On Mon, 6 Mar 2006, Michael Shapiro wrote:

> Typically there are two reasons for seeing something like this:
>
>       - a stripped binary or stripped loadable object
>       - a loadable object which has been dlclose()d
>
> Is it possible you're hitting one of these cases?  One thing you can
> quickly check is to do:
>
>       <addr>$m
>
> which will tell you what mapping the address is in.  If you get an answer
> from that, then it may be stripped.  If you don't, then that address
> refers to something which wasn't in memory anymore.

Hi Mike,

When I run $m on the address, I get the following:

> 0x10085f2a0$m
             BASE            LIMIT             SIZE NAME
        100800000        10090e000           10e000

I also ran file against the executable and each library linked into the
executable, and they all show up as "ELF 64-bit MSB dynamic lib SPARCV9 
Version 1, dynamically linked, not stripped." Given this info, is there a 
way to determine the function name for the topmost function in the stack 
backtrace?

Thanks for the reply,
- Ryan
--
UNIX Administrator
http://daemons.net/~matty

Reply via email to