From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 29781 invoked by alias); 22 Feb 2011 16:46:38 -0000 Received: (qmail 29656 invoked by uid 22791); 22 Feb 2011 16:46:36 -0000 X-SWARE-Spam-Status: No, hits=-2.4 required=5.0 tests=AWL,BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,RCVD_IN_DNSWL_LOW,TW_XF X-Spam-Check-By: sourceware.org Received: from mail-gy0-f169.google.com (HELO mail-gy0-f169.google.com) (209.85.160.169) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Tue, 22 Feb 2011 16:46:29 +0000 Received: by gyb13 with SMTP id 13so1204243gyb.0 for ; Tue, 22 Feb 2011 08:46:28 -0800 (PST) MIME-Version: 1.0 Received: by 10.91.196.3 with SMTP id y3mr3800704agp.205.1298393187841; Tue, 22 Feb 2011 08:46:27 -0800 (PST) Received: by 10.90.25.16 with HTTP; Tue, 22 Feb 2011 08:46:27 -0800 (PST) In-Reply-To: <4D63D825.5080704@redhat.com> References: <4D63D825.5080704@redhat.com> Date: Tue, 22 Feb 2011 16:46:00 -0000 Message-ID: Subject: Re: extract debuginfo for Xorg backtraces From: Elmar Stellnberger To: Nick Clifton Cc: binutils@sourceware.org Content-Type: text/plain; charset=ISO-8859-1 Mailing-List: contact binutils-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: binutils-owner@sourceware.org X-SW-Source: 2011-02/txt/msg00275.txt.bz2 Well, I have already resolved the problem by either just taking the offsets for the so-s or if available by using /proc/pid/maps to calculate them (works better). Now the next riddle is on how to obtain the load base for a kernel module in order to decode crashes related to kernel modules (lsmod does not seem to be useful since it only shows the size but not the load base). Why is it no more possible to save the kernel`s call interface per dd from /proc/self/mem into a file? - dd if=/proc/self/mem of=/dld/linux-gate.so.1 skip=$((0xffffe000)) count=1 bs=4096 How does ldd obtain the kernel address 0xffffe000 of the call gate window - it apparently does not appear in /proc/self/maps (just the window where it shows up.). Can I open this with libbfd? 2011/2/22, Nick Clifton : > Hi Elmar, > >> It works well for everything in /usr/bin/Xorg. However as the >> backtrace meets a shared library (libc.so, radeon_drv.so, >> evdev_drv.so) the symtab does not contain any section that would >> include the given addresses/+offsets. > > How about the dynamic symbol table ? > > I suggest that you have a look at the GDB code base to see how symbols > in shared libraries are handled there. > > Cheers > Nick > >