Hello Li, Thanks for the information. It can fulfil my need. Best regards, Patrick Agrain De : crash-utility-bounces@xxxxxxxxxx [mailto:crash-utility-bounces@xxxxxxxxxx]
De la part de Li Yueyi ** External email - Please consider with caution ** Hi Patrick, Try 'dis' command, like: crash> dis 0xffffffffa4099980 Li Yueyi Send by my mobile phone.
Hello all, Target runs a CentOS8 kernel with KASLR enabled. I triggered a crash on it for training purpose with ‘echo c > /proc/sysrq-trigger’. I analyze the produced dumpfile on another machine where I setup all sources and required debuginfo packages. So far, so good, the backtrace list is complete. But I tried to match address to symbol, I have something like that (e.g. for proc_reg_write() ): crash> info address proc_reg_write Symbol "proc_reg_write" is a function at address 0xffffffffa4099980. crash> info symbol 0xffffffffa4099980 No symbol matches 0xffffffffa4099980. Is there a more ‘elegant’ way to retrieve the symbol from address than to perform an ‘objdump’ request on the vmlinux.debug binary ? Have I missed an option for a command ? Note: I get the same behavior with ‘crash --kaslr auto’ than with ‘crash’. Thanks. Best regards, Patrick Agrain -- |
-- Crash-utility mailing list Crash-utility@xxxxxxxxxx https://listman.redhat.com/mailman/listinfo/crash-utility