This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug tapsets/10206] New: symname() resolves incorrect symbols on ppc
- From: "prerna at linux dot vnet dot ibm dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 27 May 2009 11:50:22 -0000
- Subject: [Bug tapsets/10206] New: symname() resolves incorrect symbols on ppc
- Reply-to: sourceware-bugzilla at sourceware dot org
A probe like
#stap -d kernel -k -ve 'global var = 0xc000000000008b64; probe begin {
printf("%x: %s\n", var, symname(var)) exit() }'
Output :
Pass 1: parsed user script and 52 library script(s) in 500usr/10sys/561real ms.
Pass 2: analyzed script: 1 probe(s), 2 function(s), 1 embed(s), 1 global(s) in
0usr/0sys/8real ms.
Pass 3: translated to C into "/tmp/staptKkAq5/stap_12573.c" in
1070usr/980sys/2346real ms.
Pass 4: compiled C into "stap_12573.ko" in 8260usr/740sys/9660real ms.
Pass 5: starting run.
c000000000008b64: .ret_from_except_lite
Pass 5: run completed in 10usr/100sys/155real ms.
===============================================================================
looking into /proc/kallsyms,
...
#grep "do_work" /proc/kallsyms
c000000000008b64 t do_work
c00000000009ecb8 t .do_work_for_cpu
d000000001718b00 d do_work [dm_mod]
d00000000170a4bc t .do_work [dm_mod]
...
I've reproduced a part of stap-symbols.h,it has no address corresponding to
0x8b64, and the symbol gets resolved to the closest match, ie
.ret_from_except_lite :
{ 0x8a00, ".ret_from_except" },
{ 0x8a54, ".ret_from_except_lite" },
{ 0x8b98, ".enter_rtas" },
--
Summary: symname() resolves incorrect symbols on ppc
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: tapsets
AssignedTo: systemtap at sources dot redhat dot com
ReportedBy: prerna at linux dot vnet dot ibm dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=10206
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.