This is the mail archive of the
archer@sourceware.org
mailing list for the Archer project.
Re: Stack trace from core file without executable
On Mon, Oct 20, 2008 at 10:40:46AM -0700, Paul Pluzhnikov wrote:
> > [New process 23913]
> > #0 0xb7f08410 in __kernel_vsyscall ()
> > #0 0xb7f08410 in __kernel_vsyscall ()
> > #1 0xb7dd4085 in ?? ()
>
> Frame #1 above is correct; I wonder what causes the rest of it to
> go wrong :-( ...
IIRC there's a patch in someone's (SuSE's?) GDB packages that improves
success for %ebp-based backtracing. Some bit of GDB decides that
missing symbols are frameless functions, which is a debatable choice.
Ref: debian bug 498030, http://bugs.debian.org/498030 .
--
Daniel Jacobowitz
CodeSourcery