Re: Deciphering Call Trace details

2009-03-04 Thread yogeshwar sonawane
Hi all, I was searching on the net for solving oops. This thread/discussion helped me alot. Thanks to all. I tried objdump gdb on vmlinux. Using this, i am able to get information about kernel functions their symbols. Now, if a module (created by a used) is giving kernel-panic/oops messages,

Re: Deciphering Call Trace details

2009-03-04 Thread Durga Prasad
@nl.linux.org; b...@q-leap.de Sent: Wednesday, March 4, 2009 7:03:26 PM Subject: Re: Deciphering Call Trace details Hi all, I was searching on the net for solving oops. This thread/discussion helped me alot. Thanks to all. I tried objdump gdb on vmlinux. Using this, i am able to get information about

Re: Deciphering Call Trace details

2008-06-16 Thread Thomas Petazzoni
Le Thu, 12 Jun 2008 17:53:18 +0530 (IST), jasjit singh [EMAIL PROTECTED] a écrit : My question is how I can decipher the constant values that are added to (perhaps) function pointers. e.g 412 in {chrdev_open+412}. Can these figures be actually helpful in getting what exactly caused kernel to

Deciphering Call Trace details

2008-06-12 Thread jasjit singh
Hi all whenever kernel gets panicked, it gives some messages like - NMI Watchdog detected LOCKUP, CPU=0, registers: CPU 0 Modules linked in: ccp(U) md5 ipv6 parport_pc lp parport autofs4 i2c_dev i2c_core nfs lockd

Re: Deciphering Call Trace details

2008-06-12 Thread Johannes Weiner
Hi, jasjit singh [EMAIL PROTECTED] writes: Hi all whenever kernel gets panicked, it gives some messages like - NMI Watchdog detected LOCKUP, CPU=0, registers: CPU 0 Modules linked in: ccp(U) md5 ipv6

Re: Deciphering Call Trace details

2008-06-12 Thread Mulyadi Santosa
Hi... On Thu, Jun 12, 2008 at 7:23 PM, jasjit singh [EMAIL PROTECTED] wrote: My question is how I can decipher the constant values that are added to (perhaps) function pointers. e.g 412 in {chrdev_open+412}. that's...IIRC the offset from the beginning of function. Can these figures be

Re: Deciphering Call Trace details

2008-06-12 Thread Wenhua Zhao
Hi, Mulyadi Santosa [EMAIL PROTECTED] writes: On Thu, Jun 12, 2008 at 7:23 PM, jasjit singh [EMAIL PROTECTED] wrote: My question is how I can decipher the constant values that are added to (perhaps) function pointers. e.g 412 in {chrdev_open+412}. that's...IIRC the offset from the

Re: Deciphering Call Trace details

2008-06-12 Thread Bernd Schubert
Hello Jasjit, jasjit singh wrote: Hi all whenever kernel gets panicked, it gives some messages like - NMI Watchdog detected LOCKUP, CPU=0, registers: CPU 0 Modules linked in: ccp(U) md5 ipv6 parport_pc lp