From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 8980 invoked by alias); 27 Apr 2012 10:00:53 -0000 Received: (qmail 8794 invoked by uid 22791); 27 Apr 2012 10:00:50 -0000 X-SWARE-Spam-Status: No, hits=-2.9 required=5.0 tests=ALL_TRUSTED,AWL,BAYES_00 X-Spam-Check-By: sourceware.org Received: from localhost (HELO sourceware.org) (127.0.0.1) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Fri, 27 Apr 2012 10:00:36 +0000 From: "adrian.m.negreanu at intel dot com" To: systemtap@sourceware.org Subject: [Bug runtime/14026] New: print_ubacktrace doesn't resolve the symbol name Date: Fri, 27 Apr 2012 10:00:00 -0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: systemtap X-Bugzilla-Component: runtime X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: adrian.m.negreanu at intel dot com X-Bugzilla-Status: NEW X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: systemtap at sourceware dot org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Changed-Fields: Message-ID: X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2012-q2/txt/msg00083.txt.bz2 http://sourceware.org/bugzilla/show_bug.cgi?id=14026 Bug #: 14026 Summary: print_ubacktrace doesn't resolve the symbol name Product: systemtap Version: unspecified Status: NEW Severity: normal Priority: P2 Component: runtime AssignedTo: systemtap@sourceware.org ReportedBy: adrian.m.negreanu@intel.com Classification: Unclassified Created attachment 6372 --> http://sourceware.org/bugzilla/attachment.cgi?id=6372 readelf -a on the debug file On an android x86 target, I'm trying this script: probe process("/system/bin/mksh").function("chvt_reinit") { printf("%s: pid=%d\n", module_name(), pid()); printf("%s: ", module_name()); print_regs(); print_ubacktrace(); printf("%s: DONE\n",module_name()); } The backtrace consists of only addresses. I attached the output of stap + staprun, readelf -a on the target executable and of its .gnu_debuglink and also the "readelf -debug-dump=frames target_executable". One thing I noticed while trying to get more insight of what's happening, was that if I define UNW_PC_FROM_RA to be 1, in -debug-dump=frames the symbol is resolved but unwind() will only unwind the topmost frame. -- Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug.