From: Paolo Bonzini <pbonz...@redhat.com> These can be useful to manually get a stack trace of a coroutine inside a core dump.
Signed-off-by: Paolo Bonzini <pbonz...@redhat.com> Message-id: 1444636974-19950-4-git-send-email-pbonz...@redhat.com Signed-off-by: Stefan Hajnoczi <stefa...@redhat.com> --- scripts/qemu-gdb.py | 3 +++ scripts/qemugdb/coroutine.py | 16 ++++++++++++++++ 2 files changed, 19 insertions(+) diff --git a/scripts/qemu-gdb.py b/scripts/qemu-gdb.py index d6f2e5a..ef2fd19 100644 --- a/scripts/qemu-gdb.py +++ b/scripts/qemu-gdb.py @@ -38,6 +38,9 @@ QemuCommand() coroutine.CoroutineCommand() mtree.MtreeCommand() +coroutine.CoroutineSPFunction() +coroutine.CoroutinePCFunction() + # Default to silently passing through SIGUSR1, because QEMU sends it # to itself a lot. gdb.execute('handle SIGUSR1 pass noprint nostop') diff --git a/scripts/qemugdb/coroutine.py b/scripts/qemugdb/coroutine.py index b5c8678..ab69979 100644 --- a/scripts/qemugdb/coroutine.py +++ b/scripts/qemugdb/coroutine.py @@ -15,6 +15,8 @@ import gdb +VOID_PTR = gdb.lookup_type('void').pointer() + def get_fs_base(): '''Fetch %fs base value using arch_prctl(ARCH_GET_FS). This is pthread_self().''' @@ -101,3 +103,17 @@ class CoroutineCommand(gdb.Command): return bt_jmpbuf(coroutine_to_jmpbuf(gdb.parse_and_eval(argv[0]))) + +class CoroutineSPFunction(gdb.Function): + def __init__(self): + gdb.Function.__init__(self, 'qemu_coroutine_sp') + + def invoke(self, addr): + return get_jmpbuf_regs(coroutine_to_jmpbuf(addr))['rsp'].cast(VOID_PTR) + +class CoroutinePCFunction(gdb.Function): + def __init__(self): + gdb.Function.__init__(self, 'qemu_coroutine_pc') + + def invoke(self, addr): + return get_jmpbuf_regs(coroutine_to_jmpbuf(addr))['rip'].cast(VOID_PTR) -- 2.4.3