Oops stack trace missing function addresses
Adrian Larumbe
fromago at gmail.com
Fri Oct 16 07:49:04 EDT 2020
> OK, I'll bite. You *are* getting the function name and offset, what additional
> knowledge do you get from knowing the VA?
I was hoping to use the VA to calculate the C source line where the
fault happens, by substracting the function's VA from the module load
address as revealed by cat /proc/modules, adding the offset within the
function and then passing the offset to addr2line.
I've just realised I might as well load the module object file into gdb
and do 'info line *(func+offset)'.
But how would I do this just with addr2line ?
> What architecture is this on? Stack unwinding is architecture-dependent, so
> it may just be the unwinder for that arch doesn't output the virtual address.
It's a QEMU VM, 'uname -m' claims it's i686.
More information about the Kernelnewbies
mailing list