Interpreting the results from backtrace()/ backtrace() usability

Interpreting the results from backtrace()/ backtrace() usability

Post by morde » Fri, 21 Feb 2003 06:26:55



I've got the following output from backtrace_symbols_fd():

(There are a ton of [0x0]s in the beginning of the file)

...
[0x0]
[0x0]
[0x14000000]
/usr/local/sbin/lockmgr.4.5
[0x42029188]
[0x2e320000]
/usr/local/sbin/lockmgr.4.5
[0x804a758]
[0x2000]
[0x0]
[0x0]
[0x0]
[0x0]
[0x0]
[0x0]

...

[0x0]
[0x0]
[0x0]
[0x0]
[0x0]
[0x0]
[0x0]
[0x10000000]
/lib/ld-linux.so.2[0x40000812]
/usr/local/sbin/lockmgr.4.5[0x4201033a]
[0x4002c1a0]
/lib/ld-linux.so.2(_dl_lookup_versioned_symbol+0x11)[0x40007641]
[0x55a36f5]
/usr/local/sbin/lockmgr.4.5[0x804a7c7]
[0x3]
[0xbfffdef0]
[0xbfffdc0c]
/usr/local/sbin/lockmgr.4.5[0x804a7b7]
[0xe]
/usr/local/sbin/lockmgr.4.5[0x804a758]
[0xbfffdc0c]
/usr/local/sbin/lockmgr.4.5[0x804a7a8]
[0xc]
/lib/ld-linux.so.2[0x400005b8]
/lib/ld-linux.so.2[0x40000218]
/lib/ld-linux.so.2(_rtld_global+0x1c8)[0x400131e8]
[0x4]
[0x4002c294]
[0xbfffdf08]
/usr/local/sbin/lockmgr.4.5
[0x42029188]

I seem to be able to crossreference some 0x8???????es to the output of
nm. But what about the rest? The executable is compiled with debug info.