Yo Hal!

On Tue, 30 May 2017 23:12:40 -0700
Hal Murray <hmur...@megapathdsl.net> wrote:

> Gary said:
> > There was never a way to decode the addresses beyond that.  Is that
> > any use? Any way to improve it so it has value?   
> 
> > #5 0x556b8bed9299 in ??  
> 
> I assume those are PCs.

Yes.

> Is there a way to get gdb to turn them into symbols?

Nope, not with gdb.

> Assuming I have
> the right ntpd handy.

Pretty unlikely you are running a binary different from the binary
you have in front of you.  :-)

> A while ago, you removed some symbol code.  Did that have any hope of 
> printing out something useful?

Nope.  The only way that worked was to hand code the symbol offset,
which nobody had ever done.

I did find this: backtrace_symbols(), which is gcc only.  It adds a bit
of decoding, assuming no stripping and some special LDFLAGS, but hardly
better.

So I wanted to see what backtrace() did with a seccomp fault, but now
I see that even though I have seccomp in my kernel, and compiled in, that
I can not trigger a seccomp fault, even if I remove syscalls that I
know ntpd uses...

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
        g...@rellim.com  Tel:+1 541 382 8588

            Veritas liberabit vos. -- Quid est veritas?
    "If you can’t measure it, you can’t improve it." - Lord Kelvin

Attachment: pgpDh94NNatXW.pgp
Description: OpenPGP digital signature

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to