免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 2310 | 回复: 3
打印 上一主题 下一主题

GDB下反汇编看到的都是相同的指令 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2014-03-14 17:25 |只看该作者 |倒序浏览
一个linux用户进程crash了,生成core文件,看起来问题出在某个thread,GDB该core文件的时候,对任何函数反汇编,得到的输出都是一样的。
请教高手,是怎么回事?

(gdb) thread 1
[Switching to thread 1 (process 1255)]#0  0x10037dbc in ihash_find__ (sh=0x10a4f39c, key=70, hash=1620853259)
    at /sw/kcao/of/v350/system/ovs/lib/hmap.h:218
218             bucket = &(*bucket)->next;
(gdb) bt
#0  0x10037dbc in ihash_find__ (sh=0x10a4f39c, key=70, hash=1620853259) at /sw/kcao/of/v350/system/ovs/lib/hmap.h:218
#1  0x10037e0c in ihash_find (sh=0x4cf4fc18, key=3213367920) at /sw/kcao/of/v350/system/ovs/lib/hmap.h:218
#2  0x10052d5c in adpt_flowdb_get_flow_info (flow_id=279245724) at /sw/kcao/of/v350/system/ovs/lib/hmap.h:301
#3  0x100fa4d4 in ofp_decode_to_ovs_packet (to_ovs_pkt=0x10a4f39c, to_ovs_pkt_info=0x46) at api/src/ofp_api.c:62
#4  0x100cce2c in packet_client_process (ofproto_=0xbbe80000, packet=0xf) at /sw/kcao/of/v350/system/ovs/lib/byte-order.h:28
#5  0x100cd154 in packet_client_recv (ofproto=0x10a4f39c) at /sw/kcao/of/v350/system/ovs/lib/byte-order.h:28
#6  0x100cfc60 in run_fast (ofproto_=0x10a4f39c) at /sw/kcao/of/v350/system/ovs/lib/byte-order.h:28
#7  0x1001962c in ofproto_run_fast (p=0x10a4f39c) at /sw/kcao/of/v350/system/ovs/lib/hmap.h:218
#8  0x1000bf38 in bridge_run_fast () at /sw/kcao/of/v350/system/ovs/lib/packets.h:61
#9  0x100137f4 in ovs_main (argc=279245724, argv=0x46) at ovs-vswitchd.c:125
#10 0x10036f8c in main (argc=279245724, argv=0x46) at api/src/ofp_master.c:69
(gdb) disassemble ihash_find__
Dump of assembler code for function ihash_find__:
0x10037d38 <ihash_find__+0>:    .long 0x0
0x10037d3c <ihash_find__+4>:    .long 0x0
0x10037d40 <ihash_find__+8>:    .long 0x0
0x10037d44 <ihash_find__+12>:   .long 0x0
0x10037d48 <ihash_find__+16>:   .long 0x0
0x10037d4c <ihash_find__+20>:   .long 0x0
0x10037d50 <ihash_find__+24>:   .long 0x0
0x10037d54 <ihash_find__+28>:   .long 0x0
0x10037d58 <ihash_find__+32>:   .long 0x0
0x10037d5c <ihash_find__+36>:   .long 0x0
0x10037d60 <ihash_find__+40>:   .long 0x0
0x10037d64 <ihash_find__+44>:   .long 0x0
0x10037d68 <ihash_find__+48>:   .long 0x0
0x10037d6c <ihash_find__+52>:   .long 0x0
0x10037d70 <ihash_find__+56>:   .long 0x0
0x10037d74 <ihash_find__+60>:   .long 0x0
0x10037d78 <ihash_find__+64>:   .long 0x0
0x10037d7c <ihash_find__+68>:   .long 0x0
0x10037d80 <ihash_find__+72>:   .long 0x0
0x10037d84 <ihash_find__+76>:   .long 0x0
0x10037d88 <ihash_find__+80>:   .long 0x0
0x10037d8c <ihash_find__+84>:   .long 0x0
0x10037d90 <ihash_find__+88>:   .long 0x0
0x10037d94 <ihash_find__+92>:   .long 0x0
0x10037d98 <ihash_find__+96>:   .long 0x0
0x10037d9c <ihash_find__+100>:  .long 0x0
0x10037da0 <ihash_find__+104>:  .long 0x0
0x10037da4 <ihash_find__+108>:  .long 0x0
0x10037da8 <ihash_find__+112>:  .long 0x0
0x10037dac <ihash_find__+116>:  .long 0x0
0x10037db0 <ihash_find__+120>:  .long 0x0
0x10037db4 <ihash_find__+124>:  .long 0x0
0x10037db8 <ihash_find__+128>:  .long 0x0
0x10037dbc <ihash_find__+132>:  .long 0x0
0x10037dc0 <ihash_find__+136>:  .long 0x0
0x10037dc4 <ihash_find__+140>:  .long 0x0
0x10037dc8 <ihash_find__+144>:  .long 0x0
0x10037dcc <ihash_find__+148>:  .long 0x0
0x10037dd0 <ihash_find__+152>:  .long 0x0
End of assembler dump.
(gdb) disassemble packet_client_recv
Dump of assembler code for function packet_client_recv:
0x100cd0fc <packet_client_recv+0>:      .long 0x0
0x100cd100 <packet_client_recv+4>:      .long 0x0
0x100cd104 <packet_client_recv+8>:      .long 0x0
0x100cd108 <packet_client_recv+12>:     .long 0x0
0x100cd10c <packet_client_recv+16>:     .long 0x0
0x100cd110 <packet_client_recv+20>:     .long 0x0
0x100cd114 <packet_client_recv+24>:     .long 0x0
0x100cd118 <packet_client_recv+28>:     .long 0x0
0x100cd11c <packet_client_recv+32>:     .long 0x0
0x100cd120 <packet_client_recv+36>:     .long 0x0
0x100cd124 <packet_client_recv+40>:     .long 0x0
0x100cd128 <packet_client_recv+44>:     .long 0x0
0x100cd12c <packet_client_recv+48>:     .long 0x0
0x100cd130 <packet_client_recv+52>:     .long 0x0
0x100cd134 <packet_client_recv+56>:     .long 0x0
0x100cd138 <packet_client_recv+60>:     .long 0x0
0x100cd13c <packet_client_recv+64>:     .long 0x0
0x100cd140 <packet_client_recv+68>:     .long 0x0
0x100cd144 <packet_client_recv+72>:     .long 0x0
0x100cd148 <packet_client_recv+76>:     .long 0x0
0x100cd14c <packet_client_recv+80>:     .long 0x0
0x100cd150 <packet_client_recv+84>:     .long 0x0
0x100cd154 <packet_client_recv+88>:     .long 0x0
0x100cd158 <packet_client_recv+92>:     .long 0x0
0x100cd15c <packet_client_recv+96>:     .long 0x0
0x100cd160 <packet_client_recv+100>:    .long 0x0
0x100cd164 <packet_client_recv+104>:    .long 0x0
0x100cd168 <packet_client_recv+108>:    .long 0x0
End of assembler dump.
(gdb)

论坛徽章:
2
摩羯座
日期:2013-10-10 14:29:04天蝎座
日期:2014-01-03 09:14:49
2 [报告]
发表于 2014-03-15 09:20 |只看该作者
直接用objdump反汇编呢?

论坛徽章:
0
3 [报告]
发表于 2014-03-19 12:12 |只看该作者
  用法 不对吧  

论坛徽章:
0
4 [报告]
发表于 2014-03-27 20:28 |只看该作者
提示: 作者被禁止或删除 内容自动屏蔽
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP