Re: How to glean info from a kernel oops

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

Call Trace:
[<d083af26>] svc_authorise+0x1b/0x2a [sunrpc]
[<d0838270>] svc_process+0x411/0x689 [sunrpc]
...

Here, the first hex value is the offset in the procedure, and the
second is the total length of the procedure. Note that the offset does
not mean the line offset in the source code. Rather an offset in the
(memory containing) machine language code. So you can utilize the hex
value and use objdump to find the offending machine language
instruction. And then reverse engineer it to find the corresponding C
source line.

Thanks,

Rajat

--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
Please read the FAQ at http://kernelnewbies.org/FAQ


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux