On Mon, 6 Mar 2006, Michael Shapiro wrote: > Typically there are two reasons for seeing something like this: > > - a stripped binary or stripped loadable object > - a loadable object which has been dlclose()d > > Is it possible you're hitting one of these cases? One thing you can > quickly check is to do: > > <addr>$m > > which will tell you what mapping the address is in. If you get an answer > from that, then it may be stripped. If you don't, then that address > refers to something which wasn't in memory anymore.
Hi Mike, When I run $m on the address, I get the following: > 0x10085f2a0$m BASE LIMIT SIZE NAME 100800000 10090e000 10e000 I also ran file against the executable and each library linked into the executable, and they all show up as "ELF 64-bit MSB dynamic lib SPARCV9 Version 1, dynamically linked, not stripped." Given this info, is there a way to determine the function name for the topmost function in the stack backtrace? Thanks for the reply, - Ryan -- UNIX Administrator http://daemons.net/~matty