We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refer this: https://fuchsia.googlesource.com/fuchsia/+/refs/heads/main/zircon/kernel/scripts/zircon.elf-gdb.py We need something as sophisticated as this for debugging the domains. Any volunteers?
e.g., here is a backtrace of a PF in ixgbe driver domain
cpu(0):Disable irqs cpu(0):EXCEPTION: PAGE FAULT cpu(0):Accessed Address: 4261415040 cpu(0):Error Code: 2 cpu(0):PtRegs { r15: 0xfe000000, r14: 0x105fc5c08, r13: 0x105fb7278, r12: 0x105faf078, rbp: 0x105fb7540, rbx: 0x101e1c000, r11: 0x1, r10: 0xe, r9: 0x2f8, r8: 0x102631c03, rax: 0x0, rcx: 0x2fd, rdx: 0x2f8, rsi: 0x1, rdi: 0x9fd348c, orig_ax: 0xffffffffffffffff, rip: 0x10262a048, rcs: 0x8, rflags: 0x10246, rsp: 0x105f9ac70, ss: 0x10, } cpu(0):Backtrace: cpu(0):frame #1 - 0x00000000010262a047 cpu(0): cpu(0):frame #2 - 0x000000000102624ab2 cpu(0): cpu(0):frame #3 - 0x0000000001022402e1 cpu(0): cpu(0):frame #4 - 0x000000000102625517 cpu(0): cpu(0):frame #5 - 0x00000000000010ead3 - <empty>cpu(0):
Would be nice to have the symbols resolved in backtrace
The text was updated successfully, but these errors were encountered:
czoop
Successfully merging a pull request may close this issue.
Refer this: https://fuchsia.googlesource.com/fuchsia/+/refs/heads/main/zircon/kernel/scripts/zircon.elf-gdb.py
We need something as sophisticated as this for debugging the domains.
Any volunteers?
e.g., here is a backtrace of a PF in ixgbe driver domain
Would be nice to have the symbols resolved in backtrace
The text was updated successfully, but these errors were encountered: