This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug releng/6491] New: need runtime-analysis tool to extend blacklist
- From: "fche at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 7 May 2008 20:51:37 -0000
- Subject: [Bug releng/6491] New: need runtime-analysis tool to extend blacklist
- Reply-to: sourceware-bugzilla at sourceware dot org
As seen in bug #6487, new kernel-side code called indirectly from probe handlers
via the runtime can cause deadlocks and whatnot. It may be nice to have a script
that searches the external-reference/undefined-symbol chain starting from the
systemtap probe module, and a kernel build tree (individual compilation unit .o
files). If only it could follow the undefined reference chain on a per-function
basis, the transitive closure could give us a pretty good blacklist suggestions.
(given an unresolved external function, find object file that defines it,
"objdump -dr" it to find the functions that it calls, then recurse).
(roland: your ideas regarding encoding the static call graph into dwarf would
be handy if ever implemented)
--
Summary: need runtime-analysis tool to extend blacklist
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: releng
AssignedTo: systemtap at sources dot redhat dot com
ReportedBy: fche at redhat dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=6491
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.