From mboxrd@z Thu Jan 1 00:00:00 1970 From: linux@arm.linux.org.uk (Russell King - ARM Linux) Date: Thu, 22 Jul 2010 09:00:16 +0100 Subject: [PATCH] arm: show_regs dump stack when ARM_UNWIND enable In-Reply-To: <20100721172428.GA5881@localhost.localdomain> References: <20100720152431.GA17092@localhost.localdomain> <1279640276.10002.35.camel@e102109-lin.cambridge.arm.com> <1279704065.17464.1.camel@e102109-lin.cambridge.arm.com> <20100721172428.GA5881@localhost.localdomain> Message-ID: <20100722080016.GF6802@n2100.arm.linux.org.uk> To: linux-arm-kernel@lists.infradead.org List-Id: linux-arm-kernel.lists.infradead.org On Thu, Jul 22, 2010 at 01:24:28AM +0800, Janboe Ye wrote: > Is there any way for arm unwind to do user space backtrace like > c_backtrace in arm_syscall? That's a job for userspace, which would have access to the program debug information, which is necessary for unwinding EABI programs. The debug information is not loaded into the programs address space when you run it, and therefore would not be available to the kernel.