031ce75da8 RFLAGS: 00010246 > > RAX: 0000000000000000 RBX: ffff8802cbd54a68 RCX: 000000000061c044 > > RDX: 0000000000000005 RSI: ffff88031ce75e87 RDI: ffff8802cbd54d1c > > RBP: ffff88031ce75eb8 R8: 0000000000000000 R9: 0000000000000000 > > R10: 0000000000616680 R11: 0000000000000246 R12: 000000000061c044 > > R13: ffff8802cbd54800 R14: 0000000000000000 R15: 7fffffffffffffff > > ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018 #10 > [ffff88031ce75ec0] tty_read at ffffffff811ebf7e > > #11 [ffff88031ce75f10] vfs_read at ffffffff810ebcc8 > > #12 [ffff88031ce75f40] sys_read at ffffffff810ebe48 > > #13 [ffff88031ce75f80] system_call_fastpath at ffffffff8100bbc2 > > > > > > 3) I want to retrieve the address of a data structure in the current > context. How can it be done? I tried using struct command, but it did > not help > You need to use bt -f and find what pointer you are looking for and then: struct <struct name> pointer most of times just doing: <struct name> pointer works out fbl > > 4) When I run the command readelf -a vmcore, I get an error message > "readelf: Error: Not an ELF file - it has the wrong magic bytes at the > start." > > > > > > Please help regarding the above queries. > > > > Thanks and Regards > > Shashidhara > > > Information transmitted by this e-mail is proprietary to MphasiS, its associated companies and/ or its customers and is intended > for use only by the individual or entity to which it is addressed, and may contain information that is privileged, confidential or > exempt from disclosure under applicable law. If you are not the intended recipient or it appears that this mail has been forwarded > to you without proper authority, you are notified that any use or dissemination of this information in any manner is strictly > prohibited. In such cases, please notify us immediately at mailmaster@xxxxxxxxxxx and delete this mail from your records. > > > > > -- > Crash-utility mailing list > Crash-utility@xxxxxxxxxx > https://www.redhat.com/mailman/listinfo/crash-utility -- Crash-utility mailing list Crash-utility@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/crash-utility