# In some cases we cannot reliably find out we got behind _start as some
# operating system do not properly terminate CFI by undefined PC.
# Ignore it here as it is a bug of OS, not a bug of elfutils.
-# If the CFI is not terminated correctly, we might find another frame by
-# checking for frame pointers. This is still not our problem, but only
-# gives an error message when trying to look up the function name.
check_err()
{
if [ $(egrep -v <$1 'dwfl_thread_getframes: (No DWARF information found|no matching address range|address out of range)$' \
bt=$1
err=$2
testname=$3
- if [ "x$4" != "x--allow-unknown" ]; then
- check_main $bt $testname
- fi
+ check_main $bt $testname
check_gsignal $bt $testname
check_err $err $testname
}
check_core()
{
arch=$1
- args=$2
testfiles backtrace.$arch.{exec,core}
tempfiles backtrace.$arch.{bt,err}
echo ./backtrace ./backtrace.$arch.{exec,core}
- testrun ${abs_builddir}/backtrace $args -e ./backtrace.$arch.exec --core=./backtrace.$arch.core 1>backtrace.$arch.bt 2>backtrace.$arch.err || true
+ testrun ${abs_builddir}/backtrace -e ./backtrace.$arch.exec --core=./backtrace.$arch.core 1>backtrace.$arch.bt 2>backtrace.$arch.err || true
cat backtrace.$arch.{bt,err}
check_unsupported backtrace.$arch.err backtrace.$arch.core
- check_all backtrace.$arch.{bt,err} backtrace.$arch.core $args
+ check_all backtrace.$arch.{bt,err} backtrace.$arch.core
}
# Backtrace live process.
return DWARF_CB_OK;
}
-static bool allow_unknown;
static bool use_raise_jmp_patching;
static pid_t check_tid;
seen_main = true;
if (pc == 0)
{
- if (!allow_unknown)
- assert (seen_main);
+ assert (seen_main);
return;
}
if (check_tid == 0)
&& (strcmp (symname, "__kernel_vsyscall") == 0
|| strcmp (symname, "__libc_do_syscall") == 0))
reduce_frameno = true;
- else if (!allow_unknown || symname)
+ else
assert (symname && strcmp (symname, "raise") == 0);
break;
case 1:
- if (!allow_unknown || symname)
- assert (symname != NULL && strcmp (symname, "sigusr2") == 0);
+ assert (symname != NULL && strcmp (symname, "sigusr2") == 0);
break;
case 2: // x86_64 only
/* __restore_rt - glibc maybe does not have to have this symbol. */
if (use_raise_jmp_patching)
{
/* Verify we trapped on the very first instruction of jmp. */
- if (!allow_unknown || symname)
- assert (symname != NULL && strcmp (symname, "jmp") == 0);
+ assert (symname != NULL && strcmp (symname, "jmp") == 0);
mod = dwfl_addrmodule (dwfl, pc - 1);
if (mod)
symname2 = dwfl_module_addrname (mod, pc - 1);
- if (!allow_unknown || symname2)
- assert (symname2 == NULL || strcmp (symname2, "jmp") != 0);
+ assert (symname2 == NULL || strcmp (symname2, "jmp") != 0);
break;
}
/* FALLTHRU */
case 4:
- if (!allow_unknown || symname)
- assert (symname != NULL && strcmp (symname, "stdarg") == 0);
+ assert (symname != NULL && strcmp (symname, "stdarg") == 0);
break;
case 5:
/* Verify we trapped on the very last instruction of child. */
- if (!allow_unknown || symname)
- assert (symname != NULL && strcmp (symname, "backtracegen") == 0);
+ assert (symname != NULL && strcmp (symname, "backtracegen") == 0);
mod = dwfl_addrmodule (dwfl, pc);
if (mod)
symname2 = dwfl_module_addrname (mod, pc);
// there is no guarantee that the compiler doesn't reorder the
// instructions or even inserts some padding instructions at the end
// (which apparently happens on ppc64).
- if (use_raise_jmp_patching && (!allow_unknown || symname2))
+ if (use_raise_jmp_patching)
assert (symname2 == NULL || strcmp (symname2, "backtracegen") != 0);
break;
}
}
#define OPT_BACKTRACE_EXEC 0x100
-#define OPT_ALLOW_UNKNOWN 0x200
static const struct argp_option options[] =
{
{ "backtrace-exec", OPT_BACKTRACE_EXEC, "EXEC", 0, N_("Run executable"), 0 },
- { "allow-unknown", OPT_ALLOW_UNKNOWN, 0, 0, N_("Allow unknown symbols"), 0 },
{ NULL, 0, NULL, 0, NULL, 0 }
};
exec_dump (arg);
exit (0);
- case OPT_ALLOW_UNKNOWN:
- allow_unknown = true;
- break;
-
default:
return ARGP_ERR_UNKNOWN;
}
(void) setlocale (LC_ALL, "");
elf_version (EV_CURRENT);
- allow_unknown = false;
Dwfl *dwfl = NULL;
const struct argp_child argp_children[] =