How to symbolize the backtrace in kernel core dump?

Hi,

I have kernel panic and core dump file:
  • Panic Report *

panic(cpu 2 caller 0xffffff801265c266): "A kext releasing a(n) IOUSBInterface has corrupted the registry."@/SourceCache/xnu/xnu-6153.121.2/libkern/c++/OSObject.cpp:219
Backtrace (CPU 2), Frame : Return Address
0xffffff811e9a3d30 : 0xffffff801212bda1
0xffffff811e9a3db0 : 0xffffff801265c266
0xffffff811e9a3e00 : 0xffffff7f94857b6f
0xffffff811e9a3e20 : 0xffffff7f948579df
0xffffff811e9a3e40 : 0xffffff7f94857255
0xffffff811e9a3e70 : 0xffffff80126b3cad
0xffffff811e9a3eb0 : 0xffffff80126b379f
0xffffff811e9a3f30 : 0xffffff80126ae553
0xffffff811e9a3f70 : 0xffffff80126b4443
0xffffff811e9a3fb0 : 0xffffff80122125b7

I use "lldb -c [core.dump.file]" and "bt" to show the backtrace, but there is no symbols:
  • thread #1: tid = 0x0000, 0xffffff8009abcecb, stop reason = signal SIGSTOP

  • frame #0: 0xffffff8009abcecb

frame #1: 0xffffff8009a1d636
frame #2: 0xffffff8009d4e45f
frame #3: 0xffffff8009d4cf7d
frame #4: 0xffffff8009d9e585
frame #5: 0xffffff8009d59942
frame #6: 0xffffff8009d58ebd
frame #7: 0xffffff7f8b28c299
frame #8: 0xffffff8009d48dc1
frame #9: 0xffffff8009afc6ee
frame #10: 0xffffff8009b103ee
frame #11: 0xffffff8009b02bc9
frame #12: 0xffffff8009b03394
frame #13: 0xffffff8009de97ba

Does anyone know how to symbolize it? I need the corresponding KDKs? Thanks!

Answered by Android2Test in 620371022
Ok, I have solved this problem by myself. Please ping me if anyone wants to know.
Accepted Answer
Ok, I have solved this problem by myself. Please ping me if anyone wants to know.
How to symbolize the backtrace in kernel core dump?
 
 
Q