- 论坛徽章:
- 0
|
非常感谢,此处stack 信息完全被**了,所以arm-eabi-addr2line没有太多的参考价值。
只好通过新旧版本分别try run对比,发现问题点在arch/arm/kernel/sys_arm.c 中的 kernel_execve()@linux3.4.39
“
/*
* We were successful. We won't be returning to our caller, but
* instead to user space by manipulating the kernel stack.
*/
asm( "add r0, %0, %1\n\t"
"mov r1, %2\n\t"
"mov r2, %3\n\t"
"bl memmove\n\t" /* copy regs to top of stack */
"mov r8, #0\n\t" /* not a syscall */
"mov r9, %0\n\t" /* thread structure */
"mov sp, r0\n\t" /* reposition stack pointer */
"b ret_to_user"
:
: "r" (current_thread_info()),
"Ir" (THREAD_START_SP - sizeof(regs)),
"r" (®s),
"Ir" (sizeof(regs))
: "r0", "r1", "r2", "r3", "r8", "r9", "ip", "lr", "memory");
”
arm-eabi-addr2line -e vmlinux de878540
??:0
arm-eabi-addr2line -e vmlinux c0875300
reciprocal_div.c:0
arm-eabi-addr2line -e vmlinux 00000002
??:0
arm-eabi-addr2line -e vmlinux 00000015
??:0
arm-eabi-addr2line -e vmlinux de878540
??:0
arm-eabi-addr2line -e vmlinux c1c82900
??:0
|
|