Re: Is stack back trace possible if compiled with -fomit-frame-pointer?

From: Xin Zhao
Date: Wed Sep 21 2005 - 09:51:11 EST


Thanks for your reply.

But I am looking for a tool or method to do stack backtrace
automatically, not debug manually.

The tool listed on http://www.aivosto.com/visustin.html can only
generate control flow from source code. But I need a control flow
generator that can generate control flow from binary codes. One
example is EEL (Executable Edit Library). But it only works for SPARC
machine, not PC. :(

As for the question about the kernel development list, I am developing
a kernel module that supports stack backtrace and can analyze user app
binaries to enforce security policies. So this is still related to
Kernel development. :)

Xin

On 9/21/05, Stefan Smietanowski <stesmi@xxxxxxxxxx> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Xin Zhao wrote:
> > Also, I might want to know whether it is common case that linux apps
> > are compiled with -fomit-frame-pointer swtich?
>
> This is the Linux KERNEL development list.
>
> Not Linux USERSPACE development list.
>
> Find an appropriate list and ask your question there please.
>
> // Stefan
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.1 (MingW32)
>
> iD8DBQFDMXRvBrn2kJu9P78RAtlSAJwOMuF3mA9oxQO6nLwsHTCmf9lngACgkfOQ
> XMpu/ZFfdokiJ7jFSRCpvvQ=
> =Q3QR
> -----END PGP SIGNATURE-----
>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/