This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug runtime/10599] Always print module/map names for kernel/executable addresses
- From: "mjw at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 29 Jun 2010 14:39:16 -0000
- Subject: [Bug runtime/10599] Always print module/map names for kernel/executable addresses
- References: <20090903190711.10599.mjw@redhat.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From mjw at redhat dot com 2010-06-29 14:39 -------
commit 82ea0c96760eba1a1f521c007b9353e7e568906b
Author: Mark Wielaard <mjw@redhat.com>
Date: Tue Jun 29 16:16:02 2010 +0200
PR10599 Always print modname when available (and requested).
* runtime/sym.c (_stp_umod_lookup): Also return vm_end if available.
(_stp_kallsyms_lookup): Don't try to handle 32bit-on-64bit signedness,
_stp_umod_lookup already does. If available return modname, size and
offset.
(_stp_print_addr): Always print modname when available (and requested).
(_stp_symbol_snprint): Likewise.
* runtime/unwind.c (unwind): Adjust _stp_umod_lookup call.
* tapset/ucontext.stp (umodname): Likewise.
$ stap -e 'probe timer.profile { if (pid() != 0)
{ log(execname() . ": " . usymdata(uaddr())); } }'
sh: 0x00000033dc7215e8 libc-2.12.so+0x1215e8/0x37f000
sh: 0x00000033dc6a6e47 libc-2.12.so+0xa6e47/0x175000
gcc: 0x0000000000414dbd gcc+0x14dbd/0x3f000
gcc: 0x00000033dc6d3ad5 libc-2.12.so+0xd3ad5/0x37f000
cc1: 0x00000033dc6d3fb0 libc-2.12.so+0xd3fb0/0x37f000
[...]
Backtraces that cannot continue because module wasn't loaded with -d will now
end with address+modname whenever possible.
process("/bin/ls").function("ferror_unlocked@/usr/include/bits/stdio.h:133")
0x0000000000411fcb : close_stream+0x1b/0x90 [ls]
0x000000000040ba4d : close_stdout+0x3d/0xc0 [ls]
0x00000033dc635ff2 [libc-2.12.so+0x35ff2/0x37f000]
--
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |FIXED
http://sourceware.org/bugzilla/show_bug.cgi?id=10599
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.