Hi all,

I'd like some help examining LWP backtraces on a running NetBSD system in a qemu-kvm virtual machine.

I've successfully done the following to examine LWP backtraces in crash dumps:

   $ gdb /path/to/netbsd.gdb
   (gdb) target kvm /path/to/netbsd.0.core
   (gdb) dir /path/to/kernel/source/code
   (gdb) kvm proc 0xdeadbeef
   (gdb) bt full

I'm now trying to do something similar on a *running* NetBSD kernel in a qemu-kvm virtual machine (Linux host). qemu has remote gdb stubs, which makes it great for stepping the kernel without having to deal with serial ports or rebuilding the kernel with KGDB enabled.

I'm able to successfully connect and do normal gdb things:

   $ kvm <args> -S -s
   $ gdb /path/to/netbsd.gdb
   (gdb) target remote localhost:1234
   (gdb) dir /path/to/kernel/source/code
   (gdb) bt full

So I can see the current LWP backtrace easily. Unfortunately, the following fails:

   (gdb) kvm proc 0xdeadbeef
   No kernel memory image.

Does anyone know how I can examine the backtraces of other LWPs from a live kernel? Does 'kvm proc' work with a KGDB setup?

Thanks,
Richard

Reply via email to