From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 19894 invoked by alias); 6 Jul 2009 20:21:16 -0000 Received: (qmail 19883 invoked by uid 22791); 6 Jul 2009 20:21:15 -0000 X-SWARE-Spam-Status: No, hits=-2.5 required=5.0 tests=AWL,BAYES_00 X-Spam-Check-By: sourceware.org Received: from NaN.false.org (HELO nan.false.org) (208.75.86.248) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Mon, 06 Jul 2009 20:21:08 +0000 Received: from nan.false.org (localhost [127.0.0.1]) by nan.false.org (Postfix) with ESMTP id 48451108AF; Mon, 6 Jul 2009 20:21:06 +0000 (GMT) Received: from caradoc.them.org (209.195.188.212.nauticom.net [209.195.188.212]) by nan.false.org (Postfix) with ESMTP id 0F80F104E1; Mon, 6 Jul 2009 20:21:04 +0000 (GMT) Received: from drow by caradoc.them.org with local (Exim 4.69) (envelope-from ) id 1MNugR-0002SJ-Tn; Mon, 06 Jul 2009 16:21:03 -0400 Date: Mon, 06 Jul 2009 20:21:00 -0000 From: Daniel Jacobowitz To: "Frank Ch. Eigler" Cc: gdb-patches@sourceware.org, Mark Kettenis , Michael Matz Subject: Re: RFC: %ebp-based backtrace patch Message-ID: <20090706202103.GA9412@caradoc.them.org> Mail-Followup-To: "Frank Ch. Eigler" , gdb-patches@sourceware.org, Mark Kettenis , Michael Matz References: <20090706183316.GA26074@caradoc.them.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.20 (2009-06-14) X-IsSubscribed: yes Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org X-SW-Source: 2009-07/txt/msg00163.txt.bz2 On Mon, Jul 06, 2009 at 04:10:23PM -0400, Frank Ch. Eigler wrote: > Daniel Jacobowitz writes: > > > A number of Linux distributions are carrying the attached patch from > > Michael Matz. [...] > > https://bugzilla.novell.com/show_bug.cgi?id=390722#c25 > >[...] > > * i386-tdep.c (i386_frame_cache): Assume anonymous functions use > > a frame pointer. > >[...] > > Could gdb partially disassemble such functions to check > whether %ebp is likely being used as this heuristic expects? I don't think so, but maybe someone else will come up with a way. Since we don't know the function's start address, we could be anywhere in the function. -- Daniel Jacobowitz CodeSourcery