> 
> On Mon, 6 Mar 2006, Michael Shapiro wrote:
> 
> > Typically there are two reasons for seeing something like this:
> >
> >     - a stripped binary or stripped loadable object
> >     - a loadable object which has been dlclose()d
> >
> > Is it possible you're hitting one of these cases?  One thing you can
> > quickly check is to do:
> >
> >     <addr>$m
> >
> > which will tell you what mapping the address is in.  If you get an answer
> > from that, then it may be stripped.  If you don't, then that address
> > refers to something which wasn't in memory anymore.
> 
> Hi Mike,
> 
> When I run $m on the address, I get the following:
> 
> > 0x10085f2a0$m
>              BASE            LIMIT             SIZE NAME
>         100800000        10090e000           10e000
> 
> I also ran file against the executable and each library linked into the
> executable, and they all show up as "ELF 64-bit MSB dynamic lib SPARCV9 
> Version 1, dynamically linked, not stripped." Given this info, is there a 
> way to determine the function name for the topmost function in the stack 
> backtrace?
> 
> Thanks for the reply,
> - Ryan

Hmm: as you see there is no NAME for that mapping, so this is why you're
not getting any symbols: we didn't match it to an object file.
Can you send back the entire $m output?

-Mike

-- 
Mike Shapiro, Solaris Kernel Development. blogs.sun.com/mws/

Reply via email to