This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug releng/6491] New: need runtime-analysis tool to extend blacklist


As seen in bug #6487, new kernel-side code called indirectly from probe handlers
via the runtime can cause deadlocks and whatnot.  It may be nice to have a script
that searches the external-reference/undefined-symbol chain starting from the
systemtap probe module, and a kernel build tree (individual compilation unit .o
files).  If only it could follow the undefined reference chain on a per-function
basis, the transitive closure could give us a pretty good blacklist suggestions.

(given an unresolved external function, find object file that defines it,
"objdump -dr" it to find the functions that it calls, then recurse).

(roland: your ideas regarding encoding the static call graph into dwarf would
be handy if ever implemented)

-- 
           Summary: need runtime-analysis tool to extend blacklist
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: releng
        AssignedTo: systemtap at sources dot redhat dot com
        ReportedBy: fche at redhat dot com


http://sourceware.org/bugzilla/show_bug.cgi?id=6491

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]