tdep/1683: Can't backtrace from syscalls

schwab@suse.de schwab@suse.de
Tue Jun 22 12:58:00 GMT 2004


>Number:         1683
>Category:       tdep
>Synopsis:       Can't backtrace from syscalls
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    unassigned
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Tue Jun 22 12:58:00 UTC 2004
>Closed-Date:
>Last-Modified:
>Originator:     schwab@suse.de
>Release:        6.1.1
>Organization:
>Environment:
ia64-suse-linux
>Description:
gdb can't backtrace from syscalls and misinterprets the frame as signal frame.
>How-To-Repeat:
$ cat cat.c
#include <stdio.h>

int
main (void)
{
  int c;

  while ((c = getchar ()) != EOF)
    putchar (c);
  return 0;
}
$ gdb cat
GNU gdb 6.1.1
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "ia64-suse-linux"...Using host libthread_db library "/lib/tls/libthread_db.so.1".

(gdb) r
Starting program: /suse/schwab/test/cat 

Program received signal SIGINT, Interrupt.
<signal handler called>
(gdb) bt
#0  <signal handler called>
Cannot access memory at address 0x28
(gdb) 
>Fix:

>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the Gdb-prs mailing list