/linux-4.4.14/scripts/gdb/linux/ |
D | lists.py | 14 import gdb 26 raise gdb.GdbError('argument must be of type (struct list_head [*])') 29 gdb.write("Starting with: {}\n".format(c)) 30 except gdb.MemoryError: 31 gdb.write('head is not accessible\n') 38 gdb.write('prev.next != current: ' 47 except gdb.MemoryError: 48 gdb.write('prev is not accessible: ' 56 gdb.write('next.prev != current: ' 65 except gdb.MemoryError: [all …]
|
D | symbols.py | 14 import gdb 21 if hasattr(gdb, 'Breakpoint'): 22 class LoadModuleBreakpoint(gdb.Breakpoint): 29 module = gdb.parse_and_eval("mod") 39 show_pagination = gdb.execute("show pagination", to_string=True) 41 gdb.execute("set pagination off") 44 gdb.write("refreshing all symbols to reload module " 51 gdb.execute("set pagination %s" % ("on" if pagination else "off")) 56 class LxSymbols(gdb.Command): 71 super(LxSymbols, self).__init__("lx-symbols", gdb.COMMAND_FILES, [all …]
|
D | cpus.py | 14 import gdb 24 return gdb.selected_thread().num - 1 26 tid = gdb.selected_thread().ptid[2] 32 raise gdb.GdbError("Sorry, obtaining the current CPU is not yet " 40 offset = gdb.parse_and_eval( 44 offset = gdb.parse_and_eval( 46 except gdb.error: 59 gdb.events.stop.disconnect(cpu_mask_invalidate) 60 if hasattr(gdb.events, 'new_objfile'): 61 gdb.events.new_objfile.disconnect(cpu_mask_invalidate) [all …]
|
D | utils.py | 14 import gdb 24 gdb.events.new_objfile.disconnect(self._new_objfile_handler) 28 self._type = gdb.lookup_type(self._name) 30 raise gdb.GdbError( 32 if hasattr(gdb, 'events') and hasattr(gdb.events, 'new_objfile'): 33 gdb.events.new_objfile.connect(self._new_objfile_handler) 46 element = gdb.Value(0).cast(typeobj) 55 class ContainerOf(gdb.Function): 66 return container_of(ptr, gdb.lookup_type(typename.string()).pointer(), 80 endian = gdb.execute("show endian", to_string=True) [all …]
|
D | dmesg.py | 14 import gdb 19 class LxDmesg(gdb.Command): 23 super(LxDmesg, self).__init__("lx-dmesg", gdb.COMMAND_DATA) 26 log_buf_addr = int(str(gdb.parse_and_eval("log_buf")).split()[0], 16) 27 log_first_idx = int(gdb.parse_and_eval("log_first_idx")) 28 log_next_idx = int(gdb.parse_and_eval("log_next_idx")) 29 log_buf_len = int(gdb.parse_and_eval("log_buf_len")) 31 inf = gdb.inferiors()[0] 47 gdb.write("Corrupted log buffer!\n") 57 gdb.write("[{time:12.6f}] {line}\n".format(
|
D | modules.py | 14 import gdb 25 modules = gdb.parse_and_eval("modules") 41 class LxModule(gdb.Function): 56 raise gdb.GdbError("Unable to find MODULE " + mod_name) 62 class LxLsmod(gdb.Command): 68 super(LxLsmod, self).__init__("lx-lsmod", gdb.COMMAND_DATA) 71 gdb.write( 76 gdb.write("{address} {name:<19} {size:>8} {ref}".format( 88 gdb.write("{separator}{name}".format( 93 gdb.write("\n")
|
D | tasks.py | 14 import gdb 24 init_task = gdb.parse_and_eval("init_task").address 49 class LxTaskByPidFunc(gdb.Function): 63 raise gdb.GdbError("No task of PID " + str(pid)) 69 class LxPs(gdb.Command): 73 super(LxPs, self).__init__("lx-ps", gdb.COMMAND_DATA) 77 gdb.write("{address} {pid} {comm}\n".format( 95 ia64_task_size = gdb.parse_and_eval("sizeof(struct task_struct)") 103 class LxThreadInfoFunc (gdb.Function):
|
D | Makefile | 1 always := gdb-scripts 5 $(obj)/gdb-scripts:
|
/linux-4.4.14/Documentation/ |
D | gdb-kernel-debugging.txt | 1 Debugging kernel and modules via gdb 6 using gdb. Gdb comes with a powerful scripting interface for python. The 10 be transferred to the other gdb stubs as well. 16 o gdb 7.2+ (recommended: 7.4+) with python support enabled (typically true 39 o Enable the gdb stub of QEMU/KVM, either 47 o Start gdb: gdb vmlinux 49 Note: Some distros may restrict auto-loading of gdb scripts to known safe 50 directories. In case gdb reports to refuse loading vmlinux-gdb.py, add 54 to ~/.gdbinit. See gdb help for more details. 57 (gdb) target remote :1234 [all …]
|
D | BUG-HUNTING | 203 gdb vmlinux 204 (gdb) l *0xc021e50e 214 gdb vmlinux 215 (gdb) p vt_ioctl 216 (gdb) l *(0x<address of vt_ioctl> + 0xda8) 218 (gdb) l *(vt_ioctl + 0xda8) 226 this shows the problem in the :jbd: module. You can load that module in gdb 228 gdb fs/jbd/jbd.ko 229 (gdb) p log_wait_commit 230 (gdb) l *(0x<address> + 0xa3) [all …]
|
D | debugging-via-ohci1394.txt | 70 There is also a gdb proxy for firewire which allows to use gdb to access 71 data which can be referenced from symbols found by gdb in vmlinux: 74 The latest version of this gdb proxy (fireproxy-0.34) can communicate (not
|
D | oops-tracing.txt | 66 gdb /usr/src/linux/vmlinux 67 gdb> disassemble <offending_function> 108 and then you get a better idea of what happens than with the gdb
|
D | kmemcheck.txt | 545 not been initialized. We can verify this using gdb: 547 $ gdb vmlinux 549 (gdb) p &((struct siginfo *) 0)->_sifields
|
D | kernel-parameters.txt | 1718 gdb or control-c on the dbgp connection. When
|
/linux-4.4.14/arch/cris/ |
D | Kconfig.debug | 15 The CRIS version of gdb can be used to remotely debug a running 16 Linux kernel via the serial debug port. Provided you have gdb-cris 17 installed, run gdb-cris vmlinux, then type 19 (gdb) set remotebaud 115200 <- kgdb uses 115200 as default 20 (gdb) target remote /dev/ttyS0 <- maybe you use another port 23 didn't before). The kernel halts when it boots, waiting for gdb if 38 delivering a terminating SIGSEGV to allow debugging with gdb.
|
/linux-4.4.14/arch/mn10300/kernel/ |
D | Makefile | 20 obj-$(CONFIG_GDBSTUB) += gdb-stub.o gdb-low.o 21 obj-$(CONFIG_GDBSTUB_ON_TTYSx) += gdb-io-serial.o gdb-io-serial-low.o 22 obj-$(CONFIG_GDBSTUB_ON_TTYSMx) += gdb-io-ttysm.o gdb-io-ttysm-low.o
|
/linux-4.4.14/scripts/gdb/ |
D | vmlinux-gdb.py | 19 gdb.parse_and_eval("0") 20 gdb.execute("", to_string=True) 22 gdb.write("NOTE: gdb 7.2 or later required for Linux helper scripts to "
|
/linux-4.4.14/Documentation/DocBook/ |
D | kgdb.xml.db | 5 API-pt-regs-to-gdb-regs 6 API-sleeping-thread-to-gdb-regs 7 API-gdb-regs-to-pt-regs
|
/linux-4.4.14/Documentation/virtual/uml/ |
D | UserModeLinux-HOWTO.txt | 89 11.1 Starting the kernel under gdb 93 11.5 Attaching gdb to the kernel 2473 possible to debug it with gdb almost like any other process. It is 2475 ptraced for system call interception, so gdb can't ptrace them. 2483 ptrace proxy so that gdb works with UML, respectively. 2488 11.1. Starting the kernel under gdb 2490 You can have the kernel running under the control of gdb from the 2492 xterm with gdb running inside it. The kernel will send some commands 2493 to gdb which will leave it stopped at the beginning of start_kernel. 2506 you ^C gdb and get a backtrace, you will see the idle thread, which [all …]
|
/linux-4.4.14/arch/frv/kernel/ |
D | Makefile | 15 obj-$(CONFIG_GDBSTUB) += gdb-stub.o gdb-io.o
|
/linux-4.4.14/Documentation/frv/ |
D | gdbstub.txt | 78 frv-uclinux-gdb linux [uClinux] 82 frv-uclinux-gdb vmlinux [MMU linux] 86 GNU gdb frv-031024 93 (gdb) 97 (gdb) target remote /dev/ttyS0 100 (gdb)
|
D | mmu-layout.txt | 209 The gdb-stub included in this kernel provides a number of services to aid in the debugging of MMU 213 variable is defined in arch/frv/kernel/gdb-stub.c. Note that the gdbinit file in this 220 (gdb) _tlb 239 (gdb) _amr 259 (gdb) _pgd 290 (gdb) _ptd_d
|
/linux-4.4.14/Documentation/zh_CN/ |
D | oops-tracing.txt | 57 使用在Documentation/kdump/gdbmacros.txt中定义的dmesg gdb宏,从旧的内存中提取内核 74 gdb /usr/src/linux/vmlinux 75 gdb> disassemble <offending_function> 106 然后你会比gdb反汇编更清楚的知道发生了什么。
|
/linux-4.4.14/fs/ext4/ |
D | resize.c | 522 struct buffer_head *gdb; in setup_new_flex_group_blocks() local 529 gdb = sb_getblk(sb, block); in setup_new_flex_group_blocks() 530 if (unlikely(!gdb)) { in setup_new_flex_group_blocks() 535 BUFFER_TRACE(gdb, "get_write_access"); in setup_new_flex_group_blocks() 536 err = ext4_journal_get_write_access(handle, gdb); in setup_new_flex_group_blocks() 538 brelse(gdb); in setup_new_flex_group_blocks() 541 memcpy(gdb->b_data, sbi->s_group_desc[j]->b_data, in setup_new_flex_group_blocks() 542 gdb->b_size); in setup_new_flex_group_blocks() 543 set_buffer_uptodate(gdb); in setup_new_flex_group_blocks() 545 err = ext4_handle_dirty_metadata(handle, NULL, gdb); in setup_new_flex_group_blocks() [all …]
|
/linux-4.4.14/scripts/ |
D | Makefile | 46 subdir-$(CONFIG_GDB_SCRIPTS) += gdb
|
/linux-4.4.14/Documentation/s390/ |
D | Debugging390.txt | 33 Stack chaining in gdb by hand 727 If using gdb & you would like accurate displays of registers & 739 some bugs, please make sure you are using gdb-5.0 or later developed 1572 N.B. if compiling for debugging gdb works better without optimisation 1577 gdb <victim program> <optional corefile> 1585 Note gdb's online help is very good use it. 1646 quit: exits gdb. 1681 As an aside unfortunately gdb's, architecture independent watchpoint code 1717 what gdb does when the victim receives certain signals. 1727 Adds directories to be searched for source if gdb cannot find the source. [all …]
|
/linux-4.4.14/Documentation/security/ |
D | Yama.txt | 31 parent to a child process (i.e. direct "gdb EXE" and "strace EXE" still 32 work), or with CAP_SYS_PTRACE (i.e. "gdb --pid=PID", and "strace -p PID"
|
/linux-4.4.14/ |
D | .gitignore | 49 /vmlinux-gdb.py
|
D | README | 392 - Alternatively, you can use gdb on a running kernel. (read-only; i.e. you 397 After you've rebooted with the new kernel, do "gdb vmlinux /proc/kcore". 398 You can now use all the usual gdb commands. The command to look up the 402 gdb'ing a non-running kernel currently fails because gdb (wrongly)
|
D | Makefile | 928 $(Q)ln -fsn `cd $(srctree) && /bin/pwd`/scripts/gdb/vmlinux-gdb.py 1181 signing_key.x509.signer vmlinux-gdb.py
|
D | MAINTAINERS | 4643 F: scripts/gdb/
|
/linux-4.4.14/arch/frv/ |
D | Kconfig.debug | 12 using gdb. This enlarges your kernel ELF image disk size by several
|
/linux-4.4.14/Documentation/kdump/ |
D | gdbmacros.txt | 2 # This file contains a few gdb macros (user defined commands) to extract 7 # directory or current directory) or by invoking gdb command with
|
D | kdump.txt | 459 gdb vmlinux <dump-file>
|
/linux-4.4.14/Documentation/cgroups/ |
D | freezer-subsystem.txt | 44 signals is gdb. In fact any program designed to use ptrace is likely to 49 being frozen. This allows the bash example above and gdb to run as
|
/linux-4.4.14/arch/mn10300/ |
D | Kconfig | 305 Enable access to SIF0 through /dev/ttySM0 or gdb-stub 327 Enable access to SIF1 through /dev/ttySM1 or gdb-stub 358 Enable access to SIF2 through /dev/ttySM2 or gdb-stub
|
D | Kconfig.debug | 40 using gdb. This enlarges your kernel ELF image disk size by several
|
/linux-4.4.14/arch/sh/ |
D | Kconfig.debug | 12 Say Y here if your target has the gdb-sh-stub
|
/linux-4.4.14/arch/xtensa/ |
D | Kconfig | 209 use hardware breakpoints (gdb 'hbreak' cmd) to break at _startup. 210 xt-gdb can't place a Software Breakpoint in the 0XD region prior 212 was mapped gdb wouldn't remove the breakpoint on hitting it as the
|
/linux-4.4.14/fs/proc/ |
D | Kconfig | 36 be read with gdb and other ELF tools. No modifications can be
|
/linux-4.4.14/lib/ |
D | Kconfig.kgdb | 11 kernel using gdb. It is recommended but not required, that
|
D | Kconfig.debug | 128 tools like crash, kgdb, LKCD, gdb, etc on the kernel. 156 Requires recent gcc (4.7+) and recent gdb/binutils. 166 of gcc and gdb. It makes the debug information larger. 168 variables in gdb on optimized code. 175 build directory. If you load vmlinux into gdb, the helper 176 scripts will be automatically imported by gdb as well, and 178 instance. See Documentation/gdb-kernel-debugging.txt for further 1722 firescope and access all memory below 4GB using fireproxy from gdb.
|