1. Interpreting the results from backtrace()/ backtrace() usability
I've got the following output from backtrace_symbols_fd():
(There are a ton of [0x0]s in the beginning of the file)
...
[0x0]
[0x0]
[0x14000000]
/usr/local/sbin/lockmgr.4.5
[0x42029188]
[0x2e320000]
/usr/local/sbin/lockmgr.4.5
[0x804a758]
[0x2000]
[0x0]
[0x0]
[0x0]
[0x0]
[0x0]
[0x0]
...
[0x0]
[0x0]
[0x0]
[0x0]
[0x0]
[0x0]
[0x0]
[0x10000000]
/lib/ld-linux.so.2[0x40000812]
/usr/local/sbin/lockmgr.4.5[0x4201033a]
[0x4002c1a0]
/lib/ld-linux.so.2(_dl_lookup_versioned_symbol+0x11)[0x40007641]
[0x55a36f5]
/usr/local/sbin/lockmgr.4.5[0x804a7c7]
[0x3]
[0xbfffdef0]
[0xbfffdc0c]
/usr/local/sbin/lockmgr.4.5[0x804a7b7]
[0xe]
/usr/local/sbin/lockmgr.4.5[0x804a758]
[0xbfffdc0c]
/usr/local/sbin/lockmgr.4.5[0x804a7a8]
[0xc]
/lib/ld-linux.so.2[0x400005b8]
/lib/ld-linux.so.2[0x40000218]
/lib/ld-linux.so.2(_rtld_global+0x1c8)[0x400131e8]
[0x4]
[0x4002c294]
[0xbfffdf08]
/usr/local/sbin/lockmgr.4.5
[0x42029188]
I seem to be able to crossreference some 0x8???????es to the output of
nm. But what about the rest? The executable is compiled with debug info.
3. 11 Linux features I care about (was: 10 Linux "features" nobody cares about.)
4. xdm question
5. "Linux Inside": Spoof of Intel Inside
6. Linux and Compaq DeskPro 486/33
7. Formattet output inside variable / line brak inside variable
9. FTP client inside linux firewall communicating with FTP server inside another linux firewall
10. eliminates irqN: nobody cared! and backtrace on inserting 16bit PCMCIA card.
12. Q: does backtrace work correctly?
13. Code to print function call backtrace wanted