This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/12278] New: map .function(0xaddr) to .function("name@...") during pass 2
- From: "fche at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: Wed, 1 Dec 2010 17:48:31 +0000
- Subject: [Bug translator/12278] New: map .function(0xaddr) to .function("name@...") during pass 2
- Auto-submitted: auto-generated
http://sourceware.org/bugzilla/show_bug.cgi?id=12278
Summary: map .function(0xaddr) to .function("name@...")
during pass 2
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: translator
AssignedTo: systemtap@sources.redhat.com
ReportedBy: fche@redhat.com
To help identify function inlining sites, it would help to have this work:
% stap --vp 02 -p4 -e 'probe kernel.function("foobar").inline {}' -w
probe foobar kernel reloc .dynamic pc=0xffffffdeadbeef
% stap --vp 02 -p4 -e 'probe kernel.function(0xffffffdeadbeef).call {}' -w
probe foobar ....
# probes
kernel.function(0xffffffdeadbeef).call ....
Note that we're not seeing the function that contains the inlined foobar
instance.
Note that the definition of function(0xaddr) is a probe at the beginning
of the function that contains said addr, not a kprobe at that addr. Maybe
we're doing that wrong (interpreting .function(addr) as if .statement(addr)).
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.