This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug translator/12278] New: map .function(0xaddr) to .function("name@...") during pass 2


http://sourceware.org/bugzilla/show_bug.cgi?id=12278

           Summary: map   .function(0xaddr)  to .function("name@...")
                    during pass 2
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: translator
        AssignedTo: systemtap@sources.redhat.com
        ReportedBy: fche@redhat.com


To help identify function inlining sites, it would help to have this work:

  % stap --vp 02 -p4 -e 'probe kernel.function("foobar").inline {}' -w
  probe foobar kernel reloc .dynamic pc=0xffffffdeadbeef
  % stap --vp 02 -p4 -e 'probe kernel.function(0xffffffdeadbeef).call {}' -w
  probe foobar ....
  # probes
  kernel.function(0xffffffdeadbeef).call ....

Note that we're not seeing the function that contains the inlined foobar
instance.

Note that the definition of  function(0xaddr)  is a probe at the beginning
of the function that contains said addr, not a kprobe at that addr.  Maybe
we're doing that wrong (interpreting .function(addr) as if .statement(addr)).

-- 
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]